• Title/Summary/Keyword: language types

Search Result 989, Processing Time 0.026 seconds

On the 'realization' meaning of possibility expressions - '-ul swu iss-' and its counterparts in Japanese and Chinese - (가능 표현의 실현 용법에 대하여 - '-을 수 있-' 및 일본어·중국어의 대응 표현을 중심으로 -)

  • Kang, Yeongri;Xu, Cuie;Park, Jinho
    • Cross-Cultural Studies
    • /
    • v.50
    • /
    • pp.313-346
    • /
    • 2018
  • It is noted that generally speaking, the expressing of actualization or non-actualization of events is not the main role of possibility for the utilization of expressions. In spite of this fact, it is possible to see many examples in which possibility expressions represent actual events, and impossibility expressions represent a type of non-actualization in relation to events. This effect can be described as a semantic extension, by which the participant-internal possibility is extended to actualization due to participant-internal factors, and the participant-external possibility is extended to the actualization due to participant-external factors. When the related possibility expressions are used in this extended sense, they express the dynamic evaluative meaning of 'desirability' of the realized event, while it is determined that when the impossibility expressions are used in this extended sense, they are seen to express the evaluative meaning of 'regretfulness' about the non-actualization of the event. In Modern Japanese, it is noted that there are a few expressions of ability and possibility. They can be largely divided into four types of expressions, according to their origins or uses of expression, which are 'ability verbs', affixes '-れる/られる(-reru/rareru)', '-できる(-dekiru)', and '-得る(-eru)'. They can all express participant-internal possibility and participant-external non-deontic possibility. While 'ability verbs', affixes '-れる/られる' and '-できる' can express participant-external deontic possibility, '-得る' cannot. However, '-得る' is the only possible element to designate the event of a epistemic possibility. Also, the four types of expressions have the usage of conveying 'actualization/non-actualization,' as is the case of the Korean language. However in Japanese, in fact adjectives cannot be associated with 'ability verbs' or 'ability affixes.' Thus the expressions of 'regrets' should in that case depend on the use contexts, unlike the expression 'adj+-지 못하다' as noted in Korean. The ability and possibility in Modern Chinese are mainly expressed by means of the four auxiliary verbs '能($n{\acute{e}}ng$)', '会(huì)', '可以(kěyǐ)' and '可能 ($k{\check{e}}n{\acute{e}}ng$)'. '能' and '会' along with '可以' can all convey participant-internal possibility. In this way '能' and '可以' can express participant-external possibility. Only '会' and '可能' can express epistemic possibility. As for 'actualization,' among the four auxiliary verbs, only '能' can represent actualization. Also, among the negatives of the four auxiliary verbs, only '沒能' can represent non-actualization.

A study on the Greeting's Types of Ganchal in Joseon Dynasty (간찰(簡札)의 안부인사(安否人事)에 대한 유형(類型) 연구(硏究))

