• Title/Summary/Keyword: cloud theory

Search Result 99, Processing Time 0.026 seconds

The study of narrative of cartoon Focusing on prerequisites for narrative in the Theory of 『Story and Discourse』 by S. Chatman (카툰의 서사 연구 (S.채트먼의 『이야기와 담론』 이론의 서사의 전제조건을 중심으로))

  • Ahn, So Ra;Lee, Won Soek
    • Cartoon and Animation Studies
    • /
    • s.33
    • /
    • pp.223-246
    • /
    • 2013
  • Even though cartoons and narration comics were born from different origin, they have been called by names such as 'cartoons' or 'comics'. The reason can be found in the similarity of cartoons and narration comics. The similarity of cartoons and narration comics is the genre consisting of writing and drawing. Writing can be the format of expression and it can represent the story. Such story is present as a component of 'narration'. Sub genre of comics includes cartoons and narration comics. It includes animation in a broad range. In cases of narration comics and animation, it is thought that narration is present with continuity of time. However, in case of cartoon, because one or two cuts without continuity of writing are frequently expressed, it is being asked whether narration is present. It is easy to be reminded of epic or chanson de geste whenever you hear 'narration'. Since it deals with a biography of the character, we think the concept of 'narration' with temporality. However, narration provides a certain event in a broad range. Thus, cartoons presenting one event with the image may have the existence of narration, because description of multiple scenes of narrative comics can be implicitly represented in cartoons. As such implications leave a space, the empty space can be filled by active reasoning of recipients. However, nevertheless, it is very difficult to find studies as well as mentions of narration in cartoons. Thus, in this paper, we investigate the concept and structure of narration and demonstrate the presence of narration in cartoons. First of all, we looked at the narration theory in literature before studying narration in cartoons. The reason is that we thought the approach to the literary theory was required in order to investigate the basic elements, since cartoons are a collection of writing and drawing. We were focused on the prerequisites of narration presented in "story and discourse" of s. Chatman. If the prerequisites of narration are present, we can assume that the narration is present. The prerequisites are 'narration reasoning', 'screening', 'consistency', 'process statements' and 'stasis statement'. As s. Chatman described them as prerequisites of narration, he analyzed the narration structures of films and novels. In addition, we revealed that the narrations were present in cartoons as we identified how prerequisites of narration presented by Chatman were presented and expressed through "vocabulary of comics", "Timeframe" and "life in the line" described in "understanding comics" by Scott McCloud.

The Posthuman Queer Body in Ghost in the Shell (1995) (<공각기동대>의 현재성과 포스트휴먼 퀴어 연구)

  • Kim, Soo-Yeon
    • Cross-Cultural Studies
    • /
    • v.40
    • /
    • pp.111-131
    • /
    • 2015
  • An unusual success engendering loyalty among cult fans in the United States, Mamoru Oshii's 1995 cyberpunk anime, Ghost in the Shell (GITS) revolves around a female cyborg assassin named Motoko Kusanagi, a.k.a. "the Major." When the news came out last year that Scarlett Johansson was offered 10 million dollars for the role of the Major in the live action remake of GITS, the frustrated fans accused DreamWorks of "whitewashing" the classic Japanimation and turning it into a PG-13 film. While it would be premature to judge a film yet to be released, it appears timely to revisit the core achievement of Oshii's film untranslatable into the Hollywood formula. That is, unlike ultimately heteronormative and humanist sci-fi films produced in Hollywood, such as the Matrix trilogy or Cloud Atlas, GITS defies a Hollywoodization by evoking much bafflement in relation to its queer, posthuman characters and settings. This essay homes in on Major Kusanagi's body in order to update prior criticism from the perspectives of posthumanism and queer theory. If the Major's voluptuous cyborg body has been read as a liberating or as a commodified feminine body, latest critical work of posthumanism and queer theory causes us to move beyond the moralistic binaries of human/non-human and male/female. This deconstruction of binaries leads to a radical rethinking of "reality" and "identity" in an image-saturated, hypermediated age. Viewed from this perspective, Major Kusanagi's body can be better understood less as a reflection of "real" women than as an embodiment of our anxieties on the loss of self and interiority in the SNS-dominated society. As is warned by many posthumanist and queer critics, queer and posthuman components are too often used to reinforce the human. I argue that the Major's hybrid body is neither a mere amalgam of human and machine nor a superficial postmodern blurring of boundaries. Rather, the compelling combination of individuality, animality, and technology embodied in the Major redefines the human as always, already posthuman. This ethical act of revision-its shifting focus from oppressive humanism to a queer coexistence-evinces the lasting power of GITS.

