• Title/Summary/Keyword: date

Search Result 7,212, Processing Time 0.04 seconds

Subject-Balanced Intelligent Text Summarization Scheme (주제 균형 지능형 텍스트 요약 기법)

  • Yun, Yeoil;Ko, Eunjung;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.141-166
    • /
    • 2019
  • Recently, channels like social media and SNS create enormous amount of data. In all kinds of data, portions of unstructured data which represented as text data has increased geometrically. But there are some difficulties to check all text data, so it is important to access those data rapidly and grasp key points of text. Due to needs of efficient understanding, many studies about text summarization for handling and using tremendous amounts of text data have been proposed. Especially, a lot of summarization methods using machine learning and artificial intelligence algorithms have been proposed lately to generate summary objectively and effectively which called "automatic summarization". However almost text summarization methods proposed up to date construct summary focused on frequency of contents in original documents. Those summaries have a limitation for contain small-weight subjects that mentioned less in original text. If summaries include contents with only major subject, bias occurs and it causes loss of information so that it is hard to ascertain every subject documents have. To avoid those bias, it is possible to summarize in point of balance between topics document have so all subject in document can be ascertained, but still unbalance of distribution between those subjects remains. To retain balance of subjects in summary, it is necessary to consider proportion of every subject documents originally have and also allocate the portion of subjects equally so that even sentences of minor subjects can be included in summary sufficiently. In this study, we propose "subject-balanced" text summarization method that procure balance between all subjects and minimize omission of low-frequency subjects. For subject-balanced summary, we use two concept of summary evaluation metrics "completeness" and "succinctness". Completeness is the feature that summary should include contents of original documents fully and succinctness means summary has minimum duplication with contents in itself. Proposed method has 3-phases for summarization. First phase is constructing subject term dictionaries. Topic modeling is used for calculating topic-term weight which indicates degrees that each terms are related to each topic. From derived weight, it is possible to figure out highly related terms for every topic and subjects of documents can be found from various topic composed similar meaning terms. And then, few terms are selected which represent subject well. In this method, it is called "seed terms". However, those terms are too small to explain each subject enough, so sufficient similar terms with seed terms are needed for well-constructed subject dictionary. Word2Vec is used for word expansion, finds similar terms with seed terms. Word vectors are created after Word2Vec modeling, and from those vectors, similarity between all terms can be derived by using cosine-similarity. Higher cosine similarity between two terms calculated, higher relationship between two terms defined. So terms that have high similarity values with seed terms for each subjects are selected and filtering those expanded terms subject dictionary is finally constructed. Next phase is allocating subjects to every sentences which original documents have. To grasp contents of all sentences first, frequency analysis is conducted with specific terms that subject dictionaries compose. TF-IDF weight of each subjects are calculated after frequency analysis, and it is possible to figure out how much sentences are explaining about each subjects. However, TF-IDF weight has limitation that the weight can be increased infinitely, so by normalizing TF-IDF weights for every subject sentences have, all values are changed to 0 to 1 values. Then allocating subject for every sentences with maximum TF-IDF weight between all subjects, sentence group are constructed for each subjects finally. Last phase is summary generation parts. Sen2Vec is used to figure out similarity between subject-sentences, and similarity matrix can be formed. By repetitive sentences selecting, it is possible to generate summary that include contents of original documents fully and minimize duplication in summary itself. For evaluation of proposed method, 50,000 reviews of TripAdvisor are used for constructing subject dictionaries and 23,087 reviews are used for generating summary. Also comparison between proposed method summary and frequency-based summary is performed and as a result, it is verified that summary from proposed method can retain balance of all subject more which documents originally have.

