• Title/Summary/Keyword: Portugal

Search Result 84, Processing Time 0.017 seconds

A Comparison of the Metanarrative and East Timor's Local Narrative in Indonesia under the Suharto's Regime (인도네시아의 메타내러티브와 동티모르의 로칼내러티브의 서술구조 비교)

  • Song, Seung-Won
    • Journal of International Area Studies (JIAS)
    • /
    • v.15 no.1
    • /
    • pp.155-180
    • /
    • 2011
  • This paper aims at comparing the metanarrative and East Timor's local narrative in Indonesia during the Suharto's regime. Although these history writings have different political goals, the patterns of writings are ironically similar. Both of the history writings show strong nationalistic history writing patterns. Yet, in the writings, these histories place different interpretations on the historical events. In the metanarrative, local dynamics are seen through the diagrams of the nation and nationhood. This narrative finds the roots of the "ethnie" from some kingdoms in Java and Sumatra. These kingdoms, which throve based on the Hindu-Buddhist culture, achieved a territorial unity to a degree, covering some parts of Java and Sumatra. The glorious past disappeared with the advent of the colonial rule. The metanarrative then emphasizes the unity of the ethnic groups in the archipelago, which fiercely resisted against the colonial exploitation and oppression. By this, these ethnic groups were defined as "the masses," the collective identity, which had a same goal to achieve the national independence. In addition, some local histories, which took positive attitudes toward the European forces, were simply left out from the metanarrative. All the separatist movements taking place in the republic were also described as the anti-unifying forces. On the other hand, the goal of the history-writing in East Timor was to enhance the sense of nationalism and create the perception of the "East Timorese." The fundamental aim was the separation from Indonesia. In the narrative, the nationalist politicians overcame the problem of the non-existence of any memories of the glorious past with the awakening of the idea of "the imagined gloriousness of the past if there was no colonial rule." In addition, the narrative overemphasizes the memory of the colonial rule for 450 years under the Portuguese rule in order to stress the fact that it was the colony of Portugal, not of the Netherlands. Finally, the narrative shows how the East Timorese collectively fell to the status of slaves. By this, the political leaders of East Timor evoked the notion that it was recolonized by Indonesia, under which the East Timorese were demoted to the status of slaves. This notion of "slave-master" relationship then became the motives for the independence struggles in East Timor.

The Characteristics of Korean Family Law - A Comparison with EU-Countries in Regard to Regime Classification - (한국 가족법의 특수성 - EU 국가와의 비교를 통한 유형 구분 -)

  • Chung, Yun Tag
    • Korean Journal of Social Welfare Studies
    • /
    • v.41 no.4
    • /
    • pp.161-187
    • /
    • 2010
  • This study begins with two research interests. Firstly, there seems to be a break of research in the field of family policy in Korea which exists especially in regard to family law. Family law was originally the core of state interventions in family life, but has been neglected because of the lack of literature with comparative research methods. This shortcoming needs to be addressed. Secondly, through inquiry into the definition of family or family policy with the lens of the law, the definition of family or family policy can be correctly extended. With these two interests combined, this research tries to derive an analytical tool - maintenance community - of the law and compare some important points of the family law of Korea with those of 16 EU-countries in terms of regime classification. The method used is, firstly, to describe the subjects of family law with a focus on partnering and parenting without subjective interpretation, and secondly, to classify the countries' family-law regimes with the criteria of privacy and autonomy using cluster analysis. The results show that the countries can be classified into three clusters: Nordic (Norway and Sweden), West-Northern (Denmark, France, England, Finland, and Belgium) and Middle South (Italy, Spain, Austria, Portugal, Netherlands, Greece, Ireland, Germany, and Korea). This result can be compared to a precedent research result which showed that 21 OECD countries can be classified in three clusters according to family policy. The number of the clusters is the same as this study, but some countries belong to other clusters; for example Denmark and Finland belong to the Nordic cluster according to family policy, while they belong to the West-Northern according to family law, and Austria, Germany, and Ireland belong to the Middle-South cluster according to family law, while they belong to the Continental according to family policy. From this result we can interpret Korean family law to be in the middle range according to both criteria of privacy and autonomy like other South-European countries including some Continental countries. We can make some theoretical suggestions. The fact that both family law and family policy regimes in countries can be classified into three clusters can be interpreted to mean that there exists parallelism between family law and family policy in a broad sense. But from the fact that some countries belong to different clusters according to family law and family policy, we can say that the family policy in a country is not always consistent with family law.

