• Title/Summary/Keyword: Ubiquitous School

Search Result 669, Processing Time 0.032 seconds

Policing the Border: Is Kitsch Still the Antagonist of Art? (예술과 문화의 영역에 대한 재고 - 문화의 타자 키치, 아직도 예술의 적인가?)

  • Kim, Hee-Young
    • The Journal of Art Theory & Practice
    • /
    • no.5
    • /
    • pp.25-41
    • /
    • 2007
  • Despite continuous efforts to redraw the boundaries between art and culture, the conventional concept of originality has persisted in approaches to the practice of contemporary art. In the discourse of originality, various forms of lesser arts that employ the method of replication have been referred to as kitsch, or "rear-guard," the opposite of avant-garde. This categorization points to the contested issue regarding the oppositional relation between modernism and mass culture. With its easily accessible content and financial affordability, mass culture has become both an irresistible attraction and a most powerful threat to modernism. This threat has instigated a discursive system that has situated mass culture as a cultural other of modernism. Taking the marginalized category of kitsch as the area of contention, this paper examines a discursive repression of kitsch. It analyzes the conceptual framework that defends originality and autonomy in art and, conversely, degrades kitsch as an inferior and dangerous cultural category. Greenberg'S concept of kitsch as a by-product of industrialization evolved into the criticism that advocates the autonomy of art. The Frankfurt School scholars, particularly Theodor Adorno and Max Horkheimer, practiced comparable cultural critiques. Focusing on mass culture such as film, radio, and television, instead of art works, they critically analyzed the system of mass culture and theorized the negative implications of the ubiquitous presence of kitsch. Some critics, on the other hand, perceived the growth of mass culture as opening possibilities in cultural development. Walter Benjamin and Harold Rosenberg asserted the socio-cultural dynamics of mass culture underlining the potential for continual transformation in reality and in the subject. They acknowledged that technological advances changed the condition of creation and enabled unmediated interactions between media. By scrutinizing conflicting views on kitsch, this paper intends to reassess arts that draw "the forces of the outside."

  • PDF

Performance Improvement of a Movie Recommendation System using Genre-wise Collaborative Filtering (장르별 협업필터링을 이용한 영화 추천 시스템의 성능 향상)

  • Lee, Jae-Sik;Park, Seog-Du
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.4
    • /
    • pp.65-78
    • /
    • 2007
  • This paper proposes a new method of weighted template matching for machine-printed numeral recognition. The proposed weighted template matching, which emphasizes the feature of a pattern using adaptive Hamming distance on local feature areas, improves the recognition rate while template matching processes an input image as one global feature. Template matching is vulnerable to random noises that generate ragged outlines of a pattern when it is binarized. This paper offers a method of chain code trimming in order to remove ragged outlines. The method corrects specific chain codes within the chain codes of the inner and the outer contour of a pattern. The experiment compares confusion matrices of both the template matching and the proposed weighted template matching with chain code trimming. The result shows that the proposed method improves fairly the recognition rate of the machine-printed numerals.

  • PDF

Wavelet-based Fusion of Optical and Radar Image using Gradient and Variance (그레디언트 및 분산을 이용한 웨이블릿 기반의 광학 및 레이더 영상 융합)

  • Ye, Chul-Soo
    • Korean Journal of Remote Sensing
    • /
    • v.26 no.5
    • /
    • pp.581-591
    • /
    • 2010
  • In this paper, we proposed a new wavelet-based image fusion algorithm, which has advantages in both frequency and spatial domains for signal analysis. The developed algorithm compares the ratio of SAR image signal to optical image signal and assigns the SAR image signal to the fused image if the ratio is larger than a predefined threshold value. If the ratio is smaller than the threshold value, the fused image signal is determined by a weighted sum of optical and SAR image signal. The fusion rules consider the ratio of SAR image signal to optical image signal, image gradient and local variance of each image signal. We evaluated the proposed algorithm using Ikonos and TerraSAR-X satellite images. The proposed method showed better performance than the conventional methods which take only relatively strong SAR image signals in the fused image, in terms of entropy, image clarity, spatial frequency and speckle index.

