• Title/Summary/Keyword: space form

Search Result 3,390, Processing Time 0.034 seconds

The Yongsan Governor General Official Residence in Korean Landscape Architectural History (용산 총독관저 정원의 조경사적 의의)

  • Kim, Hai-Gyoung;Yu, Joo-Eun
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.29 no.2
    • /
    • pp.118-129
    • /
    • 2011
  • This study is about the governor general's official residence and its garden in Yongsan that were constructed during the Japanese occupational time. The garden design drawing was also made while planning such Neo-Baroque style building, and it contains particular information of the garden unlike the other existing landscape drawings. The content of garden translated and landscape historical value drawn out by analysis of garden drawings, press articles and literatures are as follows; First, such governor general's official residence garden in Yongsan is likely to be the Korean first western style landscape form. For, from the point that it was completely constructed together with such official residential building in 1909, its construction time should be before that of the garden of Seokjojeon, Deoksu Palace, which was constructed in 1911. Second, it shows the garden style and garden planting factors introduced together with the modern architecture then. Such garden planting factors are placed from the center axis of the garden that is connected to the center of the building and monument as well. Such style and factors cover and show the flower bed appearing in Baroque style gardens, the monument that forms Vista playing the center of audience's vision, water space that is placed symmetrically against the axis, planting pattern that emphasizes the plants' space, flower bed shape and axis, and what kinds of plants were introduced then. Third, it shows the using pattern of western style gardens. Western style garden parties used to take in place in this garden while official dinner and reception were held in the evening in the official residence. Fourth, it shows the historical value as a modern landscape drawing, which is the Korean first landscape drawing that shows the plants' names and planting techniques marking the current height and planned height for change of topography and water system as a water landscape factor. That is, this drawing has the value that it was upgraded from the other existing ones that expressed only simple plants' symbols or flower bed shapes. I, therefore, hope that the studies on the modern landscape would be getting wider by excavation of new historical records in the future.

A Study on Movement Characteristics of Dalgubal Drum Dance (달구벌 북춤 춤사위의 특성에 대한 고찰)

  • Choi, Won-sun
    • (The) Research of the performance art and culture
    • /
    • no.42
    • /
    • pp.147-181
    • /
    • 2021
  • Dalgubal drum dance is inherited in a recreated form by incorporating regional symbolism and the dance philosophy and artisticity of Young Hwangbo, the creator, based on the traditional drum dance of the Yeongnam region. This dance having popularity with the transformation of traditional Korean culture has been invited not only to Yeongnam region including Daegu but also to international various venues. This study explores what the movement characteristics of this Dalgubal drum dance are and the unique charm and symbolic meaning of this dance. Specific analysis was conducted through analyzing Dalgubal drum dance video film of the 89th Korean Myeongmujeon's by using Laban Movement Analysis as a research method. The special features of this dance resulted from the LMA analysis in terms of the four categories-Body, Effort, Shape, and Space-reveal simple yet cheerful personalities and strong yet patient characteristics of the people in Daegu. The harmony of drum sounds(music) and movements(dance) creates various characteristics of dances and reveals the beauty and excitement of unique Korean dance. In particular, drum play and its related dance movements create curved linear spatial pattern of arm movements, Spiral Shape in body posture, and diverse floor patterns occupying whole stage space. These movements show the three-dimensional spatial beauty and the artistic ideas for recreation of traditional drum dance, which considered with the spatial structure of the proscenium stage. In addition, the well-organized structure and harmonious movements of this dance show the traditional Korean philosophy, implying heaven, earth, and human being and the wholeness, and the harmony of yin and yang. The dance aims at communication between the audiences and dancers through sharing excitement and the aesthetic beauty of dance. This can be interpreted as a meaningful expression of traditional Korean philosophy developed with the unique value and characteristics of Korean dance.