An Empirical Study on Statistical Optimization Model for the Portfolio Construction of Sponsored Search Advertising(SSA) (키워드검색광고 포트폴리오 구성을 위한 통계적 최적화 모델에 대한 실증분석)

  • Yang, Hognkyu;Hong, Juneseok;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.167-194
    • /
    • 2019
  • This research starts from the four basic concepts of incentive incompatibility, limited information, myopia and decision variable which are confronted when making decisions in keyword bidding. In order to make these concept concrete, four framework approaches are designed as follows; Strategic approach for the incentive incompatibility, Statistical approach for the limited information, Alternative optimization for myopia, and New model approach for decision variable. The purpose of this research is to propose the statistical optimization model in constructing the portfolio of Sponsored Search Advertising (SSA) in the Sponsor's perspective through empirical tests which can be used in portfolio decision making. Previous research up to date formulates the CTR estimation model using CPC, Rank, Impression, CVR, etc., individually or collectively as the independent variables. However, many of the variables are not controllable in keyword bidding. Only CPC and Rank can be used as decision variables in the bidding system. Classical SSA model is designed on the basic assumption that the CPC is the decision variable and CTR is the response variable. However, this classical model has so many huddles in the estimation of CTR. The main problem is the uncertainty between CPC and Rank. In keyword bid, CPC is continuously fluctuating even at the same Rank. This uncertainty usually raises questions about the credibility of CTR, along with the practical management problems. Sponsors make decisions in keyword bids under the limited information, and the strategic portfolio approach based on statistical models is necessary. In order to solve the problem in Classical SSA model, the New SSA model frame is designed on the basic assumption that Rank is the decision variable. Rank is proposed as the best decision variable in predicting the CTR in many papers. Further, most of the search engine platforms provide the options and algorithms to make it possible to bid with Rank. Sponsors can participate in the keyword bidding with Rank. Therefore, this paper tries to test the validity of this new SSA model and the applicability to construct the optimal portfolio in keyword bidding. Research process is as follows; In order to perform the optimization analysis in constructing the keyword portfolio under the New SSA model, this study proposes the criteria for categorizing the keywords, selects the representing keywords for each category, shows the non-linearity relationship, screens the scenarios for CTR and CPC estimation, selects the best fit model through Goodness-of-Fit (GOF) test, formulates the optimization models, confirms the Spillover effects, and suggests the modified optimization model reflecting Spillover and some strategic recommendations. Tests of Optimization models using these CTR/CPC estimation models are empirically performed with the objective functions of (1) maximizing CTR (CTR optimization model) and of (2) maximizing expected profit reflecting CVR (namely, CVR optimization model). Both of the CTR and CVR optimization test result show that the suggested SSA model confirms the significant improvements and this model is valid in constructing the keyword portfolio using the CTR/CPC estimation models suggested in this study. However, one critical problem is found in the CVR optimization model. Important keywords are excluded from the keyword portfolio due to the myopia of the immediate low profit at present. In order to solve this problem, Markov Chain analysis is carried out and the concept of Core Transit Keyword (CTK) and Expected Opportunity Profit (EOP) are introduced. The Revised CVR Optimization model is proposed and is tested and shows validity in constructing the portfolio. Strategic guidelines and insights are as follows; Brand keywords are usually dominant in almost every aspects of CTR, CVR, the expected profit, etc. Now, it is found that the Generic keywords are the CTK and have the spillover potentials which might increase consumers awareness and lead them to Brand keyword. That's why the Generic keyword should be focused in the keyword bidding. The contribution of the thesis is to propose the novel SSA model based on Rank as decision variable, to propose to manage the keyword portfolio by categories according to the characteristics of keywords, to propose the statistical modelling and managing based on the Rank in constructing the keyword portfolio, and to perform empirical tests and propose a new strategic guidelines to focus on the CTK and to propose the modified CVR optimization objective function reflecting the spillover effect in stead of the previous expected profit models.

