• Title/Summary/Keyword: Research Methodology

Search Result 10,263, Processing Time 0.046 seconds

Business Application of Convolutional Neural Networks for Apparel Classification Using Runway Image (합성곱 신경망의 비지니스 응용: 런웨이 이미지를 사용한 의류 분류를 중심으로)

  • Seo, Yian;Shin, Kyung-shik
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.1-19
    • /
    • 2018
  • Large amount of data is now available for research and business sectors to extract knowledge from it. This data can be in the form of unstructured data such as audio, text, and image data and can be analyzed by deep learning methodology. Deep learning is now widely used for various estimation, classification, and prediction problems. Especially, fashion business adopts deep learning techniques for apparel recognition, apparel search and retrieval engine, and automatic product recommendation. The core model of these applications is the image classification using Convolutional Neural Networks (CNN). CNN is made up of neurons which learn parameters such as weights while inputs come through and reach outputs. CNN has layer structure which is best suited for image classification as it is comprised of convolutional layer for generating feature maps, pooling layer for reducing the dimensionality of feature maps, and fully-connected layer for classifying the extracted features. However, most of the classification models have been trained using online product image, which is taken under controlled situation such as apparel image itself or professional model wearing apparel. This image may not be an effective way to train the classification model considering the situation when one might want to classify street fashion image or walking image, which is taken in uncontrolled situation and involves people's movement and unexpected pose. Therefore, we propose to train the model with runway apparel image dataset which captures mobility. This will allow the classification model to be trained with far more variable data and enhance the adaptation with diverse query image. To achieve both convergence and generalization of the model, we apply Transfer Learning on our training network. As Transfer Learning in CNN is composed of pre-training and fine-tuning stages, we divide the training step into two. First, we pre-train our architecture with large-scale dataset, ImageNet dataset, which consists of 1.2 million images with 1000 categories including animals, plants, activities, materials, instrumentations, scenes, and foods. We use GoogLeNet for our main architecture as it has achieved great accuracy with efficiency in ImageNet Large Scale Visual Recognition Challenge (ILSVRC). Second, we fine-tune the network with our own runway image dataset. For the runway image dataset, we could not find any previously and publicly made dataset, so we collect the dataset from Google Image Search attaining 2426 images of 32 major fashion brands including Anna Molinari, Balenciaga, Balmain, Brioni, Burberry, Celine, Chanel, Chloe, Christian Dior, Cividini, Dolce and Gabbana, Emilio Pucci, Ermenegildo, Fendi, Giuliana Teso, Gucci, Issey Miyake, Kenzo, Leonard, Louis Vuitton, Marc Jacobs, Marni, Max Mara, Missoni, Moschino, Ralph Lauren, Roberto Cavalli, Sonia Rykiel, Stella McCartney, Valentino, Versace, and Yve Saint Laurent. We perform 10-folded experiments to consider the random generation of training data, and our proposed model has achieved accuracy of 67.2% on final test. Our research suggests several advantages over previous related studies as to our best knowledge, there haven't been any previous studies which trained the network for apparel image classification based on runway image dataset. We suggest the idea of training model with image capturing all the possible postures, which is denoted as mobility, by using our own runway apparel image dataset. Moreover, by applying Transfer Learning and using checkpoint and parameters provided by Tensorflow Slim, we could save time spent on training the classification model as taking 6 minutes per experiment to train the classifier. This model can be used in many business applications where the query image can be runway image, product image, or street fashion image. To be specific, runway query image can be used for mobile application service during fashion week to facilitate brand search, street style query image can be classified during fashion editorial task to classify and label the brand or style, and website query image can be processed by e-commerce multi-complex service providing item information or recommending similar item.

Development of the Accident Prediction Model for Enlisted Men through an Integrated Approach to Datamining and Textmining (데이터 마이닝과 텍스트 마이닝의 통합적 접근을 통한 병사 사고예측 모델 개발)