Modern Concurrent Programming for Multicode Environment (멀티코어 환경을 위한 현대 동시성 프로그래밍)

  • Kim, Nam-gue;Kang, Young-Jin;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.589-592
    • /
    • 2016
  • The period of the previous multi-core could be helped to improve program performance, based on the development of the hardware. However, one of the core performance enhancements for this encounter limitations and become the common way of multi-core with multiple cores. Modern programming concurrency that improves the conventional method for using threads of the kernel level in order to use the multi-core come to the fore. Using modern lightweight thread concurrency programming is to optimize the benefits of multi-core. Also sharing the absence of available data that can change is a major consideration when writing concurrent code. This paper describes the key considerations when creating a discussion concurrent code, and these issues are being supported in any way in the language of one 'go' of technologies that support the modern concurrency, and even how to write better code concurrency.

  • PDF

Cloud Computing Virtualization: It's Security Issues and Vulnerability (클라우드 컴퓨팅 가상화 기술: 보안이슈 및 취약점)

  • Kang, Dea-Hoon;Kim, Sang-Gu;Kim, HyunHo;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.234-237
    • /
    • 2014
  • The increasing of Cloud Computing technology among several companies has been a key strategy for IT services to provide desirable IT solutions to consumers of cloud services. More attention is concentrated to these core technologies that enable cloud services and more particularly to the virtualization aspect. The accessibility to a larger number of users is possible because of the usage of the data-intensive, data management and data integrity. Unfortunately, those useful services are vulnerable to kind of attacks by hackers, thus the security of personal information is in critical situation. To solve this to leakage vulnerability, and with the proliferation of cloud services, the cloud service providers adopt a security system with firewall, antivirus software and a large number of virtualized servers and Host. In this paper, a variety of virtualization technologies, threats and vulnerabilities are described with a complement of different security solutions as countermeasures.

  • PDF

Cloud Computing : An Analysis of Security Vulnerabilities in managerial aspect (클라우드 컴퓨팅 : 관리적 측면에서의 보안 취약점 분석)

  • Choi, Chang-Ho;Lee, Young Sil;Lee, Hoon Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.291-294
    • /
    • 2014
  • By building an environment that can utilize big data, many companies are interested in the cloud computing technology that has increased its popularity recently. By developing cloud environments from existing virtual environments, in the process, we discovered a variety of security vulnerabilities such as management, virtual machines, hypervisors, hardware etc. The security techniques from administrative aspects in the cloud environment provide the environment which can securely store data by the identification and control of security threats. In this paper, we investigate a list of companies which supports the cloud services and the types of services, and analyze the security threats according to the administrative aspects in the cloud environment. In addition, we suggest the direction for future improvements by investigating accidents or incidents which occurred recently.

  • PDF

Elasticity Analyses between Water Temperature and Water Quality considering Climate Change in Nak-dong River Basin (기후변화를 고려한 낙동강 유역의 수온과 수질 탄성도 분석)

  • Shon, Tae Seok;Lee, Kyu Yeol;Im, Tae Hyo;Shin, Hyun Suk
    • Journal of Korean Society on Water Environment
    • /
    • v.27 no.6
    • /
    • pp.830-840
    • /
    • 2011
  • Climate change has been settled as pending issues to consider water resources and environment all over the world, however, scientific and quantitative assessment methods of climate change have never been standardized. When South Korea headed toward water deficiency nation, the study is not only required analysis of atmospheric or hydrologic factors, but also demanded analysis of correlation with water quality environment factors to gain management policies about climate change. Therefore, this study explored appropriate monthly rainfall elasticity in chosen 41 unit watersheds in Nak-dong river which is the biggest river in Korea and applied monitored discharge data in 2004 to 2009 with monthly rainfall using Thiessen method. Each unit watershed drew elasticity between water temperature and water quality factors such as BOD, COD, SS, T-N, and T-P. Moreover, this study performed non-linear correlation analysis with monitored discharge data. Based on results of analysis, this is first steps of climate change analysis using long-term monitoring to develop basic data by Nak-dong river Environmental Research Center (Ministry of Environment) and to draw quantitative results for reliable forecasting. Secondary, the results considered characteristic of air temperature and rainfall in each unit watershed so that the study has significance its various statistical applications. Finally, this study stands for developing comparable data through "The 4 major river restoration" project by Korea government before and after which cause water quality and water environment changes.