A study on animal SHUNJANG in tombs 39 and 63 in Gyo-dong, Changnyeong (창녕 교동 39·63호분 동물순장 연구)

  • KWON Jooyoung;KIM Bosang
    • Korean Journal of Heritage: History & Science
    • /
    • v.55 no.4
    • /
    • pp.56-70
    • /
    • 2022
  • Tombs No. 39 and No. 63 in Gyo-dong, Changnyeong, are unique in the Changnyeong area in that they do not have additional burials because they are hoenggu-style tombs with an entrance on the north side. This study tried to understand the nature and meaning of the two separate stone walls at the entrance of the tomb along with the burial process of the tomb. These two stone walls mark small tombs built independently within a large tomb, with stone wall No. 39 stone wall No. 3 (No.39-3) and No. 63 stone wall No. 3 (No. 63-3). Both units are located in the middle of the northern wall of the burial body part and share one wall with the burial body part wall stone. All animal fluids inside the stone wall were identified. In particular, it was estimated that at least three dogs were buried as a result of identification of animal fluids No. 63-3. Above all, these animals have their heads facing outward with their backs to the main occupants, and do not overlap in a limited space and are placed side by side. Changnyeong Gyo-dong No. 39-3 and 63-3 were created in the process of building the burial body, and although they are independent relics, they form a subordinate relationship in that they were built along the main burial within one tomb. In addition, it is coercive in that it is placed in an orderly manner according to a certain direction in a state that has not been dismantled after killing an animal. Therefore, It is understood to be the SHUNJANG of dogs. Studies on animal fluids excavated from tombs in the Three Kingdoms period are interpreted as animal stewardship, sacrificial collection, and animal sacrifice depending on their location, and this is known as a series of animal sacrifice rites, namely, animal stewardship and sacrifice. This recognition is based on material objectification of animals, such as food or sacrifices. However, Changnyeong Gyo-dong No. 39-3 and 63-3 are different in that they recognize animals as spiritual beings in the process of funeral rites and are closely related to the ideology that there is life after death. In addition, analysis of the location and directionality of the remains is also required from multiple angles. These two SHUNJANG correspond to the entrance to the tomb, and the location is the most open space at the entrance. The appearance of a dog looking outward, etc., can also be interpreted as the meaning of protecting the tombs and byeoksa. This appearance can be compared with the dog depicted in a mural in a Goguryeo tomb that reflects the ancient world's thought and stone figures excavated from the tomb of King Muryeong of Baekje, and it is also consistent with the meaning of the JINMYOSU protecting the ancient tombs. This suggests that a multifaceted study on animal fluid burial remains is needed in the future.

A Study on the Space Formation and Garden Characteristics of Garden Remains, Gao-Byeoleop for Restoration Design (가오별업(嘉梧別業)의 복원 설계를 위한 공간구성 및 정원 특성에 관한 연구)

