• Title/Summary/Keyword: human communication

Search Result 3,237, Processing Time 0.028 seconds

A Destructive Method in the Connection of the Algorithm and Design in the Digital media - Centered on the Rapid Prototyping Systems of Product Design - (디지털미디어 환경(環境)에서 디자인 특성(特性)에 관한 연구(硏究) - 실내제품(室內製品) 디자인을 중심으로 -)

  • Kim Seok-Hwa
    • Journal of Science of Art and Design
    • /
    • v.5
    • /
    • pp.87-129
    • /
    • 2003
  • The purpose of this thesis is to propose a new concept of design of the 21st century, on the basis of the study on the general signification of the structures and the signs of industrial product design, by examining the difference between modern and post-modern design, which is expected to lead the users to different design practice and interpretation of it. The starting point of this study is the different styles and patterns of 'Gestalt' in the post-modern design of the late 20th century from modern design - the factor of determination in industrial product design. That is to say, unlike functional and rational styles of modern product design, the late 20th century is based upon the pluralism characterized by complexity, synthetic and decorativeness. So far, most of the previous studies on design seem to have excluded visual aspects and usability, focused only on effective communication of design phenomena. These partial studies on design, blinded by phenomenal aspects, have resulted in failure to discover a principle of fundamental system. However, design varies according to the times; and the transformation of design is reflected in Design Pragnanz to constitute a new text of design. Therefore, it can be argued that Design Pragnanz serves as an essential factor under influence of the significance of text. In this thesis, therefore, I delve into analysis of the 20th century product design, in the light of Gestalt theory and Design Pragnanz, which have been functioning as the principle of the past design. For this study, I attempted to discover the fundamental elements in modern and post-modern designs, and to examine the formal structure of product design, the users' aesthetic preference and its semantics, from the integrative viewpoint. Also, with reference to history and theory of design my emphasis is more on fundamental visual phenomena than on structural analysis or process of visualization in product design, in order to examine the formal properties of modern and post-modern designs. Firstly, In Chapter 1, 'Issues and Background of the Study', I investigated the Gestalt theory and Design Pragnanz, on the premise of formal distinction between modern and post-modern designs. These theories are founded upon the discussion on visual perception of Gestalt in Germany in 1910's, in pursuit of the principle of perception centered around visual perception of human beings. In Chapter 2, I dealt with functionalism of modern design, as an advance preparation for the further study on the product design of the late 20th century. First of all, in Chapter 2-1, I examined the tendency of modern design focused on functionalism, which can be exemplified by the famous statement 'Form follows function'. Excluding all unessential elements in design - for example, decoration, this tendency has attained the position of the international style based on the spirit of Bauhause - universality and regularity - in search of geometric order, standardization and rationalization. In Chapter 2-2, I investigated the anthropological viewpoint that modern design started representing culture in a symbolic way including overall aspects of the society - politics, economics and ethics, and its criticism on functionalist design that aesthetic value is missing in exchange of excessive simplicity in style. Moreover, I examined the pluralist phenomena in post-modern design such as kitsch, eclecticism, reactionism, hi-tech and digital design, breaking away from functionalist purism of modern design. In Chapter 3, I analyzed Gestalt Pragnanz in design in a practical way, against the background of design trends. To begin with, I selected mass product design among those for the 20th century products as a target of analysis, highlighting representative styles in each category of the products. For this analysis, I adopted the theory of J. M Lehnhardt, who gradated in percentage the aesthetic and semantic levels of Pragnantz in design expression, and that of J. K. Grutter, who expressed it in a formula of M = O : C. I also employed eight units of dichotomies, according to the G. D. Birkhoff's aesthetic criteria, for the purpose of scientific classification of the degree of order and complexity in design; and I analyzed phenomenal aspects of design form represented in each unit. For Chapter 4, I executed a questionnaire about semiological phenomena of Design Pragnanz with 28 units of antonymous adjectives, based upon the research in the previous chapter. Then, I analyzed the process of signification of Design Pragnanz, founded on this research. Furthermore, the interpretation of the analysis served as an explanation to preference, through systematic analysis of Gestalt and Design Pragnanz in product design of the late 20th century. In Chapter 5, I determined the position of Design Pragnanz by integrating the analyses of Gestalt and Pragnanz in modern and post-modern designs In this process, 1 revealed the difference of each Design Pragnanz in formal respect, in order to suggest a vision of the future as a result, which will provide systemic and structural stimulation to current design.

