• Title/Summary/Keyword: easy of use

Search Result 3,395, Processing Time 0.036 seconds

A Study on Modern People's Consciousness and Wearing Practice of Korean Costumes (우리나라 옷에 대한 현대인(現代人)의 의식(意識)과 춘용실태(春用實態)에 관(關)한 연구(硏究) - 서울 지역(地域)을 중심(中心)으로 -)

  • Hwang, Chun-Sub
    • Journal of the Korean Society of Costume
    • /
    • v.1
    • /
    • pp.119-129
    • /
    • 1977
  • It is significant for developing the future for us to know our present age. In order to preserve our Korean costume as a fola clothes retaining our distinguished independent characterisitics and to help design the tomorrow of our Korean costume playing a role as a racial to develop the world clothing culture, a survey was conducted to investigate modern people's conscious-ness and wearing practumes of Korean costume by questionaire and interviewing methods. The results of the survey were analyzed as follows: (1) At present, Korean costumes were purchased as customtailored(64.0%) and as ready-made(17.8%) and most of them were not made at individual homes. The laundry and ironing of them were carried out at laundry shops(68.8%). Considering our present economic, social and cultural aspects, sowing, laundryand ironing will not be carried out at homes again in the future and ready made costumes seen to be produced in a large scale in the future. Garment makers and laundry shop operators should be trained how to make our Korean costumes retain our traditional beauty in the course of their production and laundry and the makers of ready-made costumes must make research how to efficiently produce ideal ready-made costumes by adopting the synchro system in their wrk odisivion. (2) The age group wearing Korean costumes most frequently was the aged people over 60 (their wearing rate; 45%-50%) and the group wearing them most frequently next io the aged people over 60, was housewives(their wearing rate; 15%-20%). Excludign aged people and housewives, other respondentsdid not wear Korean costumes very frequently. Men's wearing rate was lower their wearing rate was the younger their ages were and the less their monthly incomes were. Korean costumes were used for holiday and festival(60%), wedding and funeral ceremonies (52%), visiting and working(22%), casual wear(12.8%) and home wear(9.2%). The use of Korean costumes as casual and home wears, was lower than the use for holday, festival, visiting and working, Under our present circumstances in which our Korean people use both Western style clothes and Korean costumer, our Korean costume has lostits position as a basic and necessary requiement in Korean people's daily life and become a ceremonical and fancy costume. It is natural that the times and life change everything in our daily life. Our costume has to be made as good ceremonial and fancy clothes satisfying modern sensibility according to its new role. In order for us to get close with our clothes, a keen study must be carried out to cleat the color, material, style, function and harmony of the Korean costume matching the of the times. (3) The 47.8% of the respondents answered that they were proud of our Korean costume as our folk clothes, 47.6% replied that thought them just common and 1.1% responded that they were ashamed of it. Most of them were affirmative in feeling pride with our Korean costume. (4) Considering the functional aspect of Korean costumes, their strong points were symetric beauty, rhythmical beauty, unity feeling, harmonical beauty and detailed decorations. Their common shortcomings were lack of individuality and inadequateness for active life. The shortcomings of woman costumes were suppressing breast, making resperation difficult and in adequnteness in summer time. The main reason not to wear our Korean costumes, was due to the fact that they are incomvenient for active life. As a measure to eliminate such shortcomings, 1) the suspension system of skirt to remove the suppression of breast should be generally adopted. 2) they should be simplified in their structure to make them convenient for active life and adepuate in wearing them in hot weather in an extent to which the traditional beauty of the costume may not be lostand 3) a new technique must be explored for showing individuality by wearing method and new arrangment of colors and decorations. (5) The reasons desiring to wear Korean costumes were classifide as follows: A. Korean costumes are our traditional clothes(43.4%). B. Korean costumes are noble and beautiful(26.8%). C. They are accustomed to wear Korean costumes by habit(19.5%). D. Korean costumes are necessary for attending ceremoneis(9.5%). E. Miscellaneous reasons(0.8%). Classifying these reasons into age groups, the high age group over 40 wore them because they were easy to wear by habit and the low age group of 10-30 never thought that they were east to wear by habit. Considering that even those who were accustomed to wear Korean costumes showed a low wearing rate and that the young generation were accustomed to wear Western style clothes rather than Korean costumes, the wearing rate of Korean costumes will be reduced in the future if such trend continues. It is urgent for us to make our best efforts in order to enhance the interest of young generation in Korean costumes and not to make them lose the strong points of Korean costume in the future. (6) Conicering the plan of the respondents on what kind of clothes they were going to wear in the future, among the age group over 50, those who wanted to wear only Korean costumes were 24.8%(men) and 35.1%(women), those who wanted to wear 49.7%(men) and 47.4(women), those who wanted to wear chiefly Western style clothes were 20.7% (men) and 14.4%(women) and those who wanted to wear only Western style clothes, were 2.4% (men) and 2.1%(women). This shows that the general tendency to wear only or chiefly Korean costumes is more prevalent than that to wear only Western style. Among the age group under 50, the tendency to wear Western style clothes was conspicuous and most of the respondent answered that they would wear chiefly Western style clothes and Korean costumes occasionally. Only 5.4% of the respondent answered that they would wear only Western style clothes and this shows that meny respondents still wonted to wear Korean costumes. Those who wanted their descendants to wear what they desire, were 50.1%(men) and 68.8% (women) and those who wanted their descendants to wear Koran costumes occasionally, were 85.8%(men) and 86.3%(women). This shows that most of respondents wanted their descendants to wear Korean costumes. In order to realize, it is necessory for us to make ourdescendants recognize the preciousness of our traditional culture and modify our Korean costumes according to their taste so that they may like wearing them.

