• Title/Summary/Keyword: Step-by-step strategy

Search Result 571, Processing Time 0.028 seconds

The Cyber world of the Matrix as a typical type of 'Simulacre' (시뮬라크르의 전형(典型)으로서 매트릭스(Matrix)의 가상 세계)

  • 이종한
    • Archives of design research
    • /
    • v.17 no.1
    • /
    • pp.339-346
    • /
    • 2004
  • Matrix, produced by Larry & Andy Wachowski, was relatively precisely dealt with the cyber world. After the movie was released, it had a mania for the movie and was adopted into a various forms of cultural products. It was remade not only into the parodies of the other movies and TV programs, but also the clothes and miscellaneous items of the movie were reincarnated as an unique cultural trend. The cause of the popularity is the fresh storyline as well as the sophisticated visual effects and good-looking actors. The agony of the protagonist was connected with the people outside the movie who are yearning for the ideal world. He was confused at the fact that his circumstances which were believed as the real world were not tortally true, complicated between the sensually phisical truth and the spiritual truth and had an will for the freedom that would ransack the truth and save the other people from the fictitious world. Consequently, the movie has got sympathies with many audiences suggesting the situation that has no a firm belief of the reality, the difference between the real and the cyber world is meaningless and the faked images of the high-technology are overturned This thesis tries to study the present that the real images are excessly duplicated and consumed, related to the Jean Baudrillard's theory, 'Hyperreel'. Replaced the real objects by a technical programming in the Matrix world, there happens the image-violence that the true nature is slaughterred by images. In the world where the reproducts are more actual than the reality and pretends to be real, only semiotics are consumed and produced. That is to say, the tortally programmed images has no references and aims, therefore should be produced in an 'impediment-strategy' like a faked crisis. That is the step of 'Simulation' that artificially reincarnates the real. Based upon the Baudrillard's theory, 'Simulacre', this study tries to research today's post-modern situation that the boundary of the real world and the faked copy is vague and vanishing, through the analysis of the cyber world of the movie 'Matrix'.

  • PDF

Significance and Limitation of the Guiding Principles for the Preparation of Nominations Concerning Sites of Memory Associated with Recent Conflicts (최근 갈등과 관련된 기억유산의 등재 준비를 위한 지침원칙의 의의와 한계)

  • HEO Sujin
    • Korean Journal of Heritage: History & Science
    • /
    • v.57 no.3
    • /
    • pp.162-182
    • /
    • 2024
  • Since the adoption of the World Heritage Convention, sites associated with dark histories have been inscribed as World Heritage sites over the past fifty years. However, in 2018, the review of nomination dossiers for these sites was temporarily suspended to prevent additional discomfort or the conflicts these inscriptions might cause. Despite concerns raised by experts about nominations of these sites, the increasing demands from State Parties led to the adoption of the Guiding Principles for the Preparation of Nominations Concerning Sites of Memory Associated with Recent Conflicts. These Guiding Principles have made it possible to inscribe such sites as World Heritage sites. The Guiding Principles play a crucial role in outlining the nature and criteria for inscription, the components required in the nomination dossier, and mechanisms for notifying a contestation in cases of differing interpretations of the site. Their primary aim is to minimize further conflicts that may arise from the inscription of sites of memory. They affirm that such sites can contribute to achieving the objectives of the World Heritage Convention and represent a significant step in addressing heritage interpretation in the World Heritage system. The amendment of the Operational Guidelines to incorporate a contestation mechanism has arguably established a more transparent and open inscription process. However, the Guiding Principles also have limitations. Among the ten criteria set by the World Heritage Convention, sites related to conflicts or dark histories can use Criterion (vi). This criterion focuses on the site's outstanding universal value linked to historical events or associations, regardless of physical evidence. If a State Party chooses not to use Criterion (vi), the application of the Guiding Principles cannot be expected. Furthermore, while the Guiding Principles require a heritage interpretation strategy in the nomination dossier, the lack of detailed guidance may confuse nominating countries. Sites of memory associated with recent conflicts are not just places that need protection and remembrance due to their association with dark histories. They have also evolved to become spaces for reconciliation and healing. The inscription of these sites as World Heritage sites is not just a recognition of their historical significance, but also a platform for discussing the impact of past conflicts on modern society. It opens up a dialogue on how current generations can address these issues. With the adoption of the Guiding Principles, we hope that inscribed sites will not only promote reconciliation and healing but also serve as a starting point for addressing present and future challenges.