  • PDF

The Use of Interviews in Documentary Films (다큐멘터리에서의 인터뷰 활용 방식 연구)

  • Cho, Hyunjun
    • Trans-
    • /
    • v.7
    • /
    • pp.103-121
    • /
    • 2019
  • In some documentary films, there are interviews, but in some other ones, there aren't any. As for the documentaries with interviews, the director uses talking heads to suggest their own arguments and to have audience agree. It is evident that interviews play a key role since they lead the story of a human-related documentary. Some directors prefer interviews where directors' questions and interviewees' answers are both heard. On the other hand, there a re directors who carry out the story just by using the answers from the interviewees. Then, it becomes crucial that we understand both of these styles and have new perspectives when watching documentary films. Ethics has always been considered one of the most important factors in documentaries and since they are believed to be "true," the influence documentaries have on the society is enormous. However, possibilities of exaggerating or manipulating the "truth" always exist. Therefore, it is important for the audience to identify the intentions of the director. As a matter of fact, there have been countless researches being done, but it is difficult to find studies that discuss the ways interviews are used in documentary films. The two different styles mentioned above do have huge differences in terms of directing methods. Thus, taking a look at differences from diverse angles will help us better understand the essentials of documentary films. This study will take examples from the interviews in Michael Moore's (2002), (2007) and observe how the flow of interviews can change when the voice of the director gets involved. There will also be a close examination of interviews in Kim Ilran and Hong Ji Yoo's (2011), and (2005) directed by Jim Butterworth, Aeron Lubarsky, and Lisa Sleeth, as well as Sebastian Junger and Tim Hetherington's (2010). By a careful review, use of dissolve, cross-cutting, and flashback will be analyzed to show how different editing techniques have an impact on subjective views of the director.

  • PDF

Some New Problems of International Aviation Security- Considerations Forcused on its Legal Aspects (최근국제항공보안대책(最近國際航空保安対策)의 제간제(諸間題) -특히 법적측면(法的測面)을 중심(中心)으로-)

  • Choi, Wan-Sik
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.5
    • /
    • pp.53-75
    • /
    • 1993
  • This article is concerned with the comment on "Some New Problems of International Aviation Security-Considerations Forcused on its Legal Aspects". Ever since 1970, in addition to the problem of failure to accept the Tokyo, Hague and Montreal Conventions, there has been also the problem of parties to them, failing to comply with their obligations under the respective treaties, in the form especially of nominal penalties or the lack of any effort to prosecute after blank refusals to extradite. There have also been cases of prolonged detention of aircraft, passengers and hostages. In this regard, all three conventions contain identical clauses which submit disputes between two or more contracting States concerning the interpretation or application of the respective conventions to arbitration or failing agreement on the organization of the arbitration, to the International Court of Justice. To the extent to which contracting States have not contracted out of this undertaking, as I fear they are expressly allowed to do, this promision can be used by contracting States to ensure compliance. But to date, this avenue does not appear to have been used. From this point of view, it may be worth mentioning that there appears to be an alarming trend towards the view that the defeat of terrorism is such an overriding imperative that all means of doing so become, in international law, automatically lawful. In addition, in as far as aviation security is concerned, as in fact it has long been suggested, what is required is the "application of the strictest security measures by all concerned."In this regard, mention should be made of Annex 17 to the Chicago Convention on Security-Safeguarding International Civil Aviation against Acts of Unlawful Intereference. ICAO has, moreover, compiled, for restricted distribution, a Security Manual for Safeguarding Civil Aviation Against Acts of Unlawful Interference, which is highly useful. In this regard, it may well be argued that, unless States members of ICAO notify the ICAO Council of their inability to comply with opecific standards in Annex 17 or any of the related Annexes in accordance with Article 38 of the 1944 Chicago Convention on International Civil Aviation, their failure to do so can involve State responsibility and, if damage were to insure, their liability. The same applies to breaches of any other treaty obligation. I hope to demonstrate that although modes of international violence may change, their underlying characteristics remain broadly similar, necessitating not simply the adoption of an adequate body of domestic legislation, firm in its content and fairly administered, but also an international network of communication, of cooperation and of coordination of policies. Afurther legal instrument is now being developed by the Legal Committee of ICAO with respect to unlawful acts at International airports. These instruments, however, are not very effective, because of the absence of universal acceptance and the deficiency I have already pointed out. Therefore, States, airports and international airlines have to concentrate on prevention. If the development of policies is important at the international level, it is equally important in the domestic setting. For example, the recent experiences of France have prompted many changes in the State's legislation and in its policies towards terrorism, with higher penalties for terrorist offences and incentives which encourage accused terrorists to pass informations to the authorities. And our government has to tighten furthermore security measures. Particularly, in the case an unarmed hijacker who boards having no instrument in his possession with which to promote the hoax, a plaintiff-passenger would be hard-pressed to show that the airline was negligent in screening the hijacker prior to boarding. In light of the airline's duty to exercise a high degree of care to provide for the safety of all the passengers on board, an acquiescence to a hijacker's demands on the part of the air carrier could constitute a breach of duty only when it is clearly shown that the carrier's employees knew or plainly should have known that the hijacker was unarmed. The general opinion is that the legal oystem could be sufficient, provided that the political will is there to use and apply it effectively. All agreed that the main responsibility for security has to be borne by the governments. A state that supports aviation terrorism is responsible for violation of International Aviation Law. Generally speaking, terrorism is a violation of international law. It violates the sovereign rights of states, and the human rights of the individuals. We have to contribute more to the creation of a general consensus amongst all states about the need to combat the threat of aviation terrorism. I think that aviation terrorism as becoming an ever more serious issue, has to be solved by internationally agreed and closely co - ordinated measures.

