What Michel Foucault has interpreted about Jeremy Bentham' Panopticon in the point of power relationship of ones's gaze is put in comparison with the characteristics shown in the modern media and mutual meanings are interpreted in the respect of a power relationship of modern gaze. Modern people communicating through media are placed in certain type of power relationship. This study analyzed the difference of it in the respect of the power of gaze in Panopticon and the consumption of information. Panopticon assumes single-network supervision, that is, one-way gaze. However, in modern media, interactive communication is possible based upon the development of information telecommunication technology. Therefore, this study aims to compare and study modern single-network supervision and multi-networks supervision based on information telecommunication technology. The development of various media such as internet, mobile phone and smart card has changed the single-network supervision system structured since modern times into the multi-network supervision system. 'Gaze-power' presented in the relationship to media enables us to discuss the problem of mutual receptiveness, the presence of various powers according to information structure and consumption power. In particular, the form provided by modern media has the complexity of mutual communication in the relationship of multi-networks, rather not assuming only one-way nature of single-network. Therefore, the approach of communication issue provided by modern media in the respect of multi-networks relationship was done by the power relationship of gaze in the respect of information communication. Gaze determines the power of watching. In addition, the visualization format aims at the power.
Journal of Korean Library and Information Science Society
/
v.15
/
pp.25-77
/
1988
A Library is the fundamental character of culture in a country and it is also a barometer of culture in its community. Every cultural reality, however, can hardly come to fruition in a short time and so, it will be effected through a long time and tradition. This study aims at catching up how the above-mentioned public libraries have an influence on culture of its community people. For this purpose, the actual conditions of the public libraries have been investigated and analyzed and as a result of it, the problems have been reilluminated from the nation-wide point of view. And in the new changes, developing improvement measures have been tried to find. How to study was on the basis of the actual materials of the on the-spot survey, the interviews with the working officials and the response by way of questionnaire. Summing up the investigated and analyzed contents are as followings. In the above mentioned province, therefore, number of the public libraries are very limited compared with number of the people. And so, it is very essential to increase the public libraries in the province. In terms of the actual conditions, the public libraries lags far behind the other provinces in Korea from this library field. The present chronic conditions are the budgetary deficit, the collections insufficient to the legal minimal standards, the lack of professional librarians ignorance of the people and library managements by unprofessionals, etc.. This hinders the progress of the public libraries and to seculate them from the people. The improvements and the solutions to the above-mentioned problems are as follows. 1. To recruit the personnel sufficient to the legal standards and to reorganize the offices and to turn upward the highest class of librarian's position above the 4th class. 2. To secure collections sufficient to the legal standards and to strang then the extension services. 3. To organize the council composed of the chief librarians of the public libraries including the working chiefs in the province and to develop the works-in-hand of the libraries from the level of decision-making. 4. To organize the librarian training group and to study the working problems and to seek the qualified improvement of librarians. 5. The management of the public libraries in the province are, at present, der the Ministry of Education and the local government takes the financial power. So both should be shortly unified. 6. To do regularly the course of how to use library materials for the community people and to seek the inducement measures for the people through the various cultural events. 7. The public libraries organize the mutual cooperation networks and to seek the system automatized plans of free use of library materials and every library works. 8. To enlarge book mobile system actively and to infiltrate into the daily living of people deeply. Finally, what the present writer would like to speak to the chief librarians of the public libraries the human aspects of librarians should not be ignored no mater how excellent a library organization may be. In addition to this, the present writter is sure that the far-reached future of our library organization will depend on the librarians.
The Journal of the Institute of Internet, Broadcasting and Communication
/
v.20
no.2
/
pp.149-155
/
2020
The Korea Highway Traffic Authority provides statistics that analyze the causes of traffic accidents that occurred since 2015 using the Traffic Accident Analysis System (TAAS). it was reported Through TAAS that the driver's forward carelessness was the main cause of traffic accidents in 2018. As statistics on the cause of traffic accidents, 51.2 percent used mobile phones and watched DMB while driving, 14 percent did not secure safe distance, and 3.6 percent violated their duty to protect pedestrians, representing a total of 68.8 percent. In this paper, we propose a system that has improved the advanced driver assistance system ADAS (Advanced Driver Assistance Systems) by utilizing CNN (Convolutional Neural Network) among the algorithms of Deep Learning. The proposed system learns a model that classifies the movement of the driver's face and eyes using Conv2D techniques which are mainly used for Image processing, while recognizing and detecting objects around the vehicle with cameras attached to the front of the vehicle to recognize the driving environment. Then, using the learned visual steering model and driving environment data, the hazard is classified and detected in three stages, depending on the driver's view and driving environment to assist the driver with the forward and blind spots.