  • PDF

Twitter Issue Tracking System by Topic Modeling Techniques (토픽 모델링을 이용한 트위터 이슈 트래킹 시스템)

  • Bae, Jung-Hwan;Han, Nam-Gi;Song, Min
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.109-122
    • /
    • 2014
  • People are nowadays creating a tremendous amount of data on Social Network Service (SNS). In particular, the incorporation of SNS into mobile devices has resulted in massive amounts of data generation, thereby greatly influencing society. This is an unmatched phenomenon in history, and now we live in the Age of Big Data. SNS Data is defined as a condition of Big Data where the amount of data (volume), data input and output speeds (velocity), and the variety of data types (variety) are satisfied. If someone intends to discover the trend of an issue in SNS Big Data, this information can be used as a new important source for the creation of new values because this information covers the whole of society. In this study, a Twitter Issue Tracking System (TITS) is designed and established to meet the needs of analyzing SNS Big Data. TITS extracts issues from Twitter texts and visualizes them on the web. The proposed system provides the following four functions: (1) Provide the topic keyword set that corresponds to daily ranking; (2) Visualize the daily time series graph of a topic for the duration of a month; (3) Provide the importance of a topic through a treemap based on the score system and frequency; (4) Visualize the daily time-series graph of keywords by searching the keyword; The present study analyzes the Big Data generated by SNS in real time. SNS Big Data analysis requires various natural language processing techniques, including the removal of stop words, and noun extraction for processing various unrefined forms of unstructured data. In addition, such analysis requires the latest big data technology to process rapidly a large amount of real-time data, such as the Hadoop distributed system or NoSQL, which is an alternative to relational database. We built TITS based on Hadoop to optimize the processing of big data because Hadoop is designed to scale up from single node computing to thousands of machines. Furthermore, we use MongoDB, which is classified as a NoSQL database. In addition, MongoDB is an open source platform, document-oriented database that provides high performance, high availability, and automatic scaling. Unlike existing relational database, there are no schema or tables with MongoDB, and its most important goal is that of data accessibility and data processing performance. In the Age of Big Data, the visualization of Big Data is more attractive to the Big Data community because it helps analysts to examine such data easily and clearly. Therefore, TITS uses the d3.js library as a visualization tool. This library is designed for the purpose of creating Data Driven Documents that bind document object model (DOM) and any data; the interaction between data is easy and useful for managing real-time data stream with smooth animation. In addition, TITS uses a bootstrap made of pre-configured plug-in style sheets and JavaScript libraries to build a web system. The TITS Graphical User Interface (GUI) is designed using these libraries, and it is capable of detecting issues on Twitter in an easy and intuitive manner. The proposed work demonstrates the superiority of our issue detection techniques by matching detected issues with corresponding online news articles. The contributions of the present study are threefold. First, we suggest an alternative approach to real-time big data analysis, which has become an extremely important issue. Second, we apply a topic modeling technique that is used in various research areas, including Library and Information Science (LIS). Based on this, we can confirm the utility of storytelling and time series analysis. Third, we develop a web-based system, and make the system available for the real-time discovery of topics. The present study conducted experiments with nearly 150 million tweets in Korea during March 2013.

