• Title/Summary/Keyword: Web Documents

Search Result 828, Processing Time 0.024 seconds

Development of Local Food Content in Jinan-Gun and Gurye-Gun through Storytelling (스토리텔링을 활용한 호남지역 장수밥상 콘텐츠 개발 - 전북 진안·전남 구례군 중심으로 -)

  • Kim, Mi-Hye;Chung, Hae-Kyung
    • Journal of the Korean Society of Food Culture
    • /
    • v.28 no.2
    • /
    • pp.145-157
    • /
    • 2013
  • The purpose of this study was to develop cultural food contents from local dishes related to the historical and cultural heritage in the representative areas of Gurye and Jinan. The information on 'Story' was collected from each region's representative local native journal, searches of related web-sites, analysis of old literature, and interviews of traditional households. 'Telling', the conveyance, was focused on texts of literature analysis, which were synthesized from historical conditions, regional food materials, cuisine, regional symbolism, etc. The created food contents were displayed with balanced and healthy Korean food dishes after nutritional analysis. In Gurye, the content was extracted from the story of Hwang hyun (黃玹, 1855-1910) - figura of Gurye - and his collection, "Maecheonyarok", and the storytelling native food was prepared. In Jinan, the content was extracted from the text of an anecdote from "filial son Kwang-beom Lee", a local journal. We tried to express Gurye's clean image in connection with the patriot - Hwang hyun (his nick name was Maecheon), in the late period of Chosun through the unprocessed and simple nature of the dining table. As in Jinan's storytelling materials, we tried to express a healthy menu of health food for older people based on the clean nature and documents about the real character's filial behavior. The developed healthy menu and dining table properties in this study have been established in accordance with nutrient intake standards of energy in Korea.

A Case Study on the Formation of Contract under the CISG (CISG상 계약의 성립에 관한 판례연구)

  • LEE, Byung-Mun;PARK, Eun-Ok
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.69
    • /
    • pp.1-22
    • /
    • 2016
  • This study primarily concerns the cases recently held as to the formation of contract under the CISG. In order to put forward the most plausible direction to interpret the rules on the formation of contract under the CISG, it particularly deals with the followings. First, it scrutinizes the rules on the formation of contract, focusing on the requirements of offer and acceptance, the time when such offer and acceptance become effective, the issues on the battle of forms. Second, it introduces two recent interesting cases regarding the formation of contract and provides legal and practical advice to the contracting parties when they intend to conclude a contract under the CISG as a governing law. The followings are practical points that the parties should consider when they enter into contract. First, as any signature or intial made in the offer could be regarded as an acceptance, the parties are required to clarify the meaning of such signature or initials before the conclusion of contract. Second, it is not necessarily required one's signature for an offer to become effective but his name. Third, standard terms cannot be incorporated into the contract simply by reference to web-page or other documents. In order for such terms to be incorporated, it may be necessary to enclose them in the offer or to bring the other party's attention to them. Forth, one should remember that an acceptance by act become effective not when such act is complete, but when it is performed.

  • PDF

A the internet distance education system development of the LINUXBASED subtitle - A the center of textbook design module (리눅스 기반의 인터넷 원격 교육 시스템 개발-교재 설계 모듈을 중심으로)

  • 성평식
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.2
    • /
    • pp.141-150
    • /
    • 2001
  • Within a context of rapid technological change and shifting market conditions, the education environment requires new paradigm of education delivery. In accordance of such a technological progress, distance education system, which makes the learning take place at anytime anywhere, overcoming barriers of time, or distance, is emerging as a mainstream of education delivery replacing the convectional one way delivery system from instructor to learners. This paper aims to introduce the development principle and algorithm about Instructional System Desgin(ISD) module, a part of a total solution for distance education services. It was developed on Linux, a free Unix-type operating system. Linux supports so various network protocols, sharing the network resources in a smooth way, that it is able to integrate with other operating system very easily, especially with Windows NT or Windows 2000 servers. In terms of quality, it never falls behind the windows products which are commercially available only. It is a right operating system for the such a school environment that is usually limited in budgets. The development environment of the distance education solution to which ISD module belongs is composing of Apache server for web server, lava bean based on components for ISD module, PHP, server-side scripting language, for HTML documents and MySQL for DBMS.