  • Jeon, Byeong-yong
    • (The)Study of the Eastern Classic
    • /
    • no.57
    • /
    • pp.467-505
    • /
    • 2014
  • I am working on a series of Korean linguistic studies targeting Ganchal(old typed letters in Korea) for many years and this study is for the typology of the [Safety Expression] as the part. For this purpose, [Safety Expression] were divided into a formal types and semantic types, targeting the Chinese Ganchal and Hangul Ganchal of modern Korean Language time(16th century-19th century). Formal types can be divided based on whether Normal position or not, whether Omission or not, whether the Sending letter or not, whether the relationship of the high and the low or not. Normal position form and completion were made the first type which reveal well the typicality of the [Safety Expression]. Original position while [Own Safety] omitted as the second type, while Original position while [Opposite Safety] omitted as the third type, Original position while [Safety Expression] omitted as the fourth type. Inversion type were made as the fifth type which is the most severe solecism in [Safety Expression]. The first type is refers to Original position type that [Opposite Safety] precede the [Own Safety] and the completion type that is full of semantic element. This type can be referred to most typical and normative in that it equipped all components of [Safety Expression]. A second type is that [Safety Expression] is composed of only the [Opposite Safety]. This type is inferior to the first type in terms of set pattern, it is never outdone when it comes to the appearance frequency. Because asking [Opposite Safety] faithfully, omitting [Own Safety] dose not greatly deviate politeness and easy to write Ganchal, it is utilized. The third type is the Original position type showing the configuration of the [Opposite Safety]+Own Safety], but [Opposite Safety] is omitted. The fourth type is a Original position type showing configuration of the [Opposite Safety+Own Safety], but [Safety Expression] is omitted. This type is divided into A ; [Safety Expression] is entirely omitted and B ; such as 'saving trouble', the conventional expression, replace [Safety Expression]. The fifth type is inversion type that shown to structure of the [Own Safety+Opposite Safety], unlike the Original position type. This type is the most severe solecism type and real example is very rare. It is because let leading [Own Safety] and ask later [Opposite Safety] for face save is offend against common decency. In addition, it can be divided into the direct type that [Opposite Safety] and [Own Safety] is directly connected and indirect type that separate into the [story]. The semantic types of [Safety Expression] can be classified based on whether Sending letter or not, fast or slow, whether intimate or not, and isolation or not. For Sending letter, [Safety Expression] consists [Opposite Safety(Climate+Inquiry after health+Mental state)+Own safety(status+Inquiry after health+Mental state)]. At [Opposite safety], [Climate] could be subdivided as [Season] information and [Climate(weather)] information. Also, [Mental state] is divided as receiver's [Family Safety Mental state] and [Individual Safety Mental state]. In [Own Safety], [Status] is divided as receiver's traditional situation; [Recent condition] and receiver's ongoing situation; [Present condition]. [Inquiry after health] is also subdivided as receiver's [Family Safety] and [Individual Safety], [Safety] is as [Family Safety] and [Individual Safety]. Likewise, [Inquiry after health] or [Safety] is usually used as pairs, in dimension of [Family] and [Individual]. This phenomenon seems to have occurred from a big family system, which is defined as taking care of one's parents or grand parents. As for the Written Reply, [Safety Expression] consists [Opposite Safety (Reception+Inquiry after health+Mental state)+Own safety(status+Inquiry after health+Mental state)], and only in [Opposite safety], a difference in semantic structure happens with Sending letter. In [Opposite Safety], [Reception] is divided as [Letter] which is Ganchal that is directly received and [Message], which is news that is received indirectly from people. [Safety] is as [Family Safety] and [Individual Safety], [Mental state] also as [Family Safety Mental state] and [Individual Safety Mental state].

Comparison of Deep Learning Frameworks: About Theano, Tensorflow, and Cognitive Toolkit (딥러닝 프레임워크의 비교: 티아노, 텐서플로, CNTK를 중심으로)