Essay on Form and Function Design (디자인의 형태와 기능에 관한 연구)

  • 이재국
    • Archives of design research
    • /
    • v.2 no.1
    • /
    • pp.63-97
    • /
    • 1989
  • There is nothing more important than the form and function in design, because every design product can be done on the basis of them. Form and Function are already existed before the word of design has been appeared and all the natural and man-made things' basic organization is based on their organic relations. The organic relations is the source of vitality which identifies the subsistance of all the objects and the evolution of living creatures has been changed their appearances by the natural law and order. Design is no exception. Design is a man-made organic thing which is developed its own way according to the purposed aim and given situations. If so, what is the ultimate goal of design. It is without saying that the goal is to make every effort to contribute to the -human beings most desirable life by the designer who is devoting himself to their convenience and well-being. Therefore, the designer can be called the man of rich life practitioner. This word implies a lot of meanings since the essence of design is improving the guality of life by the man-made things which are created by the designer. Also, the things are existed through the relations between form and function, and the things can keep their value when they are answered to the right purpose. In design, thus, it is to be a main concern how to create valuable things and to use them in the right way, and the subject of study is focused on the designer's outlook of value and uk relations between form and function. Christopher Alexander mentioned the importance of form as follows. The ultimate object of design is form. Every design problem begins with an effort to achieve fittness between the form and its context. The form is the solution to the problem: the context defmes the problem. In other words, when we speak of design, the real object of discussion is not form alone, but the ensemble comprising the form and its context. Good fit is a desirable property of this ensemble which relates to some particular division of the ensemble into form and context. Max Bill mainatined how important form is in design. Form represents a self-contained concept, and its embodiment in an object results in that object becoming a work of art. Futhermore, this explains why we use form so freguently in a comparative sense for determining whether one thing is less or more beautiful than another, and why the ideal of absolute beauty is always the standard by which we appraise form, and through form, art itself. Hence form has became synonymous with beauty. On the other hand, Laszlo Moholy-Nagy stated the importance of function as follows. Function means the task an object is designed to fulfill the task instrument is shaping the form. Unfortunately, this principle was not appreciated at the same time but through the endeavors of Frank Lloyd Wright and of the Bauhaus group and its many collegues in Europe, the idea of functionalism became the keynote of the twenites. Functionalism soon became a cheap slogan, however, and its original meaning blurred. It is neccessary to reexamine it in the light of present circumstances. Charles William Eliot expressed his idea on the relations between function and beauty. Beauty often results chiefly from fittness: indeed it is easy to manitain that nothing is fair except what is fit its uses or functions. If the function of the product of a machine be useful and valuable, an the machine be eminently fit for its function, it conspicuously has the beauty of fittness. A locomotive or a steamship has the same sort of beauty, derived from the supreme fittness for its function. As functions vary, so will those beauty..vary. However, it is impossible to study form and function in separate beings. Function can't be existed without form, and without function, form is nothing. In other words, form is a function's container, and function is content in form. It can be said that, therefore, the form and function are indispensable and commensal individuals which have coetemal relations. From the different point of view, sometimes, one is more emphasized than the other, but in this case, the logic is only accepted on the assumption of recognizing the importance of the other's entity. The fact can be proved what Frank Hoyd wright said that form and function are one. In spite of that, the form and function should be considered as independent indivisuals, because they are too important to be treated just as the simple single one. Form and function have flexible properties to the context. In other words, the context plays a role as the barometer to define the form and function, also which implies every meaning of surroun'||'&'||'not;dings. Thus, design is formed under the influence of situations. Situations are dynamic, like the design process itself, in which fixed focus can be cripping. Moreover, situations control over making the good design. Judging from the respect, I defined the good design in my thesis An Analytic Research on Desigh Ethic, "good design is to solve the problem by the most proper way in the situations." Situations are changeable, and so is design. There is no progress without change, but change is not neccessarily progress. It is highly desirable that there changes be beneficial to mankind. Our main problem is to be able to discriminate between that which should be discarded and that which should be kept, built upon, and improved. Form and Function are no exception. The practical function gives birth to the inevitable form and the $$\mu$ti-classified function is delivered to the varieties of form. All of these are depended upon changeable situations. That is precisely the situations of "situation de'||'&'||'not;sign", the concept of moving from the design of things to the design of the circumstances in which things are used. From this point of view, the core of form and function is depended upon how the designer can manage it efficiently in given situations. That is to say that the creativity designer plays an important role to fulfill the purpose. Generally speaking, creativity is the organization of a concept in response to a human need-a solution that is both satisfying and innovative. In order to meet human needs, creative design activities require a special intuitive insight which is set into motion by purposeful imagination. Therefore, creativity is the most essential quality of every designer. In addition, designers share with other creative people a compulsive ingenuity and a passion for imaginative solutions which will meet their criteria for excellence. Ultimately, it is said that the form and function is the matter which belongs to the desire of creative designers who constantly try to bring new thing into being to create new things. In accordance with that the main puppose of this thesis is to catch every meaning of the form and function and to close analyze their relations for the promotion of understanding and devising practical application to gradual progression in design. The thesis is composed of four parts: Introduction, Form, Function and Conclusion. Introduction, the purpose and background of the research are presented. In Chapter I, orgin of form, perception of form, and classification of form are studied. In Chapter II, generation of function, development of function, and diversification of function are considered. Conclusion, some concluding words are mentioned.ioned.