A Study on Classroom Interactions by Student's Cognitive Level in the Performance of Controlling Variable Tasks (변인통제 문제해결 활동에서 학생들의 인지수준에 따른 상호작용 분석)

  • Nam, Jeong-Hee;Kim, Sung-Hee;Kang, Soon-hee;Park, Jong-Yoon;Choi, Byung-Soon
    • Journal of The Korean Association For Science Education
    • /
    • v.22 no.1
    • /
    • pp.110-121
    • /
    • 2002
  • In this study, the verbal interactions occurred during the CASE(Cognitive Acceleration through Science Education) activities in the middle school science class has been analyzed regarding with students cognitive level. The subjects were 24 students of 6 groups in a middle school in Korea. Verbal interactions within group discussions during CASE activities were audio-taped, transcribed, and analyzed. Also, classroom observation and interview with students were carried out. The results showed that the student with higher cognitive level tended to be a group leader. They had strong influences on the group discussions in each step of problem solving. Also, the higher cognitive level students were more active in metacognitive discussion and more often used scientific terms. When their group met difficulties in each stage of problem solving, such as perception of problem and designing experiment, the higher cognitive level students suggested some ideas to help their peers and gave them an explanation of how they worked. Low cognitive level students had difficulties in perception and solving the problem as compared with high cognitive students. It was common during activities for the low cognitive level students to fail to identify variables and to distinguish between dependent variables and independent variables. They failed to hold a number of variables at once. However, the metacognitive questions from their peers or teacher were helpful for them to construct the concept of controlling variables. If there is no student who has a high level of thinking in a group, it was necessary to intervene for teacher. A well judged questions from teacher created the cognitive conflict which causes the students to reconstruct their strategy for problem solving and reinforce the control of variables reasoning pattern. From the above results, it is concluded that students' cognitive levels are much related to the verbal interaction patterns. This suggests that teacher should consider individual student's cognitive level in organizing groups and intervene to facilitate the environment for metacognitive interaction.

Monoclonal Antibody against leucocyte CD11b(MAb 1B6) increase the early mortality rate in Spraque Dawley with E. coli pneumonia (백혈구 CD11b에 대한 단 클론 항체 (MAb 1B6)는 Spraque Dawley의 E. coli 폐렴의 조기 사망률을 증가시킨다)

  • Kim, Hyung Jung;Kim, Sung Kyu;Lee, Won Young
    • Tuberculosis and Respiratory Diseases
    • /
    • v.43 no.4
    • /
    • pp.579-589
    • /
    • 1996
  • Background : Activation of neutrophil is critical for the clearance of microorganisms and toxic host mediators during sepsis. Unfortunately the activated neutrophil and its toxic byproducts can produce tissue injury and organ dysfunction. The leucocyte CD11/18 adhesion complex regulates neutrophil-endothelial cell adhesion, the first step in neutrophil migration to sites of injection and inflammation. To investigate the potential of neutrophil inhibition as a treatment strategy for sepsis, we evaluated the effects of monoclonal antibody against CD11b (MAb 1B6) in rats intrabronchial challenged with Escherichia coli. Methods : Animals were randomly assigned to receive monoclonal antibody against CD11b (1 mg/kg, sc) and bovine serum albumin(BSA, 1 mg/kg, sc) 6 hr before, at 0 and 6 hr after intrabronchial challenge of $20x10^9$ CFU/kg E. coli 0111. Animals were randomized to treat either 24, 60 or 90% oxygen after bacterial challenge and begining 4 hr after inoculation, all animals were received 100 mg/kg ceftriaxone qd for 3 days. Peripheral and alveolar neutrophil(by bronchoalveolar lavage) counts and lung injury parameters such as alveolar-arte rial $PO_2$ difference, wet to dry lung weight ratio and protein concentration of alveolar fluid were measured in survived rats at 12 hr and 96 hr. Results : Monoclonal antibody against CD11b decreased circulating and alveolar neutrophil especially more in 12 hr than in 96 hr The lung injury parameters of antibody-treated animals were not different from those of BSA-treated animals. but It was meaningless due to small number of survived animals. The early(6 hr) mortality rate was significantly increased in antibody-treated group(51%) compared to BSA-treated group(31%) (P=0.02) but late(from 12 hr to 72 hr) mortality rate was not different in antibody-treated group(44%) from BSA-treated group(36%) (P =0.089). Conclusion : Leucocyte CD11b/18 adhesion molecule is known to regulate neutrophil migration to the site of infection and inflammation. The monoclonal antibody against CD11b decreased alveolar neutrophil in rats with pulmonary sepsis and increased early mortality rate. Therefore, we can speculate that monoclonal antibody against CD11b blocks of alveolar recruitment of neutrophils, impairs host defense mechanism and increases early mortality rate of pulmonary sepsis in rat.