  • PDF

Using CR System at the Department of Radiation Oncology PACS Evaluation (방사선 종양학과에서 CR System을 이용한 PACS 유용성 평가)

  • Hong, Seung-Il;Kim, Young-Jae
    • Journal of the Korean Society of Radiology
    • /
    • v.6 no.2
    • /
    • pp.143-149
    • /
    • 2012
  • Today each hospital is trend that change rapidly by up to date, digitization and introducing newest medical treatment equipment. So, we introduce new CR system and supplement film system's shortcoming and PACS, EMR, RTP system's network that is using in hospital harmoniously and accomplish quality improvement of medical treatment and service elevation about business efficiency enlargement and patient Accordingly, we wish to introduce our case that integrate reflex that happen with radiation oncology here upon to PACS using CR system and estimate the availability. We measured that is Gantry, Collimator Star Shot, Light vs. Radiation, HDR QA(Dwell position accuracy) with Medical LINAC(MEVATRON-MX) Then, PACS was implemented on the digital images on the monitor that can be confirmed through the QA. Also, for cooperation with OCS system that is using from present source and impose code that need in treatment in each treatment, did so that Order that connect to network, input to CR may appear, did so that can solve support data mistake (active Pinacle's case supports DICOM3 file from present source but PACS does not support DICOM3 files.) of Pinacle and PACS that is Planning System and look at Planning premier in PACS. All image and data constructed integration to PACS as can refer and conduct premier in Hospital anywhere using CR system. Use Dosimetry IP in Filmless environment and QA's trial such as Light/Radition field size correspondence, gantry rotation axis' accuracy, collimator rotation axis' accuracy, brachy therapy's Dwell position check is available. Business efficiency by decrease and so on of unnecessary human strength consumption was augmented accordingly with session shortening as that integrate premier that is neted with radiation oncology using CR system to PACS. and for the future patient information security is essential.

A Study of Textured Image Segmentation using Phase Information (페이즈 정보를 이용한 텍스처 영상 분할 연구)

  • Oh, Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.249-256
    • /
    • 2011
  • Finding a new set of features representing textured images is one of the most important studies in textured image analysis. This is because it is impossible to construct a perfect set of features representing every textured image, and it is inevitable to choose some relevant features which are efficient to on-going image processing jobs. This paper intends to find relevant features which are efficient to textured image segmentation. In this regards, this paper presents a different method for the segmentation of textured images based on the Gabor filter. Gabor filter is known to be a very efficient and effective tool which represents human visual system for texture analysis. Filtering a real-valued input image by the Gabor filter results in complex-valued output data defined in the spatial frequency domain. This complex value, as usual, gives the module and the phase. This paper focused its attention on the phase information, rather than the module information. In fact, the module information is considered very useful at region analysis in texture, while the phase information was considered almost of no use. But this paper shows that the phase information can also be fully useful and effective at region analysis in texture, once a good method introduced. We now propose "phase derivated method", which is an efficient and effective way to compute the useful phase information directly from the filtered value. This new method reduces effectively computing burden and widen applicable textured images.

The present situation and trend of China archives science (중국(中國) 당안학(檔案學)와 현황(現況) 및 발전추세(發展趨勢))

  • Feng, Fuj-Ling
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.1 no.1
    • /
    • pp.37-52
    • /
    • 2001
  • 1. establishment and development of China archives science: With the centuries-old history of archives and archives management, early China archives science came into being in 1930s, and the research pushed forward by archives enterprise has made great achievements since then. 1.1 Expanding research fields: Foundation

An Analysis of Efficiency of Security Services : A Comparative Determinants Analysis of Public and Private Security (경호업무 효율성에 관한 연구 : 공공경호와 민간경호의 효율성 영향요인의 비교분석)

