• Title/Summary/Keyword: Work-study parallel

Search Result 237, Processing Time 0.024 seconds

A Command of French and anti-style used in Lee Sang's poetic work (이상(Lee Sang)의 시작품에 구사되는 프랑스어와 반문체)

  • Lee, Byung Soo
    • Cross-Cultural Studies
    • /
    • v.49
    • /
    • pp.229-248
    • /
    • 2017
  • This paper is a study on French of Lee Sang's poems called metaphysical scandals in Korean poetry. Is poetic language he used a common poetic word or a non-poetic word in French? What kind of harmony do words and sentences composed of French have with Korean, Chinese character, and non-poetic word? Based on these questions, we analyzed a command of French, that is symbolic, geometrical, and pictorial French as well as repetitive and parallel constitution used in form of words and sentences. In Lee Sang's poems, as a result, the use of French is seen as a mixture of non-poetic word. It shows characteristics that reject traditional native language and the creation of poetry. In his poems, French is also an important factor of avant-garde poetic material and experimental creation technique. In his poems, French is used as a special tool to express internal conflicts of the poet. Lee Sang showed experimental style that could not be found in modern Korean literature by using signifier and signifed that french language has.

Investigation of Sorption Reaction of Re(VII) onto HDPy- and HDTMA-modified Bentonite (HDPy 및 HDTMA로 개질된 벤토나이트에 대한 Re(VII)의 흡착반응 분석)

  • Jun-Myung Choi;Junhyuk Ha;Ranyeong Choi;Jun-Yeop Lee
    • Journal of Radiation Industry
    • /
    • v.18 no.3
    • /
    • pp.167-171
    • /
    • 2024
  • Technetium-99 (99Tc) is recognized as a critical concern in the disposal of spent nuclear fuel due to its long half-life and remarkable stability, existing predominantly as TcO4- in the natural environment. The anionic form of technetium is highly soluble and mobile, posing significant environmental risks from the viewpoint of nuclear waste management. Thus, developing efficient and cost-effective sorbents for aqueous Tc(VII) is essential for mitigating relevant contamination. In the present work, the adsorption characteristics of Re(VII), a chemical analog of Tc(VII), were investigated using the clay mineral bentonite, modified with two different organic cations: hexadecylpyridinium (HDPy) and hexadecyltrimethylammonium (HDTMA). Sorption experiments were conducted at a liquid-to-solid ratio of 1 g/L with Re(VII) solutions prepared at concentrations from 10-4 mol/L to 10-6 mol/L. The sorption ratio and distribution coefficients were determined with samples collected at reaction times of 10, 50, 100, and 500 minutes after 0.45 ㎛ syringe filtration. In parallel, the modified bentonite samples were further analyzed using the X-ray diffraction (XRD) method to understand the adsorption mechanism of Re(VII) onto the target minerals. According to the quantification analysis results, a rapid equilibrium reaction of aqueous Re(VII) for all modified bentonite samples was identified. Moreover, near-complete adsorption of Re(VII) was observed when the bentonite was modified at 200-400% of its cation exchange capacity (CEC) for both organic cations. For cases of lower modification, the HDTMA-modified bentonite showed relatively higher adsorption efficiency compared with the one modified with HDPy. This result was inferred to be due to the difference in inter-layer spacing based on the characteristics of the organic cations. It is expected that the results obtained through this study will serve as a preliminary case for the synthesis of adsorbents for the retardation of highly mobile anionic radionuclides, such as I and Tc, in the natural environment.

UX Methodology Study by Data Analysis Focusing on deriving persona through customer segment classification (데이터 분석을 통한 UX 방법론 연구 고객 세그먼트 분류를 통한 페르소나 도출을 중심으로)