  • Rho, Jae-Hyun;Kim, Soon-Ki
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.36 no.3
    • /
    • pp.58-74
    • /
    • 2018
  • This study aims to propose baseline data for designing restoration of Gaobyulup, researching space formation and characteristics of gardens of Gaobyulup, which located in the foot of Cheonmasan Mountain in Namyangju. Gaobyulup is a remain in retirement of Gyulsan Yu-Won Lee, a representative politician, administrator, and tea drinker in late Joseon Dynasty. The results of the research about the shape of Gaobyulup deducted through reference review, poetry and prose analysis, an on-the-spot survey and residents' interview are below: Lee, who used pseudonym as 'Gyulsan,' which menas Jongnamsan Mountain, yearned Mangcheonbyeoreop(輞川別業) by Yu Wang and retirement with a country house operation by Seogye Sedang Park. In the persuit of this ideal, he created and operated a country house in Gaogok of Yangju, which a family burial ground was located. Gaobyulup, which located in Gaogok in the lower part of Cheonmasan Mountain, was largely composed outer and inner gardens, and the area of house operation was started from a stone post of Gaobokji The inner garden of Gaobyulup was including major garden components like buildings, such as Sasihyanggwan, Obaekganjung, Imharyoe and Toesadam, and Chaewon near Haengrangchae, and Gwawon in an backyard. In addition, Younggwijung pavilion, which located 850m away from Gaobyulup, was the another country house inside the Byulup, thus Gaobyulup shows a duplex space formation. In the inner garden of Gaobyulup, there are Sasihyanggwan, which had functions of Sarangchae as library and depository of old paintings and calligraphic works, and Obaekganjung, a small Sarangchae which connected with Sasihyanggwan in the form of a transept. Yusanggoksuger located near Obaekganjung. Additionally, Imharyeo, a library with a tablet of Byeokryowon(??園), which located in the highest point in Byulup, has the functions of a reading room and a tea house. Many Taihu stones were located not only in Toesadam, a square-formed pond with lotus but also many places in the inner gardens. And rare garden plants were planted. These were closely related to the trend of horticulture for pleasure, wealth, and collecting old paintings and calligraphic works for pleasure of Lee. Meanwhile, the area of Younggwijung pavilion, located in Gaocheon stream fall from Byulup to Manhoiam, looks like Wooampok, a enjoying place of other personages, who use their pseudonym as "Oksan" or "Wooam" Lee identifies Wooampok as "Jesampok" and carved 'Gyulsan' s he declared this place is his operating area. Lee built Younggwijung pavilion and planted many peach trees for recreation of utopia. The stone letters of Byukpadongcheon, located in front of a bridge in the foreside of Younggwijung pavilion, seems another enchanted land created in Gaobokji inside. Lee carved Jeilsan in huge rock on the falls rear Manhoiam temple, which Lee did great role of foundation of the temple, so he identifies that this place was the end of the outer garden of Gaobyulup. This study tries to estimate traces of the country house in Gaogok through reference review and on-th-spot survey, and the results from this study are presumed based on site remains only conformed today. It needs to discover second scenary or stone carved letters between Jeilsan and Jesampok. Additionally, exact formation characteristics of Gaobyulup should be identified through excavation survey later. To do so, an interest and a major role of Namyangju-si must be equipped for future restoration of Gaobyulup.

A Study on the Improvement of Recommendation Accuracy by Using Category Association Rule Mining (카테고리 연관 규칙 마이닝을 활용한 추천 정확도 향상 기법)

  • Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.27-42
    • /
    • 2020
  • Traditional companies with offline stores were unable to secure large display space due to the problems of cost. This limitation inevitably allowed limited kinds of products to be displayed on the shelves, which resulted in consumers being deprived of the opportunity to experience various items. Taking advantage of the virtual space called the Internet, online shopping goes beyond the limits of limitations in physical space of offline shopping and is now able to display numerous products on web pages that can satisfy consumers with a variety of needs. Paradoxically, however, this can also cause consumers to experience the difficulty of comparing and evaluating too many alternatives in their purchase decision-making process. As an effort to address this side effect, various kinds of consumer's purchase decision support systems have been studied, such as keyword-based item search service and recommender systems. These systems can reduce search time for items, prevent consumer from leaving while browsing, and contribute to the seller's increased sales. Among those systems, recommender systems based on association rule mining techniques can effectively detect interrelated products from transaction data such as orders. The association between products obtained by statistical analysis provides clues to predicting how interested consumers will be in another product. However, since its algorithm is based on the number of transactions, products not sold enough so far in the early days of launch may not be included in the list of recommendations even though they are highly likely to be sold. Such missing items may not have sufficient opportunities to be exposed to consumers to record sufficient sales, and then fall into a vicious cycle of a vicious cycle of declining sales and omission in the recommendation list. This situation is an inevitable outcome in situations in which recommendations are made based on past transaction histories, rather than on determining potential future sales possibilities. This study started with the idea that reflecting the means by which this potential possibility can be identified indirectly would help to select highly recommended products. In the light of the fact that the attributes of a product affect the consumer's purchasing decisions, this study was conducted to reflect them in the recommender systems. In other words, consumers who visit a product page have shown interest in the attributes of the product and would be also interested in other products with the same attributes. On such assumption, based on these attributes, the recommender system can select recommended products that can show a higher acceptance rate. Given that a category is one of the main attributes of a product, it can be a good indicator of not only direct associations between two items but also potential associations that have yet to be revealed. Based on this idea, the study devised a recommender system that reflects not only associations between products but also categories. Through regression analysis, two kinds of associations were combined to form a model that could predict the hit rate of recommendation. To evaluate the performance of the proposed model, another regression model was also developed based only on associations between products. Comparative experiments were designed to be similar to the environment in which products are actually recommended in online shopping malls. First, the association rules for all possible combinations of antecedent and consequent items were generated from the order data. Then, hit rates for each of the associated rules were predicted from the support and confidence that are calculated by each of the models. The comparative experiments using order data collected from an online shopping mall show that the recommendation accuracy can be improved by further reflecting not only the association between products but also categories in the recommendation of related products. The proposed model showed a 2 to 3 percent improvement in hit rates compared to the existing model. From a practical point of view, it is expected to have a positive effect on improving consumers' purchasing satisfaction and increasing sellers' sales.