  • PDF

한강하류지형면의 분류와 지형발달에 대한 연구 (양수리에서 능곡까지)

  • Park, No-Sik
    • Journal of the Speleological Society of Korea
    • /
    • no.68
    • /
    • pp.23-73
    • /
    • 2005
  • Purpose of study; The purpose of this study is specifically classified as two parts. The one is to attempt the chronological annals of Quaternary topographic surface through the study over the formation process of alluvial surfaces in our country, setting forth the alluvial surfaces lower-parts of Han River area, as the basic deposit, and comparing it to the marginal landform surfaces. The other is to attempt the classification of micro morphology based on the and condition premising the land use as a link for the regional development in the lower-parts of Han river area. Reasons why selected the Lower-parts of Han river area as study objects: 1. The change of river course in this area is very serve both in vertical and horizontal sides. With a situation it is very easy to know about the old geography related to the formation process of topography. 2. The component materials of gravel, sand, silt and clay are deposited in this area. Making it the available data, it is possible to consider about not oかy the formation process of topography but alsoon the development history to some extent. 3. The earthen vessel, a fossil shell fish, bone, cnarcoal and sea-weed are included in the alluvial deposition in this area. These can be also valuable data related to the chronological annals. 4. The bottom set conglometate beds is also included in the alluvial deposits. This can be also valuable data related to the research of geomorphological development. 5. Around of this area the medium landform surface, lower landform surface, pediment and basin, are existed, and these enable the comparison between the erosion surfaces and the alluvial surfaces. Approach : 1. Referring to the change of river beds, I have calculated the vertical and horizontal differences comparing the topographic map published in 1916 with that published in 1966 and through the field work 2. In classifying the landform, I have applied the method of micro morphological classification in accordance with the synthetic index based upon the land conditions, and furthermore used the classification method comparing the topographic map published in 1916 and in that of 1966. 3. I have accorded this classification with the classification by mapping through appliying the method of classification in the development history for the field work making the component materials as the available data. 4. I have used the component materials, which were picked up form the outcrop of 10 places and bored at 5 places, as the available data. 5. I have referred to Hydrological survey data of the ministry of Construction (since 1916) on the overflow of Han-river, and used geologic map of Seoul metropolitan area. Survey Data, and general map published in 1916 by the Japanese Army Survbey Dept., and map published in 1966 by the Construction Research Laboratory and ROK Army Survey Dept., respectively. Conclusion: 1. Classification of Morphology: I have added the historical consideration for development, making the component materials and fossil as the data, to the typical consideration in accordance with the map of summit level, reliefe and slope distribution. In connection with the erosion surface, I have divided into three classification such as high, medium and low-,level landform surfaces which were classified as high and low level landform surfaces in past. furthermore I have divided the low level landform surface two parts, namely upper-parts(200-300m) and bellow-parts(${\pm}100m$). Accordingly, we can recognize the three-parts of erosion surface including the medium level landform surface (500-600m) in this area. (see table 22). In condition with the alluvial surfaces I have classified as two landform surfaces (old and new) which was regarded as one face in past. Meamwhile, under the premise of land use, the synthetic, micro morphological classification based upon the land condition is as per the draw No. 19-1. This is the quite new method of classification which was at first attempted in this country. 2. I have learned that the change of river was most severe at seeing the river meandering rate from Dangjung-ni to Nanjido. As you seee the table and the vertical and horizontal change of river beds is justly proportionable to the river meandering rate. 3. It can be learned at seeing the analysis of component materials of alluvial deposits that the component from each other by areas, however, in the deposits relationship upper stream, and between upper parts and below parts I couldn't always find out the regular ones. 4. Having earthern vessel, shell bone, fossil charcoal and and seaweeds includen in the component materials such as gravel, clay, sand and silt in Dukso and Songpa deposits area. I have become to attempt the compilation of chronicle as yon see in the table 22. 5. In according to hearing of basemen excavation, the bottom set conglomerate beds of Dukso beds of Dukso-beds is 7m and Songpa-beds is 10m. In according to information of dredger it is approx. 20m in the down stream. 6. Making these two beds as the standard beds, I have compared it to other beds. 7 The coarse sand beds which is covering the clay-beds of Dukso-beds and Nanjidobeds is shown the existence of so-called erosion period which formed the gap among the alluvial deposits of stratum. The former has been proved by the sorting, bedding and roundness which was supplied by the main stream and later by the branch stream, respectively. 8. If the clay-beds of Dukeo-bed and Songpa-bed is called as being transgressive overlap, by the Eustatic movement after glacial age, the bottom set conglomerate beds shall be called as being regressive overlap at the holocene. This has the closest relationship with the basin formation movement of Seoul besides the Eustatic movement. 9. The silt-beds which is the main component of deposits of flood plain, is regarded as being deposited at the Holocene in the comb ceramic and plain pottery ages. This has the closest relationship with the change of river course and river beds.

