• Title/Summary/Keyword: place-identify

Search Result 680, Processing Time 0.036 seconds

A Study on the Meaning and Cultural Properties Value of Rock-Go-Board from the Viewpoint of Site and Location Characteristics (입지와 장소 특성으로 본 암각바둑판의 의미와 문화재적 가치)

  • Park, Joo Sung;Rho, Jae Hyun;Sim, Woo Kyung
    • Korean Journal of Heritage: History & Science
    • /
    • v.44 no.4
    • /
    • pp.172-205
    • /
    • 2011
  • Go bears significant meanings in terms of cultural and entertaining functions in Asia Eastern such as China and Japan. Beyond the mere entertaining level, it produces philosophical and mythic discourse as well. As a part of effort to seek an identity of Korean traditional garden culture, this study traced back to find meanings of rock-go-board and taste for the arts which ancestors pursued in playing Go game, through analysis and interpretation of correlation among origin of place name, nearby scenery, carved letters and vicinal handed-down place name. At the same time, their position, shape and location types were interpreted through comprehensive research and analysis of stone-go-boards including rock-go-board. Particularly, it focused on the rock names related to Sundoism(仙道) Ideal world, fixed due to a connection between traces of Sundoism and places in a folk etymology. Series of this work is to highlight features of the immortal sceneries, one of traditional landscaping ideals, by understanding place identity and scenic features of where the rock-go-boards are carved. These works are expected to become foundation for promotion and preservation of the traditional landscaping remains. The contents of this study could be summarized as follows; First, round stone and square board for round sky and angled land, black and white color for harmony of yin and yang and 361paths for rotating sky are symbols projecting order of universe. Sayings of Gyuljungjirak(橘中之樂), Sangsansaho(商山四皓), Nangagosa(爛柯故事) formed based on the idea of eternity stand for union of sky and sun. It indicates Go game which matches life and nature spatiotemporally and elegant taste for arts pursuing beauty and leisure. Second, the stone-go-boards found through this research, are 18 in total. 3 of those(16.1%), Gangjin Weolnamsaji, Yangsan Sohanjeong and Banryongdae ones were classified into movable Seokguk and 15(83.9%) including Banghakdong were turned out to be non-movable rock-go-boards carved on natural rocks. Third, upon the result of materializing location types of rock-go-boards, 15 are mountain stream type(83.9%) and 3 are rock peak type(16.1%). Among those, the one at Sobaeksam Sinseonbong is located at the highest place(1,389m). Considering the fact that all of 15 rock-go-boards were found at mountainous areas lower than 500m, it is recognizable that where the Go-boards are the parts of the living space, not far from secular world. Fourth, there are 7 Sunjang(巡將) Go with 17 Hwajeoms(花點), which is a traditional Go board type, but their existences, numbers and shapes of Hwajeom appear variously. Based on the fact, it is recognizable that culture of making go-board had been handed down for an extended period of time. Among the studied rock-goboards, the biggest one was Muju Sasunam[$80(82)cm{\times}80(82)cm$] while the smallest one was Yangsan Sohandjeong Seokguk ($40cm{\times}40cm$). The dimension of length and breadth are both $49cm{\times}48cm$ on average, which is realistic size for actual Go play. Fifth, the biggest bed rock, an under-masonry with carved Go-board on it, was one in Muju Sasunam[$8.7m{\times}7.5m(65.25m^2)$], followed by ones in Hoengseong Chuiseok[$7.8m{\times}6.3m(49.14m^2$] and Goisan Sungukam[$6.7m{\times}5.7m(37.14m^2)$]. Meanwhile, the smallest rock-go-board was turned out to be one in Seoul Banghak-dong. There was no consistency in directions of the Go-boards, which gives a hint that geographical features and sceneries of locations were considered first and then these were carved toward an optimal direction corresponding to the conditions. Sixth, rock-go-boards were all located in valleys and peaks of mountains with breathtaking scenery. It seems closely related to ancestors' taste for arts. Particularly, rock-go-boards are apprehended as facilities related to taste for arts for having leisure in many mountains and big streams under the idea of union of sky and human as a primitive communal line. Go became a medium of hermits, which is a traditional image of Go-game, and symbol of amusement and entertainment with the idea that Go is an essence of scholar culture enabling to reach the Tao of turning back to nature. Seventh, the further ancient time going back to, the more dreamlike the Go-boards are. It is an evident for that Sundoism, which used to be unacceptable once, became more visible and realistic. Considering the high relation between rock-go-boards and Sundoism relevant names such as Sundoism peak in Danyang Sobaeksan, 4 hermits rock in Muju and Sundoism hermit rock in Jangsu, Sundoism hermit rocks and rock-go-boards are sceneries and observation spots to express a communication of worship and longing for Sundoism. Eighth, 3 elements-physical environment such as location type of the rock-go-boards, human activities concentrated on 8 sceneries and Dongcheongugok(洞天九曲) setup and relevancy to Confucian scholars, as well as 'Sangsansaho' motif and 'Nangagosa' symbolic meaning were used as interpretation tools in order to judge the place identity. Upon the result, spatial investigation is required with respect to Sunyoodongcheon(仙遊洞天) concept based on enjoyment to unify with the nature rather than Dongcheongugok concept of neo-Confucian, for Dongcheon and Dongmoon(洞門) motives carved around the rock-go-boards. Generally, places where mountain stream type rock-go-boards were formed were hermit spaces of Confucianism or Sundoism. They are considered to have compromised one other with the change of times. Particularly, in the rock-go-board at the mountain peak, sublimity-oriented advent of Sundoism is considered as a significant factor to control place identity. Ninth, including where the rock-go-boards were established, the vicinal areas are well-known as parts of Dongcheongugok and Palkyung(八景) mostly. In addition, many of Sundoism relevant expressions were discovered even in the neighboring carvings written by scholars and nobility, which means sophisticated taste based on longing for Sundoism world played a significant role in making go-board. The rock-go-board is an integration of cultural phenomena naturally managed by seclusion of scholars in the Joseon Dynasty as well as remains and essence of Korean traditional landscaping. Some rock-go-boards out of 17 discovered in South Korea, including ones in Sobaeksan Sinsunbong, Banghak-dong, Chungju Gongili, Muju Sasunam, Yangsan Eogokdong Banryongdae Seokguk, are damaged such as cracks in rocks or fainted lines by hardships of time and hand stains. Worse yet, in case of Eunyang Bangudae Jipcheongjeong board, it is very difficult to identify the shape due to being buried. Rock-go-boards are valuable sculptures in terms of cultural asset and artwork since they reflect ancestors' love for nature and longing for Sundoism world. Therefore, they should be maintained properly with right preservation method. Not only rock-boards itself but also peripheral places are excellent cultural heritages and crucial cultural assets. In addition, vicinal sceneries of where rock-goboards and pavilion spots are the representative remains of embracing prototype of Korean traditional landscaping and major parts of cultural properties.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