Sentiment Analysis of Korean Reviews Using CNN: Focusing on Morpheme Embedding (CNN을 적용한 한국어 상품평 감성분석: 형태소 임베딩을 중심으로)

  • Park, Hyun-jung;Song, Min-chae;Shin, Kyung-shik
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.59-83
    • /
    • 2018
  • With the increasing importance of sentiment analysis to grasp the needs of customers and the public, various types of deep learning models have been actively applied to English texts. In the sentiment analysis of English texts by deep learning, natural language sentences included in training and test datasets are usually converted into sequences of word vectors before being entered into the deep learning models. In this case, word vectors generally refer to vector representations of words obtained through splitting a sentence by space characters. There are several ways to derive word vectors, one of which is Word2Vec used for producing the 300 dimensional Google word vectors from about 100 billion words of Google News data. They have been widely used in the studies of sentiment analysis of reviews from various fields such as restaurants, movies, laptops, cameras, etc. Unlike English, morpheme plays an essential role in sentiment analysis and sentence structure analysis in Korean, which is a typical agglutinative language with developed postpositions and endings. A morpheme can be defined as the smallest meaningful unit of a language, and a word consists of one or more morphemes. For example, for a word '예쁘고', the morphemes are '예쁘(= adjective)' and '고(=connective ending)'. Reflecting the significance of Korean morphemes, it seems reasonable to adopt the morphemes as a basic unit in Korean sentiment analysis. Therefore, in this study, we use 'morpheme vector' as an input to a deep learning model rather than 'word vector' which is mainly used in English text. The morpheme vector refers to a vector representation for the morpheme and can be derived by applying an existent word vector derivation mechanism to the sentences divided into constituent morphemes. By the way, here come some questions as follows. What is the desirable range of POS(Part-Of-Speech) tags when deriving morpheme vectors for improving the classification accuracy of a deep learning model? Is it proper to apply a typical word vector model which primarily relies on the form of words to Korean with a high homonym ratio? Will the text preprocessing such as correcting spelling or spacing errors affect the classification accuracy, especially when drawing morpheme vectors from Korean product reviews with a lot of grammatical mistakes and variations? We seek to find empirical answers to these fundamental issues, which may be encountered first when applying various deep learning models to Korean texts. As a starting point, we summarized these issues as three central research questions as follows. First, which is better effective, to use morpheme vectors from grammatically correct texts of other domain than the analysis target, or to use morpheme vectors from considerably ungrammatical texts of the same domain, as the initial input of a deep learning model? Second, what is an appropriate morpheme vector derivation method for Korean regarding the range of POS tags, homonym, text preprocessing, minimum frequency? Third, can we get a satisfactory level of classification accuracy when applying deep learning to Korean sentiment analysis? As an approach to these research questions, we generate various types of morpheme vectors reflecting the research questions and then compare the classification accuracy through a non-static CNN(Convolutional Neural Network) model taking in the morpheme vectors. As for training and test datasets, Naver Shopping's 17,260 cosmetics product reviews are used. To derive morpheme vectors, we use data from the same domain as the target one and data from other domain; Naver shopping's about 2 million cosmetics product reviews and 520,000 Naver News data arguably corresponding to Google's News data. The six primary sets of morpheme vectors constructed in this study differ in terms of the following three criteria. First, they come from two types of data source; Naver news of high grammatical correctness and Naver shopping's cosmetics product reviews of low grammatical correctness. Second, they are distinguished in the degree of data preprocessing, namely, only splitting sentences or up to additional spelling and spacing corrections after sentence separation. Third, they vary concerning the form of input fed into a word vector model; whether the morphemes themselves are entered into a word vector model or with their POS tags attached. The morpheme vectors further vary depending on the consideration range of POS tags, the minimum frequency of morphemes included, and the random initialization range. All morpheme vectors are derived through CBOW(Continuous Bag-Of-Words) model with the context window 5 and the vector dimension 300. It seems that utilizing the same domain text even with a lower degree of grammatical correctness, performing spelling and spacing corrections as well as sentence splitting, and incorporating morphemes of any POS tags including incomprehensible category lead to the better classification accuracy. The POS tag attachment, which is devised for the high proportion of homonyms in Korean, and the minimum frequency standard for the morpheme to be included seem not to have any definite influence on the classification accuracy.