Feasibility of Deep Learning Algorithms for Binary Classification Problems (이진 분류문제에서의 딥러닝 알고리즘의 활용 가능성 평가)

  • Kim, Kitae;Lee, Bomi;Kim, Jong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.95-108
    • /
    • 2017
  • Recently, AlphaGo which is Bakuk (Go) artificial intelligence program by Google DeepMind, had a huge victory against Lee Sedol. Many people thought that machines would not be able to win a man in Go games because the number of paths to make a one move is more than the number of atoms in the universe unlike chess, but the result was the opposite to what people predicted. After the match, artificial intelligence technology was focused as a core technology of the fourth industrial revolution and attracted attentions from various application domains. Especially, deep learning technique have been attracted as a core artificial intelligence technology used in the AlphaGo algorithm. The deep learning technique is already being applied to many problems. Especially, it shows good performance in image recognition field. In addition, it shows good performance in high dimensional data area such as voice, image and natural language, which was difficult to get good performance using existing machine learning techniques. However, in contrast, it is difficult to find deep leaning researches on traditional business data and structured data analysis. In this study, we tried to find out whether the deep learning techniques have been studied so far can be used not only for the recognition of high dimensional data but also for the binary classification problem of traditional business data analysis such as customer churn analysis, marketing response prediction, and default prediction. And we compare the performance of the deep learning techniques with that of traditional artificial neural network models. The experimental data in the paper is the telemarketing response data of a bank in Portugal. It has input variables such as age, occupation, loan status, and the number of previous telemarketing and has a binary target variable that records whether the customer intends to open an account or not. In this study, to evaluate the possibility of utilization of deep learning algorithms and techniques in binary classification problem, we compared the performance of various models using CNN, LSTM algorithm and dropout, which are widely used algorithms and techniques in deep learning, with that of MLP models which is a traditional artificial neural network model. However, since all the network design alternatives can not be tested due to the nature of the artificial neural network, the experiment was conducted based on restricted settings on the number of hidden layers, the number of neurons in the hidden layer, the number of output data (filters), and the application conditions of the dropout technique. The F1 Score was used to evaluate the performance of models to show how well the models work to classify the interesting class instead of the overall accuracy. The detail methods for applying each deep learning technique in the experiment is as follows. The CNN algorithm is a method that reads adjacent values from a specific value and recognizes the features, but it does not matter how close the distance of each business data field is because each field is usually independent. In this experiment, we set the filter size of the CNN algorithm as the number of fields to learn the whole characteristics of the data at once, and added a hidden layer to make decision based on the additional features. For the model having two LSTM layers, the input direction of the second layer is put in reversed position with first layer in order to reduce the influence from the position of each field. In the case of the dropout technique, we set the neurons to disappear with a probability of 0.5 for each hidden layer. The experimental results show that the predicted model with the highest F1 score was the CNN model using the dropout technique, and the next best model was the MLP model with two hidden layers using the dropout technique. In this study, we were able to get some findings as the experiment had proceeded. First, models using dropout techniques have a slightly more conservative prediction than those without dropout techniques, and it generally shows better performance in classification. Second, CNN models show better classification performance than MLP models. This is interesting because it has shown good performance in binary classification problems which it rarely have been applied to, as well as in the fields where it's effectiveness has been proven. Third, the LSTM algorithm seems to be unsuitable for binary classification problems because the training time is too long compared to the performance improvement. From these results, we can confirm that some of the deep learning algorithms can be applied to solve business binary classification problems.