An Analysis of the Moderating Effects of User Ability on the Acceptance of an Internet Shopping Mall (인터넷 쇼핑몰 수용에 있어 사용자 능력의 조절효과 분석)

  • Suh, Kun-Soo
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.27-55
    • /
    • 2008
  • Due to the increasing and intensifying competition in the Internet shopping market, it has been recognized as very important to develop an effective policy and strategy for acquiring loyal customers. For this reason, web site designers need to know if a new Internet shopping mall(ISM) will be accepted. Researchers have been working on identifying factors for explaining and predicting user acceptance of an ISM. Some studies, however, revealed inconsistent findings on the antecedents of user acceptance of a website. Lack of consideration for individual differences in user ability is believed to be one of the key reasons for the mixed findings. The elaboration likelihood model (ELM) and several studies have suggested that individual differences in ability plays an moderating role on the relationship between the antecedents and user acceptance. Despite the critical role of user ability, little research has examined the role of user ability in the Internet shopping mall context. The purpose of this study is to develop a user acceptance model that consider the moderating role of user ability in the context of Internet shopping. This study was initiated to see the ability of the technology acceptance model(TAM) to explain the acceptance of a specific ISM. According to TAM. which is one of the most influential models for explaining user acceptance of IT, an intention to use IT is determined by usefulness and ease of use. Given that interaction between user and website takes place through web interface, the decisions to accept and continue using an ISM depend on these beliefs. However, TAM neglects to consider the fact that many users would not stick to an ISM until they trust it although they may think it useful and easy to use. The importance of trust for user acceptance of ISM has been raised by the relational views. The relational view emphasizes the trust-building process between the user and ISM, and user's trust on the website is a major determinant of user acceptance. The proposed model extends and integrates the TAM and relational views on user acceptance of ISM by incorporating usefulness, ease of use, and trust. User acceptance is defined as a user's intention to reuse a specific ISM. And user ability is introduced into the model as moderating variable. Here, the user ability is defined as a degree of experiences, knowledge and skills regarding Internet shopping sites. The research model proposes that the ease of use, usefulness and trust of ISM are key determinants of user acceptance. In addition, this paper hypothesizes that the effects of the antecedents(i.e., ease of use, usefulness, and trust) on user acceptance may differ among users. In particular, this paper proposes a moderating effect of a user's ability on the relationship between antecedents with user's intention to reuse. The research model with eleven hypotheses was derived and tested through a survey that involved 470 university students. For each research variable, this paper used measurement items recognized for reliability and widely used in previous research. We slightly modified some items proper to the research context. The reliability and validity of the research variables were tested using the Crobnach's alpha and internal consistency reliability (ICR) values, standard factor loadings of the confirmative factor analysis, and average variance extracted (AVE) values. A LISREL method was used to test the suitability of the research model and its relating six hypotheses. Key findings of the results are summarized in the following. First, TAM's two constructs, ease of use and usefulness directly affect user acceptance. In addition, ease of use indirectly influences user acceptance by affecting trust. This implies that users tend to trust a shopping site and visit repeatedly when they perceive a specific ISM easy to use. Accordingly, designing a shopping site that allows users to navigate with heuristic and minimal clicks for finding information and products within the site is important for improving the site's trust and acceptance. Usefulness, however, was not found to influence trust. Second, among the three belief constructs(ease of use, usefulness, and trust), trust was empirically supported as the most important determinants of user acceptance. This implies that users require trustworthiness from an Internet shopping site to be repeat visitors of an ISM. Providing a sense of safety and eliminating the anxiety of online shoppers in relation to privacy, security, delivery, and product returns are critically important conditions for acquiring repeat visitors. Hence, in addition to usefulness and ease of use as in TAM, trust should be a fundamental determinants of user acceptance in the context of internet shopping. Third, the user's ability on using an Internet shopping site played a moderating role. For users with low ability, ease of use was found to be a more important factors in deciding to reuse the shopping mall, whereas usefulness and trust had more effects on users