A Study of Intangible Cultural Heritage Communities through a Social Network Analysis - Focused on the Item of Jeongseon Arirang - (소셜 네트워크 분석을 통한 무형문화유산 공동체 지식연결망 연구 - 정선아리랑을 중심으로 -)

  • Oh, Jung-shim
    • Korean Journal of Heritage: History & Science
    • /
    • v.52 no.3
    • /
    • pp.172-187
    • /
    • 2019
  • Knowledge of intangible cultural heritage is usually disseminated through word-of-mouth and actions rather than written records. Thus, people assemble to teach others about it and form communities. Accordingly, to understand and spread information about intangible cultural heritage properly, it is necessary to understand not only their attributes but also a community's relational characteristics. Community members include specialized transmitters who work under the auspices of institutions, and general transmitters who enjoy intangible cultural heritage in their daily lives. They converse about intangible cultural heritage in close relationships. However, to date, research has focused only on professionals. Thus, this study focused on the roles of general transmitters of intangible cultural heritage information by investigating intangible cultural heritage communities centering around Jeongseon Arirang; a social network analysis was performed. Regarding the research objectives presented in the introduction, the main findings of the study are summarized as follows. First, there were 197 links between 74 members of the Jeongseon Arirang Transmission Community. One individual had connections with 2.7 persons on average, and all were connected through two steps in the community. However, the density and the clustering coefficient were low, 0.036 and 0.32, respectively; therefore, the cohesiveness of this community was low, and the relationships between the members were not strong. Second, 'Young-ran Yu', 'Nam-gi Kim' and 'Gil-ja Kim' were found to be the prominent figures of the Jeongseon Arirang Transmission Community, and the central structure of the network was concentrated around these three individuals. Being located in the central structure of the network indicates that a person is popular and ranked high. Also, it means that a person has an advantage in terms of the speed and quantity of the acquisition of information and resources, and is in a relatively superior position in terms of bargaining power. Third, to understand the replaceability of the roles of Young-ran Yu, Nam-gi Kim, and Gil-ja Kim, who were found to be the major figures through an analysis of the central structure, structural equivalence was profiled. The results of the analysis showed that the positions and roles of Young-ran Yu, Nam-gi Kim, and Gil-ja Kim were unrivaled and irreplaceable in the Jeongseon Arirang Transmission Community. However, considering that these three members were in their 60s and 70s, it seemed that it would be necessary to prepare measures for the smooth maintenance and operation of the community. Fourth, to examine the subgroup hidden in the network of the Jeongseon Arirang Transmission Community, an analysis of communities was conducted. A community refers to a subgroup clearly differentiated based on modularity. The results of the analysis identified the existence of four communities. Furthermore, the results of an analysis of the central structure showed that the communities were formed and centered around Young-ran Yu, Hyung-jo Kim, Nam-gi Kim, and Gil-ja Kim. Most of the transmission TAs recommended by those members, students who completed a course, transmission scholarship holders, and the general members taught in the transmission classes of the Jeongseon Arirang Preservation Society were included as members of the communities. Through these findings, it was discovered that it is possible to maintain the transmission genealogy, making an exchange with the general members by employing the present method for the transmission of Jeongseon Arirang, the joint transmission method. It is worth paying attention to the joint transmission method as it overcomes the demerits of the existing closed one-on-one apprentice method and provides members with an opportunity to learn their masters' various singing styles. This study is significant for the following reasons: First, by collecting and examining data using a social network analysis method, this study analyzed phenomena that had been difficult to investigate using existing statistical analyses. Second, by adopting a different approach to the previous method in which the genealogy was understood, looking at oral data, this study analyzed the structures of the transmitters' relationships with objective and quantitative data. Third, this study visualized and presented the abstract structures of the relationships among the transmitters of intangible cultural heritage information on a 2D spring map. The results of this study can be utilized as a baseline for the development of community-centered policies for the protection of intangible cultural heritage specified in the UNESCO Convention for the Safeguarding of Intangible Cultural Heritage. To achieve this, it would be necessary to supplement this study through case studies and follow-up studies on more aspects in the future.

