• Title/Summary/Keyword: logic model

Search Result 1,403, Processing Time 0.028 seconds

Criticism of Inherent Ideology in the Storytelling of Car TV Commercials - Focusing on Grandeur's TV Commercial in 2008~2010 (자동차 TV광고의 스토리텔링에 내재된 이데올로기 비판 - 2008~2010년 그랜저 TV광고를 중심으로)

  • Ahn, Soong Beum
    • Cross-Cultural Studies
    • /
    • v.21
    • /
    • pp.113-138
    • /
    • 2010
  • This writing verifies ideology producing unethical stratification or discrimination targeting on Grandeur's TV commercial after 2008. And attempts to point out the utopia desired by those commercials reproduces distorted ideology at Korean society. To achieve this, the analysis model was postulated utilizing narratology and semiotics system in application of methodology. The result of discussion, is that the 2008 'Grandeur New Luxury' commercial can have utilized the inflected patriotism and sexual fantasies as the core strategy of storytelling. The fact trebly othering women's body from the point of view of gender ethics can be pointed out as the biggest problem in this commercial. 2009 'Grandeur New Luxury' frankly stimulates costumer's desire of stratum rise and possessiveness, circulating the logic 'owning a vehicle' is a proof of their existence. Also considering the meaning woman narration takes up in corresponding commercial, criticism utilizing feminine signifier as a tool to reinforce male success legend was available. Finally 2010 'The Luxury Grandeur' commercial was able to make a judgement using the mechanism of present consumption culture cleverly which Baudrilliard and Althusser has critically recognized. Because commercial images precisely utilizes the mistake called the 'phantasme-$m{\acute{e}}connaissance$' or the 'reconnaissance-$m{\acute{e}}connaissance$' that consumers easily make. Reminding TV commercials exerts control power against unspecified many sitting in front of the TV, continuous studies with same interest are needed in the future. This writing will be able to have a meaning as attempting narratological methodology for analyzing the storytelling of car TV commercials. But systemizing the criticism about the commercial as a single narrative with going through theoretical supplementation is being respected in the future.

An Evaluative Study on Communication Enhancement Program through Social Network Service of Older Adults in the Community (노인의 SNS 활동을 통한 소통증진 프로그램에 대한 평가연구)

  • Shin, Ji Won;Kwon, Ji Sung
    • Korean Journal of Family Social Work
    • /
    • no.58
    • /
    • pp.151-179
    • /
    • 2017
  • The purpose of this study was to evaluate the communication enhancement program through Social Network Service(SNS) of older adults in the community. This program was mainly designed for improving self-efficacy of older adults and enhancing their communication in the community by using SNS. This program was composed of several sub-programs; understanding the value of communication, meeting with SNS users, SNS education and practice, having activities with SNS, promoting SNS, holding public rehearsals and starting ceremony, and having off-line meeting. This study applied analytical framework based on logic model of systems theory, collected data from the subject group, and evaluated the sub-programs on dimensions of process and outcome. The results showed that this program has an effect on improving self-efficacy through participating SNS activities, enhancing communication through boosting SNS, creating new culture for older adults, and changing attitudes between generations. Based on these results, the practical guidelines for expanding the communication enhancement program through SNS, leading by older adults in the community, were suggested.

Effect of search algorithm execution time analysis education on logical thinking of elementary school student (파이썬을 활용한 탐색 알고리즘 수행시간 분석이 초등학생의 논리성에 미치는 효과)

  • Yang, Yunghoon;Kong, Gipyo;Kim, Jonghoon
    • Journal of The Korean Association of Information Education
    • /
    • v.23 no.2
    • /
    • pp.179-188
    • /
    • 2019
  • The purpose of this study is to develop a Python search algorithm educational program based on execution time to improve the logical thinking of elementary school students. This educational program was developed based on the process of ADDIE model, utilizing the results of pre-demand analysis conducted for 133students in elementary school in ${\bigcirc}{\bigcirc}$. In order to verify the effectiveness of the developed education program, 25 students who participated in the education donation program at ${\bigcirc}{\bigcirc}$ University conducted 42 hours of classes during 6 days. The GALT test was used to analyze the educational effects of the pre- and post-test. The results of the analysis show that the SW education program developed in this study can positively affect the logic of elementary school students.