A Study on the Characteristics and Management Plan of Old Big Trees in the Sacred Natural Sites of Handan City, China (중국 한단시 자연성지 내 노거수의 특성과 관리방안)

  • Xi, Su-Ting;Shin, Hyun-Sil
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.41 no.2
    • /
    • pp.35-45
    • /
    • 2023
  • First, The spatial distribution characteristics of old big trees were analyzed using ArcGIS figures by combining basic information such as species and ages of old big trees in Handan City, which were compiled by the local bureau of landscaping. The types of species, distribution by ages of trees, ownership status, growth status, and diversity status were comprehensively analyzed. Statistically, Styphnolobium, Acacia, Gleditsia, and Albizia of Fabaceae accounted for the majority, of which Sophora japonica accounted for the highest proportion. Sophora japonica is widely and intensively distributed to each prefecture and district in Handan city. According to the age and distribution, the old big trees over 1000 years old were mainly Sophora japonica, Zelkova serrata, Juniperus chinensis, Morus australis Koidz., Dalbergia hupeana Hance, Ceratonia siliqua L., and Pistacia chinensis, and Platycladus orientalis. Second, as found in each type of old big tree status, various types of old big tree status were investigated, the protection management system, protection management process, and protection management benefits were studied, and the protection of old big tree was closely related to the growth environment. Currently, the main driving force behind the protection of old big trees is the worship of old big trees. By depositing its sacredness to the old big tree and sublimating the natural character that nature gave to the old big tree into a guiding consciousness of social activities, nature's "beauty" and personality's "goodness" are well combined. The protection state of the old big tree is closely related to the degree of interaction with the surrounding environment and the participation of various cultures and subjects. In the process of continuously interacting with the surrounding environment during the long-term growth of old big trees, it seems that a natural sanctuary was formed around old big trees in the process of voluntarily establishing a "natural-cultural-scape" system involving bottom-up and top-down cross-regions, multicultural and multi-subjects. Third, China focused on protecting and recovering old big trees, but the protection management system is poor due to a lack of comprehensive consideration of historical and cultural values, plant diversity significance, and social values of old big trees in the management process. Three indicators of space's regional characteristics, property and protection characteristics, and value characteristics can be found in the evaluation of the natural characteristics of old giant trees, which are highly valuable in terms of traditional consciousness management, resource protection practice, faith system construction, and realization of life community values. A systematic management system should be supported as to whether they can be protected and developed for a long time. Fourth, as the perception of protected areas is not yet mature in China, "natural sanctuary" should be treated as an important research content in the process of establishing a nature reserve system. The form of natural sanctuary management, which focuses on bottom-up community participation, is a strong supplement to the current type of top-down nature reserve management in China. Based on this, the protection of old giant trees should be included in the form of a nature reserve called a natural monument in the nature reserve system. In addition, residents of the area around the nature reserve should be one of the main agents of biodiversity conservation.