Bibliographic Study on 『ChungMinKongKeicho (忠愍公啓草)』 by YI Sun-sin (이순신의 『충민공계초(忠愍公啓草)』에 대한 서지적 고찰)

  • Ro, Seung-Suk
    • Korean Journal of Heritage: History & Science
    • /
    • v.49 no.2
    • /
    • pp.4-19
    • /
    • 2016
  • Jangkei(狀啓) made to the Royal Court by Yi Sun-sin during the Japanese invasions of Korea is handed down under the names of Jangcho(狀草), Keicho(啓草), Keibon(啓本) and others depending on copying patterns of those times and later times as it was copied out by a third person. In particular, "YimjinJangcho(壬辰狀草)" which Yi drew up during his service as the director of the naval forces in Jeolla Jwasooyeong is known as the most popular Jangkei. "ChungMinKongKeicho" which has been re-located recently after loss is a national treasure level cultural property as valuable as "YimjinJangcho" and should be treated as a model of Yi Sun-sin's other Jangkeis by next generations. As of now, however it is not confirmed if it is a totally new book related to Yi Sun-sin or is supplementary to the lost Jangkei, this study decided to ascertain relevant information through a bibliographic discussion on the question. "Chungmin(忠愍)" was the title that was used after the death of Yi Sun-sin, and "ChungMinKongKeicho" was completed when Jangkei was copied in 1662. 12 books that would not be found in YimjinJangcho are included in the book and such books are also present in the Jangkei supplement which has been known lost so far. What should be especially focused on here is that the forms and contents of these (11) photographs that Japanese shot from "ChungMinKongKeicho" in 1928 turned out to be completely identical to those of the original copy. The point that Korean History Compilation Committee added the 12 books to Jangkei as referring to the book as "One Keicho(啓草) partially copied(抄寫) in separation" and that Cho Sung-do categorized the 12 books into a supplement and others can be solid proofs to make the Jangkei supplement called "ChungMinKongKeicho". In terms of "ChungMooKongKeicho", since it consists of 62 books in total, it is not reasonable to see the book as Jangkei supplement which has the extra 12 more books for itself. "ChungMooKongKeibon" in "ChungMooKongYusa" was written with a total of 16 books. In the body, Yidumun is only clearly present, and the three books in the later part are same with the original copy of "ChungMooKongKeicho". "YimjinJangcho" by Korean History Compilation Committee has been the only book in which Yidumun was observed so far but now, it is assumed that the publication date of "ChungMooKongKeibon" goes before that of the former. The counterargument to the opinion that "ChungMinKongKeicho" is the supplement to Jangkei is based on Lee Eun-sang's comment "One page of a log in the Jangkei copy supplement." At first Seol Ui-sik introduced a piece photo of the rough draft of "MoosulIlki" in a drawing form through "Nanjung Ilkicho by Yi Sun-sin" in 1953. Lee Eun-sang also added two pages of the handwritten Yilkicho in the Jangkeichobon supplement to "MoosulIlki" and for the second time, the phrase "One page of a log written during the last 10 days after the Jangkei copy supplement" and "Supplement" were used. Those views are originated from the comment "One photograph of the rough draft of "MoosulIlki"" which Seol Ui-sik introduced without knowledge of the exact source. Lee Eun-sang said, "One page of a log in the Jangkei copy supplement" because Lee mistook "ChungMooKongYusa" for a book related to Jangkei. Since it is the wrong argument different from the actual situation of the original copy, if it has to be corrected, it should be rephrased "One page of a log in ChungMooKongYusa." After all, the source of the counterargument is the mistake because there has never been the Jangkei supplement with one page of a log included. All the Jangkeis other than "YimjinJangcho" can be said as the Jangkei supplements but still, they are separated from the other Jangkeis for the extra 12 more books are present in the commonly-called Jangkei supplement. Due to that reason, the argument on how "ChungMinKongKeicho" with the 12 books added is the popular Jangkei supplement should be considered more reasonable.