Asia-Pacific Journal of Business Venturing and Entrepreneurship
/
v.15
no.5
/
pp.235-243
/
2020
The more consumers feel the brand as authentic, the better the brand image and the higher the purchase intention, so companies actively seek to build brand authenticity. On the other hand, the quality of products perceived by consumers comprehensively in consideration of various factors such as performance, durability, and materials can affect brand authenticity. The purpose of this study is to present useful implications by building a research model for quality and brand authenticity from a marketing point of view, and empirical analysis. For this, product quality and brand authenticity were theoretically defined, the relationship between them was identified, and ultimately the influence of these concepts on brand image was examined. In detail, a survey was conducted on a total of 286 consumers to find out the quality of the product, authenticity of the brand, and brand image, and the product to be surveyed was S20, the latest mobile phone of S Electronics. As a result of empirical analysis, although quality had a statistically significant positive effect on brand authenticity, the degree was not greater than expected. In addition, quality had a statistically significant positive effect on brand image, and its degree was large, but when quality and brand authenticity were considered together, it was found that the regression coefficient of brand authenticity was larger than that of quality. This means a partial mediating effect of brand authenticity. Therefore, in order to enhance the brand image and purchase intention of SMEs/Venture companies, a strategy that build brand authenticity simultaneously in consideration of the components presented in this study will be more effective than a strategy that focuses only on quality. This study proposes a variety of theoretical and practical implications by empirically examining the relationship between brand authenticity and brand image perceived by consumers through quality from a marketing perspective, based on a research model that was not discussed in previous studies. In particular, this study proposes a plan to build brand authenticity from the perspective of SMEs/Ventures.
Embedded systems and web browsers have started to provide two-dimensional vector graphics features, to finally support scalability of graphics outputs, while traditional graphics systems have focused on the raster and bitmap operations. Nowadays, SVG and Flash are actively used while OpenVG from Khronos group plays the role of a de facto low-level API standard to support them. In this paper, we represent the design and implementation process and the final results of an OpenVG implementation, AlexVG. From its design stage, our implementation aims at the cooperation with SVG-Tiny, another de facto standard for embedded systems. Currently, our overall system provides not only the OpenVG core features but also variety of OpenVG application programs and SVG-Tiny media file playing capabilities. For the conformance with the standard specifications, our system completely passed the whole OpenVG conformance test suites and the graphics output portions of the SVG-Tiny conformance test suites. From the performance point of view, we focused on the efficiency and effectiveness especially on the mobile phones and embedded devices with limited resources. As the result, it showed impressive benchmarks on the small-scale CPU's such as ARM's, even without neither any other libraries nor acceleration hardware.
Journal of Korea Society of Industrial Information Systems
/
v.23
no.5
/
pp.61-76
/
2018
Everything is coming into the world of network where modern people are living. The Internet of Things that attach sensors to objects allows real-time data transfer to and from the network. Mobile devices, essential for modern humans, play an important role in keeping all traces of everyday life in real time. Through the social network services, information acquisition activities and communication activities are left in a huge network in real time. From the business point of view, customer needs analysis begins with SNS data. In this research, we want to build an automatic collection system of SNS contents of web environment in real time using Python. We want to help customers' needs analysis through the typical data collection system of Instagram, Twitter, and YouTube, which has a large number of users worldwide. It is stored in database through the exploitation process and NLP process by using the virtual web browser in the Python web server environment. According to the results of this study, we want to conduct service through the site, the desired data is automatically collected by the search function and the netizen's response can be confirmed in real time. Through time series data analysis. Also, since the search was performed within 5 seconds of the execution result, the advantage of the proposed algorithm is confirmed.
