• Title/Summary/Keyword: 敍述

Search Result 4,009, Processing Time 0.029 seconds

Dance Storytelling Perspective and Searching for Dance in Korea - Cheoyongmu text Centered on - (한국춤 스토리텔링 관점과 모색방안 - 처용무 텍스트를 예로 -)

  • Kim, Ji-won
    • (The) Research of the performance art and culture
    • /
    • no.35
    • /
    • pp.373-404
    • /
    • 2017
  • As an art, Korean dance is a history, a tradition, and a continuing activity of consciousness. It is a present and future activity in the past that will continue the identity of Korean people. So storytelling is not just a description of the historical background, but of eternity that is being recreated. From this study, the inquiry of artistic beauty of Korean traditional dance is questioning the original essence and value of 'storytelling' through old tradition and historical art. If the study of the Korean dance among them was a study of the theorists for the aesthetic essence or the ideological system, the point of view of the storytelling of the Korean dance is that the public understanding about the core structure and reason of Korean dance and the study of the humanistic value It reminded me of a desperate attitude. The meaning of this study is to verify the usefulness of storytelling as a way to construct various contents of Korean dance in conceptual definition of storytelling. In the symbolic meaning of Korean dance, Cheoyongmu text formed the deep meaning network of the original art beyond the linguistic narrative structure and suggested the importance of storytelling development as DB of original contents.

The feature of the 'Mun-yi-jae-do' artistic attitude in Chinese Animation from 1949 to 1966 (1949-1966년 중국 애니메이션에 나타난 '문이재도' 문예관의 특징)

  • Liu, Danya;Lee, Dong-hun
    • Journal of Communication Design
    • /
    • v.65
    • /
    • pp.70-81
    • /
    • 2018
  • From 1949 to 1966, after the new China was established, in order to consolidate newborn regime and erect national image, "proletariat revolutionary education" had become the main way of literary and artistic creation in the new era. In this era, Chinese animation began to produce to form the characteristics of emphasizing the ideological expression and political education from 1949 to1966, but it also made people misunderstand that it was the results of comprehensive containment of Soviet literary thoughts and creative models. In fact, Regardless of the subject matter, narrative, and role, Chinese animations have inherited and developed the ideological characteristics of the "Mun-yi-jae-do" literary view, forming a creative style that is different from the Soviet "dogmatism." The characteristics of "revolutionary hero role", "mythological expression of revolutionary thought" and "unique storytelling narrative mode" in Chinese animation from 1949 to 1966 were the inheritance and development of the "hero role", "mythological story", and "art of storytelling" of the important expression means of traditional art creation after the establishment of the "Mun-yi-jae-do".

Comparative Studies on Figures Appeared in Moral Education Textbooks for Elementary and Junior High Schools in Korea and Japan (한국과 일본의 초·중학교 도덕 교과서에 나타난 인물상 비교연구)

  • Kunii, Yutaka
    • Korean Journal of Comparative Education
    • /
    • v.22 no.4
    • /
    • pp.51-73
    • /
    • 2012
  • The purpose of this study was to demonstrate the characteristics of ideal figure aimed by the moral education of both Korea and Japan by comparing and analyzing the descriptive content and characters' tendency appeared in the moral education textbooks published in accordance with the current moral education curriculum in Korea and Japan. First, this study examined the tendency of real persons appeared in the moral education textbooks in both countries. To be specific, this study attempted a quantitative comparative analysis of the characters' tendency by expressing the distribution of the characters by appearance time, male-to-female ratio, Koreans and foreigners and characters by occupation and position in percentage. Furthermore, it attempted to demonstrate the particular emphasis in values and virtues in both countries by examining the moral values derived from the characters' decency, way of life and teachings and expressing the distribution of the characters by value and virtue in percentage.

Development and Limitation of Income Maintenance Policy after the Financial Crisis (외환위기 20년, 소득보장정책의 발전과 한계)

  • Kim, Kyo-seong
    • 한국사회정책
    • /
    • v.24 no.4
    • /
    • pp.151-184
    • /
    • 2017
  • The purpose of this study is to investigate the development process and current status of income maintenance policies after the financial crisis, to sort out key issues or problems, and to explore future plans or directions that can overcome the limitation. In order to develop intensive argument, the scope of research is limited to the National Pension, Basic Pension, and the National Basic Livelihood Security System. The research also focused on two values of the 'universalism' and the 'adequacy' based on the 'SPF(social protection floor)' in the overall narrative process. Additionally, this paper briefly summarized the related contents released by the Moon Jae-in Government and presented an affirmative strategy and a transformational strategy centered on social allowance and basic income respectively, to establish an integrated income guarantee scheme. Although some improvements to the present system are also required, it is an effort to expand the practical effect of social benefits through the full and comprehensive reform of benefit structure and method.

A Study on the Zhu Xi's theory of "gewu zhizhi" - focusing on critical understandings of Zhu Xi in the Daxue huowen chapter V and Daxue huowen yulei (주희의 격물치지설(格物致知說)에 대한 고찰 - 『대학혹문(大學或問)』 전오장(傳五章)과 '대학혹문어류(大學或問語類)'의 비판적 이해를 중심으로 -)

  • Sung, Kwang-dong
    • (The)Study of the Eastern Classic
    • /
    • no.63
    • /
    • pp.141-168
    • /
    • 2016
  • This paper studies Zhu Xi's critical comprehension about the theories of gewu zhizhi of senior Confucian scholars, focusing on the Daxue Zhangju, Daxue huowen, and Daxue huowen yulei of Zhuzi yulei. Zhu Xi described in depth the theory of gewu zhizhi of Sima Guang, disciples of the Cheng Yi(Lu Dalin, Xie Liangzuo, Yin Ch'un, Yang Shi), scholars of Hu-Xing province(Hu An-guo, Hu hong), Li Dong in the Daxue huowen and Daxue huowen yulei, by his understanding through a criticism of the theory of gewu zhizh, thereby formulating a theory of gewu zhizhi on the basis of Cheng Yi's theory. Through this criticism of senior Confucian scholars, Zhu Xi explained that the theory of gewu zhizhi was departed from a positive affirmation of things. Zhu Xi claimed that the crux of gewu zhizhi was a thorough understanding like a sudden release achieved by accumulating Li of things. This plan of Zhu Xi with respect to "Supplementary Chapter on the Gewu Zhizhi" showed that the theory of gewu zhizhi which was set up by himself corresponded to the theory of Cheng Yi's, and it was based on the Confucian tradition firmly.

