• Title/Summary/Keyword: Agency theory

Search Result 575, Processing Time 0.043 seconds

Influence of Detailed Structure and Curvature of Woven Fabric on the Luminescence Effect of Wearable Optical Fiber Fabric (직물의 세부 구조 및 굴곡이 웨어러블 광섬유의 발광 효과에 미치는 영향)

  • Yang, Jin-Hee;Cho, Hyun-Seung;Kwak, Hwy-Kuen;Oh, Yun-Jung;Lee, Joo-Hyeon
    • Science of Emotion and Sensibility
    • /
    • v.21 no.4
    • /
    • pp.55-62
    • /
    • 2018
  • The two main requirements of wearable optical fiber fabrics are that they must presuppose a high degree of flexibility and they must maintain the luminance effect in both flat and bent conformations. Therefore, woven optical fiber fabrics that satisfy the above conditions were developed by both weaving and by using computer embroidery. First, we measured the brightness of the wearable optical fiber fabric in the flat state at a total of 10 measurement points at intervals of 1 cm. Second, the wearable optical fiber fabric was placed horizontally on the forearm, where three-dimensional bending occurs, and the luminance values were recorded at the same 10 measurement points. For the woven fabric in the flat state, the maximum, minimum, average, and standard deviation luminance values were $5.23cd/m^2$, $2.74cd/m^2$, $3.56cd/m^2$, and $1.11cd/m^2$, respectively. The corresponding luminance values from the bent forearm were $7.92cd/m^2$ (maximum), $2.37cd/m^2$ (minimum), $4.42cd/m^2$ (average), and $2.16cd/m^2$ (standard deviation). In the case of the computer-embroidered fabric, the maximum, minimum, average, and standard deviation luminance values in the flat state were $7.56cd/m^2$, $3.84cd/m^2$, $5.13cd/m^2$, and $1.04cd/m^2$, respectively, and in the bent forearm state were $9.6cd/m^2$, $3.63cd/m^2$, $6.13cd/m^2$, and $2.26cd/m^2$, respectively. Therefore, the computer-embroidered fabric exhibited a higher luminous effect than the woven fabric because the detailed structure reduced light-loss due to the backside fabric. In both types of wearable optical fiber fabric the luminance at the forearm was 124% and 119%, respectively, and the light emitting effect of the optical fiber fabric was maintained even when bent by the human body. This is consistent with the principle of Huygens, which defines the wave theory of light, and also the Huygens-Fresnel-Kirchhoff principle, which states that the intensity of light increases according to the magnitude of the angle of propagation of the light wavefront (${\theta}$).

A Proposal for Korean armed forces preparing toward Future war: Examine the U.S. 'Mosaic Warfare' Concept (미래전을 대비한 한국군 발전방향 제언: 미국의 모자이크전 수행개념 고찰을 통하여)

  • Chang, Jin O;Jung, Jae-young
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.215-240
    • /
    • 2020
  • In 2017, the U.S. DARPA coined 'mosaic warfare' as a new way of warfighting. According to the Timothy Grayson, director of DARPA's Strategic Technologies Office, mosaic warfare is a "system of system" approach to warfghting designed around compatible "tiles" of capabilities, rather than uniquely shaped "puzzle pieces" that must be fitted into a specific slot in a battle plan in order for it to work. Prior to cover mosaic warfare theory and recent development, it deals analyze its background and several premises for better understanding. The U.S. DoD officials might acknowledge the current its forces vulnerability to the China's A2/AD assets. Furthermore, the U.S. seeks to complete military superiority even in other nation's territorial domains including sea and air. Given its rapid combat restoration capability and less manpower casualty, the U.S. would be able to ready to endure war of attrition that requires massive resources. The core concept of mosaic warfare is a "decision centric warfare". To embody this idea, it create adaptability for U.S. forces and complexity or uncertainty for the enemy through the rapid composition and recomposition of a more disag g reg ated U.S. military force using human command and machine control. This allows providing more options to friendly forces and collapse adversary's OODA loop eventually. Adaptable kill web, composable force packages, A.I., and context-centric C3 architecture are crucial elements to implement and carry out mosaic warfare. Recently, CSBA showed an compelling assessment of mosaic warfare simulation. In this wargame, there was a significant differences between traditional and mosaic teams. Mosaic team was able to mount more simultaneous actions, creating additional complexity to adversaries and overwhelming their decision-making with less friendly force's human casualty. It increase the speed of the U.S. force's decision-making, enabling commanders to better employ tempo. Consequently, this article finds out and suggests implications for Korea armed forces. First of all, it needs to examine and develop 'mosaic warfare' in terms of our security circumstance. In response to future warfare, reviewing overall force structure and architecture is required which is able to compose force element regardless domain. In regards to insufficient defense resources and budget, "choice" and "concentration" are also essential. It needs to have eyes on the neighboring countries' development of future war concept carefully.