  • PDF

A Knowledge-based Approach for the Estimation of Effective Sampling Station Frequencies in Benthic Ecological Assessments (지식기반적 방법을 활용한 저서생태계 평가의 유효 조사정점 개수 산정)

  • Yoo, Jae-Won;Kim, Chang-Soo;Jung, Hoe-In;Lee, Yong-Woo;Lee, Man-Woo;Lee, Chang-Gun;Jin, Sung-Ju;Maeng, Jun-Ho;Hong, Jae-Sang
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.16 no.3
    • /
    • pp.147-154
    • /
    • 2011
  • Decision making in Environmental Impact Assessment (EIA) and Consultation on the Coastal Area Utilization (CCAU) is footing on the survey reports, thus requires concrete and accurate information on the natural habitats. In spite of the importance of reporting the ecological quality and status of habitats, the accumulated knowledge and recent techniques in ecology such as the use of investigated cases and indicators/indices have not been utilized in evaluation processes. Even the EIA report does not contain sufficient information required in a decision making process for conservation and development. In addition, for CCAU, sampling efforts were so limited that only two or a few stations were set in most study cases. This hampers transferring key ecological information to both specialist review and decision making processes. Hence, setting the effective number of sampling stations can be said as a prior step for better assessment. We introduced a few statistical techniques to determine the number of sampling stations in macrobenthos surveys. However, the application of the techniques requires a preliminary study that cannot be performed under the current assessment frame. An analysis of the spatial configuration of sampling stations from 19 previous studies was carried out as an alternative approach, based on the assumption that those configurations reported in scientific journal contribute to successful understanding of the ecological phenomena. The distance between stations and number of sampling stations in a $4{\times}4$ km unit area were calculated, and the medians of each parameter were 2.3 km, and 3, respectively. For each study, approximated survey area (ASA, $km^2$) was obtained by using the number of sampling stations in a unit area (NSSU) and total number of sampling stations (TNSS). To predict either appropriate ASA or NSSU/TNSS, we found and suggested statistically significant functional relationship among ASA, survey purpose and NSSU. This empirical approach will contribute to increasing sampling effort in a field survey and communicating with reasonable data and information in EIA and CCAU.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Media Work as Creative Labor?: Toward Critical Inquiry of Media Work with Critical Cultural Economy (창의적 일로서의 미디어 노동?: 미디어 노동의 문화경제 분석을 위한 시론)

  • Seo, Dong-Jin
    • Korean journal of communication and information
    • /
    • v.57
    • /
    • pp.33-48
    • /
    • 2012
  • Over the last decades, the issue of work or labor has played a critical role in prevailing discourses to represent the changed economic reality. Aesthetic labor, cultural work, network labor, team-work and alike, have played a dazzling role to represent the emerging economic order, employing the word of labor. Certainly, it is not less than a part of a wide range of shifts in order to make capital work with more effect by making up a workable and governable subject. In this article, I try to examine shifts around the media work which has contributed to expand the new discourse of 'labor.' I will say that it is quite crucial for accounting for the reality of media work to shed light on moves to represent media work, and, among others, one to transform the subjectivity involved in it among others. Furthermore, it would be necessary to take a close look at the subjectivity of media work and its modification to deal with and eliminate the precariousness of media work. Saying about media work without paying any attention to heterogenous and various practices to compose a media work, one is forced to regard media work as the matter of economic and legal interests. In addition, it would bring about that the cultural political concerns of media work will be detached from critical sight of the media cultural studies. Referring to major studies around media work in critical media studies, cultural studies and political economy of communication, this article will briefly look into the arrangement of contentions around subjectivity of media work in South Korea. And it will try to suggest what cultural-political strategy we need to investigate, fighting against the hegemonic power to generate and regulate media work and its workers in precarious conditions. It does not intend to search the media work and its complicated realities in detail in South Korea. I wish that it would make a preliminary step to propose and elaborate the critical analysis of media work and its form of subjectivities.