Types and Characteristics of Traditional Music Performance of the 1920s - Focused on the mixed performances type in the western-style genre - (1920년대 전통음악공연의 형태와 특징 - 서양식 장르와의 혼성공연형태를 중심으로 -)

  • Keum, Yong-woong
    • (The) Research of the performance art and culture
    • /
    • no.35
    • /
    • pp.61-92
    • /
    • 2017
  • During the Japanese colonial era, traditional music performances were gradually diminishing and weakening in the particular condition of colonization. Meanwhile, from the time of enlightenment, Western genre performances were becoming vitalized with the influence of Western civilization that began to be spread steadily throughout the society. In that situation, traditional music performances tended to be mixed performances accompanied by Western ones, not independent performances. Mostly, they were accompanied by Western music, and also, they were performed along with other genres like plays, lectures, movies, dances, or magic, too. Such form of mixed performances accompanied by Western genres became even more vitalized in the 1920's and came to be positioned as a form of traditional music performances. Therefore, research on the forms of mixed performances between Western genres and traditional music is meaningful in examining the forms of traditional music performances that have not been studied in the history of Korean modern music and understanding the trends of traditional music performances which were generally found in the Japanese colonial era. However, such research has hardly been conducted concretely yet. Accordingly, concerning the forms of mixed performances between Western genres and traditional music in the 1920's, this author considered the background of vitalizing mixed performances between Western genres and traditional music mainly with newspaper articles of the time and their formal characteristics. Regarding the background of vitalizing the forms of mixed performances between Western genres and traditional music, from the 1920's, the forms of mixed performances between Western genres and traditional music became more vitalized than before. The causes of that may include the increase of groups hosting or sponsoring such performances from the 1920's and also the dramatic increase of such performances in general. Moreover, the increased performances were conducted in the forms of mixed performances mainly in order to satisfy the people's needs becoming diversified with the distribution of Western civilization. Concerning the formal characteristics of mixed performances between Western genres and traditional music, this researcher classified western genres performed with traditional music and examined what characteristics were found in such mixed performances of tradition music by the types of Western genres respectively. First, in the mixed performances type of western-type genre and traditional music, the number of programs for the western music had significant portion in general, and there were certain ensemble of the western music and traditional musical instrument that was rare at this period of time, and it also had the characteristics of classifying two genres to perform for each title or date. Second, in the mixed performances type of the drama and traditional music, the traditional music is directly participated in the drama with the similar type to the theater, or performed independently from the drama with the role of interlude performance for the stage conversion of the drama to have the characteristics of performing in audience publicity or entertainment. Third, in the mixed performances type of the lecture and traditional music, the traditional music is played before or after the lecture to play the role to set the atmosphere and entertainment for the lecture as displaying the feature to perform for the audience attraction. And, fourth, in the mixed performances type of the movie and traditional music, the traditional music sometimes directly participated in the movie or had the features of independent performance, and there was a characteristic to perform for the entertainment after showing a movie.

Supplementary Woodblocks of the Tripitaka Koreana at Haeinsa Temple: Focus on Supplementary Woodblocks of the Maha Prajnaparamita Sutra (해인사 고려대장경 보각판(補刻板) 연구 -『대반야바라밀다경』 보각판을 중심으로-)