  • Yoon, Seungjin;Kim, Suhwan;Shin, Kyungshik
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.3
    • /
    • pp.1-17
    • /
    • 2015
  • In this paper, we report what we have observed with regards to a prediction model for the military based on enlisted men's internal(cumulative records) and external data(SNS data). This work is significant in the military's efforts to supervise them. In spite of their effort, many commanders have failed to prevent accidents by their subordinates. One of the important duties of officers' work is to take care of their subordinates in prevention unexpected accidents. However, it is hard to prevent accidents so we must attempt to determine a proper method. Our motivation for presenting this paper is to mate it possible to predict accidents using enlisted men's internal and external data. The biggest issue facing the military is the occurrence of accidents by enlisted men related to maladjustment and the relaxation of military discipline. The core method of preventing accidents by soldiers is to identify problems and manage them quickly. Commanders predict accidents by interviewing their soldiers and observing their surroundings. It requires considerable time and effort and results in a significant difference depending on the capabilities of the commanders. In this paper, we seek to predict accidents with objective data which can easily be obtained. Recently, records of enlisted men as well as SNS communication between commanders and soldiers, make it possible to predict and prevent accidents. This paper concerns the application of data mining to identify their interests, predict accidents and make use of internal and external data (SNS). We propose both a topic analysis and decision tree method. The study is conducted in two steps. First, topic analysis is conducted through the SNS of enlisted men. Second, the decision tree method is used to analyze the internal data with the results of the first analysis. The dependent variable for these analysis is the presence of any accidents. In order to analyze their SNS, we require tools such as text mining and topic analysis. We used SAS Enterprise Miner 12.1, which provides a text miner module. Our approach for finding their interests is composed of three main phases; collecting, topic analysis, and converting topic analysis results into points for using independent variables. In the first phase, we collect enlisted men's SNS data by commender's ID. After gathering unstructured SNS data, the topic analysis phase extracts issues from them. For simplicity, 5 topics(vacation, friends, stress, training, and sports) are extracted from 20,000 articles. In the third phase, using these 5 topics, we quantify them as personal points. After quantifying their topic, we include these results in independent variables which are composed of 15 internal data sets. Then, we make two decision trees. The first tree is composed of their internal data only. The second tree is composed of their external data(SNS) as well as their internal data. After that, we compare the results of misclassification from SAS E-miner. The first model's misclassification is 12.1%. On the other hand, second model's misclassification is 7.8%. This method predicts accidents with an accuracy of approximately 92%. The gap of the two models is 4.3%. Finally, we test if the difference between them is meaningful or not, using the McNemar test. The result of test is considered relevant.(p-value : 0.0003) This study has two limitations. First, the results of the experiments cannot be generalized, mainly because the experiment is limited to a small number of enlisted men's data. Additionally, various independent variables used in the decision tree model are used as categorical variables instead of continuous variables. So it suffers a loss of information. In spite of extensive efforts to provide prediction models for the military, commanders' predictions are accurate only when they have sufficient data about their subordinates. Our proposed methodology can provide support to decision-making in the military. This study is expected to contribute to the prevention of accidents in the military based on scientific analysis of enlisted men and proper management of them.

Study on the Effects of Shop Choice Properties on Brand Attitudes: Focus on Six Major Coffee Shop Brands (점포선택속성이 브랜드 태도에 미치는 영향에 관한 연구: 6개 메이저 브랜드 커피전문점을 중심으로)