Securing Sensitive Data in Cloud Storage (클라우드 스토리지에서의 중요데이터 보호)

  • Lee, Shir-Ly;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.

Holocarpic oomycete parasites of red algae are not Olpidiopsis, but neither are they all Pontisma or Sirolpidium (Oomycota)

  • Giuseppe C. Zuccarello;Claire M. M. Gachon;Yacine Badis;Pedro Murua;Andrea Garvetto;Gwang Hoon Kim
    • ALGAE
    • /
    • v.39 no.1
    • /
    • pp.43-50
    • /
    • 2024
  • Oomycetes are ubiquitous heterotrophs of considerable economic and ecological importance. Lately their diversity in marine environments has been shown to be greatly underappreciated and many lineages of intracellular holocarpic parasites, infecting micro- and macro-algae, remain to be fully described taxonomically. Among them, pathogens of marine red algae have been studied extensively as they infect important seaweed crops. Throughout the 20th century, most intracellular, holocarpic biotrophic oomycetes that infect red algae have been assigned to the genus Olpidiopsis Cornu. However, 18S rRNA sequencing of Olpidiopsis saprolegniae, the species considered the generitype for Olpidiopsis, suggests that this genus is not closely related to the marine pathogens and that the latter requires a nomenclatural update. Here, we compile and reanalyze all recently published 18S rRNA sequence data for marine holocarpic oomycetes, with a particular focus on holocarpic pathogens of red algae. Their taxonomy has been revised twice over the past four years, with suggestions to transfer them first into the genus Pontisma and then Sirolpidium, and into a monogeneric order, Pontismatales. We show however, that previously published topologies and the proposed taxa Pontisma, Sirolpidium, and Pontismatales are unsupported. We highlight that name changes that are unfounded and premature create confusion in interested parties, especially concerning pathogens of marine red algae that infect important seaweed crops. We thus propose that the names of these holocarpic biotrophic parasites of red algae are retained temporarily, until a supported topology is produced with more genetic markers to enable the circumscription of species and higher-level taxa.

Development and Performance Test of Gas Safety Management System based on the Ubiquitous Home (u-home 가스안전관리시스템 개발 및 성능시험)

  • Park, Gyou-Tae;Lyu, Geun-Jun;Kim, Young-Gyu;Kim, Yeong-Dae;Jee, Cha-Wan;Kwon, Jong-Won;Kim, Hie-Sik
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.3
    • /
    • pp.13-20
    • /
    • 2011
  • In this paper, we proposed a system to raise gas safety management by using the wireless communication module and intelligent gas safety appliances. Our designed systems configure a micom-gas meter, an automatic extinguisher, sensors, and a wallpad. A micom-gas-meter monitors gas flow, gas pressure, and earthquake. An automatic fire extinguisher checks gas(combustible) leaks and temperature of $100^{\circ}C$ and $130^{\circ}C$. Sensors measure smoke and CO gas. In our novel system, a micom-gas meter cut off inner valve with warnings, an automatic fire extinguisher cut off middle valve and spray extinguishing materials, and sensors generate signals for smoke and CO when occurring gas risk. Gas safety appliances and sensors takes safety measures, and transmit those signal to a wallpad. The wallpad again transmit signal like events to a control server. Users can connect web pages for gas safety through B-ISDN and control and manage them. We hereby devised scenarios for gas safety and risk management, and demonstrated their effectiveness through experiments.