  • Chung, Yeojin;Ahn, SungMahn;Yang, Jiheon;Lee, Jaejoon
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.2
    • /
    • pp.1-17
    • /
    • 2017
  • The deep learning framework is software designed to help develop deep learning models. Some of its important functions include "automatic differentiation" and "utilization of GPU". The list of popular deep learning framework includes Caffe (BVLC) and Theano (University of Montreal). And recently, Microsoft's deep learning framework, Microsoft Cognitive Toolkit, was released as open-source license, following Google's Tensorflow a year earlier. The early deep learning frameworks have been developed mainly for research at universities. Beginning with the inception of Tensorflow, however, it seems that companies such as Microsoft and Facebook have started to join the competition of framework development. Given the trend, Google and other companies are expected to continue investing in the deep learning framework to bring forward the initiative in the artificial intelligence business. From this point of view, we think it is a good time to compare some of deep learning frameworks. So we compare three deep learning frameworks which can be used as a Python library. Those are Google's Tensorflow, Microsoft's CNTK, and Theano which is sort of a predecessor of the preceding two. The most common and important function of deep learning frameworks is the ability to perform automatic differentiation. Basically all the mathematical expressions of deep learning models can be represented as computational graphs, which consist of nodes and edges. Partial derivatives on each edge of a computational graph can then be obtained. With the partial derivatives, we can let software compute differentiation of any node with respect to any variable by utilizing chain rule of Calculus. First of all, the convenience of coding is in the order of CNTK, Tensorflow, and Theano. The criterion is simply based on the lengths of the codes and the learning curve and the ease of coding are not the main concern. According to the criteria, Theano was the most difficult to implement with, and CNTK and Tensorflow were somewhat easier. With Tensorflow, we need to define weight variables and biases explicitly. The reason that CNTK and Tensorflow are easier to implement with is that those frameworks provide us with more abstraction than Theano. We, however, need to mention that low-level coding is not always bad. It gives us flexibility of coding. With the low-level coding such as in Theano, we can implement and test any new deep learning models or any new search methods that we can think of. The assessment of the execution speed of each framework is that there is not meaningful difference. According to the experiment, execution speeds of Theano and Tensorflow are very similar, although the experiment was limited to a CNN model. In the case of CNTK, the experimental environment was not maintained as the same. The code written in CNTK has to be run in PC environment without GPU where codes execute as much as 50 times slower than with GPU. But we concluded that the difference of execution speed was within the range of variation caused by the different hardware setup. In this study, we compared three types of deep learning framework: Theano, Tensorflow, and CNTK. According to Wikipedia, there are 12 available deep learning frameworks. And 15 different attributes differentiate each framework. Some of the important attributes would include interface language (Python, C ++, Java, etc.) and the availability of libraries on various deep learning models such as CNN, RNN, DBN, and etc. And if a user implements a large scale deep learning model, it will also be important to support multiple GPU or multiple servers. Also, if you are learning the deep learning model, it would also be important if there are enough examples and references.

A Study on Criteria for the Credit Approval of Nationally Authorized Civil Qualifications (국가공인 민간자격 학점인정 기준에 관한 방안 연구)

  • Shin Myong-Hoon;Park Jong-Sung
    • Journal of Engineering Education Research
    • /
    • v.7 no.2
    • /
    • pp.5-21
    • /
    • 2004
  • The study aims to propose plans to give credit approval to those who obtain authorized civil qualifications, in accordance with the enforcement regulations under the Clause 7, Article 4 of $\ulcorner$the law on credit approval and others$\lrcorner$. Preceding studies on the grounds and principles of credit approval, analyses on the related references and materials, and surveys asking the managers of authorized civil qualifications their opinion over giving credit approval to authorized civil qualifications were conducted as the methodology of this study. Besides, a conference inviting experts from the relevant fields was held to specifically overview the contents and levels to be examined by qualification items, to conduct a face-to-face survey on directions to take in the credit approval of authorized civil qualifications, and to analyze the level and the degree of the difficulty of questions in the examinations of authorized civil qualifications. The contents and the level of credit approval in this study are as follows. For the authorized civil qualification items unable to formulate criteria in accordance with the principles of credit approval taken in the national technique qualification and other national qualifications, two factors were put under consideration for setting the level of the credit approval. First, the level and scope of work were investigated. Second, the content of qualification was compared with the course work of college. The degree of difficulty in the scope and performance of work was reviewed by specialized qualification and general qualification, respectively. Specialized qualification indicates whether or not the required knowledge and technique are acquired for performing duty in specific work fields. It falls into service fields and qualification items except qualification items on general clerical work of the national technique qualification and other national qualifications. To the contrary, general qualification is to prove the degree of acquisition of knowledge and technique for improving the basic competencies throughout diverse types of occupations. It includes competencies to verify language proficiency, mathematical and statistical capacity, problem settlement, negotiation and communication skills. When the authorized civil qualification came under the specialized qualification, the level of qualification was determined in comparison with the level of work of national qualifications. In the case of the general qualification, the credit to be approved was settled by conducting a comparative analysis on the course work of college.