  • Yi, Weon-Ho;Kim, Su-Ok;Lee, Sang-Youn;Youn, Myoung-Kil
    • Journal of Distribution Science
    • /
    • v.10 no.3
    • /
    • pp.51-61
    • /
    • 2012
  • This study seeks to understand how the choice of a coffee shop is related to a customer's loyalty and which characteristics of a shop influence this choice. It considers large-sized coffee shops brands whose market scale has gradually grown. The users' choice of shop is determined by price, employee service, shop location, and shop atmosphere. The study investigated the effects of these four properties on the brand attitudes of coffee shops. The effects were found to vary depending on users' characteristics. The properties with the largest influence were shop atmosphere and shop location Therefore, the purpose of the study was to examine the properties that could help coffee shops get loyal customers, and the choice properties that could satisfy consumers' desires The study examined consumers' perceptions of shop properties at selection of coffee shop and the difference between perceptual difference and coffee brand in order to investigate customers' desires and needs and to suggest ways that could supply products and service. The research methodology consisted of two parts: normative and empirical research, which includes empirical analysis and statistical analysis. In this study, a statistical analysis of the empirical research was carried out. The study theoretically confirmed the shop choice properties by reviewing previous studies and performed an empirical analysis including cross tabulation based on secondary material. The findings were as follows: First, coffee shop choice properties varied by gender. Price advantage influenced the choice of both men and women; men preferred nearer coffee shops where they could buy coffee easily and more conveniently than women did. The atmosphere of the coffee shop had the greatest influence on both men and women, and shop atmosphere was thought to be the most important for age analysis. In the past, customers selected coffee shops solely to drink coffee. Now, they select the coffee shop according to its interior, menu variety, and atmosphere owing to improved quality and service of coffee shop brands. Second, the prices of the brands did not vary much because the coffee shops were similarly priced. The service was thought to be more important and to elevate service quality so that price and employee service and other properties did not have a great influence on shop choice. However, those working in the farming, forestry, fishery, and livestock industries were more concerned with the price than the shop atmosphere. College and graduate school students were also affected by inexpensive price. Third, shop choice properties varied depending on income. The shop location and shop atmosphere had a greater influence on shop choice. The customers in an income bracket of less than 2 million won selected low-price coffee shops more than those earning 6 million won or more. Therefore, price advantage had no relation with difference in income. The higher income group was not affected by employee service. Fourth, shop choice properties varied depending on place. For instance, customers at Ulsan were the most affected by the price, and the ones at Busan were the least affected. The shop location had the greatest influence among all of the properties. Among the places surveyed, Gwangju had the least influence. The alternate use of space in a coffee shop was thought to be important in all the cities under consideration. The customers at Ulsan were not affected by employee service, and they selected coffee shops according to quality and preference of shop atmosphere. Lastly, the price factor was found to be a little higher than other factors when customers frequently selected brands according to shop properties. Customers at Gwangju reacted to discounts more than those in other cities did, and the former gave less priority to the quality and taste of coffee. Brand preference varied depending on coffee shop location. Customers at Busan selected brands according to the coffee shop location, and those at Ulsan were not influenced by employee kindness and specialty. The implications of this study are that franchise coffee shop businesses should focus on customers rather than aggressive marketing strategies that increase the number of coffee shops. Thus, they should create an environment with a good atmosphere and set up coffee shops in places that customers have good access to. This study has some limitations. First, the respondents were concentrated in metropolitan areas. Secondary data showed that the number of respondents at Seoul was much more than that at Gyeonggi-do. Furthermore, the number of respondents at Gyeonggi-do was much more than those at the six major cities in the nation. Thus, the regional sample was not representative enough of the population. Second, respondents' ratio was used as a measurement scale to test the perception of shop choice properties and brand preference. The difficulties arose when examining the relation between these properties and brand preference, as well as when understanding the difference between groups. Therefore, future research should seek to address some of the shortcomings of this study: If the coffee shops are being expanded to local areas, then a questionnaire survey of consumers at small cities in local areas shall be conducted to collect primary material. In particular, variables of the questionnaire survey shall be measured using Likert scales in order to include perception on shop choice properties, brand preference, and repurchase. Therefore, correlation analysis, multi-regression, and ANOVA shall be used for empirical analysis and to investigate consumers' attitudes and behavior in detail.

  • PDF

Optimization and Development of Prediction Model on the Removal Condition of Livestock Wastewater using a Response Surface Method in the Photo-Fenton Oxidation Process (Photo-Fenton 산화공정에서 반응표면분석법을 이용한 축산폐수의 COD 처리조건 최적화 및 예측식 수립)