A Study on Market Size Estimation Method by Product Group Using Word2Vec Algorithm (Word2Vec을 활용한 제품군별 시장규모 추정 방법에 관한 연구)

  • Jung, Ye Lim;Kim, Ji Hui;Yoo, Hyoung Sun
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.1
    • /
    • pp.1-21
    • /
    • 2020
  • With the rapid development of artificial intelligence technology, various techniques have been developed to extract meaningful information from unstructured text data which constitutes a large portion of big data. Over the past decades, text mining technologies have been utilized in various industries for practical applications. In the field of business intelligence, it has been employed to discover new market and/or technology opportunities and support rational decision making of business participants. The market information such as market size, market growth rate, and market share is essential for setting companies' business strategies. There has been a continuous demand in various fields for specific product level-market information. However, the information has been generally provided at industry level or broad categories based on classification standards, making it difficult to obtain specific and proper information. In this regard, we propose a new methodology that can estimate the market sizes of product groups at more detailed levels than that of previously offered. We applied Word2Vec algorithm, a neural network based semantic word embedding model, to enable automatic market size estimation from individual companies' product information in a bottom-up manner. The overall process is as follows: First, the data related to product information is collected, refined, and restructured into suitable form for applying Word2Vec model. Next, the preprocessed data is embedded into vector space by Word2Vec and then the product groups are derived by extracting similar products names based on cosine similarity calculation. Finally, the sales data on the extracted products is summated to estimate the market size of the product groups. As an experimental data, text data of product names from Statistics Korea's microdata (345,103 cases) were mapped in multidimensional vector space by Word2Vec training. We performed parameters optimization for training and then applied vector dimension of 300 and window size of 15 as optimized parameters for further experiments. We employed index words of Korean Standard Industry Classification (KSIC) as a product name dataset to more efficiently cluster product groups. The product names which are similar to KSIC indexes were extracted based on cosine similarity. The market size of extracted products as one product category was calculated from individual companies' sales data. The market sizes of 11,654 specific product lines were automatically estimated by the proposed model. For the performance verification, the results were compared with actual market size of some items. The Pearson's correlation coefficient was 0.513. Our approach has several advantages differing from the previous studies. First, text mining and machine learning techniques were applied for the first time on market size estimation, overcoming the limitations of traditional sampling based- or multiple assumption required-methods. In addition, the level of market category can be easily and efficiently adjusted according to the purpose of information use by changing cosine similarity threshold. Furthermore, it has a high potential of practical applications since it can resolve unmet needs for detailed market size information in public and private sectors. Specifically, it can be utilized in technology evaluation and technology commercialization support program conducted by governmental institutions, as well as business strategies consulting and market analysis report publishing by private firms. The limitation of our study is that the presented model needs to be improved in terms of accuracy and reliability. The semantic-based word embedding module can be advanced by giving a proper order in the preprocessed dataset or by combining another algorithm such as Jaccard similarity with Word2Vec. Also, the methods of product group clustering can be changed to other types of unsupervised machine learning algorithm. Our group is currently working on subsequent studies and we expect that it can further improve the performance of the conceptually proposed basic model in this study.

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF

Memory Organization for a Fuzzy Controller.