A Study on the Motive of Escape from the North Korea and the Life Situation of Female Fugitives in China - based on the Interview with North Korean Female Refugees in Yenben Province - (북한 여성들의 탈북동기와 생활실태 - 중국 연변지역의 탈북 여성들을 중심으로 -)

  • 문숙재;김지희;이명근
    • Journal of the Korean Home Economics Association
    • /
    • v.38 no.5
    • /
    • pp.137-152
    • /
    • 2000
  • North Korean fugitives is one of various nominations referring to the North Koreans who have secretly crossed the territorial border of their country. It is a new terminology that huts gained wider usage in our society as we entered the 1990s. North Koreans list various motives for escaping their county, such as food shortage and disillusionment of belief in the system. Most of the forced repatriation of North Korean escapees takes place in China. The purpose of this study examines the family knife of female fugitives from North Korea in order to provide pertinent alterntives which are needed to secure basic human right of the female fugitives and enable them to keep stability of their family lives and to adapt themselves into new socio-cultural circumstances in China. For this, the preliminary survey performed to examine the demographic characteristics on the female fugitives; to find out the incentives and channels of their escape out of North Korea; to investigate what types of family life and family relationship they manage in China; to grasp their problems and need of family life in adaptation into Chinese society. The specific questions for grasping the general characteristics of the female fugitives are composed of age, education level residential district in North Korea. In order to find out main causes and influential factors of their escape from North Korea, the following questions are included: what the most important incentives and motives are; the frequency of escape; and whether they discuss their escape with their family or not. The questions to find out their present actual life situations in China are about difficult things to adjust in China, family life, relationship with husband, and their conversational diction, the degree of their mastering the chinese language, the degree of their adaptation to chinese way of living, and so forth, which reveal to what extent they are adapted themselves to new cultural situation in China. This study collected the data through face-to-face personal interview from July to October, 1999 Yenben province along the China-North Korea border. Data from 202 female fugitives were used in final analysis. This study uses the SAS PC program for windows, Ver, 6.12 to analyze the data such as the distribution of frequency, percentage, mean and so on. The results from this analysis are follows; the most principal motive of North Korean women's escape to china is to eat to live because of famine. Concerning the year when the fugitives escape from North Korea, all of the interviewees haute escaped since 1990. After escape their continual contact with their family in North Korea, 81.7% of the respondent have not been in touch with their family. The main reasons for their not contacting with their family in North Korea are that it is not helpful although they contacts with their family. Female fugitives from North Korea have difficulties in life. They have rather stable relationship to their husband, but they have experienced difficulties in other aspects of family life. Their main difficulties are largely from their relationships to husbands'family members, and from the problems relate to their family in North Korea, and their children. Based on this study, further research has to present supportive policies that help North Korean female escapees live without being deprived and protect their human rights. And the development of practical program to help their efficient social adaptation has to be continued without stop together.

  • PDF

Citing Behavior of Korean Scientists on Foreign Journals in KSCD (KSCD를 활용한 국내 과학기술자의 해외 학술지 인용행태 연구)

  • Kim, Byung-Kyu;Kang, Mu-Yeong;Choi, Seon-Heui;Kim, Soon-Young;You, Beom-Jong;Shin, Jae-Do
    • Journal of the Korean Society for information Management
    • /
    • v.28 no.2
    • /
    • pp.117-133
    • /
    • 2011
  • There have been little comprehensive research for studying impact of foreign journals on Korean scientists. The main reason for this is because there was no extensive citation index database of domestic journals for analysis. Korea Institute of Science and Technology Information (KISTI) built the Korea Science Citation Database (KSCD), and have provided Korea Science Citation Index (KSCI) and Korea Journal Citation Reports (KJCR) services. In this article, citing behavior of Korean scientists on foreign journals was examined by using KSCD that covers Korean core journals. This research covers (1) analysis of foreign document types cited, (2) analysis of citation counts of foreign journals by subject and the ratio of citing different disciplines, (3) analysis of language and country of foreign documents cited, (4) analysis of publishers of journals and whether or not journals are listed on global citation index services and (5) analysis for current situation of subscribing to foreign electronic journals in Korea. The results of this research would be useful for establishing strategies for licensing foreign electronic journals and for information services. From this research, immediacy citation rate (average 1.46%), peak-time (average 3.9 years) and half-life (average 8 years) of cited foreign journals were identified. It was also found that Korean scientistis tend to cite journals covered in SCI(E) or SCOPUS, and 90% of cited foreign journals have been licensed by institutions in Korea.