with high ability. Applying the EML theory to these findings, we can suggest that experienced and knowledgeable ISM users tend to elaborate on such usefulness aspects as efficient and effective shopping performance and trust factors as ability, benevolence, integrity, and predictability of a shopping site before they become repeat visitors of the site. In contrast, novice users tend to rely on the low elaborating features, such as the perceived ease of use. The existence of moderating effects suggests the fact that different individuals evaluate an ISM from different perspectives. The expert users are more interested in the outcome of the visit(usefulness) and trustworthiness(trust) than those novice visitors. The latter evaluate the ISM in a more superficial manner focusing on the novelty of the site and on other instrumental beliefs(ease of use). This is consistent with the insights proposed by the Heuristic-Systematic model. According to the Heuristic-Systematic model. a users act on the principle of minimum effort. Thus, the user considers an ISM heuristically, focusing on those aspects that are easy to process and evaluate(ease of use). When the user has sufficient experience and skills, the user will change to systematic processing, where they will evaluate more complex aspects of the site(its usefulness and trustworthiness). This implies that an ISM has to provide a minimum level of ease of use to make it possible for a user to evaluate its usefulness and trustworthiness. Ease of use is a necessary but not sufficient condition for the acceptance and use of an ISM. Overall, the empirical results generally support the proposed model and identify the moderating effect of the effects of user ability. More detailed interpretations and implications of the findings are discussed. The limitations of this study are also discussed to provide directions for future research.

Rural Migration and Changes of Agricultural Population (농민이촌(農民離村)과 농업인구(農業人口)의 변화(變化))

  • Wu, Tsong-Shien;Kim, Kuong-Ho
    • Korean Journal of Agricultural Science
    • /
    • v.1 no.1
    • /
    • pp.91-116
    • /
    • 1974
  • Taiwan agricultural development in the last decade has not been changed much since the accomplishment of land reform program. This is mainly due to the rapid development taken place within industry that agricultural development can not keep pace with. The increasing gap of rural-urban income discrepancy has caused socio-psychological unstability among rural people and inspire wants of out-migration. From 1961 to 1970, population of the ten largest cities showed an annual growth rate of 4.05%, while the population of the remainder of Taiwan showed 2.06%. Assuming the natural increase rate of these two population sections are similar, the difference of rural and urban annual growth rate can be at tributed to the flow of people from rural to urban sectors. The main objective of this paper is to identify the amount of agricultural out-migration and its impact on agricultural development and agricultural extension programs. Specifically, the objectives are to examine (1) rural-urban population composition (2) rural out-migration estimation (3) changes of agricultural population, and (4) implications for agricultural development and extension programs Some of the important findings are listed below; (1) The average agricultural out migration of the period 1960-1969 is estimated at around 60,000 per year. Take Tainan prefecture for example, the Male-Female Migration Ratio is 0.39 for age 20-24, 0.55 for age 25-29, 0.90 for 30-34. It is understood between age 20 and 34, the rural female migration rate is higher than the rural male. (2) Based on the population growth rate of 1950-1969, agricultural population is projected for the period of 1953 to 1989. By 1978, the agricultural population will reach its peak and begin to dedaine from 1980. The projected agricultural population in 1989 is 5,847,566 which occupies 29% of the Taiwan total population. (3) Assuming area of cultivated land keep unchanged as 905,263 ha. in 1970, and tif we can eliminate all 72% of part-time farms, then the average farm acreage for hose full-time farms will be increased to 3.6 hactares. This is unlikely to happen before 1989 without the government interference. (4) Less than 10% of adult farmer s of age 25-64 in 1969 enrolled in Farm Discussion Club, only 5% of adult farm women enrolled in Home Economics Club, and 5% of rural youth enrolled in 4-H Club. These statistics show a fact that only few farmers are reached by extension workers. Based on findings in this paper, some important suggestions are listed for future agricultural development. (1) Improve agricultural structure by decreasing agricultural population (a) Encourage farmers with less than 0.5 ha. of land to seek jobs outside of agriculture (b) Encourage joint cultivation and farm mechanization (c) Discourage rural migrants to Keep farm land (d) Provide occupational guidance program through extension education programs (2) Establish future farmers settlement project to assure rural youth have enough resources for farming. (3) An optimum Population policy should be integrated into rural socio-economic development and national development programs.