  • Shin, Eunje;Park, Hyein
    • MISULJARYO - National Museum of Korea Art Journal
    • /
    • v.98
    • /
    • pp.104-129
    • /
    • 2020
  • Designated as a national treasure of Korea and inscribed on the UNESCO World Heritage List, the Tripitaka Koreana at Haeinsa Temple is the world's oldest and most comprehensive extant version of the Tripitaka in Hanja script (i.e., Chinese characters). The set consists of 81,352 carved woodblocks, some of which have two or more copies, which are known as "duplicate woodblocks." These duplicates are supplementary woodblocks (bogakpan) that were carved some time after the original production, likely to replace blocks that had been eroded or damaged by repeated printings. According to the most recent survey, the number of supplementary woodblocks is 118, or approximately 0.14% of the total set, which attests to the outstanding preservation of the original woodblocks. Research on the supplementary woodblocks can reveal important details about the preservation and management of the Tripitaka Koreana woodblocks. Most of the supplementary woodblocks were carved during the Joseon period (1392-1910) or Japanese colonial period (1910-1945). Although the details of the woodblocks from the Japanese colonial period have been recorded and organized to a certain extent, no such efforts have been made with regards to the woodblocks from the Joseon period. This paper analyzes the characteristics and production date of the supplementary woodblocks of the Tripitaka Koreana. The sutra with the most supplementary woodblocks is the Maha Prajnaparamita Sutra (Perfection of Transcendental Wisdom), often known as the Heart Sutra. In fact, 76 of the total 118 supplementary woodblocks (64.4%) are for this sutra. Hence, analyses of printed versions of the Maha Prajnaparamita Sutra should illuminate trends in the carving of supplementary woodblocks for the Tripitaka Koreana, including the representative characteristics of different periods. According to analysis of the 76 supplementary woodblocks of the Maha Prajnaparamita Sutra, 23 were carved during the Japanese colonial period: 12 in 1915 and 11 in 1937. The remaining 53 were carved during the Joseon period at three separate times. First, 14 of the woodblocks bear the inscription "carved in the mujin year by Haeji" ("戊辰年更刻海志"). Here, the "mujin year" is estimated to correspond to 1448, or the thirtieth year of the reign of King Sejong. On many of these 14 woodblocks, the name of the person who did the carving is engraved outside the border. One of these names is Seonggyeong, an artisan who is known to have been active in 1446, thus supporting the conclusion that the mujin year corresponds to 1448. The vertical length of these woodblocks (inside the border) is 21 cm, which is about 1 cm shorter than the original woodblocks. Some of these blocks were carved in the Zhao Mengfu script. Distinguishing features include the appearance of faint lines on some plates, and the rough finish of the bottoms. The second group of supplementary woodblocks was carved shortly after 1865, when the monks Namho Yeonggi and Haemyeong Jangung had two copies of the Tripitaka Koreana printed. At the time, some of the pages could not be printed because the original woodblocks were damaged. This is confirmed by the missing pages of the extant copy that is now preserved at Woljeongsa Temple. As a result, the supplementary woodblocks are estimated to have been produced immediately after the printing. Evidently, however, not all of the damaged woodblocks could be replaced at this time, as only six woodblocks (comprising eight pages) were carved. On the 1865 woodblocks, lines can be seen between the columns, no red paint was applied, and the prayers of patrons were also carved into the plates. The third carving of supplementary woodblocks occurred just before 1899, when the imperial court of the Korean Empire sponsored a new printing of the Tripitaka Koreana. Government officials who were dispatched to supervise the printing likely inspected the existing blocks and ordered supplementary woodblocks to be carved to replace those that were damaged. A total of 33 supplementary woodblocks (comprising 56 pages) were carved at this time, accounting for the largest number of supplementary woodblocks for the Maha Prajnaparamita Sutra. On the 1899 supplementary woodblocks, red paint was applied to each plate and one line was left blank at both ends.

Analysis of the Shijujils(施主秩), the records on the creation of Buddha statues, of wooden seated Vairocana Buddha Triad of Hwaeomsa Temple (화엄사 목조비로자나삼신불좌상의 조성기 「시주질(施主秩)」 분석)