  • Lee, Seul-Yi;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.151-176
    • /
    • 2021
  • As the information technology industry develops, various kinds of data are being created, and it is now essential to process them and use them in the industry. Analyzing and utilizing various digital data collected online and offline is a necessary process to provide an appropriate experience for customers in the industry. In order to create new businesses, products, and services, it is essential to use customer data collected in various ways to deeply understand potential customers' needs and analyze behavior patterns to capture hidden signals of desire. However, it is true that research using data analysis and UX methodology, which should be conducted in parallel for effective service development, is being conducted separately and that there is a lack of examples of use in the industry. In thiswork, we construct a single process by applying data analysis methods and UX methodologies. This study is important in that it is highly likely to be used because it applies methodologies that are actively used in practice. We conducted a survey on the topic to identify and cluster the associations between factors to establish customer classification and target customers. The research methods are as follows. First, we first conduct a factor, regression analysis to determine the association between factors in the happiness data survey. Groups are grouped according to the survey results and identify the relationship between 34 questions of psychological stability, family life, relational satisfaction, health, economic satisfaction, work satisfaction, daily life satisfaction, and residential environment satisfaction. Second, we classify clusters based on factors affecting happiness and extract the optimal number of clusters. Based on the results, we cross-analyzed the characteristics of each cluster. Third, forservice definition, analysis was conducted by correlating with keywords related to happiness. We leverage keyword analysis of the thumb trend to derive ideas based on the interest and associations of the keyword. We also collected approximately 11,000 news articles based on the top three keywords that are highly related to happiness, then derived issues between keywords through text mining analysis in SAS, and utilized them in defining services after ideas were conceived. Fourth, based on the characteristics identified through data analysis, we selected segmentation and targetingappropriate for service discovery. To this end, the characteristics of the factors were grouped and selected into four groups, and the profile was drawn up and the main target customers were selected. Fifth, based on the characteristics of the main target customers, interviewers were selected and the In-depthinterviews were conducted to discover the causes of happiness, causes of unhappiness, and needs for services. Sixth, we derive customer behavior patterns based on segment results and detailed interviews, and specify the objectives associated with the characteristics. Seventh, a typical persona using qualitative surveys and a persona using data were produced to analyze each characteristic and pros and cons by comparing the two personas. Existing market segmentation classifies customers based on purchasing factors, and UX methodology measures users' behavior variables to establish criteria and redefine users' classification. Utilizing these segment classification methods, applying the process of producinguser classification and persona in UX methodology will be able to utilize them as more accurate customer classification schemes. The significance of this study is summarized in two ways: First, the idea of using data to create a variety of services was linked to the UX methodology used to plan IT services by applying it in the hot topic era. Second, we further enhance user classification by applying segment analysis methods that are not currently used well in UX methodologies. To provide a consistent experience in creating a single service, from large to small, it is necessary to define customers with common goals. To this end, it is necessary to derive persona and persuade various stakeholders. Under these circumstances, designing a consistent experience from beginning to end, through fast and concrete user descriptions, would be a very effective way to produce a successful service.

A Feasibility Study on the Use of Liner and Cover Materials Using Sewage Sludge (하수슬러지의 차수재 및 복토재로의 이용타당성에 관한 연구)

  • 유남재;김영길;박병수;정하익
    • Journal of the Korean Geotechnical Society
    • /
    • v.15 no.2
    • /
    • pp.43-71
    • /
    • 1999
  • This research is an experimental work of developing a construction material using municipal wastewater sludge as liner and cover materials for waste disposal landfill. Weathered granite soil and flyash, produced as a by-product in the power plant, were used as the primary additives to improve geotechnical engineering properties of sludge. For secondary additives, bentonite and cement were mixed with sludge to decrease the permeability and to increase the shear strength, respectively. Various laboratory test required to evaluate the design criteria for liner and cover materials, were carried out by changing the mixing ratio of sludge with the additives. Basic soil properties such as specific gravity, grain size distribution, liquid and plastic limits were measured to analyze their effects on permeability, compaction, compressibility and shear strength properties of mixtures. Laboratory compaction tests were conducted to find the maximum dry densities and the optimum moisture contents of mixtures, and their effectiveness of compaction in field was consequently evaluated. Permeability tests of variable heads with compacted samples, and the stress-controlled consolidation tests with measuring permeabilities of samples during consolidation process were performed to obtain permeability, and to find the compressibility as well as consolidational coefficients of mixtures, respectively. To evaluate the long term stability of sludges, creep tests were also conducted in parallel with permeability tests of variable heads. On the other hand, for the compacted sludge decomposed for a month, permeability tests were carried out to investigate the effect of decomposition of organic matters in sludges on its permeability. Direct shear tests were performed to evaluate the shear strength parameters of mixed sludge with weathered granite, flyash and bentonite. For the mixture of sludge with cement, unconfined compression tests were carried out to find their strength with varying mixing ratio and curing time. On the other hand, CBR tests for compacted specimen were also conducted to evaluate the trafficability of mixtures. Various test results with mixtures were assessed to evaluate whether their properties meet the requirements as liner and cover materials in waste disposal landfill.

  • PDF

Professional Speciality of Communication Administration and, Occupational Group and Series Classes of Position in National Public Official Law -for Efficiency of Telecommunication Management- (통신행정의 전문성과 공무원법상 직군렬 - 전기통신의 관리들 중심으로-)