  • Cho, Il-Hyoung;Chang, Soon-Woong;Lee, Si-Jin
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.30 no.6
    • /
    • pp.642-652
    • /
    • 2008
  • The aim of our research was to apply experimental design methodology in the optimization condition of Photo-Fenton oxidation of the residual livestock wastewater after the coagulation process. The reactions of Photo-Fenton oxidation were mathematically described as a function of parameters amount of Fe(II)($x_1$), $H_2O_2(x_2)$ and pH($x_3$) being modeled by the use of the Box-Behnken method, which was used for fitting 2nd order response surface models and was alternative to central composite designs. The application of RSM using the Box-Behnken method yielded the following regression equation, which is an empirical relationship between the removal(%) of livestock wastewater and test variables in coded unit: Y = 79.3 + 15.61x$_1$ - 7.31x$_2$ - 4.26x$_3$ - 18x$_1{^2}$ - 10x$_2{^2}$ - 11.9x$_3{^2}$ + 2.49x$_1$x$_2$ - 4.4x$_2$x$_3$ - 1.65x$_1$x$_3$. The model predicted also agreed with the experimentally observed result(R$^2$ = 0.96) The results show that the response of treatment removal(%) in Photo-Fenton oxidation of livestock wastewater were significantly affected by the synergistic effect of linear terms(Fe(II)($x_1$), $H_2O_2(x_2)$, pH(x$_3$)), whereas Fe(II) $\times$ Fe(II)(x$_1{^2}$), $H_2O_2$ $\times$ $H_2O_2$(x$_2{^2}$) and pH $\times$ pH(x$_3{^2}$) on the quadratic terms were significantly affected by the antagonistic effect. $H_2O_2$ $\times$ pH(x$_2$x$_3$) had also a antagonistic effect in the cross-product term. The estimated ridge of the expected maximum response and optimal conditions for Y using canonical analysis were 84 $\pm$ 0.95% and (Fe(II)(X$_1$) = 0.0146 mM, $H_2O_2$(X$_2$) = 0.0867 mM and pH(X$_3$) = 4.704, respectively. The optimal ratio of Fe/H$_2O_2$ was also 0.17 at the pH 4.7.

A Study on improvement of curriculum in Nursing (간호학 교과과정 개선을 위한 조사 연구)

  • 김애실
    • Journal of Korean Academy of Nursing
    • /
    • v.4 no.2
    • /
    • pp.1-16
    • /
    • 1974
  • This Study involved the development of a survey form and the collection of data in an effort-to provide information which can be used in the improvement of nursing curricula. The data examined were the kinds courses currently being taught in the curricula of nursing education institutions throughout Korea, credits required for course completion, and year in-which courses are taken. For the purposes of this study, curricula were classified into college, nursing school and vocational school categories. Courses were directed into the 3 major categories of general education courses, supporting science courses and professional education course, and further subdirector as. follows: 1) General education (following the classification of Philip H. phoenix): a) Symbolics, b) Empirics, c) Aesthetics. 4) Synthetics, e) Ethics, f) Synoptic. 2) Supporting science: a) physical science, b) biological science, c) social science, d) behavioral science, e) Health science, f) Educations 3) Professional Education; a) basic courses, b) courses in each of the respective fields of nursing. Ⅰ. General Education aimed at developing the individual as a person and as a member of society is relatively strong in college curricula compared with the other two. a) Courses included in the category of symbolics included Korean language, English, German. Chines. Mathematics. Statics: Economics and Computer most college curricula included 20 credits. of courses in this sub-category, while nursing schools required 12 credits and vocational school 10 units. English ordinarily receives particularly heavy emphasis. b) Research methodology, Domestic affair and women & courtney was included under the category of empirics in the college curricula, nursing and vocational school do not offer this at all. c) Courses classified under aesthetics were physical education, drill, music, recreation and fine arts. Most college curricula had 4 credits in these areas, nursing school provided for 2 credits, and most vocational schools offered 10 units. d) Synoptic included leadership, interpersonal relationship, and communications, Most schools did not offer courses of this nature. e) The category of ethics included citizenship. 2 credits are provided in college curricula, while vocational schools require 4 units. Nursing schools do not offer these courses. f) Courses included under synoptic were Korean history, cultural history, philosophy, Logics, and religion. Most college curricular 5 credits in these areas, nursing schools 4 credits. and vocational schools 2 units. g) Only physical education was given every Year in college curricula and only English was given in nursing schools and vocational schools in every of the curriculum. Most of the other courses were given during the first year of the curriculum. Ⅱ. Supporting science courses are fundamental to the practice and application of nursing theory. a) Physical science course include physics, chemistry and natural science. most colleges and nursing schools