Understanding the Mismatch between ERP and Organizational Information Needs and Its Responses: A Study based on Organizational Memory Theory (조직의 정보 니즈와 ERP 기능과의 불일치 및 그 대응책에 대한 이해: 조직 메모리 이론을 바탕으로)

  • Jeong, Seung-Ryul;Bae, Uk-Ho
    • Asia pacific journal of information systems
    • /
    • v.22 no.2
    • /
    • pp.21-38
    • /
    • 2012
  • Until recently, successful implementation of ERP systems has been a popular topic among ERP researchers, who have attempted to identify its various contributing factors. None of these efforts, however, explicitly recognize the need to identify disparities that can exist between organizational information requirements and ERP systems. Since ERP systems are in fact "packages" -that is, software programs developed by independent software vendors for sale to organizations that use them-they are designed to meet the general needs of numerous organizations, rather than the unique needs of a particular organization, as is the case with custom-developed software. By adopting standard packages, organizations can substantially reduce many of the potential implementation risks commonly associated with custom-developed software. However, it is also true that the nature of the package itself could be a risk factor as the features and functions of the ERP systems may not completely comply with a particular organization's informational requirements. In this study, based on the organizational memory mismatch perspective that was derived from organizational memory theory and cognitive dissonance theory, we define the nature of disparities, which we call "mismatches," and propose that the mismatch between organizational information requirements and ERP systems is one of the primary determinants in the successful implementation of ERP systems. Furthermore, we suggest that customization efforts as a coping strategy for mismatches can play a significant role in increasing the possibilities of success. In order to examine the contention we propose in this study, we employed a survey-based field study of ERP project team members, resulting in a total of 77 responses. The results of this study show that, as anticipated from the organizational memory mismatch perspective, the mismatch between organizational information requirements and ERP systems makes a significantly negative impact on the implementation success of ERP systems. This finding confirms our hypothesis that the more mismatch there is, the more difficult successful ERP implementation is, and thus requires more attention to be drawn to mismatch as a major failure source in ERP implementation. This study also found that as a coping strategy on mismatch, the effects of customization are significant. In other words, utilizing the appropriate customization method could lead to the implementation success of ERP systems. This is somewhat interesting because it runs counter to the argument of some literature and ERP vendors that minimized customization (or even the lack thereof) is required for successful ERP implementation. In many ERP projects, there is a tendency among ERP developers to adopt default ERP functions without any customization, adhering to the slogan of "the introduction of best practices." However, this study asserts that we cannot expect successful implementation if we don't attempt to customize ERP systems when mismatches exist. For a more detailed analysis, we identified three types of mismatches-Non-ERP, Non-Procedure, and Hybrid. Among these, only Non-ERP mismatches (a situation in which ERP systems cannot support the existing information needs that are currently fulfilled) were found to have a direct influence on the implementation of ERP systems. Neither Non-Procedure nor Hybrid mismatches were found to have significant impact in the ERP context. These findings provide meaningful insights since they could serve as the basis for discussing how the ERP implementation process should be defined and what activities should be included in the implementation process. They show that ERP developers may not want to include organizational (or business processes) changes in the implementation process, suggesting that doing so could lead to failed implementation. And in fact, this suggestion eventually turned out to be true when we found that the application of process customization led to higher possibilities of failure. From these discussions, we are convinced that Non-ERP is the only type of mismatch we need to focus on during the implementation process, implying that organizational changes must be made before, rather than during, the implementation process. Finally, this study found that among the various customization approaches, bolt-on development methods in particular seemed to have significantly positive effects. Interestingly again, this finding is not in the same line of thought as that of the vendors in the ERP industry. The vendors' recommendations are to apply as many best practices as possible, thereby resulting in the minimization of customization and utilization of bolt-on development methods. They particularly advise against changing the source code and rather recommend employing, when necessary, the method of programming additional software code using the computer language of the vendor. As previously stated, however, our study found active customization, especially bolt-on development methods, to have positive effects on ERP, and found source code changes in particular to have the most significant effects. Moreover, our study found programming additional software to be ineffective, suggesting there is much difference between ERP developers and vendors in viewpoints and strategies toward ERP customization. In summary, mismatches are inherent in the ERP implementation context and play an important role in determining its success. Considering the significance of mismatches, this study proposes a new model for successful ERP implementation, developed from the organizational memory mismatch perspective, and provides many insights by empirically confirming the model's usefulness.