  • PDF

APPLICATION OF FUZZY SET THEORY IN SAFEGUARDS

  • Fattah, A.;Nishiwaki, Y.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1051-1054
    • /
    • 1993
  • The International Atomic Energy Agency's Statute in Article III.A.5 allows it“to establish and administer safeguards designed to ensure that special fissionable and other materials, services, equipment, facilities and information made available by the Agency or at its request or under its supervision or control are not used in such a way as to further any military purpose; and to apply safeguards, at the request of the parties, to any bilateral or multilateral arrangement, or at the request of a State, to any of that State's activities in the field of atomic energy”. Safeguards are essentially a technical means of verifying the fulfilment of political obligations undertaken by States and given a legal force in international agreements relating to the peaceful uses of nuclear energy. The main political objectives are: to assure the international community that States are complying with their non-proliferation and other peaceful undertakings; and to deter (a) the diversion of afeguarded nuclear materials to the production of nuclear explosives or for military purposes and (b) the misuse of safeguarded facilities with the aim of producing unsafeguarded nuclear material. It is clear that no international safeguards system can physically prevent diversion. The IAEA safeguards system is basically a verification measure designed to provide assurance in those cases in which diversion has not occurred. Verification is accomplished by two basic means: material accountancy and containment and surveillance measures. Nuclear material accountancy is the fundamental IAEA safeguards mechanism, while containment and surveillance serve as important complementary measures. Material accountancy refers to a collection of measurements and other determinations which enable the State and the Agency to maintain a current picture of the location and movement of nuclear material into and out of material balance areas, i. e. areas where all material entering or leaving is measurab e. A containment measure is one that is designed by taking advantage of structural characteristics, such as containers, tanks or pipes, etc. To establish the physical integrity of an area or item by preventing the undetected movement of nuclear material or equipment. Such measures involve the application of tamper-indicating or surveillance devices. Surveillance refers to both human and instrumental observation aimed at indicating the movement of nuclear material. The verification process consists of three over-lapping elements: (a) Provision by the State of information such as - design information describing nuclear installations; - accounting reports listing nuclear material inventories, receipts and shipments; - documents amplifying and clarifying reports, as applicable; - notification of international transfers of nuclear material. (b) Collection by the IAEA of information through inspection activities such as - verification of design information - examination of records and repo ts - measurement of nuclear material - examination of containment and surveillance measures - follow-up activities in case of unusual findings. (c) Evaluation of the information provided by the State and of that collected by inspectors to determine the completeness, accuracy and validity of the information provided by the State and to resolve any anomalies and discrepancies. To design an effective verification system, one must identify possible ways and means by which nuclear material could be diverted from peaceful uses, including means to conceal such diversions. These theoretical ways and means, which have become known as diversion strategies, are used as one of the basic inputs for the development of safeguards procedures, equipment and instrumentation. For analysis of implementation strategy purposes, it is assumed that non-compliance cannot be excluded a priori and that consequently there is a low but non-zero probability that a diversion could be attempted in all safeguards ituations. An important element of diversion strategies is the identification of various possible diversion paths; the amount, type and location of nuclear material involved, the physical route and conversion of the material that may take place, rate of removal and concealment methods, as appropriate. With regard to the physical route and conversion of nuclear material the following main categories may be considered: - unreported removal of nuclear material from an installation or during transit - unreported introduction of nuclear material into an installation - unreported transfer of nuclear material from one material balance area to another - unreported production of nuclear material, e. g. enrichment of uranium or production of plutonium - undeclared uses of the material within the installation. With respect to the amount of nuclear material that might be diverted in a given time (the diversion rate), the continuum between the following two limiting cases is cons dered: - one significant quantity or more in a short time, often known as abrupt diversion; and - one significant quantity or more per year, for example, by accumulation of smaller amounts each time to add up to a significant quantity over a period of one year, often called protracted diversion. Concealment methods may include: - restriction of access of inspectors - falsification of records, reports and other material balance areas - replacement of nuclear material, e. g. use of dummy objects - falsification of measurements or of their evaluation - interference with IAEA installed equipment.As a result of diversion and its concealment or other actions, anomalies will occur. All reasonable diversion routes, scenarios/strategies and concealment methods have to be taken into account in designing safeguards implementation strategies so as to provide sufficient opportunities for the IAEA to observe such anomalies. The safeguards approach for each facility will make a different use of these procedures, equipment and instrumentation according to the various diversion strategies which could be applicable to that facility and according to the detection and inspection goals which are applied. Postulated pathways sets of scenarios comprise those elements of diversion strategies which might be carried out at a facility or across a State's fuel cycle with declared or undeclared activities. All such factors, however, contain a degree of fuzziness that need a human judgment to make the ultimate conclusion that all material is being used for peaceful purposes. Safeguards has been traditionally based on verification of declared material and facilities using material accountancy as a fundamental measure. The strength of material accountancy is based on the fact that it allows to detect any diversion independent of the diversion route taken. Material accountancy detects a diversion after it actually happened and thus is powerless to physically prevent it and can only deter by the risk of early detection any contemplation by State authorities to carry out a diversion. Recently the IAEA has been faced with new challenges. To deal with these, various measures are being reconsidered to strengthen the safeguards system such as enhanced assessment of the completeness of the State's initial declaration of nuclear material and installations under its jurisdiction enhanced monitoring and analysis of open information and analysis of open information that may indicate inconsistencies with the State's safeguards obligations. Precise information vital for such enhanced assessments and analyses is normally not available or, if available, difficult and expensive collection of information would be necessary. Above all, realistic appraisal of truth needs sound human judgment.