  • PDF

Ecoclimatic Map over North-East Asia Using SPOT/VEGETATION 10-day Synthesis Data (SPOT/VEGETATION NDVI 자료를 이용한 동북아시아의 생태기후지도)

  • Park Youn-Young;Han Kyung-Soo
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.8 no.2
    • /
    • pp.86-96
    • /
    • 2006
  • Ecoclimap-1, a new complete surface parameter global database at a 1-km resolution, was previously presented. It is intended to be used to initialize the soil-vegetation- atmosphere transfer schemes in meteorological and climate models. Surface parameters in the Ecoclimap-1 database are provided in the form of a per-class value by an ecoclimatic base map from a simple merging of land cover and climate maps. The principal objective of this ecoclimatic map is to consider intra-class variability of life cycle that the usual land cover map cannot describe. Although the ecoclimatic map considering land cover and climate is used, the intra-class variability was still too high inside some classes. In this study, a new strategy is defined; the idea is to use the information contained in S10 NDVI SPOT/VEGETATION profiles to split a land cover into more homogeneous sub-classes. This utilizes an intra-class unsupervised sub-clustering methodology instead of simple merging. This study was performed to provide a new ecolimatic map over Northeast Asia in the framework of Ecoclimap-2 global database construction for surface parameters. We used the University of Maryland's 1km Global Land Cover Database (UMD) and a climate map to determine the initial number of clusters for intra-class sub-clustering. An unsupervised classification process using six years of NDVI profiles allows the discrimination of different behavior for each land cover class. We checked the spatial coherence of the classes and, if necessary, carried out an aggregation step of the clusters having a similar NDVI time series profile. From the mapping system, 29 ecosystems resulted for the study area. In terms of climate-related studies, this new ecosystem map may be useful as a base map to construct an Ecoclimap-2 database and to improve the surface climatology quality in the climate model.

Composition and Development of Archival Content Service for Teaching-learning Materials (교수·학습자료용 기록정보 콘텐츠 서비스의 구성 및 개발)

  • Shim, Sungbo
    • The Korean Journal of Archival Studies
    • /
    • no.16
    • /
    • pp.201-256
    • /
    • 2007
  • Nowadays Korean main archives and manuscript repositories are planning to develop archival information service for students and teachers in their web sites. This study is aimed at discovering main issues of developing archival information service for students and teachers and finding a solution. The goal of archival information service for students and teachers is the promotion of use through launching service and the gradual growth of archival management program. The customer group is segmented into the students and teachers who are learning and teaching Korean history in classroom. As a result of analyzing curriculum and educational environment, the archival information must be developed into teaching-learning materials. And the processing archival information into archival content is needed. Consequently the character of archival information service for students and teachers is conceptualized as archival content service for teaching-learning materials. At every step of developing archival content service for teaching-learning materials, the next main points are considered and achieved. First, the strategy of customer-focused service must be the same from beginning to end. Second, the growth of traditional archival management(e.g. classification, description and finding aids) must be contributed. Third, the collaboration system leading by professional education staff must be organized. Fourth, the archival information must be related with teaching-learning activities. Fifth, the quality of content is more important than the quantity of it. Sixth, the networking with another agencies for cooperation must be considered.

Territorial Expansion the King Võ (Võ Vương, 1738-1765) in the Mekong Delta: Variation of Tám Thực Chi Kế (strategy of silkworm nibbling) and Dĩ Man Công Man (to strike barbarians by barbarians) in the Way to Build a New World Order (무왕(武王, 1738-1765) 시기 메콩 델타에서의 영토 확장 추이: 제국으로 가는 길, '잠식지계(蠶食之計)'와 '이만공만(以蠻攻蠻)'의 변주)