Design of AES-Based Encryption Chip for IoT Security (IoT 보안을 위한 AES 기반의 암호화칩 설계)

  • Kang, Min-Sup
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.1-6
    • /
    • 2021
  • The paper proposes the design of AES-based encryption chip for IoT security. ROM based S-Box implementation occurs a number of memory space and some delay problems for its access. In this approach, S-Box is designed by pipeline structure on composite field GF((22)2) to get faster calculation results. In addition, in order to achieve both higher throughput and less delay, shared S-Box are used in each round transformation and the key scheduling process. The proposed AES crypto-processor is described in Veilog-HDL, and Xilinx ISE 14.7 tool is used for logic synthesis by using Xilinx XC6VLX75T FPGA. In order to perform the verification of the crypto-processor, the timing simulator(ModelSim 10.3) is also used.

Design of Efficient NTT-based Polynomial Multiplier (NTT 기반의 효율적인 다항식 곱셈기 설계)

  • Lee, SeungHo;Lee, DongChan;Kim, Yongmin
    • Journal of IKEEE
    • /
    • v.25 no.1
    • /
    • pp.88-94
    • /
    • 2021
  • Public-key cryptographic algorithms such as RSA and ECC, which are currently in use, have used mathematical problems that would take a long time to calculate with current computers for encryption. But those algorithms can be easily broken by the Shor algorithm using the quantum computer. Lattice-based cryptography is proposed as new public-key encryption for the post-quantum era. This cryptographic algorithm is performed in the Polynomial Ring, and polynomial multiplication requires the most processing time. Therefore, a hardware model module is needed to calculate polynomial multiplication faster. Number Theoretic Transform, which called NTT, is the FFT performed in the finite field. The logic verification was performed using HDL, and the proposed design at the transistor level using Hspice was compared and analyzed to see how much improvement in delay time and power consumption was achieved. In the proposed design, the average delay was improved by 30% and the power consumption was reduced by more than 8%.

International Trends in Public Library Performance Evaluation (해외 공공도서관의 성과평가 동향과 사례 연구)

  • Kwon, Nahyun;Choi, Youngok;Kim, Sun-Ae;Kim, Sin-Young
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.2
    • /
    • pp.111-130
    • /
    • 2021
  • The purpose of this study is to examine international trends in performance evaluation of public libraries. We examined major theoretical models for performance evaluation and its measurement guidelines and tools in the literature. We also conducted case studies to investigate actual practices in major regional public library systems in the United States. In-depth interviews with library staff were conducted in three large U.S. public library systems along with analyses of both internal and public documents. The results of the study inform that the most noticeable trend of performance evaluation was to assess the impact of public library in the lives of citizens and the society. Guidelines and methods to measure intangible impact were developed in both international and national levels. These efforts were also found at the local library levels. While the outcome and impact measures were found to be direct reflections of strategic goals of the library systems, actual impact measures have yet to be refined in actual library practices.

Real-Time Fault Detection in Discrete Manufacturing Systems Via LSTM Model based on PLC Digital Control Signals (PLC 디지털 제어 신호를 통한 LSTM기반의 이산 생산 공정의 실시간 고장 상태 감지)