  • Jee, K.D.S.;Poluzzi, R.;Russo, B.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1041-1043
    • /
    • 1993
  • Fuzzy logic based Control Theory has gained much interest in the industrial world, thanks to its ability to formalize and solve in a very natural way many problems that are very difficult to quantify at an analytical level. This paper shows a solution for treating membership function inside hardware circuits. The proposed hardware structure optimizes the memoried size by using particular form of the vectorial representation. The process of memorizing fuzzy sets, i.e. their membership function, has always been one of the more problematic issues for the hardware implementation, due to the quite large memory space that is needed. To simplify such an implementation, it is commonly [1,2,8,9,10,11] used to limit the membership functions either to those having triangular or trapezoidal shape, or pre-definite shape. These kinds of functions are able to cover a large spectrum of applications with a limited usage of memory, since they can be memorized by specifying very few parameters ( ight, base, critical points, etc.). This however results in a loss of computational power due to computation on the medium points. A solution to this problem is obtained by discretizing the universe of discourse U, i.e. by fixing a finite number of points and memorizing the value of the membership functions on such points [3,10,14,15]. Such a solution provides a satisfying computational speed, a very high precision of definitions and gives the users the opportunity to choose membership functions of any shape. However, a significant memory waste can as well be registered. It is indeed possible that for each of the given fuzzy sets many elements of the universe of discourse have a membership value equal to zero. It has also been noticed that almost in all cases common points among fuzzy sets, i.e. points with non null membership values are very few. More specifically, in many applications, for each element u of U, there exists at most three fuzzy sets for which the membership value is ot null [3,5,6,7,12,13]. Our proposal is based on such hypotheses. Moreover, we use a technique that even though it does not restrict the shapes of membership functions, it reduces strongly the computational time for the membership values and optimizes the function memorization. In figure 1 it is represented a term set whose characteristics are common for fuzzy controllers and to which we will refer in the following. The above term set has a universe of discourse with 128 elements (so to have a good resolution), 8 fuzzy sets that describe the term set, 32 levels of discretization for the membership values. Clearly, the number of bits necessary for the given specifications are 5 for 32 truth levels, 3 for 8 membership functions and 7 for 128 levels of resolution. The memory depth is given by the dimension of the universe of the discourse (128 in our case) and it will be represented by the memory rows. The length of a world of memory is defined by: Length = nem (dm(m)+dm(fm) Where: fm is the maximum number of non null values in every element of the universe of the discourse, dm(m) is the dimension of the values of the membership function m, dm(fm) is the dimension of the word to represent the index of the highest membership function. In our case then Length=24. The memory dimension is therefore 128*24 bits. If we had chosen to memorize all values of the membership functions we would have needed to memorize on each memory row the membership value of each element. Fuzzy sets word dimension is 8*5 bits. Therefore, the dimension of the memory would have been 128*40 bits. Coherently with our hypothesis, in fig. 1 each element of universe of the discourse has a non null membership value on at most three fuzzy sets. Focusing on the elements 32,64,96 of the universe of discourse, they will be memorized as follows: The computation of the rule weights is done by comparing those bits that represent the index of the membership function, with the word of the program memor . The output bus of the Program Memory (μCOD), is given as input a comparator (Combinatory Net). If the index is equal to the bus value then one of the non null weight derives from the rule and it is produced as output, otherwise the output is zero (fig. 2). It is clear, that the memory dimension of the antecedent is in this way reduced since only non null values are memorized. Moreover, the time performance of the system is equivalent to the performance of a system using vectorial memorization of all weights. The dimensioning of the word is influenced by some parameters of the input variable. The most important parameter is the maximum number membership functions (nfm) having a non null value in each element of the universe of discourse. From our study in the field of fuzzy system, we see that typically nfm 3 and there are at most 16 membership function. At any rate, such a value can be increased up to the physical dimensional limit of the antecedent memory. A less important role n the optimization process of the word dimension is played by the number of membership functions defined for each linguistic term. The table below shows the request word dimension as a function of such parameters and compares our proposed method with the method of vectorial memorization[10]. Summing up, the characteristics of our method are: Users are not restricted to membership functions with specific shapes. The number of the fuzzy sets and the resolution of the vertical axis have a very small influence in increasing memory space. Weight computations are done by combinatorial network and therefore the time performance of the system is equivalent to the one of the vectorial method. The number of non null membership values on any element of the universe of discourse is limited. Such a constraint is usually non very restrictive since many controllers obtain a good precision with only three non null weights. The method here briefly described has been adopted by our group in the design of an optimized version of the coprocessor described in [10].

  • PDF