  • 조정현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.3 no.1
    • /
    • pp.26-27
    • /
    • 1978
  • It can be expected that intelligence and knowledge will be the core of the post-industrial society in a near future. Accordingly, the age of intelligence shall be accelerated extensively to find ourselves in an age of 'Communication' service enterprise. The communication actions will increase its efficiency and multiply its utility, indebted to its scientic principles and legal idea. The two basic elements of communication action, that is, communication station and communication men are considered to perform their function when they are properly supported and managed by the government administration. Since the communication action itself is composed of various factors, the elements such as communication stations and officials must be cultivated and managed by specialist or experts with continuous and extensive study practices concerned. With the above mind, this study reviewed our public service officials law with a view to improve it by providing some suggestions for communication experts and researchers to find suitable positions in the framework of government administration. In this study, I would like to suggest 'Occupational Group of Communication' that is consisted of a series of comm, management positions and research positions in parallel to the existing series of comm, technical position. The communication specialist or expert is required to be qualified with necessary scientific knowledge and techniques of communication, as well as prerequisites as government service officials. Communication experts must succeed in the first hand to obtain government licence concerned in with the government law and regulation, and international custom before they can be appointed to the official positions. This system of licence-prior-to-appointment is principally applied in the communication management position. And communication research positions are for those who shall engage themselves to the work of study and research in the field of both management and technical nature. It is hopefully expected that efficient and extensive management of communication activities, as well as scientific and continuous study over than communication enterprise will be upgraded at national dimensions.

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

The Abuse and Invention of Tradition from Maintenance Process of Historic Site No.135 Buyeo Gungnamji Pond (사적 제135호 부여 궁남지의 정비과정으로 살펴본 전통의 남용과 발명)

  • Jung, Woo-Jin
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.35 no.2
    • /
    • pp.26-44
    • /
    • 2017
  • Regarded as Korea's traditional pond, Gungnamj Pond was surmised to be "Gungnamji" due to its geological positioning in the south of Hwajisan (花枝山) and relics of the Gwanbuk-ri (官北里) suspected of being components to the historical records of Muwang (武王)'s pond of The Chronicles of the Three States [三國史記] and Sabi Palace, respectively, yet was subjected to a restoration following a designation to national historic site. This study is focused on the distortion of authenticity identified in the course of the "Gungnamji Pond" restoration and the invention of tradition, whose summarized conclusions are as follows. 1. Once called Maraebangjuk (마래방죽), or Macheonji (馬川池) Pond, Gungnamji Pond was existent in the form of a low-level swamp of vast area encompassing 30,000 pyeong during the Japanese colonial period. Hong, Sa-jun, who played a leading role in the restoration of "Gungnamji Pond," said that even during the 1940s, the remains of the island and stone facilities suspected of being the relics of Gungnamji Pond of the Baekje period were found, and that the traces of forming a royal palace and garden were discovered on top of them. Hong, Sa-jun also expressed an opinion of establishing a parallel between "Gungnamji Pond" and "Maraebangjuk" in connection with a 'tale of Seodong [薯童說話]' in the aftermath of the detached palace of Hwajisan, which ultimately operated as a theoretical ground for the restoration of Gungnamj Pond. Assessing through Hong, Sa-jun's sketch, the form and scale of Maraebangjuk were visible, of which the form was in close proximity to that photographed during the Japanese colonial period. 2. The minimized restoration of Gungnamji Pond faced deterrence for the land redevelopment project implemented in the 1960s, and the remainder of the land size is an attestment. The fundamental problem manifest in the restoration of Gungnamji Pond numerously attempted from 1964 through 1967 was the failure of basing the restorative work in the archaeological facts yet in the perspective of the latest generations, ultimately yielding a replication of Hyangwonji Pond of Gyeongbok Palace. More specifically, the methodologies employed in setting an island and a pavilion within a pond, or bridging an island with a land evidenced as to how Gungnamji Pond was modeled after Hyangwonji Pond of Gyeongbok Palace. Furthermore, Chihyanggyo (醉香橋) Bridge referenced in the designing of the bridge was hardly conceived as a form indigenous to the Joseon Dynasty, whose motivation and idea of the misguided restoration design at the time all the more devaluated Gungnamji Pond. Such an utterly pure replication of the design widely known as an ingredient for the traditional landscape was purposive towards the aesthetic symbolism and preference retained by Gyeongbok Palace, which was intended to entitle Gungnamji Pond to a physical status of the value in par with that of Gyeongbok Palace. 3. For its detachment to the authenticity as a historical site since its origin, Gungnamji Pond represented distortions of the landscape beauty and tradition even through the restorative process. The restorative process for such a historical monument, devoid of constructive use and certain of distortion, maintains extreme intimacy with the nationalistic cultural policy promoted by the Park, Jeong-hee regime through the 1960s and 1970s. In the context of the "manipulated discussions of tradition," the Park's cultural policy transformed the citizens' recollection into an idealized form of the past, further magnifying it at best. Consequently, many of the historical sites emerged as fancy and grand as they possibly could beyond their status quo across the nation, and "Gungnamji Pond" was a victim to this monopolistic government-led cultural policy incrementally sweeping away with new buildings and structures instituted regardless of their original space, and hence, their value.