  • Yoo, Geun-Ja
    • MISULJARYO - National Museum of Korea Art Journal
    • /
    • v.100
    • /
    • pp.112-138
    • /
    • 2021
  • This paper mainly analyzes the records titled 'Shijujil(施主秩)' from the Bokjangs of each of the Rocana and Shakyamuni statues enshrined as wooden seated Vairocana Buddha Triadcomposed of Vairocana(center), Rocana(right), and Shakyamuni(left) at the Daeungjeon Hall of Hwaeomsa Temple in Gurye. The Shijujil from the Shakyamuni statue was recovered through Bokjang investigation in September 2015 and has been kept in the museum of Hwaeomsa as an undisclosed relic. After the discovery of the Shijujil from the Rocana statue through an Bokjang investigation in July 2020, both of the Shijujils were only officially released through the special exhibition 'Grand Hwaeomsa Temple in Jirisan Mountain' in September 2021. Existing documents recording on the creation of Buddha statues in the 17th century are in the form of sheets or rolls. However, the Shijujils take the form of simple stitched booklets. The Shijujil from Rocana consists of 19 chapters and 38 pages in one book, and the Shijujil from Shakyamuni consists of 11 chapters and 22 pages in one book. The contents of the Shijujils consist of the purpose of the Buddha statue creation, the creation date, the year and place of enshrining, the names of the statues, the people in charge and their roles, the sculptors, the list of items donated, and the list of the contributors. In addition, the list of monks who were staying at Hwaeomsa Temple at that time are also recorded, so the Shijujil is like a time capsule that tells the situation of Hwaeomsa Temple about 400 years ago. According to the records of the Shijujils and the Writing on the wooden pedestal of Rocana, the Vairocana Triad began to be in March 1634(12th year of King Injo) and was completed in August of that year, and was enshrined in the Daeungjeon Hall in the fall of the following year. It is very important to confirm that the Vairocana Buddha Triad of Hwaeomsa was created in 1634. Since studies on the reconstruction of Hwaeomsa Temple in the 17th century and the roles of Byeokam Gakseong have been mainly based on 『湖南道求禮縣智異山大華嚴寺事蹟』 written by monk Haean in 1636, it has been estimated that the wooden seated Vairocana Buddha Triad was created in 1636. However, it is now known that the Virocana Buddha Triad was created in 1634. The Shijujils are also a good source of information about Byeokam Gakseong who played a pivotal roles in the reconstruction projects of Hwaeomsa Temple in the 17th century. He played leading roles in rebuilding the East Five-story Stone Pagoda(1630), in creating the wooden seated Vairocana Buddha Triad(1634), and in producing the Yeongsanhoe Gwaebul(1653, Hanging Scroll Painting depicting the Shakyamuni preaching). It is also very important that the Shijujils are records that can reveal the relationship between Byeokam Gakseong and royal family of Joseon Dynasty in the 17th century. The Shijujils from Rocana and Shakyamuni are the first documents ever discovered in which the names of royal family members, such as Uichanggun(Gwang Lee, son of King Seonjo), Ikseong Shin(son-in-law of King Seonjo), and Crown Prince Sohyeon(son of King Injo) are recorded in detail in relation to the production of Buddha statues. The Shijujils from Rocana and Shakyamuni contain specific information about the production of the wooden seated Vairocana Buddha Triad in the 17th century, such as the year of production of the Buddha statues, the role of Byeokam Gakseong, and the relationship between Byeokam Gakseong and the royal family, so it is of great value not only for art history but also for historical studies of Hwaeomsa Temple.

Studies on Direct Sowing-Dry Paddy Rice Culture in the Middle Part of Korea (중부지방에 있어서의 수도건답직파재배 기술체계확립에 관한 시험연구)