Change Acceptable In-Depth Searching in LOD Cloud for Efficient Knowledge Expansion (효과적인 지식확장을 위한 LOD 클라우드에서의 변화수용적 심층검색)

  • Kim, Kwangmin;Sohn, Yonglak
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.171-193
    • /
    • 2018
  • LOD(Linked Open Data) cloud is a practical implementation of semantic web. We suggested a new method that provides identity links conveniently in LOD cloud. It also allows changes in LOD to be reflected to searching results without any omissions. LOD provides detail descriptions of entities to public in RDF triple form. RDF triple is composed of subject, predicates, and objects and presents detail description for an entity. Links in LOD cloud, named identity links, are realized by asserting entities of different RDF triples to be identical. Currently, the identity link is provided with creating a link triple explicitly in which associates its subject and object with source and target entities. Link triples are appended to LOD. With identity links, a knowledge achieves from an LOD can be expanded with different knowledge from different LODs. The goal of LOD cloud is providing opportunity of knowledge expansion to users. Appending link triples to LOD, however, has serious difficulties in discovering identity links between entities one by one notwithstanding the enormous scale of LOD. Newly added entities cannot be reflected to searching results until identity links heading for them are serialized and published to LOD cloud. Instead of creating enormous identity links, we propose LOD to prepare its own link policy. The link policy specifies a set of target LODs to link and constraints necessary to discover identity links to entities on target LODs. On searching, it becomes possible to access newly added entities and reflect them to searching results without any omissions by referencing the link policies. Link policy specifies a set of predicate pairs for discovering identity between associated entities in source and target LODs. For the link policy specification, we have suggested a set of vocabularies that conform to RDFS and OWL. Identity between entities is evaluated in accordance with a similarity of the source and the target entities' objects which have been associated with the predicates' pair in the link policy. We implemented a system "Change Acceptable In-Depth Searching System(CAIDS)". With CAIDS, user's searching request starts from depth_0 LOD, i.e. surface searching. Referencing the link policies of LODs, CAIDS proceeds in-depth searching, next LODs of next depths. To supplement identity links derived from the link policies, CAIDS uses explicit link triples as well. Following the identity links, CAIDS's in-depth searching progresses. Content of an entity obtained from depth_0 LOD expands with the contents of entities of other LODs which have been discovered to be identical to depth_0 LOD entity. Expanding content of depth_0 LOD entity without user's cognition of such other LODs is the implementation of knowledge expansion. It is the goal of LOD cloud. The more identity links in LOD cloud, the wider content expansions in LOD cloud. We have suggested a new way to create identity links abundantly and supply them to LOD cloud. Experiments on CAIDS performed against DBpedia LODs of Korea, France, Italy, Spain, and Portugal. They present that CAIDS provides appropriate expansion ratio and inclusion ratio as long as degree of similarity between source and target objects is 0.8 ~ 0.9. Expansion ratio, for each depth, depicts the ratio of the entities discovered at the depth to the entities of depth_0 LOD. For each depth, inclusion ratio illustrates the ratio of the entities discovered only with explicit links to the entities discovered only with link policies. In cases of similarity degrees with under 0.8, expansion becomes excessive and thus contents become distorted. Similarity degree of 0.8 ~ 0.9 provides appropriate amount of RDF triples searched as well. Experiments have evaluated confidence degree of contents which have been expanded in accordance with in-depth searching. Confidence degree of content is directly coupled with identity ratio of an entity, which means the degree of identity to the entity of depth_0 LOD. Identity ratio of an entity is obtained by multiplying source LOD's confidence and source entity's identity ratio. By tracing the identity links in advance, LOD's confidence is evaluated in accordance with the amount of identity links incoming to the entities in the LOD. While evaluating the identity ratio, concept of identity agreement, which means that multiple identity links head to a common entity, has been considered. With the identity agreement concept, experimental results present that identity ratio decreases as depth deepens, but rebounds as the depth deepens more. For each entity, as the number of identity links increases, identity ratio rebounds early and reaches at 1 finally. We found out that more than 8 identity links for each entity would lead users to give their confidence to the contents expanded. Link policy based in-depth searching method, we proposed, is expected to contribute to abundant identity links provisions to LOD cloud.