Construction and Application of Intelligent Decision Support System through Defense Ontology - Application example of Air Force Logistics Situation Management System (국방 온톨로지를 통한 지능형 의사결정지원시스템 구축 및 활용 - 공군 군수상황관리체계 적용 사례)

  • Jo, Wongi;Kim, Hak-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.77-97
    • /
    • 2019
  • The large amount of data that emerges from the initial connection environment of the Fourth Industrial Revolution is a major factor that distinguishes the Fourth Industrial Revolution from the existing production environment. This environment has two-sided features that allow it to produce data while using it. And the data produced so produces another value. Due to the massive scale of data, future information systems need to process more data in terms of quantities than existing information systems. In addition, in terms of quality, only a large amount of data, Ability is required. In a small-scale information system, it is possible for a person to accurately understand the system and obtain the necessary information, but in a variety of complex systems where it is difficult to understand the system accurately, it becomes increasingly difficult to acquire the desired information. In other words, more accurate processing of large amounts of data has become a basic condition for future information systems. This problem related to the efficient performance of the information system can be solved by building a semantic web which enables various information processing by expressing the collected data as an ontology that can be understood by not only people but also computers. For example, as in most other organizations, IT has been introduced in the military, and most of the work has been done through information systems. Currently, most of the work is done through information systems. As existing systems contain increasingly large amounts of data, efforts are needed to make the system easier to use through its data utilization. An ontology-based system has a large data semantic network through connection with other systems, and has a wide range of databases that can be utilized, and has the advantage of searching more precisely and quickly through relationships between predefined concepts. In this paper, we propose a defense ontology as a method for effective data management and decision support. In order to judge the applicability and effectiveness of the actual system, we reconstructed the existing air force munitions situation management system as an ontology based system. It is a system constructed to strengthen management and control of logistics situation of commanders and practitioners by providing real - time information on maintenance and distribution situation as it becomes difficult to use complicated logistics information system with large amount of data. Although it is a method to take pre-specified necessary information from the existing logistics system and display it as a web page, it is also difficult to confirm this system except for a few specified items in advance, and it is also time-consuming to extend the additional function if necessary And it is a system composed of category type without search function. Therefore, it has a disadvantage that it can be easily utilized only when the system is well known as in the existing system. The ontology-based logistics situation management system is designed to provide the intuitive visualization of the complex information of the existing logistics information system through the ontology. In order to construct the logistics situation management system through the ontology, And the useful functions such as performance - based logistics support contract management and component dictionary are further identified and included in the ontology. In order to confirm whether the constructed ontology can be used for decision support, it is necessary to implement a meaningful analysis function such as calculation of the utilization rate of the aircraft, inquiry about performance-based military contract. Especially, in contrast to building ontology database in ontology study in the past, in this study, time series data which change value according to time such as the state of aircraft by date are constructed by ontology, and through the constructed ontology, It is confirmed that it is possible to calculate the utilization rate based on various criteria as well as the computable utilization rate. In addition, the data related to performance-based logistics contracts introduced as a new maintenance method of aircraft and other munitions can be inquired into various contents, and it is easy to calculate performance indexes used in performance-based logistics contract through reasoning and functions. Of course, we propose a new performance index that complements the limitations of the currently applied performance indicators, and calculate it through the ontology, confirming the possibility of using the constructed ontology. Finally, it is possible to calculate the failure rate or reliability of each component, including MTBF data of the selected fault-tolerant item based on the actual part consumption performance. The reliability of the mission and the reliability of the system are calculated. In order to confirm the usability of the constructed ontology-based logistics situation management system, the proposed system through the Technology Acceptance Model (TAM), which is a representative model for measuring the acceptability of the technology, is more useful and convenient than the existing system.

