• 제목/요약/키워드: 전통기술

Search Result 2,929, Processing Time 0.03 seconds

Development of Standard Model for Traditional Pavilion (전통정자의 표준모델 개발)

  • Hong, Kwang-pyo;Sim, Daesup;LEE, Hyukjae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.387-395
    • /
    • 2020
  • The standard model of Korean pavilions can embody the beauty of the Korean traditional and reflect the trend of the times, develop a universal and realistic model, and at the same time promote Korean traditional beauty internationally. Therefore, the purpose of this study is to develop a standard model for living, industrializing, activating and globalizing Korean traditional pavilions while inheriting our own traditional technologies and preserving the legitimacy of Korean pavilions through a case study of Korean traditional pavilions. Considering the case analysis and modern trends, the plan was carried out in each part to present standard models for the representative types of traditional pavilion, Samojeong, Yukgakjeong, and Palgakjeong. The standard model has made some changes in design trends, including the installation of handrails and handrails to enhance utilization while considering legitimacy. The standard model presented in this way reflects the current design trend and can be changed in different forms depending on the trend at that time. The standard model of Korean pavilions developed this time can be said to be a universal and realistic model, while reproducing the beauty of Korean tradition.

Forecasting non-traditional security threats in Korea :by Republic of Korea Army collective intelligence platform operating result (미래 한반도의 비전통적 안보위협 예측 :육군의 집단지성 플랫폼 운영 결과를 중심으로)

  • Cho, Sang Keun;Jung, Min-Sub;Moon, Sang Jun;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.216-222
    • /
    • 2021
  • COVID-19 pandemic brings attentions to the nonmilitary and transnational non-traditonal security threats, as the scales of such damage by these threats are beyond expectation. The Republic of Korea Army tries to forecast non-traditional security threat which may be occurred in Korean peninsula by using collective intelligence platform. In coming years, climate change, social changes and technology development caused by the 4th industrial revolution will diversify non-traditional security threat. Considering urbanization, internet distribution rate, and geopolitical location where atmosphere from continent and ocean meet, Korea would may face the most lethal ones compared to those of other countries may face. Therefore, to predict such threats in pangovernment scale using collective intelligence platforms which embrace civil, public, military, industry, academy and research center is the most important than anything.

A Study on E-Learning System of Korean Traditional Dance for Transmission and Dissemination (한국 전통춤의 전승 및 보급을 위한 이러닝 시스템에 관한 연구)

  • Lee, Jongwook;Lee, Ji-Hyun
    • Journal of the HCI Society of Korea
    • /
    • v.12 no.3
    • /
    • pp.5-11
    • /
    • 2017
  • Korean traditional dance has cultural value and is human's cultural heritage. But they are in danger which is caused by lack of bearers and public interest. E-Learning of traditional dance using network technology and digital media can be a solution to extinction problem. The aim of this study is to propose the E-Learning courses and systems for learning traditional dance. E-Learning systems were evaluated in accordance with the HCI (Human Computer Interaction) user evaluation. This study contribute to overcoming distance constraints by offering synchronous E-Learning education system of traditional dance as intangible cultural heritage through new media experience.

Bukpo's History and Transition of the Hemp Fabric Production Technique (북포(北布)의 내력과 제섬(製纖) 기술의 변천)

  • Kong, Sang-Hui
    • Korean Journal of Heritage: History & Science
    • /
    • v.50 no.3
    • /
    • pp.44-63
    • /
    • 2017
  • 'Bukpo' is called 'Tongpo' or 'Balnaepo,' which respectively mean hemp fabric that goes into a small bamboo tube and women's table utensil 'bari' in Chosen. It is fine hemp fabric produced in Yukjin, Hamgyeong province. Korea has been divided into North and South since the Korean War in 1950. As it is hard to get information about Northern life style or their traditional technology, their hemp fabric production is also left unknown. This study demonstrates characteristics of the production of 'Bukpo' through "Ojuyeonmunjangjeonsango", the only document that marked about 'Bukpo' making process of the late Chosen dynasty. It aims to analyze the transition of the technique and the meaning by comparing the characteristics of the production of 'Bukpo' with the modern era's documents. In this process, I discovered that the hemp fabric production technique at 19th century shares some sort of similarities with that of Europe or Chinese Miao(hmong). But the hemp fabric production technique changed before the 20th century. The evolution of Northern hemp fabric production technique can be a good example to examine the context of the traditional craft technique.

Development of Cyber Lectures for Technology Education in Industry Fields (산업체 기술 교육을 위한 Cyber 강좌 제작 및 활성화 방안)

  • 조세홍;김정화;이수희;공범용
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2003.05a
    • /
    • pp.41-44
    • /
    • 2003
  • 평생 교육이 화두가 되는 현대 기술 및 지식정보화 사회에서, 사회인이 재교육 등을 위하여 전통적인 교육의 형태로 재교육을 받는 것은 쉬운 일이 아니다. 전통적인 교육 형태가 제공하지 못하는 교육의 기회를 현재 널리 응용되고 있는 Cyber 강의가 줄 수는 있지만, 실험 실습 등이 요구되는 산업체 기술 교육을 위한 Cyber 강의는 일반적인 이론 강의를 위한 Cyber 강의에 비하여 새로운 제작 방법 등이 요구되어진다. 본 논문은 산업체 기술 교육을 위한 Cyber강의 제작 방법을 제안하고 실제 구현을 통하여 그 활성화 방법을 보이고자 한다.

  • PDF

A Study on the Effect of Traditional Market Revitalization Factors on Management Performance (전통시장 활성화 요인이 경영성과에 미치는 영향)

  • Se-Yong Kwon;Mi-Rye Kang;Hyung-Ho Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.307-317
    • /
    • 2024
  • The purpose of this study is to analyze the impact of merchants' perceptions of service quality, youth mall creation, and traditional market revitalization on management performance to derive factors that can improve the self-sustainability of the traditional market. In particular, it was intended to predict the practical effect of the youth mall creation project by including merchants' perceptions of the rapidly emerging youth mall to revitalize the traditional market. In this study, 430 small business owners from five private traditional markets in Iksan were surveyed, the research model was verified by analyzing the technical statistics, reliability, and validity of the data collected using the SPSS 21.0 program, and the hypothesis was verified through correlation and regression analysis. Although youth malls are actively promoted at the government level to revitalize traditional markets and improve management performance, this study confirmed that the creation of youth malls in traditional markets does not directly affect traditional market revitalization and management performance, confirming that policies to create youth malls that can actually help revitalize traditional markets and improve management performance in the future need to be promoted.

Design of NFC-based Mobile Electronic Micro-payment System for Traditional Market Activation (전통시장 활성화를 위한 NFC 기반 모바일 전자소액결제 시스템의 설계)

  • Cha, ByungRae;Kim, Dae-Gue;Kim, YongIl;Kim, JongWon
    • Smart Media Journal
    • /
    • v.2 no.3
    • /
    • pp.23-33
    • /
    • 2013
  • In this paper, we find out about the effort and status of GwangJu metropolitan city to reinvigorate traditional market. And we propose the micro payment model based on Android NFC and tokenization technique to support the small trader's micro payment in aspect of information technology more than the physical infrastructure and environmental improvement projects to reinvigorate the traditional market. The micropayment model supports facilities of payment using smart phone based on NFC, and the encryption and tokenization support the indirection authentication and privacy of users.

  • PDF