  • PDF

An Empirical Study on How the Moderating Effects of Individual Cultural Characteristics towards a Specific Target Affects User Experience: Based on the Survey Results of Four Types of Digital Device Users in the US, Germany, and Russia (특정 대상에 대한 개인 수준의 문화적 성향이 사용자 경험에 미치는 조절효과에 대한 실증적 연구: 미국, 독일, 러시아의 4개 디지털 기기 사용자를 대상으로)

  • Lee, In-Seong;Choi, Gi-Woong;Kim, So-Lyung;Lee, Ki-Ho;Kim, Jin-Woo
    • Asia pacific journal of information systems
    • /
    • v.19 no.1
    • /
    • pp.113-145
    • /
    • 2009
  • Recently, due to the globalization of the IT(Information Technology) market, devices and systems designed in one country are used in other countries as well. This phenomenon is becoming the key factor for increased interest on cross-cultural, or cross-national, research within the IT area. However, as the IT market is becoming bigger and more globalized, a great number of IT practitioners are having difficulty in designing and developing devices or systems which can provide optimal experience. This is because not only tangible factors such as language and a country's economic or industrial power affect the user experience of a certain device or system but also invisible and intangible factors as well. Among such invisible and intangible factors, the cultural characteristics of users from different countries may affect the user experience of certain devices or systems because cultural characteristics affect how they understand and interpret the devices or systems. In other words, when users evaluate the quality of overall user experience, the cultural characteristics of each user act as a perceptual lens that leads the user to focus on a certain elements of experience. Therefore, there is a need within the IT field to consider cultural characteristics when designing or developing certain devices or systems and plan a strategy for localization. In such an environment, existing IS studies identify the culture with the country, emphasize the importance of culture in a national level perspective, and hypothesize that users within the same country have same cultural characteristics. Under such assumptions, these studies focus on the moderating effects of cultural characteristics on a national level within a certain theoretical framework. This has already been suggested by cross-cultural studies conducted by scholars such as Hofstede(1980) in providing numerical research results and measurement items for cultural characteristics and using such results or items as they increase the efficiency of studies. However, such national level culture has its limitations in forecasting and explaining individual-level behaviors such as voluntary device or system usage. This is because individual cultural characteristics are the outcome of not only the national culture but also the culture of a race, company, local area, family, and other groups that are formulated through interaction within the group. Therefore, national or nationally dominant cultural characteristics may have its limitations in forecasting and explaining the cultural characteristics of an individual. Moreover, past studies in psychology suggest a possibility that there exist different cultural characteristics within a single individual depending on the subject being measured or its context. For example, in relation to individual vs. collective characteristics, which is one of the major cultural characteristics, an individual may show collectivistic characteristics when he or she is with family or friends but show individualistic characteristics in his or her workplace. Therefore, this study acknowledged such limitations of past studies and conducted a research within the framework of 'theoretically integrated model of user satisfaction and emotional attachment', which was developed through a former study, on how the effects of different experience elements on emotional attachment or user satisfaction are differentiated depending on the individual cultural characteristics related to a system or device usage. In order to do this, this study hypothesized the moderating effects of four cultural dimensions (uncertainty avoidance, individualism vs, collectivism, masculinity vs. femininity, and power distance) as suggested by Hofstede(1980) within the theoretically integrated model of emotional attachment and user satisfaction. Statistical tests were then implemented on these moderating effects through conducting surveys with users of four digital devices (mobile phone, MP3 player, LCD TV, and refrigerator) in three countries (US, Germany, and Russia). In order to explain and forecast the behavior of personal device or system users, individual cultural characteristics must be measured, and depending on the target device or system, measurements must be measured independently. Through this suggestion, this study hopes to provide new and useful perspectives for future IS research.