Dynamic Behavior Study Using Videomicroscopy in Systems Containing Polar Oils and Nonionic Surfactant (극성 오일, 비이온성 계면활성제를 포함한 계에서의 Videomicroscopy를 이용한 동적 거동에 관한 연구)

  • Lim, Jong-Choo
    • Applied Chemistry for Engineering
    • /
    • v.8 no.3
    • /
    • pp.473-481
    • /
    • 1997
  • Enhanced videomicroscopy was used to observe the dynamic behavior which occurred when water containing pure nonionic surfactant was carefully contacted with equal volumes of polar oils such as oleyl alcohol and oleic acid at various temperatures. A key component of the system is a vertical-stage microscope which provides for stable interfaces by locating the oil above the denser aqueous phase. This arrangement allowed intermediate phases formed at the surface of contact to be clearly observed, as well as any spontaneous emulsification which developed. Contacting experiments with $C_{12}E_5$ as the surfactant and with pure oleyl alcohol and oleic acid soils showed little activity below the cloud point but vigorous activity at higher temperatures including formation of an intermediate lamellar liquid crystalline phase. Diffusion path theory, which allows prediction of spontaneous emulsification resulting from diffusion and of intermediate phase formation during contacting processes, was used to understand the dynamic behavior seen during contacting experiments. Tentative diffusion paths for the contacting experiments with pure oleyl alcohol were presented with the aid of a partial phase diagram of the oleyl alcohol-water-$C_{12}E_5$ system.

  • PDF

The study on the diagnosis and measurement of post-information society by ANP (ANP를 활용한 후기정보사회의 수준진단과 측정에 관한 연구)

  • Song, Young-Jo;Kwak, Jeong-Ho
    • Informatization Policy
    • /
    • v.23 no.2
    • /
    • pp.73-97
    • /
    • 2016
  • Social changes due to ICT like Big Data, IoT, Cloud and Mobile is progressing rapidly. Now, we get out of the old-fashioned frame was measured at the level of the information society through the introduction of PC, Internet speed and Internet subscribers etc and there is a need for a new type of diagnostic information society framework. This study is the study for the framework established to diagnose and measure post-information society. The framework and indicators were chosen in accordance with the technological society coevolution theory and information society-related indicators presented from authoritative international organizations. Empirical results utilizing the indicators and framework developed in this study were as follows: First, the three sectors, six clusters (items), 25 nodes (indicators) that make up the information society showed that all strongly connected. Second, it was diagnosed as information society development (50.34%), technology-based expansion (25.03%) and ICT effect (24.63%) through a network analysis (ANP) for the measurement of importance of the information society. Third, the result of calculating the relative importance of the cluster and nodes showed us (1)social development potential (26.04%), (2)competitiveness (15.9%), (3)ICT literacy (15.5%) (4) (social)capital (24.3 %), (5)ICT acceptance(9.54%), (6)quality of life(8.7%). Consequently, We should take into account the effect of the economy and quality of life beyond ICT infrastructure-centric when we measure the post-information society. By applying the weighting we should performs a comparison between countries and we should diagnose the level of Korea and provide policy implications for the preparation of post-information society.