  • Song, Yong-Uk;Baek, Sujeong
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.2
    • /
    • pp.115-123
    • /
    • 2021
  • A lot of sensor and control signals is generated by an industrial controller and related internet-of-things in discrete manufacturing system. The acquired signals are such records indicating whether several process operations have been correctly conducted or not in the system, therefore they are usually composed of binary numbers. For example, once a certain sensor turns on, the corresponding value is changed from 0 to 1, and it means the process is finished the previous operation and ready to conduct next operation. If an actuator starts to move, the corresponding value is changed from 0 to 1 and it indicates the corresponding operation is been conducting. Because traditional fault detection approaches are generally conducted with analog sensor signals and the signals show stationary during normal operation states, it is not simple to identify whether the manufacturing process works properly via conventional fault detection methods. However, digital control signals collected from a programmable logic controller continuously vary during normal process operation in order to show inherent sequence information which indicates the conducting operation tasks. Therefore, in this research, it is proposed to a recurrent neural network-based fault detection approach for considering sequential patterns in normal states of the manufacturing process. Using the constructed long short-term memory based fault detection, it is possible to predict the next control signals and detect faulty states by compared the predicted and real control signals in real-time. We validated and verified the proposed fault detection methods using digital control signals which are collected from a laser marking process, and the method provide good detection performance only using binary values.

Design of Lightweight S-Box for Low Power AES Cryptosystem (저전력 AES 암호시스템을 위한 경량의 S-Box 설계)

  • Lee, Sang-Hong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.1
    • /
    • pp.1-6
    • /
    • 2022
  • In this paper, the design of lightweight S-Box structure for implementing a low power AES cryptosystem based on composite field. In this approach, the S-Box is designed as a simple structure by which the three modules of x2, λ, and GF((22)2) merge into one module for improving the usable area and processing speed on GF(((22)2)2). The designed AES S-Box is modelled in Veilog-HDL at structural level, and a logic synthesis is also performed through the use of Xilinx ISE 14.7 tool, where Spartan 3s1500l is used as a target FPGA device. It is shown that the designed S-Box is correctly operated through simulation result, where ModelSim 10.3. is used for performing timing simulation.

Methodology for estimating the damage rate of equipment mounted on the warship (해상 플랫폼 탑재장비 손실률 산정 방법 - 워게임모델 적용을 중심으로 -)

  • Jeong Kwan, Yang;Bong Seok, Kim;Ji Hoon, Kyung;Hyun Shik, Oh
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.18 no.2
    • /
    • pp.108-116
    • /
    • 2022
  • Accurately predicting wartime resources requirements and preparing war supplies in peacetime is an important task that can determine the outcome of the war by guaranteeing the duration of the operation. The wartime warship damage rate is a measure of estimating the battle damage of our warships in the process of performing battles to achieve the war goal. In the previously studied wartime warship damage rate estimation method, when damage occurs, long-term repair is required due to the complexity and specificity of the ship structure. Only the case of a complete defeat at the level of sinking was defined as a damage, and even if it was impossible to perform a maritime operation mission, it was not estimated as a damage if the level of sinking was not reached. Therefore, in order to improve the reliability of the wartime warship damage rate, the equipment damage assessment level can be estimated based on the warhead weight of the threat weapon system, the vulnerability rate of the warship's equipment, and the warship's hull. In the future, it is expected that the estimation methodology proposed in this study will be used as a simulation logic when developing a model for analyzing the wartime resources requirements for the warship's equipment and hull.

Multi-layer Structure Based QCA Half Adder Design Using XOR Gate (XOR 게이트를 이용한 다층구조의 QCA 반가산기 설계)

  • Nam, Ji-hyun;Jeon, Jun-Cheol
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.3
    • /
    • pp.291-300
    • /
    • 2017
  • Quantum-dot cellular automata(QCA) is a computing model designed to be similar to cellular automata, and an alternative technology for next generation using high performance and low power consumption. QCA is undergoing various studies with recent experimental results, and it is one of the paradigms of transistors that can solve device density and interconnection problems as nano-unit materials. An XOR gate is a gate that operates so that the result is true when either one of the logic is true. The proposed XOR gate consists of five layers. The first layer consists of OR gates, the third and fifth layers consist of AND gates, and the second and fourth layers are designed as passages in the middle. The half adder consists of an XOR gate and an AND gate. The proposed half adder is designed by adding two cells to the proposed XOR gate. The proposed half adder consists of fewer cells, total area, and clock than the conventional half adder.