Existent, but Non-existent Spaces for Others Focusing on Discourse-spaces of a Korean Movie (2016) (존재하지만 존재 않는 타자들의 공간 영화 <죽여주는 여자>의 담론 공간을 중심으로)

  • Jang, Eun Mi;Han, Hee Jeong
    • Korean journal of communication and information
    • /
    • v.84
    • /
    • pp.99-123
    • /
    • 2017
  • We analyzed the movie (2016/ directed by J-yong E), which is entangled in politics of gender, age, class, or sexuality, naming as "spaces of Others", using the concepts of heterotopia of Foucault. Foucault addressed three types of spaces: the realistic space where we currently live, the unrealistic and non-existent utopia, and heterotopia, which functions antithetically to reality. Thus, Foucault's heterotopia can be considered to indicate "heterogeneous spaces" in reality. The Bacchus Lady revolves a 65-year old prostitute So-Young, sells her body to old men at the parks in downtown of Seoul. Old prostitute on streets are often referred as "Bacchus Ladies", because suggest the popular energy drink a bottle of Bacchus while selling sex. The movie represents some minorities such as transgender, Tina and madam of the club, G-spot, migrant women like Camila and Aindu, and a amputee, Dohoon. Through these people's bodies, the problems such as imperials, nations, ethnics, gender, age, class are entangled in the movie. The politics of these points work and construct heterotopias in four spaces of Others. First, the spaces which ageing and death are intersected. Second, the spaces of So-Young for prostitutes, Third, the spaces of So-Young's mothering: she adopted her baby to American when he was a infant, so she have felt guilty. Fourth, the spaces for So-young's quasi-family with Minho, a Kopian boy who was abandoned by Korean father, Dohoon, who is a poor amputee, and Tina, who is a transgender singer. Fifth, the spaces of speech of So-Young as the subaltern: the subaltern does not have the language to express its own experiences. In order to listen to the words of subaltern, we must do the task of measuring the silence. This cinematic representation of So-young as the subaltern makes her speak about her situation. Finally, the spaces constructed by the movie can be connected 'heterotopia of crisis', 'heterotopia of deviation' and 'heterotopia of fantasy'. The spaces of the movie represents lives of Others, nevertheless, So-Young's Otherness through spaces of heterotopia was transformed to an absolute Other by patriarchal traits of cinematic narrative.

  • PDF

User Centered Interface Design of Web-based Attention Testing Tools: Inhibition of Return(IOR) and Graphic UI (웹 기반 주의력 검사의 사용자 인터페이스 설계: 회귀억제 과제와 그래픽 UI를 중심으로)

  • Kwahk, Ji-Eun;Kwak, Ho-Wan
    • Korean Journal of Cognitive Science
    • /
    • v.19 no.4
    • /
    • pp.331-367
    • /
    • 2008
  • This study aims to validate a web-based neuropsychological testing tool developed by Kwak(2007) and to suggest solutions to potential problems that can deteriorate its validity. When it targets a wider range of subjects, a web-based neuropsychological testing tool is challenged by high drop-out rates, lack of motivation, lack of interactivity with the experimenter, fear of computer, etc. As a possible solution to these threats, this study aims to redesign the user interface of a web-based attention testing tool through three phases of study. In Study 1, an extensive analysis of Kwak's(2007) attention testing tool was conducted to identify potential usability problems. The Heuristic Walkthrough(HW) method was used by three usability experts to review various design features. As a result, many problems were found throughout the tool. The findings concluded that the design of instructions, user information survey forms, task screen, results screen, etc. did not conform to the needs of users and their tasks. In Study 2, 11 guidelines for the design of web-based attention testing tools were established based on the findings from Study 1. The guidelines were used to optimize the design and organization of the tool so that it fits to the user and task needs. The resulting new design alternative was then implemented as a working prototype using the JAVA programming language. In Study 3, a comparative study was conducted to demonstrate the excellence of the new design of attention testing tool(named graphic style tool) over the existing design(named text style tool). A total of 60 subjects participated in user testing sessions where their error frequency, error patterns, and subjective satisfaction were measured through performance observation and questionnaires. Through the task performance measurement, a number of user errors in various types were observed in the existing text style tool. The questionnaire results were also in support of the new graphic style tool, users rated the new graphic style tool higher than the existing text style tool in terms of overall satisfaction, screen design, terms and system information, ease of learning, and system performance.

  • PDF