provided for 2 credits of physical science courses in their curricula, while most vocational schools did not offer t me. b) Courses included under biological science were anatomy, physiologic, biology and biochemistry. Most college curricula provided for 15 credits of biological science, nursing schools for the most part provided for 11 credits, and most vocational schools provided for 8 units. c) Courses included under social science were sociology and anthropology. Most colleges provided for 1 credit in courses of this category, which most nursing schools provided for 2 creates Most vocational school did not provide courses of this type. d) Courses included under behavioral science were general and clinical psychology, developmental psychology. mental hygiene and guidance. Most schools did not provide for these courses. e) Courses included under health science included pharmacy and pharmacology, microbiology, pathology, nutrition and dietetics, parasitology, and Chinese medicine. Most college curricula provided for 11 credits, while most nursing schools provide for 12 credits, most part provided 20 units of medical courses. f) Courses included under education included educational psychology, principles of education, philosophy of education, history of education, social education, educational evaluation, educational curricula, class management, guidance techniques and school & community. Host college softer 3 credits in courses in this category, while nursing schools provide 8 credits and vocational schools provide for 6 units, 50% of the colleges prepare these students to qualify as regular teachers of the second level, while 91% of the nursing schools and 60% of the vocational schools prepare their of the vocational schools prepare their students to qualify as school nurse. g) The majority of colleges start supporting science courses in the first year and complete them by the second year. Nursing schools and vocational schools usually complete them in the first year. Ⅲ. Professional Education courses are designed to develop professional nursing knowledge, attitudes and skills in the students. a) Basic courses include social nursing, nursing ethics, history of nursing professional control, nursing administration, social medicine, social welfare, introductory nursing, advanced nursing, medical regulations, efficient nursing, nursing english and basic nursing, College curricula devoted 13 credits to these subjects, nursing schools 14 credits, and vocational schools 26 units indicating a severe difference in the scope of education provided. b) There was noticeable tendency for the colleges to take a unified approach to the branches of nursing. 60% of the schools had courses in public health nursing, 80% in pediatric nursing, 60% in obstetric nursing, 90% in psychiatric nursing and 80% in medical-surgical nursing. The greatest number of schools provided 48 crudites in all of these fields combined. in most of the nursing schools, 52 credits were provided for courses divided according to disease. in the vocational schools, unified courses are provided in public health nursing, child nursing, maternal nursing, psychiatric nursing and adult nursing. In addition, one unit is provided for one hour a week of practice. The total number of units provided in the greatest number of vocational schools is thus Ⅲ units double the number provided in nursing schools and colleges. c) In th leges, the second year is devoted mainly to basic nursing courses, while the third and fourth years are used for advanced nursing courses. In nursing schools and vocational schools, the first year deals primarily with basic nursing and the second and third years are used to cover advanced nursing courses. The study yielded the following conclusions. 1. Instructional goals should be established for each courses in line with the idea of nursing, and curriculum improvements should be made accordingly. 2. Course that fall under the synthetics category should be strengthened and ways should be sought to develop the ability to cooperate with those who work for human welfare and health. 3. The ability to solve problems on the basis of scientific principles and knowledge and understanding of man society should be fostered through a strengthening of courses dealing with physical sciences, social sciences and behavioral sciences and redistribution of courses emphasizing biological and health sciences. 4. There should be more balanced curricula with less emphasis on courses in the major There is a need to establish courses necessary for the individual nurse by doing away with courses centered around specific diseases and combining them in unified courses. In addition it is possible to develop skill in dealing with people by using the social setting in comprehensive training. The most efficient ratio of the study experience should be studied to provide more effective, interesting education Elective course should be initiated to insure a man flexible, responsive educational program. 5. The curriculum stipulated in the education law should be examined.