  • CHOI, Byung Wook
    • The Southeast Asian review
    • /
    • v.27 no.2
    • /
    • pp.37-76
    • /
    • 2017
  • $Nguy{\tilde{\hat{e}}}n$ Cư Trinh has two faces in the history of territorial expansion of Vietnam into the Mekong delta. One is his heroic contribution to the $Nguy{\tilde{\hat{e}}}n$ family gaining control over the large part of the Mekong delta. The other is his role to make the eyes of readers of Vietnamese history be fixed only to the present territory of Vietnam. To the readers, $Nguy{\tilde{\hat{e}}}n$ Cư Trinh's achievement of territorial expansion was the final stage of the nam $ti{\acute{\hat{e}}n$ of Vietnam. In fact, however, his achievement was partial. This study pays attention to the King $V{\tilde{o}}$ instead of $Nguy{\tilde{\hat{e}}}n$ Cư Trinh in the history of the territorial expansion in the Mekong delta. King's goal was more ambitious. And the ambition was propelled by his dream to build a new world, and its order, in which his new capital, $Ph{\acute{u}}$ $Xu{\hat{a}}n$ was to be the center with his status as an emperor. To improve my assertion, three elements were examined in this article. First is the nature of $V{\tilde{o}}$ Vương's new kingship. Second is the preparation and the background of the military operation in the Mekong Delta. The nature of the new territory is the third element of the discussion. In 1744, six years after this ascending to the throne, $V{\tilde{o}}$ Vương declared he was a king. Author points out this event as the departure of the southern kingdom from the traditional dynasties based on the Red River delta. Besides, the government system, northern custom and way of dressings were abandoned and new southern modes were adopted. $V{\tilde{o}}$ Vương had enough tributary kingdoms such as Cambodia, Champa, Thủy $X{\tilde{a}}$, Hoả $X{\tilde{a}}$, Vạn Tượng, and Nam Chưởng. Compared with the $L{\hat{e}}$ empire, the number of the tributary kingdoms was higher and the number was equivalent to that of the Đại Nam empire of the 19th century. In reality, author claims, the King $V{\tilde{o}}^{\prime}s$ real intention was to become an emperor. Though he failed in using the title of emperor, he distinguished himself by claiming himself as the Heaven King, $Thi{\hat{e}}n$ Vương. Cambodian king's attack on the thousands of Cham ethnics in Cambodian territory was an enough reason to the King $V{\tilde{o}}^{\prime}s$ military intervention. He considered these Cham men and women as his amicable subjects, and he saw them a branch of the Cham communities in his realm. He declared war against Cambodia in 1750. At the same time he sent a lengthy letter to the Siamese king claiming that the Cambodia was his exclusive tributary kingdom. Before he launched a fatal strike on the Mekong delta which had been the southern part of Cambodia, $V{\tilde{o}}$ Vương renovated his capital $Ph{\acute{u}}$ $Xu{\hat{a}}n$ to the level of the new center of power equivalent to that of empire for his sake. Inflation, famine, economic distortion were also the features of this time. But this study pays attention more to the active policy of the King $V{\tilde{o}}$ as an empire builder than to the economic situation that has been told as the main reason for King $V{\tilde{o}}^{\prime}s$ annexation of the large part of the Mekong delta. From the year of 1754, by the initiative of $Nguy{\tilde{\hat{e}}}n$ Cư Trinh, almost whole region of the Mekong delta within the current border line was incorporated into the territory of $V{\tilde{o}}$ Vương within three years, though the intention of the king was to extend his land to the right side of the Mekong Basin beyond the current border such as Kampong Cham, Prey Vieng, and Svai Rieng. The main reason was $V{\tilde{o}}$ Vương's need to expand his territory to be matched with that of his potential empire with the large number of the tributary kingdoms. King $V{\tilde{o}}^{\prime}s$ strategy was the variation of 'silkworm nibbling' and 'to strike barbarians by barbarians.' He ate the land of Lower Cambodia, the region of the Mekong delta step by step as silkworm nibbles mulberry leave(general meaning of $t{\acute{a}}m$ thực), but his final goal was to eat all(another meaning of $t{\acute{a}}m$ thực) the part of the Mekong delta including the three provinces of Cambodia mentioned above. He used Cham to strike Cambodian in the process of getting land from Long An area to $Ch{\hat{a}}u$ Đốc. This is a faithful application of the Dĩ Man $C{\hat{o}}ng$ Man (to strike barbarians by barbarians). In addition he used Chinese refugees led by the Mạc family or their quasi kingdom to gain land in the region of $H{\grave{a}}$ $Ti{\hat{e}}n$ and its environs from the hand of Cambodian king. This is another application of Dĩ Man $C{\hat{o}}ng$ Man. In sum, author claims a new way of looking at the origin of the imperial world order which emerged during the first half of the 19th century. It was not the result of the long history of Đại Việt empires based on the Red River delta, but the succession of the King $V{\tilde{o}}^{\prime}s$ new world based on $Ph{\acute{u}}$ $Xu{\hat{a}}n$. The same ways of Dĩ Man $C{\hat{o}}ng$ Man and $T{\acute{a}}m$ Thực Chi $K{\acute{\hat{e}}}$ were still used by $V{\tilde{o}}^{\prime}s$ descendents. His grandson Gia Long used man such as Thai, Khmer, Lao, Chinese, and European to win another man the '$T{\hat{a}}y$ Sơn bandits' that included many of Chinese pirates, Cham, and other mountain peoples. His great grand son Minh Mạng constructed a splendid empire. At the same time, however, Minh Mạng kept expanding the size of his empire by eating all the part of Cambodia and Cham territories.