  • Park, Moon-Sun
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.67-103
    • /
    • 2009
  • Objectives of this study is develop security services through determinants analysis on the efficiency of security works regarding security and guarding business in Korea because nowadays the modern society like Korea let alone all over the world faces the increase of dangerous factors in every security field of the human societies, and also it is the very present situation that an individual's life even the national security itself can be at the risk without guaranteeing the efficiency of the security services. For this purpose, this study reviewed related documents, surveyed and interviewed security personnels to identify what the potentially influential factors are in both the public and private security organizations regarding the efficiency of present security services and organizations, and what differences are. Also, comparing the public and private security sectors, this study intended to suggest policy agendas how to enhance the efficiency of security services in the future. This study surveyed the 177 agents and former agents of the Presidential Security Service(PSS) for the public security sector, and also surveyed, interviewed, and internet-based polled 821 randomly selected personnels for the private security sector. This research showed that regarding the efficiency of the security services number of independent variables which had positive responses in the public security sector was more than that in the private security sector. Among the 21 questions regarding this issue, there were all of 21 positive responses in the public security sector while there were 18 negative responses in the private security sector. As a result of synthesizing all the answers of the both sides, it is possible to understand that mostly the ratio of the positive response was much higher. In the public security service, statistically significant variables were budget support for events, prior access of information, an integrated teamwork training, organizational atmosphere, morale of organization personnel. However, practical training of the security service and mutual communication showed unexpectedly negative(-) signs. In the private security service, statistically significant variables were budget support for events, integrated teamwork training, socially friendly atmosphere, compensation for the personnels, bullet-proof equipments and vehicles, mood of organization, personnel recruit and disposition, unexpected incidents and basic attitude for security services. In sum, while organizational personnel variables and organizational management variables were significant in the public security service, some organizational management variables and all socio-environment variables were statistically significant at 5% significance level.

  • PDF

Shade comparative analysis of natural tooth measured by visual and spectrophotometric methods (육안과 분광 측정기를 이용한 자연 치아의 색조비교분석)

  • Kim, Bum-Suk;Shin, Soo-Yeon;Lee, Jong-Hyuk
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.46 no.5
    • /
    • pp.443-454
    • /
    • 2008
  • Statement of problem: A clinically successful color match is one of the important factor to get an esthetic dental restoration. Dental shade guides are commonly used to evaluate tooth color in restorative procedure. But numerous reports have indicated that common shade guides do not provide sufficient spectral coverage of the natural tooth colors. To address issues associated with the shade guide, distinct avenues have been pursued objective spectrophotometric / colorimetric assessment. Purpose: This study compared the accuracy of tooth color selection of spectrophotometer with that of human visual determination. Three main factors were investigated, namely, the effect of light, the individual variation and the experience of the observer. Material and methods: At the first experiment, on ten patients, one operator independently selected the best matching shade to the unrestored maxillary central incisor, using a Vita Classical Shade Guide in the morning, at noon and in the afternoon. The same teeth were measured by means of a reflectance spectrophotometer. At the second experiment, on ten patients, ten operators (5 experts, 5 novices) selected and measured by the same method above at noon. At the third experiment, the results of the second experiment were divided into two groups, expert and novice, and analyzed. Results: 1. There was significant difference between visual and spectrophotometric assessment (mean ${\Delta}E$ values) in experiment 1, 2, 3 (P < .05). 2. There was no significant difference between experts and novices group, when comparing with each visual and spectrophotometric assessment (mean ${\Delta}E$ values). Conclusion: Spectrophotometer could be used to analyze the shade of natural tooth objectively. Thereby, this method offers the potential tominimize considerably the need for corrections or even remakesafter intraoral try-in of restoration. Furthermore, to achieve its advantage, both the shade-matching environment and communication between dentist and technician should be optimized with use of visual and instrumental shade-matching systems.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Status of Agrometeorological Information and Dissemination Networks (농업기상 정보 및 배분 네트워크 현황)

  • Jagtap, Shrikant;Li, Chunqiang
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.6 no.2
    • /
    • pp.71-84
    • /
    • 2004
  • There is a growing demand for agrometeorological information that end-users can use and not just interesting information. lo achieve this, each region/community needs to develop and provide localized climate and weather information for growers. Additionally, provide tools to help local users interpret climate forecasts issued by the National Weather Service in the country. Real time information should be provided for farmers, including some basic data. An ideal agrometeorological information system includes several components: an efficient data measuring and collection system; a modern telecommunication system; a standard data management processing and analysis system; and an advanced technological information dissemination system. While it is conventional wisdom that, Internet is and will play a major role in the delivery and dissemination of agrometeorological information, there are large gaps between the "information rich" and the "information poor" countries. Rural communities represent the "last mile of connectivity". For some time to come, TV broadcast, radio, phone, newspaper and fax will be used in many countries for communication. The differences in achieving this among countries arise from the human and financial resources available to implement this information and the methods of information dissemination. These differences must be considered in designing any information dissemination system. Experience shows that easy across to information more tailored to user needs would substantially increase use of climate information. Opportunities remain unexplored for applications of geographical information systems and remote sensing in agro meteorology.e sensing in agro meteorology.