A Study on the Creation and Use of Nokgakseong and Underwater Wooden Fence (조선시대 녹각성과 수중목책의 조성 및 활용에 관한 연구)

  • SHIM Sunhui;KIM Choongsik
    • Korean Journal of Heritage: History & Science
    • /
    • v.56 no.4
    • /
    • pp.230-246
    • /
    • 2023
  • The wooden fence(木柵), which began to appear in the Bronze Age and is presumed to be the oldest defense facility in human history, was used as a fortress for the purpose of further strengthening military defense functions until after the Japanese Invasion of Korea in 1592 in the Joseon Dynasty(壬辰倭亂). As it was established as the concept of a fortress or a fence installed outside a fence castle(城柵) or barracks fence(營柵), its importance as an essential facility for defense was further highlighted. This study is the result of exploring wooden fence that were used as official facilities during the Joseon Dynasty, focusing on literature surveys such as 『Annals of the Joseon Dynasty』 and 『New Jeungdonggukyeojiseungram』 In this study, in particular, the conclusion of this study is as follows, focusing on the use and function of Nokgakseong(鹿角城), underwater wooden fence, installation methods, and materials of wooden fences, is as follows. The conclusions of this study, which focused on the materials of the wooden fence, are as follows. First, as invasions by foreign enemies became more frequent in the late Goryeo and early Joseon Dynasty, wooden fences played a major role as a major out-of-castle defense facility((防禦施設). In addition, wooden fences were modified and installed into various types such as wooden fences(木柵城), Nokgakseong, a fence made up of large branches in the shape of a deer antler, and underwater wooden fences(水中木柵) according to the circumstances of the times, government policy, and location environment. Second, wooden fences were installed in strategic locations in defense facilities for military purposes, such as mountain fortress(山城), fortresses(營), camps(鎭), forts(堡), and castles(邑城) in strategic locations, and were used for defense in case of emergency. According to the urgency of farming, it was installed in accordance with the non-farming season, when it is easy to mobilize manpower to avoid the busy farming season. The size of the wooden fence of the Joseon Dynasty, which are confirmed through literature records, was converted into Pobaekchuk(布帛尺), and the circumference was very diverse from 4,428chuk(2,066m) to 55chuk(25m). Third, Nokgakseong is an efficient combat support facility that is more aggressive than a general wooden fence, and the records of Nokgakseong in the Annals of the Joseon Dynasty appeared during the King Sejong period the record was 20 times, the most. By region, it was found that it was mainly installed in coastal rugged areas such as Pyeongan and Hamgildo(12), which are the 6-jin areas of the 4th Army. Fourth, in the early 15th century, as the royal court established a maritime defense strategy for the coastal area of the southern coast, after the Sampo Invasion(三浦倭亂), riots by Japanese settlers in Sampo in 1510, major military posts including eupseong(邑城), camps, and forts were established. The installation of underwater barriers around various government facilities rapidly increased as a defense facility to block the warships of Japanese pirates around various government facilities. Fifth, between the 15th and 17th centuries before and after the Japanese Invasion of Korea in Sampo, underwater fences were installed in the Southern coast and Ganghwa Island. In particular, in the 15th century, underwater fences were intensively installed in coastal areas of Gyeongsangnam-do, such as Jepo. Pine trees and Oaks are the main materials used for underwater fences, but other materials such as Oldham's meliosma, Loose-flower hornbeam and The vines of arrowroots were also used as materials for wooden fences.

A New Approach to Automatic Keyword Generation Using Inverse Vector Space Model (키워드 자동 생성에 대한 새로운 접근법: 역 벡터공간모델을 이용한 키워드 할당 방법)