  • PDF

Provenance Compression Scheme Considering RDF Graph Patterns (RDF 그래프 패턴을 고려한 프로버넌스 압축 기법)

  • Bok, kyoungsoo;Han, Jieun;Noh, Yeonwoo;Yook, Misun;Lim, Jongtae;Lee, Seok-Hee;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.2
    • /
    • pp.374-386
    • /
    • 2016
  • Provenance means the meta data that represents the history or lineage of a data in collaboration storage environments. Therefore, as provenance has been accruing over time, it takes several ten times as large as the original data. The schemes for effciently compressing huge amounts of provenance are required. In this paper, we propose a provenance compression scheme considering the RDF graph patterns. The proposed scheme represents provenance based on a standard PROV model and encodes provenance in numeric data through the text encoding. We compress provenance and RDF data using the graph patterns. Unlike conventional provenance compression techniques, we compress provenance by considering RDF documents on the semantic web. In order to show the superiority of the proposed scheme, we compare it with the existing scheme in terms of compression ratio and the processing time.

A Study on the Improvement of Retrieval Efficiency Based on the CRFMD (공통기술표현포맷에 기반한 다매체자료의 검색효율 향상에 관한 연구)

  • Park, Il-Jong;Jeong, Ki-Tai
    • Journal of the Korean Society for information Management
    • /
    • v.23 no.3 s.61
    • /
    • pp.5-21
    • /
    • 2006
  • In recent years, theories of image and sound analysis have been proposed to work with text retrieval systems and have progressed quickly with the rapid progress in data processing speeds. This study proposes a common representation format for multimedia documents (CRFMD) composed of both images and text to form a single data structure. It also shows that image classification of a given test set is dramatically improved when text features are encoded together with image features. CRFMD might be applicable to other areas of multimedia document retrieval and processing, such as medical image retrieval, World Wide Web searching, and museum collection retrieval.

A Study on Recognition of Artificial Intelligence Utilizing Big Data Analysis (빅데이터 분석을 활용한 인공지능 인식에 관한 연구)

  • Nam, Soo-Tai;Kim, Do-Goan;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.129-130
    • /
    • 2018
  • Big data analysis is a technique for effectively analyzing unstructured data such as the Internet, social network services, web documents generated in the mobile environment, e-mail, and social data, as well as well formed structured data in a database. The most big data analysis techniques are data mining, machine learning, natural language processing, and pattern recognition, which were used in existing statistics and computer science. Global research institutes have identified analysis of big data as the most noteworthy new technology since 2011. Therefore, companies in most industries are making efforts to create new value through the application of big data. In this study, we analyzed using the Social Matrics which a big data analysis tool of Daum communications. We analyzed public perceptions of "Artificial Intelligence" keyword, one month as of May 19, 2018. The results of the big data analysis are as follows. First, the 1st related search keyword of the keyword of the "Artificial Intelligence" has been found to be technology (4,122). This study suggests theoretical implications based on the results.

  • PDF

Design and Implementation of XML Document Search System for the Cyber University (가상대학 XML 문서 검색시스템의 설계 및 구현)

  • Kong Beom-Yong;Hwang Byung-Kon;Cho Sae-Hong
    • Journal of Digital Contents Society
    • /
    • v.3 no.2
    • /
    • pp.131-142
    • /
    • 2002
  • This paper announces that, with the emergence of the imaginary university for the remote education, which is based on Web due to the education change, the introduction of the Multimedia contents system using computers and the Internet becomes serious. For this reason, this paper suggests search system for managing the imaginary university documents. For the success of the document management of the imaginary university, document search is regarded as an important issue as well as the executive support and search system of the document management. This paper plans and embodies the imaginary university XML document search system to establish the foundation of increasing efficiency o( affairs using XML document, by aiming at the fact that it will be highlighted as a representative application field as well as the efficiency of the executive affairs, by applying of Multimedia documentary creation system, which is about the imaginary university XML documentary that it is seen distinctly an effect of administrative work being a consequence of new technique application of computers.