  • PDF

A Study on Knowledge Entity Extraction Method for Individual Stocks Based on Neural Tensor Network (뉴럴 텐서 네트워크 기반 주식 개별종목 지식개체명 추출 방법에 관한 연구)

  • Yang, Yunseok;Lee, Hyun Jun;Oh, Kyong Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.25-38
    • /
    • 2019
  • Selecting high-quality information that meets the interests and needs of users among the overflowing contents is becoming more important as the generation continues. In the flood of information, efforts to reflect the intention of the user in the search result better are being tried, rather than recognizing the information request as a simple string. Also, large IT companies such as Google and Microsoft focus on developing knowledge-based technologies including search engines which provide users with satisfaction and convenience. Especially, the finance is one of the fields expected to have the usefulness and potential of text data analysis because it's constantly generating new information, and the earlier the information is, the more valuable it is. Automatic knowledge extraction can be effective in areas where information flow is vast, such as financial sector, and new information continues to emerge. However, there are several practical difficulties faced by automatic knowledge extraction. First, there are difficulties in making corpus from different fields with same algorithm, and it is difficult to extract good quality triple. Second, it becomes more difficult to produce labeled text data by people if the extent and scope of knowledge increases and patterns are constantly updated. Third, performance evaluation is difficult due to the characteristics of unsupervised learning. Finally, problem definition for automatic knowledge extraction is not easy because of ambiguous conceptual characteristics of knowledge. So, in order to overcome limits described above and improve the semantic performance of stock-related information searching, this study attempts to extract the knowledge entity by using neural tensor network and evaluate the performance of them. Different from other references, the purpose of this study is to extract knowledge entity which is related to individual stock items. Various but relatively simple data processing methods are applied in the presented model to solve the problems of previous researches and to enhance the effectiveness of the model. From these processes, this study has the following three significances. First, A practical and simple automatic knowledge extraction method that can be applied. Second, the possibility of performance evaluation is presented through simple problem definition. Finally, the expressiveness of the knowledge increased by generating input data on a sentence basis without complex morphological analysis. The results of the empirical analysis and objective performance evaluation method are also presented. The empirical study to confirm the usefulness of the presented model, experts' reports about individual 30 stocks which are top 30 items based on frequency of publication from May 30, 2017 to May 21, 2018 are used. the total number of reports are 5,600, and 3,074 reports, which accounts about 55% of the total, is designated as a training set, and other 45% of reports are designated as a testing set. Before constructing the model, all reports of a training set are classified by stocks, and their entities are extracted using named entity recognition tool which is the KKMA. for each stocks, top 100 entities based on appearance frequency are selected, and become vectorized using one-hot encoding. After that, by using neural tensor network, the same number of score functions as stocks are trained. Thus, if a new entity from a testing set appears, we can try to calculate the score by putting it into every single score function, and the stock of the function with the highest score is predicted as the related item with the entity. To evaluate presented models, we confirm prediction power and determining whether the score functions are well constructed by calculating hit ratio for all reports of testing set. As a result of the empirical study, the presented model shows 69.3% hit accuracy for testing set which consists of 2,526 reports. this hit ratio is meaningfully high despite of some constraints for conducting research. Looking at the prediction performance of the model for each stocks, only 3 stocks, which are LG ELECTRONICS, KiaMtr, and Mando, show extremely low performance than average. this result maybe due to the interference effect with other similar items and generation of new knowledge. In this paper, we propose a methodology to find out key entities or their combinations which are necessary to search related information in accordance with the user's investment intention. Graph data is generated by using only the named entity recognition tool and applied to the neural tensor network without learning corpus or word vectors for the field. From the empirical test, we confirm the effectiveness of the presented model as described above. However, there also exist some limits and things to complement. Representatively, the phenomenon that the model performance is especially bad for only some stocks shows the need for further researches. Finally, through the empirical study, we confirmed that the learning method presented in this study can be used for the purpose of matching the new text information semantically with the related stocks.

Dedicatory Inscriptions on the Amitabha Buddha and Maitreya Bodhisattva Sculptures of Gamsansa Temple (감산사(甘山寺) 아미타불상(阿彌陁佛像)과 미륵보살상(彌勒菩薩像) 조상기(造像記)의 연구)