  • Cho, Won-Chin;Rho, Sang-Kyu;Yun, Ji-Young Agnes;Park, Jin-Soo
    • Asia pacific journal of information systems
    • /
    • v.21 no.1
    • /
    • pp.103-122
    • /
    • 2011
  • Recently, numerous documents have been made available electronically. Internet search engines and digital libraries commonly return query results containing hundreds or even thousands of documents. In this situation, it is virtually impossible for users to examine complete documents to determine whether they might be useful for them. For this reason, some on-line documents are accompanied by a list of keywords specified by the authors in an effort to guide the users by facilitating the filtering process. In this way, a set of keywords is often considered a condensed version of the whole document and therefore plays an important role for document retrieval, Web page retrieval, document clustering, summarization, text mining, and so on. Since many academic journals ask the authors to provide a list of five or six keywords on the first page of an article, keywords are most familiar in the context of journal articles. However, many other types of documents could not benefit from the use of keywords, including Web pages, email messages, news reports, magazine articles, and business papers. Although the potential benefit is large, the implementation itself is the obstacle; manually assigning keywords to all documents is a daunting task, or even impractical in that it is extremely tedious and time-consuming requiring a certain level of domain knowledge. Therefore, it is highly desirable to automate the keyword generation process. There are mainly two approaches to achieving this aim: keyword assignment approach and keyword extraction approach. Both approaches use machine learning methods and require, for training purposes, a set of documents with keywords already attached. In the former approach, there is a given set of vocabulary, and the aim is to match them to the texts. In other words, the keywords assignment approach seeks to select the words from a controlled vocabulary that best describes a document. Although this approach is domain dependent and is not easy to transfer and expand, it can generate implicit keywords that do not appear in a document. On the other hand, in the latter approach, the aim is to extract keywords with respect to their relevance in the text without prior vocabulary. In this approach, automatic keyword generation is treated as a classification task, and keywords are commonly extracted based on supervised learning techniques. Thus, keyword extraction algorithms classify candidate keywords in a document into positive or negative examples. Several systems such as Extractor and Kea were developed using keyword extraction approach. Most indicative words in a document are selected as keywords for that document and as a result, keywords extraction is limited to terms that appear in the document. Therefore, keywords extraction cannot generate implicit keywords that are not included in a document. According to the experiment results of Turney, about 64% to 90% of keywords assigned by the authors can be found in the full text of an article. Inversely, it also means that 10% to 36% of the keywords assigned by the authors do not appear in the article, which cannot be generated through keyword extraction algorithms. Our preliminary experiment result also shows that 37% of keywords assigned by the authors are not included in the full text. This is the reason why we have decided to adopt the keyword assignment approach. In this paper, we propose a new approach for automatic keyword assignment namely IVSM(Inverse Vector Space Model). The model is based on a vector space model. which is a conventional information retrieval model that represents documents and queries by vectors in a multidimensional space. IVSM generates an appropriate keyword set for a specific document by measuring the distance between the document and the keyword sets. The keyword assignment process of IVSM is as follows: (1) calculating the vector length of each keyword set based on each keyword weight; (2) preprocessing and parsing a target document that does not have keywords; (3) calculating the vector length of the target document based on the term frequency; (4) measuring the cosine similarity between each keyword set and the target document; and (5) generating keywords that have high similarity scores. Two keyword generation systems were implemented applying IVSM: IVSM system for Web-based community service and stand-alone IVSM system. Firstly, the IVSM system is implemented in a community service for sharing knowledge and opinions on current trends such as fashion, movies, social problems, and health information. The stand-alone IVSM system is dedicated to generating keywords for academic papers, and, indeed, it has been tested through a number of academic papers including those published by the Korean Association of Shipping and Logistics, the Korea Research Academy of Distribution Information, the Korea Logistics Society, the Korea Logistics Research Association, and the Korea Port Economic Association. We measured the performance of IVSM by the number of matches between the IVSM-generated keywords and the author-assigned keywords. According to our experiment, the precisions of IVSM applied to Web-based community service and academic journals were 0.75 and 0.71, respectively. The performance of both systems is much better than that of baseline systems that generate keywords based on simple probability. Also, IVSM shows comparable performance to Extractor that is a representative system of keyword extraction approach developed by Turney. As electronic documents increase, we expect that IVSM proposed in this paper can be applied to many electronic documents in Web-based community and digital library.

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

Customer Behavior Prediction of Binary Classification Model Using Unstructured Information and Convolution Neural Network: The Case of Online Storefront (비정형 정보와 CNN 기법을 활용한 이진 분류 모델의 고객 행태 예측: 전자상거래 사례를 중심으로)