  • PDF

The Effects of Learners' Cognitive Styles and Visual Organizer Types on Contents Comprehension and Awareness of Structure in Electronic Text Documents (학습자 인지양식과 시각적 조직자 유형이 전자 텍스트 문서의 내용이해 및 구조파악에 미치는 효과)

  • Han, Ahnna
    • The Journal of Korean Association of Computer Education
    • /
    • v.11 no.4
    • /
    • pp.47-58
    • /
    • 2008
  • The purpose of the study was to reveal the effects of visual organizer types and cognitive styles in electronic text understanding. 126 graduate students were divided into a field-dependent group and a field-independent group, and then assigned to two different types of web- based instruction programs which included visual organizers of 'reduction' type and 'abstraction' type. Regarding the comprehension of contents, there were no significant effects of visual organizer types and cognitive styles. However, it was revealed that there were significant interaction effects between visual organizer types and cognitive styles on the awareness of structure in electronic texts. That is to say, while Type 2 ('abstraction' type) was more effective to field-dependent learners, Type 1 ('reduction' type) was more effective to field-independent learners in awareness of structure in electronic texts.

  • PDF

Implementation of Kiosk-based Internet Public Services System (키오스크 기반 인터넷민원처리시스템의 구현)

  • An, Im-Sang;Jeong, Gi-Won
    • The KIPS Transactions:PartA
    • /
    • v.10A no.5
    • /
    • pp.433-438
    • /
    • 2003
  • To provede public services through Internet, there are several prerequisites such as security issue resolutions for public area installation and hardware support for authorized signatures etc. in addition to web-based system development. A kiosk-based system is a right solution for public services provision through Internet because a kiosk has hardware features supporting authorized signatures and also it can be installed at public area through Internet without security exposure, meeting security guidelines of National Intelligence Service. The process to provide public services through a koisk is that a client requests a kind of public services selecting menu through the kiosk, then the system issues a civil service documents after taking authentification and payment process. To support those kinds o processes it is required to support electronic payment using SMART card in addition to cash payment and to apply government standard security guidelines to protect administrative and personal information. This kiosk-based Internet public service system support and meet those all requirements.

A Study Of The Acupuncture & Moxibustion Fix-a-Day Method In Seunjeongwon-Ilgi (『승정원일기(承政院日記)』를 통해 본 침구택일(鍼灸擇日) 활용 방법)

  • Oh, Jun-Ho;Cha, Wung-Seok;Kim, Nam-Il
    • The Journal of Korean Medical History
    • /
    • v.22 no.1
    • /
    • pp.15-24
    • /
    • 2009
  • The objective of this article is to analysis of Acupuncture & Moxibustion Fix-a-day Method (AMFDM;鍼灸擇日) shown in the Seunjeongwon-Ilgi(承政院日記). Through such inquisition, The practical application of AMFDM could be found. The authors used web database of Seunjeongwon-Ilgi(承政院日記) serviced by National Institution of Korea History. We searched the database twice. First, We check up the database using key words - '忌日', '吉日', '拘忌', '鍼', '針' and '灸'. Search words is "(忌日|吉 日|拘忌)&(鍼|針|灸)". Second, We check up the database using other key words - '瘟㾮', '爲吉', '爲受鍼吉'. 1. AMFDM was used whenever Royal Family was cared. Futhermore, Its application method was as same as medical documents said. 2. AMFDM in the Seunjeongwon-Ilgi consists of Taboo-day(忌日) and Favor-day(吉日). Taboo-day is classified into following 5 type. Weather, Moon phases, The 24 solar terms(節氣), Spirit-location(人神), KunJie-12-deity(建除十二神) and OnHuang-day(瘟㾮日). 3. Sometime contradiction was occurred when AMFDM was used. So AMFDM had the priority order. According to these's order, doctor picked up a date. 4. Doctor used AMFDM to control Interval of treatment. They thought that acupuncture treatment exhaust one's Qi(氣). Using AMFDM, they could give recovery period to patient.

  • PDF