  • Jai-Hyoun Lee
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.7 no.1
    • /
    • pp.1-29
    • /
    • 1969
  • Experiments on rice concerning it s varieties, fertilization, seedling dates and herbicides have been conducted to determine the most desirable method of direct sowing cultivation on dry paddy field land in the middle part of Korea. The results obtained at the Office of Rural Development of Choongnam Province are as follows:. 1. Sixteen different derivatives from the main varieties of low land rice were cultivated on a dry paddy field by the direct sowing method; at the same time, a few varieties were tried adopting the common transplanting cultivation method. The yield and yield factors from these two groups were examined to give the following results: a) Compared to the common transplanting cultivation, the direct sowing method showed remarkably increased number of panicles while the number of flowers per panicle was shown to be significantly decreased. The maturing ratio was detected to be lowered. The yield horn them differed according to the different varieties : good yield was obtained from Hokwang while Norin #25 proved poor when compared with the common transplanting cultivation method. b) Among sixteen varieties tested, Sunsou, Norin #25, Jaigou, Hokwang, Palkueng and Gosi showed comparatively high yields, their yield being more than 325 kilograms per 10 Are, but Nampoong, Paldal, Nongkwang, Norin #29, Eunbangju #101 and Shiro gane showed less yield, their yield being less than 271 kilograms per 10 Are, the relations between the yield and the yield factors can be summarized as follows; Number of varieties and their rice yield. 1) The varieties which were great in the, number of panicles and high in yield=Jaigoun, Hokwang Palkueng and Gosi. 2) The varieties which were low in the number of panicles and high in yield=Sounsou and Norin #25. 3) The varieties which were great in the number of panicles and poor in yield=Eunbangju #101 and Sirogane. 4) The varieties which were poor in the number of panicles and poor in yield: Nampung, Paldal and Norin #29. Number of flowers per panicle and yield. 1) The varieties which were great in the number of flowers per panicle and high in yield: Sounsou, Norin #25 and Gosi. 2) The varieties which were poor in the number of flowers per panicle and high in yield ; Jaigoun, Hokwang and Palkueng. 3) The varieties which were great in the number of flowers per panicle and poor in yield: Paldal and Nampung. 4) The varieties which were poor in the number of flowers per panicle and poor in yield: Norin #29. Eunbangju #101 and Sirogane. Maturing ratio and yield. 1) The varieties which were high in the maturing ratio and high in yield: Jaigoun, Sounsou, Norin #25 and Palkueng. 2) The varieties which were low in the maturing ratio and high in yield: Hokwang and Gosi. 3) The varieties which were early maturing rat io and low in yield: Hokwang and Gosi. 4) The varieties which were late maturing ratio and poor in yield: Eunbangju #101, Nampungand Sirogane 1, 000 grain weight and yield. 1) The varieties which were heavy in 1, 000 grains weight and high in yield=Norin #25 and Hokwang. 2) The varieties which were light in 1, 000 grains weight and high in yield=Sounsou and Jaigoun. 3) The varieties which were heavy in 1, 000 grains weight and poor in yield=Nongkwang and Eunbanju. 4) The varieties which were light in 1, 000 grains weight and poor in yield=Norin #29 and Sirogane. 2. The experiment on fertilization showed that the most desirable amount to be given per 10 Are was 10 kilograms of Nitrogen, 5 kilograms of phosphate and 6 kilograms of potassium; and when the Nitrogen given exceeded 8 kilograms, its effect was better when given in amsll consecutive (split) amounts, while the maturing ratio and the number of the flowers per panicle increased when Nitrogen was given in large amount during the later stage of growth of rice. 3. The experiment on the date and amount of seedling showed that the tested variety, Sunsou gave the best results when planted on the days between 25 April and 10 May. Eight liters per 10 Are were preferable if planted early and 12 liters per 10 Are if planted late. The reason why the later planting gave a lower yield was that the number of flowers per panicle was fewer. 4. The experiment on the irrigation for rice with direct sowing cultivation immersed in water showed that it was the most satisfactory when irrigated on 25th June, 55 days after its seedling, its plot giving the best yield. The plots 10th June and 15th July showed just as good results. However, irrigated later, than 15th July it showed lower yields. 5. Compared to the yield of the plot controlled by the common method, the yield from the plots treated with chemical herbicide such as LOROX, TOK, PCP, SWEP, Mo-338 on dry condition soil seemed poorer, but significant difference was not found statistically. On the other hand in the case where chemical herbicides such as TOK, Mo-338, Stam F-34 or ORDRAM were used after irrigation, the yield from the ORDRAM and TOK treated plots did not show significant differences compared to the common hand weed controling method, but those treated with chemicals other than the above showed a lower yield.

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.