  • Kim, Seungsoo;Kim, Jongwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.221-241
    • /
    • 2018
  • Deep learning is getting attention recently. The deep learning technique which had been applied in competitions of the International Conference on Image Recognition Technology(ILSVR) and AlphaGo is Convolution Neural Network(CNN). CNN is characterized in that the input image is divided into small sections to recognize the partial features and combine them to recognize as a whole. Deep learning technologies are expected to bring a lot of changes in our lives, but until now, its applications have been limited to image recognition and natural language processing. The use of deep learning techniques for business problems is still an early research stage. If their performance is proved, they can be applied to traditional business problems such as future marketing response prediction, fraud transaction detection, bankruptcy prediction, and so on. So, it is a very meaningful experiment to diagnose the possibility of solving business problems using deep learning technologies based on the case of online shopping companies which have big data, are relatively easy to identify customer behavior and has high utilization values. Especially, in online shopping companies, the competition environment is rapidly changing and becoming more intense. Therefore, analysis of customer behavior for maximizing profit is becoming more and more important for online shopping companies. In this study, we propose 'CNN model of Heterogeneous Information Integration' using CNN as a way to improve the predictive power of customer behavior in online shopping enterprises. In order to propose a model that optimizes the performance, which is a model that learns from the convolution neural network of the multi-layer perceptron structure by combining structured and unstructured information, this model uses 'heterogeneous information integration', 'unstructured information vector conversion', 'multi-layer perceptron design', and evaluate the performance of each architecture, and confirm the proposed model based on the results. In addition, the target variables for predicting customer behavior are defined as six binary classification problems: re-purchaser, churn, frequent shopper, frequent refund shopper, high amount shopper, high discount shopper. In order to verify the usefulness of the proposed model, we conducted experiments using actual data of domestic specific online shopping company. This experiment uses actual transactions, customers, and VOC data of specific online shopping company in Korea. Data extraction criteria are defined for 47,947 customers who registered at least one VOC in January 2011 (1 month). The customer profiles of these customers, as well as a total of 19 months of trading data from September 2010 to March 2012, and VOCs posted for a month are used. The experiment of this study is divided into two stages. In the first step, we evaluate three architectures that affect the performance of the proposed model and select optimal parameters. We evaluate the performance with the proposed model. Experimental results show that the proposed model, which combines both structured and unstructured information, is superior compared to NBC(Naïve Bayes classification), SVM(Support vector machine), and ANN(Artificial neural network). Therefore, it is significant that the use of unstructured information contributes to predict customer behavior, and that CNN can be applied to solve business problems as well as image recognition and natural language processing problems. It can be confirmed through experiments that CNN is more effective in understanding and interpreting the meaning of context in text VOC data. And it is significant that the empirical research based on the actual data of the e-commerce company can extract very meaningful information from the VOC data written in the text format directly by the customer in the prediction of the customer behavior. Finally, through various experiments, it is possible to say that the proposed model provides useful information for the future research related to the parameter selection and its performance.

Problems on the Arbitral Awards Enforcement in the 2016 Korean Arbitration Act (2016년 개정 중재법의 중재판정 집행에 관한 문제점)

  • Yoon, Jin-Ki
    • Journal of Arbitration Studies
    • /
    • v.26 no.4
    • /
    • pp.3-41
    • /
    • 2016
  • This paper reviews the problems on the arbitral awards enforcement in the 2016 Korean Arbitration Act. In order to get easy and rapid enforcement of the arbitral awards, the new arbitration act changed the enforcement procedure from an enforcement judgement procedure to an enforcement decision procedure. However, like the old arbitration act, the new act is still not arbitration friendly. First of all, there are various problems in the new act because it does not approve that an arbitral award can be a schuldtitel (title of enforcement) of which the arbitral award can be enforced. In this paper, several problems of the new act are discussed: effect of arbitral award, approval to res judicata of enforcement decision, different trial process and result for same ground, possibility of abuse of litigation for setting aside arbitral awards and delay of enforcement caused by setting aside, infringement of arbitration customer's right to be informed, and non-internationality of enforcement of interim measures of protection, inter alia. The new arbitration act added a proviso on article 35 (Effect of Arbitral Awards). According to article 35 of the old arbitration act, arbitral awards shall have the same effect on the parties as the final and conclusive judgement of the court. The proviso of article 35 in the new act can be interpret two ways: if arbitral awards have any ground of refusal of recognition or enforcement according to article 38, the arbitral awards do not have the same effect on the parties as the final and conclusive judgement of the court; if arbitral awards have not recognised or been enforced according to article 38, the arbitral awards do not have the same effect on the parties as the final and conclusive judgement of the court. In the case of the former, the parties cannot file action for setting aside arbitral awards in article 36 to the court, and this is one of the important problems of the new act. In the new act, same ground of setting aside arbitral awards can be tried in different trial process with or without plead according to article 35 and 37. Therefore, progress of enforcement decision of arbitral awards can be blocked by the action of setting aside arbitral awards. If so, parties have to spend their time and money to go on unexpected litigation. In order to simplify enforcement procedure of arbitral awards, the new act changed enforcement judgement procedure to enforcement decision procedure. However, there is still room for the court to hear a case in the same way of enforcement judgement procedure. Although the new act simplifies enforcement procedure by changing enforcement judgement procedure to enforcement decision procedure, there still remains action of setting aside arbitral awards, so that enforcement of arbitral awards still can be delayed by it. Moreover, another problem exists in that the parties could have to wait until a seventh trial (maximum) for a final decision. This result in not good for the arbitration system itself in the respect of confidence as well as cost. If the arbitration institution promotes to use arbitration by emphasizing single-trial system of arbitration without enough improvement of enforcement procedure in the arbitration system, it would infringe the arbitration customer's right to be informed, and further raise a problem of legal responsibility of arbitration institution. With reference to enforcement procedure of interim measures of protection, the new act did not provide preliminary orders, and moreover limit the court not to recognize interim measures of protection done in a foreign country. These have a bad effect on the internationalization of the Korean arbitration system.