  • PDF

Efficient Topic Modeling by Mapping Global and Local Topics (전역 토픽의 지역 매핑을 통한 효율적 토픽 모델링 방안)

  • Choi, Hochang;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.3
    • /
    • pp.69-94
    • /
    • 2017
  • Recently, increase of demand for big data analysis has been driving the vigorous development of related technologies and tools. In addition, development of IT and increased penetration rate of smart devices are producing a large amount of data. According to this phenomenon, data analysis technology is rapidly becoming popular. Also, attempts to acquire insights through data analysis have been continuously increasing. It means that the big data analysis will be more important in various industries for the foreseeable future. Big data analysis is generally performed by a small number of experts and delivered to each demander of analysis. However, increase of interest about big data analysis arouses activation of computer programming education and development of many programs for data analysis. Accordingly, the entry barriers of big data analysis are gradually lowering and data analysis technology being spread out. As the result, big data analysis is expected to be performed by demanders of analysis themselves. Along with this, interest about various unstructured data is continually increasing. Especially, a lot of attention is focused on using text data. Emergence of new platforms and techniques using the web bring about mass production of text data and active attempt to analyze text data. Furthermore, result of text analysis has been utilized in various fields. Text mining is a concept that embraces various theories and techniques for text analysis. Many text mining techniques are utilized in this field for various research purposes, topic modeling is one of the most widely used and studied. Topic modeling is a technique that extracts the major issues from a lot of documents, identifies the documents that correspond to each issue and provides identified documents as a cluster. It is evaluated as a very useful technique in that reflect the semantic elements of the document. Traditional topic modeling is based on the distribution of key terms across the entire document. Thus, it is essential to analyze the entire document at once to identify topic of each document. This condition causes a long time in analysis process when topic modeling is applied to a lot of documents. In addition, it has a scalability problem that is an exponential increase in the processing time with the increase of analysis objects. This problem is particularly noticeable when the documents are distributed across multiple systems or regions. To overcome these problems, divide and conquer approach can be applied to topic modeling. It means dividing a large number of documents into sub-units and deriving topics through repetition of topic modeling to each unit. This method can be used for topic modeling on a large number of documents with limited system resources, and can improve processing speed of topic modeling. It also can significantly reduce analysis time and cost through ability to analyze documents in each location or place without combining analysis object documents. However, despite many advantages, this method has two major problems. First, the relationship between local topics derived from each unit and global topics derived from entire document is unclear. It means that in each document, local topics can be identified, but global topics cannot be identified. Second, a method for measuring the accuracy of the proposed methodology should be established. That is to say, assuming that global topic is ideal answer, the difference in a local topic on a global topic needs to be measured. By those difficulties, the study in this method is not performed sufficiently, compare with other studies dealing with topic modeling. In this paper, we propose a topic modeling approach to solve the above two problems. First of all, we divide the entire document cluster(Global set) into sub-clusters(Local set), and generate the reduced entire document cluster(RGS, Reduced global set) that consist of delegated documents extracted from each local set. We try to solve the first problem by mapping RGS topics and local topics. Along with this, we verify the accuracy of the proposed methodology by detecting documents, whether to be discerned as the same topic at result of global and local set. Using 24,000 news articles, we conduct experiments to evaluate practical applicability of the proposed methodology. In addition, through additional experiment, we confirmed that the proposed methodology can provide similar results to the entire topic modeling. We also proposed a reasonable method for comparing the result of both methods.