Recently, an introduction of the cloud computing causes rapid changes in every aspect of the internet environments including hardware, operating systems, applications, and their services. As the cloud computing environment based on SaaS are being developed to a form in which web platform technology and web cloud services are converged. The digital library system also has been being developed to a service model optimized to SaaS based cloud computing environment, which are different from ASP technology. From the web interface point of view, user customization of the SaaS based cloud computing environment is the most important fact. Therefore, this research work suggests a customized web interface considering usability and accessibility so that enterprises and individual users can be able to do an effortless internet browsing under the cloud computing environment. For this purpose, usability tests were carried out as the user customized web interface design were developed and applied to the LinkSaaS website. This paper work lastly presents an UI environment on which customized interface design for individual users can be formulated.
Recently, shooting photographs have become highly popular among general public and been used by various media such as digital camera, mobile, and kiosk. We could find that users prefer to Funology which is combined by fun and hardware technology on emotional point of view. Shooting photographs attracts user participation and makes effect of design to expand. The goal of this study is to classify user actions in a electronic kiosk which includes digital photography function based on the perspective of Funology and to bulit user behaviors model. Therefore user group model will be defined, and then interaction design guidelines of shooting photographs will be proposed. For this research, first of all, the concepts of Funology and user interaction with taking photographs are classified to three types which is based on literature investigation. Secondly, "Phodosee" kiosk is examined with Funology design elements which have been categorized beforehand. Then user's behaviors which are shown their interaction with "Phodosee" kiosk are observed and analyzed using video ethnography based on Funology perspectives. Finally, four persona models are suggested based on user's behaviors as follows; 1) to avoid being taken photography, 2) to try to shoot photography, 3) to participate shooting photography and 4) to lead others to take photography. To summarize this study, effects and limitations of Funology design elements using digital photography are discussed and guideline is suggested to improve user experience design.
Due to the increasing demand for clean energy, the consumption of lithium ion batteries (LIBs) is expected to grow steadily. Therefore, stable supply of lithium is becoming an important issue globally. Commercially, most of lithium is produced from the brine and minerals viz., spodumene, although various processes/technologies have been developed to recover lithium from other resources such as low grade ores, clays, seawaters and waste lithium ion batteries. In particular, commercialization of such recycling technologies for end-of-life LIBs being generated from various sources including mobile phones and electric vehicles(EVs), has a great potential. This review presents the commercial processes and also the emerging technologies for exploiting minerals and brines, besides that of newly developed lithium-recovery-processes for the waste LIBs. In addition, the future lithium-supply is discussed from the technical point of view. Amongst the emerging processes being developed for lithium recovery from low-grade ores, focus is mostly on the pyro-cum-hydrometallurgical based approaches, though only a few of such approaches have matured. Because of low recycling rate (<1%) of lithium globally compared to the consumption of lithium ion batteries (56% of lithium produced currently), processing of secondary resources could be foresighted as the grand opportunity. Considering the carbon economy, environment, and energy concerns, the hydrometallurgical process may potentially resolve the issue.
The smartphone is the communication device that is the most personal to the user, and it keeps a lot of information related to the user and makes information communication with other devices. With these characteristics, forensics on smartphones are one of the most basic methods of investigation in criminal investigations, and have actually contributed to the settlement of the case by providing many clues. However, recently, it is designed to encrypt data stored as a social issue related to the protection of user's personal information, or to delete deleted data or to delete log data together. So, any solutions? In this paper, I try to find the answer from cloud data stored by smartphone user account. Cloud forensics should approach complementary relationships rather than smartphone forensics. There are a lot of data stored in the cloud that can be meaningfully used in the investigation. Online activity information of users, such as Internet usage, YouTube view, and contents purchase information, cloud service such as e-mail, cloud drive, and location information are the most representative data. These data can be unvaluable, but here are some important clues in various types of criminal investigations. In this paper, I propose a method to extract data from the google cloud so that the data can be used for investigation, and to utilize the extracted data for investigation. And it explains the role of the extracted artifacts in the actual investigation business through virtual cases and proves its value.
이메일무단수집거부
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.