  • Nam, Dongsin
    • MISULJARYO - National Museum of Korea Art Journal
    • /
    • v.98
    • /
    • pp.22-53
    • /
    • 2020
  • This paper analyzes the contents, characteristics, and historical significance of the dedicatory inscriptions (josanggi) on the Amitabha Buddha and the Maitreya Bodhisattva statues of Gamsansa Temple, two masterpieces of Buddhist sculpture from the Unified Silla period. In the first section, I summarize research results from the past century (divided into four periods), before presenting a new perspective and methodology that questions the pre-existing notion that the Maitreya Bodhisattva has a higher rank than the Amitabha Buddha. In the second section, through my own analysis of the dedicatory inscriptions, arrangement, and overall appearance of the two images, I assert that the Amitabha Buddha sculpture actually held a higher rank and greater significance than the Maitreya Bodhisattva sculpture. In the third section, for the first time, I provide a new interpretation of two previously undeciphered characters from the inscriptions. In addition, by comparing the sentence structures from the respective inscriptions and revising the current understanding of the author (chanja) and calligrapher (seoja), I elucidate the possible meaning of some ambiguous phrases. Finally, in the fourth section, I reexamine the content of both inscriptions, differentiating between the parts relating to the patron (josangju), the dedication (josang), and the prayers of the patrons or donors (balwon). In particular, I argue that the phrase "for my deceased parents" is not merely a general axiom, but a specific reference. To summarize, the dedicatory inscriptions can be interpreted as follows: when Kim Jiseong's parents died, they were cremated and he scattered most of their remains by the East Sea. But years later, he regretted having no physical memorial of them to which to pay his respects. Thus, in his later years, he donated his estate on Gamsan as alms and led the construction of Gamsansa Temple. He then commissioned the production of the two stone sculptures of Amitabha Buddha and Maitreya Bodhisattva for the temple, asking that they be sculpted realistically to reflect the actual appearance of his parents. Finally, he enshrined the remains of his parents in the sculptures through the hole in the back of the head (jeonghyeol). The Maitreya Bodhisattva is a standing image with a nirmanakaya, or "transformation Buddha," on the crown. As various art historians have pointed out, this iconography is virtually unprecedented among Maitreya images in East Asian Buddhist sculpture, leading some to speculate that the standing image is actually the Avalokitesvara. However, anyone who reads the dedicatory inscription can have no doubt that this image is in fact the Maitreya. To ensure that the sculpture properly embodied his mother (who wished to be reborn in Tushita Heaven with Maitreya Bodhisattva), Kim Jiseong combined the iconography of the Maitreya and Avalokitesvara (the reincarnation of compassion). Hence, Kim Jiseong's deep love for his mother motivated him to modify the conventional iconography of the Maitreya and Avalokitesvara. A similar sentiment can be found in the sculpture of Amitabha Buddha. To this day, any visitor to the temple who first looks at the sculptures from the front before reading the text on the back will be deeply touched by the filial love of Kim Jiseong, who truly cherished the memory of his parents.

A Study on Dance Historical Value of Jaein Line Dance by Han Seong-jun (한성준을 통해 본 재인 계통춤의 무용사적 가치 연구)

  • Choung, Soung Sook
    • (The) Research of the performance art and culture
    • /
    • no.19
    • /
    • pp.347-378
    • /
    • 2009
  • Those who were from Jaeincheon and Jaein line entertainers played great roles during transition period from traditional society to modern society, and even at present the dances of them are the representative traditional dances of Korea and the matrix of Korean originality. Nevertheless, Korea dance field has given little importance to these dances, but too much importance to Gibang dance in studying traditional dances, which causes the studies on Jaein line danced to be superficial or separate. Therefore, the aims of this article are to analyze the dances of Jaein line by Han Seong-jun, who was representative for the dances, and to appraise the historical value of them. Han Seong-jun(1874-1942) was the most influential dummer and dancer of his day in Japanese colonial times, and has been recognized as one of the masters of traditional dances. He established autonomy of traditional dances by reorganizing, collecting and stage-formalizing the dances, and systemized transmitting ways for various folk dances including a Buddhist dance, which made it possiblefor those dances to be traditional dances of Korea and the bases for creative dances. The values of Jaein line dances, which were transmitted through Han, are the following: First, the dances have been designated as national or regional intangible cultural assets, and, as the representative traditional arts, we proudly show them to the world. Second, the dances, as one of the genres of Korean dances, are the subjects of younger scholars' studies. Third, the dances become one of the representative examples of revivals of traditional dances, which tend to be extinct during modernization times, and contribute to establishing national identity and subjectivity. In addition, they contribute to discovering and transmitting other traditional dances. Fourth, the dances enable many dancers to make association, that is, Association for Preservation of Traditional Dances,for the transmitting the dances, and to distribute the dances and get many dancers to transmit the dances. Furthermore, as new performance repertories, they give another pleasure to the audience. In addition to the above, as a base for expansion of Korean creative dances, Han's dances have other values such as the following: First, in searching for a new methodology for creation, he played an important role in rediscovering the foundation in the tradition, and tried to discover nationalidentity by employing the traditional dances for expression of theme. Second, he contributed to drastically dissolving the genres by expanding the gesture language from motion factors of traditional dances, which can be compared to the modern dance. Third, he tried new challenging approaches to re-create the tradition, and contributed to pursuing the simple elements of our traditional dances as traditional aesthetics. While the dances of Jaein line have such values as the above, there are also some problems around the dances, such as the confusion in the process of transmission resulted from different transmission forms and transmitters, which we must no longer leave as it is. Furthermore, it is urgent that the rest of Jaein line dances be recovered and designated as intangible cultural assets for the sound transmission of the traditional dances.