  • PDF

Universal Ethics and Pragmatic Pluralism (보편윤리학과 실용주의적 다원론)

  • Kwon, Su-Hyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.446-453
    • /
    • 2021
  • This paper deals with two methods regarding fact and value. One is the method of H. Putnam, which is to break the boundary between fact and value and to make a world where the two have an inherent connection. The other is the method of J. Habermas, which regards fact and value as the product of an intersubjective agreement based on argumentation. Putnam, through his position of internal realism, moves from realism to pragmatism, especially by combining the rationalist tradition of Kant and Dewey's pragmatic views. Habermas also stands in the tradition of rationalism and universalism in Kant, at the same time emphasizing the practicability of truth in Hegel's tradition of historical reason. The significance of the strategy of Putnam and Habermas is that they have attempted to revive the realm of value against the strict dichotomy of facts and values and the subsequent devaluation of rationality in the realm of value. The starting point of this attempt is that the practical foundation of rationality is laid on life and practice. This could provide the room for escaping from rationality, which prioritizes only truths that reveal facts, that is, instrument-reduced rationality, the room for the revival of practical rationality through reflection on what is the purpose of life, and, in turn, the room for resisting to pass the realm of values and norms to the logic of habitual routines or customs. However, despite such common goal, there are clear limitations to Putnam's approach due to the differences in the strategies taken on facts and values. Putnam's method can demolish the whole universal framework that is the foundation where pragmatic pluralism will be fostered, eliminating the difference between the specificity of values and the universality of norms and shaking up the status of universal ethics. Therefore, Habermas' ethical theory is proposed as an alternative to establish a basis for universal ethics by relying on communication rationality and to secure the coercion of norms and blossom cultural pluralism as a diverse lifestyle based on this coercion.

A Study on Calligraphy theory and the Calligraphy and Paintings aesthetic of GangAm, Song Sungyong (강암(剛菴) 송성용(宋成鏞)의 서예관과 서화미학 고찰)

  • Kim, Doyoung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.273-280
    • /
    • 2021
  • GangAm Song Sungyong (1913~1999) was from Gimje, Jeollabuk-do. And he is a calligrapher from the last Confucian scholar of the 20th century and a writer of poetry, calligraphy, and painting. While wearing a topcoat and hanbok for the rest of his life, he approached the study, thought, and calligraphy art of Yoo Jae Song Kimyeon and Kojae Lee Byungeun from the perspective of 'GucheSinyong'. And he kept the philosophical subjectivity that tries to maintain character and a right mind. It was based on 'Guche', which is a faithful succession to the reverence of the old. When I was young, I practiced Mibul and Dong Kichang with Gu Yangsun as the center, and Hwang Jeonggyeon, Hanye, Oh Heejae, and Sojeon typefaces were grafted together during the national exhibition. Then, in 1965 (age 53), he moved to Jeonju, and learned several typefaces such as Chusa typeface on his own, creating a Gangam typeface without any obstacles. And he created 'Sinyong' with Windy Bamboo painting, which embodied strange and unconventional meanings. In addition, he re-established his identity by reexamining the fundamental spirit and natural aesthetics of calligraphy, and based on this, he greatly contributed to expanding the aesthetics of modern calligraphy and painting art by pursuing an aesthetic that explores novelty. In particular, Windy Bamboo painting has strong abstraction based on the principle of 'drawing the will'. And, in terms of discipline, the ethical aesthetic of Express Tao with pictures (畵以載道), which expresses the high level of elegance of observing small things in a big way, based on deep research on the logic of things and fulfilling human nature. By implementing it, Tao and Art become one. The Jeonbuk calligraphy group achieved the greatest prosperity in the Gangam era, and at the end of the 20th century, it entered a period of revival as it established itself as the central calligraphy group of Korean calligraphy.

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.