Developing the Process and Characteristics of Preservation of Area-Based Heritage Sites in Japan (일본 면형 유산 보존제도의 확산과정과 특성)

  • Sung, Wonseok;Kang, Dongjin
    • Korean Journal of Heritage: History & Science
    • /
    • v.53 no.4
    • /
    • pp.32-59
    • /
    • 2020
  • South Korea's area-based heritage preservation system originates from the "Preservation of Traditional Buildings Act" enacted in 1984. However, this system was abolished in 1996. As there was a need for protection of ancient cities in the 1960s, Japan enacted the Historic City Preservation Act in 1966, and 'Preservation Areas for Historic Landscapes' and 'Special Preservation Districts for Historic Landscapes' were introduced. For the preservation of area-based heritage sites, the 'Important Preservation Districts for Groups of Traditional Buildings' system introduced as part of the revision of the Cultural Heritage Protection Act in 1975 was the beginning. Then, in the early-2000s, discussions on the preservation of area-based heritage sites began in earnest, and the 'Important Cultural Landscape' system was introduced for protection of the space and context between heritage sites. Also, '33 Groups of Modernization Industry Heritage Sites' were designated in 2007, covering various material and immaterial resources related to the modernization of Japan, and '100 Beautiful Historic Landscapes of Japan' were selected for protection of local landscapes with historic value in the same year. In 2015, the "Japanese Heritage" system was established for the integrated preservation and management of tangible and intangible heritage aspects located in specific areas; in 2016, the "Japanese Agricultural Heritage" system was established for the succession and fostering of the disappearing agriculture and fishery industries; and in 2017, "the 20th Century Heritage," was established, representing evidence of modern and contemporary Japanese technologies in the 20th century. As a result, presently (in September 2020), 30 'Historic Landscape Preservation Areas', 60 'Historic Landscape Special Districts,' 120 'Important Preservation Districts for Groups of Traditional Buildings," 65 'Important Cultural Landscapes,' 66 'Groups of Modernization Industry Heritage Sites,' 264 "100 Beautiful Historic Landscapes of Japan,' 104 'Japanese Heritage Sites,' and 15 'Japanese Agricultural Heritage Sites' have been designated. According to this perception of situations, the research process for this study with its basic purpose of extracting the general characteristics of Japan's area-based heritage preservation system, has sequentially spread since 1976 as follows. First, this study investigates Japan's area-based heritage site preservation system and sets the scope of research through discussions of literature and preceding studies. Second, this study investigates the process of the spread of the area-based heritage site preservation system and analyzes the relationship between the systems according to their development, in order to draw upon their characteristics. Third, to concretize content related to relationships and characteristics, this study involves in-depth analysis of three representative examples and sums them up to identify the characteristics of Japan's area-based heritage system. A noticeable characteristic of Japan's area-based heritage site preservation system drawn from this is that new heritage sites are born each year. Consequently, an overlapping phenomenon takes place between heritage sites, and such phenomena occur alongside revitalization of related industries, traditional industry, and cultural tourism and the improvement of localities as well as the preservation of area-based heritage. These characteristics can be applied as suggestions for the revitalization of the 'modern historical and cultural space' system implemented by South Korea.

A Study of Perspective on Cheon Gwan(天觀) of Toegye (퇴계(退溪)의 천관(天觀) 연구(硏究))