Transforming the Wongaksa Bell[Buddhist Bell] to the Bosingak Bell[Court Bell]: An Example of the Debuddhismization during the Joseon Dynasty (원각사종(圓覺寺鐘)에서 보신각종(普信閣鍾)으로 -조선시대 탈불교화의 일례-)

  • Nam Dongsin
    • MISULJARYO - National Museum of Korea Art Journal
    • /
    • v.104
    • /
    • pp.102-142
    • /
    • 2023
  • The Bronze Bell of Wongaksa Temple, also known as the Bosingak Bell, was produced in 1468 during the reign of King Sejo for dedication at Wongaksa Temple in the middle of the capital Hanyang in celebration of the tenth anniversary of his accession to the throne. It is currently heavily damaged and cannot be struck. This paper focuses on the man-made damage inflicted on the Bosingak Bell and explores when, why, and by whom the bell was damaged along with the historical significance of this damage. In the first section, the relevant literature is reviewed and the problems concerned, research perspective, and methodology are presented. The history of related theories is investigated focusing on the relationship between Bosingak Bell and Wongaksa Bell. The perspective that Bosingak Bell and Wongaksa Bell are the same is introduced. My discussion will be developed from this perspective. In the second section, the background to King Sejo's construction of Wongaksa Bell is examined. Specifically, the bells commissioned by the kings of the early Joseon era are divided into court bells (jojong) and Buddhist bells (beomjong). They total four court bells and three Buddhist bells. The former are the Jongnu Tower Bell commissioned by King Taejo, Donhwamun Gate Bell by King Taejong, Gwanghwamun Gate Bell by King Sejong, and Sajeongjeon Hall Bell by King Sejo. The latter are the bells of Yongmunsa, Heungcheonsa (or Jeongneungsa) and Wongaksa Temples, all of which were made during the reign of King Sejo. Sejo also made Wongaksa Bell and gave it the meaning that the monarch and the Buddha both wish to enlighten the people through the sound of the bells. In the third section, traces of the man-made damage done to Bosingak Bell are closely examined. By observing the current condition of Bosingak Bell and comparing it with the contemporaneous Heungcheongsa Bell (1462) and Bongseonsa Bell (1469), the components of Bosingak Bell that were damaged can be identified. The damaged parts are again divided into Buddhist elements and non-Buddhist elements. The former includes the reversed lotus petals on the shoulder band, four standing bodhisattvas, and the inscription of the bell composed by Choe Hang. The latter includes lists of chief supervisors (dojejo). I describe the phenomenon of deliberately damaging Buddhist elements on bells as "effacement of Buddhism," meaning Buddhist images and inscriptions are eliminated, and I note the prevailing rejection of Buddhism theory among Neo-Confucianists as its ideological root. The erasure of non-Buddhist images was probably caused by political conflicts such as Yeonsangun's purge in 1504. Since both ideological and political factors played a role in the changes made to Bosingak Bell, the damage was possibly done between the Purge of 1504 and the abdication of Yeonsangun in 1506. Chapter four traces the transformation of the Buddhist bell of Wongaksa Temple into the Bosingak court bell. Finally completed in 1468, the Wongaksa Bell only served its role as a Buddhist bell at related services for a relatively brief period of 36 years (until 1504). Wongaksa Temple was closed down and the bell lost its Buddhist function. In 1536, it was moved from Wongaksa Temple to Namdaemun Gate, where it remained silent for the next 90 years until it was struck again in November 1594. However, after the destruction of the Jongnu Bell in a fire during the Japanese Invasions of Korea (1592-1598), the Buddhist bell from Wongaksa Temple became a court bell. The Wongaksa Temple bell was relocated to Jongnu Tower in 1619, traveling through Myeongdong Pass. From then on, as the official Jongnu Bell (later renamed Bosingak Bell), it was regularly rung at dawn and dusk every day for nearly 300 years until 1908, when Japanese authorities halted the ritual. The transformation of the Wongaksa Bell (a Buddhist bell) to Bosingak Bell (a court bell) means that the voice of the Buddha was changed to the voice of the king. The concept of "effacement of Buddhism," evident in the transformation of Wongaksa Bell to Bosingak Bell, was practiced widely on almost every manifestation of Buddhism throughout the Joseon period. In short, the damage evident in Bosingak Bell underscores the debuddhismization in Korean society during the Joseon Dynasty.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.