Related Key Differential Attacks on 32-Round GOST (연관키 차분 특성을 이용한 32-라운드 GOST 공격)

  • 이태건;고영대;홍석희;이상진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.75-84
    • /
    • 2004
  • In this paper, we present a related key differential attack on Full-round GOST Firstly, we present a distinguishing attack on full rounds of GOST, which can distinguish it from random oracle with probability 1- 64$2^{64}$ using a related key differential characteristic. We will also show that H. Seki et al.'s idea can be applied to attack on 31 rounds of GOST combining our related key differential characteristic. Lastly, we propose a related key differential attack on full rounds of GOST. In this attack we can recover 12 bits of the master key with $2^{35}$ chosen plaintexts and $2^{36}$ encryption times for the 91.7% expectation of success rate.

Proactive Code Verification Protocol Using Empty Memory Deletion in Wireless Sensor Network (무선 센서 네트워크에서의 메모리 공간 삭제를 이용한 선행 코드-검증 기법)

  • Choi, Young-Geun;Kang, Jeon-Il;Lee, Kyung-Hee;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.37-46
    • /
    • 2007
  • The authentication in WSN(Wireless Sensor Network) usually means the entity authentication, but owing to the data centric nature of sensor network, much more importance must be put on the authentication(or attestation) for code of sensor nodes. The naive approach to the attestation is for the verifier to compare the previously known memory contents of the target node with the actual memory contents in the target node, but it has a significant drawback. In this paper, we show what the drawback is and propose a countermeasure. This scheme can verify the whole memory space of the target node and provides extremely low probability of malicious code's concealment without depending on accurate timing information unlike SWATT. We provide two modes of this verification method: BS-to-node and node-to-node. The performance estimation in various environments is shown.

Determinant Whether the Data Fragment in Unallocated Space is Compressed or Not and Decompressing of Compressed Data Fragment (비할당 영역 데이터 파편의 압축 여부 판단과 압축 해제)

  • Park, Bo-Ra;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.175-185
    • /
    • 2008
  • It is meaningful to investigate data in unallocated space because we can investigate the deleted data. However the data in unallocated space is formed to fragmented and it cannot be read by application in most cases. Especially in case of being compressed or encrypted, the data is more difficult to be read. If the fragmented data is encrypted and damaged, it is almost impossible to be read. If the fragmented data is compressed and damaged, it is very difficult to be read but we can read and interpret it sometimes. Therefore if the computer forensic investigator wants to investigate data in unallocated space, formal work of determining the data is encrypted of compressed and decompressing the damaged compressed data. In this paper, I suggest the method of analyzing data in unallocated space from a viewpoint of computer forensics.

Study on the Effect of Nurses in Response to New Respiratory Infection Disease on the Performance of Standard Precaution (신종호흡기 감염병 대응 간호사의 표준주의지침 수행에 미치는 영향에 대한 연구)

  • Choi, Eun-A
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.285-292
    • /
    • 2020
  • The purpose of this study is a descriptive investigation study to find out the knowledge, awareness and performance of the nurse's standards precaution(SP) and to identify the factors affecting the performance of them. The research method was collected through a questionnaire from nurses at two general hospitals in B city and analyzed with technical statistics, t-test, ANOVA, Person's correlation coefficient and Multiple regression using the SPSS program. As a result of the average level of knowledge of the SP 22.55/25, recognition 3.68/4, and performance 3.77/4. The recognition of SP and implementation of SP(r=.250, p=.003) had a significant amount of correlation. The influence factor on the implementation of the SP was recognition of the SP(β=-.582, p=.001). Therefore, in order to improve the performance of SP and to respond well to new respiratory infections, accurate awareness of the SP of nurses and opportunities for systematic education and participation in education are needed by medical institutions.

Development and Verification Methodology for Small Civil Unmanned Aerial Vehicle System based on Open System Architecture (개방형 시스템 아키텍처 기반의 소형 민간 무인항공기 시스템 개발 및 검증 방법)

  • Jo, Hyun-Chul;Park, Keunyoung
    • Journal of Platform Technology
    • /
    • v.8 no.2
    • /
    • pp.32-43
    • /
    • 2020
  • The Unmanned Aerial Vehicle(UAV) system has been mainly used for military domains, but it also widely applied to used in the civilian domains. In civilian domains, low-cost and small-sized UAV systems are mainly applied in various industries. The software that operates UAV systems has a lot of common functions. However, even though there are many common functionalities of the software, changing the devices may cause a problem requiring software modification. These problems degrade interoperability, modularity and portability in UAV systems. In order to solve the problems, an Open System Architecture(OSA) has been proposed. In this paper, we propose a UAV system software architecture based on Future Airborne Capability Environment(FACE) standard. Our system can support UAV systems of various platforms in the civilian domains, which is supplied in small quantity batch production. And it has the advantages of software consolidation and portability. Finally, We describe the development and conformant methodology of the software based on the FACE standard using open development tools.

  • PDF