  • Hwang, Sang Hee
    • (The)Study of the Eastern Classic
    • /
    • no.56
    • /
    • pp.147-170
    • /
    • 2014
  • To divide by the concept of Cheon (天) before and after the period of Song Dynasty: before Song Dynasty; according to the ancient Book of Odes (Sigyeong-詩經), "Cheon (天) gives birth to a large number of people", and, Confucius(孔子) say "Cheon(天) gave me Virtue(德)." Mencius(孟子) say "The person done with all his heart knows Seong(性, personality), so if he knows such Seong(性, personality), then he knows Cheon(天)." In Doctrine of the Mean(中庸), it says "Cheon(天) ordered it to be called - Seong(性, personality)." So, Cheon(天) had a religious meaning, such as Sangje(上帝) - Supreme Ruler. During the Song period, Cheon(天), the source of its existence, had construed as Mugeuk i Taegeuk Non(無極而太極論 - Theory of Supreme Ultimate while being Indeterminate) and Theory of li and ki (iginon-理氣論). Juja (朱子, a honorary name of Juhui, 朱熹) had said a reasonable Cheon(天), that is, Heavenly Principle (天理 - Cheolli) by interpreting Cheon(天) as Taegeuk(太極 - Supreme Polarity) and li(理) of Muwi(無爲 - uncontrived action). That's why Juja had lost the religiosity because of his reasonable frame. The purpose of this dissertation is to identify of the quality of being religious of li(理) on the basis of attribute of Cheon(天) argued by Toegye and Juja. In the text of Seomyeong(西銘 - Western Inscription), we can see their interpretation of the content that Toegye as "西銘考證講義"(Lecture on Historical Research of Western Inscription), and Juja as "西銘解"(Commentary on the Western Inscription). Seomyeong(西銘 - Western Inscription) was expounded as a logic of 'iil bunsu' (理一分殊 - coherence is one and distinguished into many). '理一分殊' means to live in as meaningful as possible according to the human nature that has been bestowed upon thyself. Juja and Toegye both said that in the aspect of 'iil'(理一 - coherence is one), Reverence(事天) ought to be done, but to look into the aspect of 'bunsu'(分殊-distinguished into many), Juja argued that people should follow the order of Heavenly Principle(天理 - Cheolli), and Toegye argued that people should have to perform the filial piety(孝). There are differences in methods of Toegye and Juja on account of distinction between attributes of Cheon(天). Such a distinction affects the attribute of li(理). Juja said divisively that Soiyeon(所以然-why its principle is so) is li(理), and Sodangyeon(所當然-what should be so) is Sa(事-divine project). Toegye argued that Sodangyeon(所當然-what should be so) is indeed li(理). It is the position of Toegye that to know Seong(性-the personality) of Sodangyeon(所當然-what should be so) is the first, rather than to know Cheon(天) of Soiyeon(所以然-why its principle is so) that is out of reach in a faraway place. Seong(性-the personality) is li(理) that bestowed by Cheon(天). In view of discussion about the essence and existence, for Toegye, the existence is the first, rather than the essence. The issues of existence is now enabled to talk about amid the discussion of metaphysics, namely li(理). Different from Juja, a theory noticed in Toegye is the theory of 'Lijado'(理自到). 'Lijado'(理自到) denotes 'Li(理) leads on their own.' It tells that separate from thing-in-itself, there is an energy that moves and oversees the thing. This is an issue of response between "I" as the principal agent and other people. If "I" as the principal agent is sincere to others, the others will come to me insomuch as they will be revealed through me. Here, a problem between the host and guest arises. Toegye perceived this problem that do not see me and others as same, and also do not see me and others as two. This is the logic of 'ilii iiil'(一而二 二而一 - looks like one but two, looks like two but one) of '理一分殊' (coherence is one and distinguished into many). The first thing to do between these two processes is to recognize the existence of 'iil'(理一). Toegye strongly displays a religious attitude identifying Cheon(天)=Li (理)=Sangje(上帝- Supreme Ruler) in the same light.

The Conservation Treatment for the Mattress from National Folklore Cultural Heritage, the Red-lacquered Furniture with Inlaid Mother-of-pearl Design Used by Empress Sunjeonghyo and Comparative Study of Manufacturing Techniques (국가민속문화재 전 순정효황후 주칠 나전가구(傳 純貞孝皇后 朱漆 螺鈿家具) 매트리스의 보존처리 및 제작 기법 비교)