A Study on Business Types of IoT-based Smarthome: Based on the Theory of Platform Typology (IoT 기반 스마트홈 비즈니스 유형 연구: 플랫폼유형론을 근간으로)

  • Song, Minzheong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.27-40
    • /
    • 2016
  • This paper aims to analyze the business types of 237 IoT based smart home companies in the world (launched during 1999~2014) which got global investment last few years. For this, the previous literatures trying to analze technology and service types of smart home are searched and the typology of the platform is discussed. Based on it, this research conceptualizes an analysis framework that includes three areas of smart home like home automation, home security, and energy efficiency with the three platform types like product, software, and service. This study concludes that the development of business type for IoT based smart home ecosystem is from the product to software and it can be a platform or not. In current status, there are a few platforms of product and software, but in the device management (16%) and thermostat (11%), companies are persuing more platform like. It is difficult to find the service platform in overall areas, for application based service has a few attractions in the investment market due to the lack of cloud infrastructure and data analytics. The following three are the implication to domestic market: 1) More active offering of API and SDK, 2) more active introduction of wireless Intenet network protocols, and 3) more active interoperability efforts and alliance activities are needed.

Method of ChatBot Implementation Using Bot Framework (봇 프레임워크를 활용한 챗봇 구현 방안)

  • Kim, Ki-Young
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.1
    • /
    • pp.56-61
    • /
    • 2022
  • In this paper, we classify and present AI algorithms and natural language processing methods used in chatbots. A framework that can be used to implement a chatbot is also described. A chatbot is a system with a structure that interprets the input string by constructing the user interface in a conversational manner and selects an appropriate answer to the input string from the learned data and outputs it. However, training is required to generate an appropriate set of answers to a question and hardware with considerable computational power is required. Therefore, there is a limit to the practice of not only developing companies but also students learning AI development. Currently, chatbots are replacing the existing traditional tasks, and a practice course to understand and implement the system is required. RNN and Char-CNN are used to increase the accuracy of answering questions by learning unstructured data by applying technologies such as deep learning beyond the level of responding only to standardized data. In order to implement a chatbot, it is necessary to understand such a theory. In addition, the students presented examples of implementation of the entire system by utilizing the methods that can be used for coding education and the platform where existing developers and students can implement chatbots.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

Tropospheric Ozone over the Seoul Metropolitan Area Derived from Satellite Observations (MODIS) and Numerical Simulation (위성관측(MODIS)에서 유도된 수도권 지역의 대류권 오존 및 수치실험)

  • Yoo Jung-Moon;Park Yoo-Min;Lee Suk-Jo
    • Journal of the Korean earth science society
    • /
    • v.26 no.3
    • /
    • pp.283-296
    • /
    • 2005
  • The effect of ozone and surface temperature on the ozone band at $9.7{\mu}m$ has been investigated from radiative transfer theory together with observations in order to derive empirical methods for remotely sensing ground-ozone concentration. Simultaneous observations of satellite (MODIS Aqua; ECT 13:30) and ground-ozone at 79 stations have been used over the Seoul Metropolitan Area (SMA; 125.7-127.2 E, 37.2-37.7 N) during four ozone-warning days in the year 2003. Cloud effect on the band in the methods was filtered out based on synoptic observations. Upwelling radiance values at $9.6{\mu}m$ which have been estimated at the given ozone concentration of 327-391 DU depend on surface temperature (Ts) showing $5.52\~5.78Wm^{-2}sr^{-1}\;at\;Ts = 290 K,\;and\;9.00\~9.57Wm^{-2}sr^{-1}$ Ts = 325K. Thus, the partitioned contributions of ozone and temperature to intensity of ozone absorption band are $0.26Wm^{-1}sr^{-1}/64\;DU\;and\;0.31 Wm^{-2}sr^{-1}/35K$, respectively. Here the intensity which has been used to remotely detect ground-ozone concentration from infrared satellite measurement is defined as the difference in brightness temperature between $11{\mu} m\;and\;9.7{\mu}m (i.e.,\; T_{11-9.7})$. The methods in this study have been applied to estimate ground-ozone from MODIS data in cases that there are significant correlations between the band intensity and ground-ozone. The values of estimated ozone significantly correlate (0.49-0.63) with ground observations at a significance level of $1\%$. For the improved methods, further study may be required to use tropospheric ozone rather than ground-ozone, considering the variation stratospheric ozone.

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.