  • Park, Hyungho;Kim, Jongsu;Kim, Suchul;Keum, Jongsuk;Jang, Jongmin;Kim, Suha;Park, Changyuel
    • Korean Journal of Heritage: History & Science
    • /
    • v.54 no.1
    • /
    • pp.220-237
    • /
    • 2021
  • This study carried out the conservation treatment for the mattress put on the bed, which is one of 4 items in National Folklore Cultural Heritage, the Red-lacquered Furniture with the inlaid mother-of-pearl design used by Empress Sunjeonghyo (presumed), after identifying the characteristics of the manufacturing techniques and the used materials. And the study intends to compare it with the mattress placed in the Daejojeong in the Changdeokgung Palace in order to identify the characteristics of mattresses domestically used during the 1920s and 1930s. From the analysis of the mattress presumably used by Empress Sunjeonghyo, it was identified that the mattress frame was made of pinaceous hemlock spruce while the webbing and twine in the structural parts were made of jute. The findings are as follows: the burlap had a filling material that was made of jute; the straw mat was made from Oryza; and, the rest of the filling material was cotton. Rayon was used for the top cover while cotton was used for the bottom. As a result of research on the materials and the inner structure, it was found that mattress was manufactured in the form of the upholstery style mainly found in chairs and day-beds in Western furniture. Based on analysis results, materials identical to the original were adopted during the conservation treatment. Next, the process of dismantling, cleaning, repair, reinforcement and assembling was conducted. During the dismantling process, the top cover was newly discovered and some letters (Yokohama, Kobe, and Joseon) were found in the burlap filling, but there was no trace which can clarify its maker or production place. dry cleaning was carried out on the structural parts, filling materials, and the cover, and then the repair and reinforcement were done, preserving the existing materials in the upholstery structure and using the same materials for conservation. The webbing in the structural parts was reinforced using materials identical to the original, and the twine was used for arranging and fixing the springs into wooden frames. For the damaged cotton cloth and burlap, reinforcement materials identical to the original were put over it and sown. For the damaged area of the top cover, reinforcement cloth was cut and then added inside and the damaged area was sown. Assembling was carried out in the reverse order of the dismantling. After the burlap identical to the original material was inserted into the areas in contact with the springs and then fastened, a filling pad, reinforcement cloth, a straw mat, cotton cloth, cotton felt, wide cotton cloth for protecting the cover, and the cover were layered and fastened with tacks. The two mattresses used by Empress Sunjeonghyo differed only by the period of production and followed the same Western upholstery style consisting of the frames, filling materials, and covers. During the conservation treatment process, a velvet cover was newly discovered and the traces of repair in the past were found. Furthermore, identifying straw mats, straw bags, and straws for filling material, this study confirmed changes in the materials used according to the production environment. In the future, it is expected to see changes in the conservation materials during the conservation treatment and manufacturing techniques used for chairs and sofas in the upholstery style belonging to the modern cultural artifacts.

A Study on the Entrepreneurial Intention of College Students in the Entertainment Industry with Idea Education and Support for Startup Infrastructure (아이디어 교육 및 창업 인프라 지원이 엔터테인먼트 산업 분야에 대한 대학생 창업의도 연구)

  • Lee, Ji-Hun
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.8
    • /
    • pp.19-31
    • /
    • 2021
  • This study tried to identify the characteristics of college students' entrepreneurial intentions in the entertainment industry, focusing on existing literature studies. Based on this, it was intended to suggest realistic educational alternatives for university student start-ups and implications for start-up management to university start-up officials and those in charge of national start-up support policy. Therefore, the implications of this study are as follows. First, technology(item) for idea creation education, which is an essential element in the entertainment industry, how to connect ideas and products, technology methods that can increase content value, and user characteristics education within the entertainment industry will need to be continued. In addition, along with the idea education, it is necessary to increase the understanding of start-up business management such as financing, human resource management, marketing, and operation management, and furthermore, confidence education should be provided so that the possibility of success in an entertainment start-up and a sense of adventure in a new job can be developed. Second, the space and equipment necessary for start-up (club room, student start-up room, entertainment-related equipment, etc.) should be provided centering on the opinion survey of students who are interested in starting a business, and various regulations of universities and government for student start-up should be relaxed. will have to In addition, education for the formation of entrepreneurial knowledge inside and outside of the school, special lectures and consultations by experts, and on-the-spot education, etc., should be made to create more practical entrepreneurial knowledge. something to do. Third, for students wishing to start a business in the entertainment industry, it is necessary to inform their families about the field situation of the entertainment industry accurately so that their children can develop a positive perception rather than a negative perception when choosing a business field. In addition, by promoting various successful cases of college students to their families after starting a business, families should be encouraged so that their children can develop a challenging spirit about starting a business. Fourth, it should be possible to form continuous clubs or gatherings with friends who wish to start a business in the entertainment industry, and furthermore, an opportunity to listen to the opinions of friends who actually started a business through these meetings should be provided. In addition, the meeting and the formation of friends should create a place for discussion about writing a business plan, how to succeed in starting a business, and management of startups, and psychological stimulation activities should be conducted so that each other's will to start a business arises. Fifth, various knowledge related to start-up (methods for securing funds, management of start-up organizations, grasping information about the market in which they want to start a business, etc.) should be cultivated, and how to write a business plan for the various entertainment industry fields they want to start up. You will also need to train them to be practical. Also, based on this knowledge formation, students themselves should be able to respond to risks and changes that may occur in entrepreneurship. Lastly, it is necessary to increase the understanding of business start-up management, and various psychological stimulation activities are needed to make the confidence and fear of starting a business disappear.