• Title/Summary/Keyword: traditional system

Search Result 6,539, Processing Time 0.036 seconds

A Study on the Effect of Network Centralities on Recommendation Performance (네트워크 중심성 척도가 추천 성능에 미치는 영향에 대한 연구)

  • Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.23-46
    • /
    • 2021
  • Collaborative filtering, which is often used in personalization recommendations, is recognized as a very useful technique to find similar customers and recommend products to them based on their purchase history. However, the traditional collaborative filtering technique has raised the question of having difficulty calculating the similarity for new customers or products due to the method of calculating similaritiesbased on direct connections and common features among customers. For this reason, a hybrid technique was designed to use content-based filtering techniques together. On the one hand, efforts have been made to solve these problems by applying the structural characteristics of social networks. This applies a method of indirectly calculating similarities through their similar customers placed between them. This means creating a customer's network based on purchasing data and calculating the similarity between the two based on the features of the network that indirectly connects the two customers within this network. Such similarity can be used as a measure to predict whether the target customer accepts recommendations. The centrality metrics of networks can be utilized for the calculation of these similarities. Different centrality metrics have important implications in that they may have different effects on recommended performance. In this study, furthermore, the effect of these centrality metrics on the performance of recommendation may vary depending on recommender algorithms. In addition, recommendation techniques using network analysis can be expected to contribute to increasing recommendation performance even if they apply not only to new customers or products but also to entire customers or products. By considering a customer's purchase of an item as a link generated between the customer and the item on the network, the prediction of user acceptance of recommendation is solved as a prediction of whether a new link will be created between them. As the classification models fit the purpose of solving the binary problem of whether the link is engaged or not, decision tree, k-nearest neighbors (KNN), logistic regression, artificial neural network, and support vector machine (SVM) are selected in the research. The data for performance evaluation used order data collected from an online shopping mall over four years and two months. Among them, the previous three years and eight months constitute social networks composed of and the experiment was conducted by organizing the data collected into the social network. The next four months' records were used to train and evaluate recommender models. Experiments with the centrality metrics applied to each model show that the recommendation acceptance rates of the centrality metrics are different for each algorithm at a meaningful level. In this work, we analyzed only four commonly used centrality metrics: degree centrality, betweenness centrality, closeness centrality, and eigenvector centrality. Eigenvector centrality records the lowest performance in all models except support vector machines. Closeness centrality and betweenness centrality show similar performance across all models. Degree centrality ranking moderate across overall models while betweenness centrality always ranking higher than degree centrality. Finally, closeness centrality is characterized by distinct differences in performance according to the model. It ranks first in logistic regression, artificial neural network, and decision tree withnumerically high performance. However, it only records very low rankings in support vector machine and K-neighborhood with low-performance levels. As the experiment results reveal, in a classification model, network centrality metrics over a subnetwork that connects the two nodes can effectively predict the connectivity between two nodes in a social network. Furthermore, each metric has a different performance depending on the classification model type. This result implies that choosing appropriate metrics for each algorithm can lead to achieving higher recommendation performance. In general, betweenness centrality can guarantee a high level of performance in any model. It would be possible to consider the introduction of proximity centrality to obtain higher performance for certain models.

Creativity of the Unconscious and Religion : Focusing on Christianity (무의식의 창조성과 종교 : 그리스도교를 중심으로)

  • Jung-Taek Kim
    • Sim-seong Yeon-gu
    • /
    • v.26 no.1
    • /
    • pp.36-66
    • /
    • 2011
  • The goal of this article is to examine the connection between creativity of unconscious and religion. Jung criticized how Freud's approach in studying the unconscious as a scientific inquiry focuses on the unconscious as reflecting only those which is repressed by the ego. Jung conceived of the unconscious as encompassing not only the repressed but also the variety of other psychic materials that have not reached the threshold of the consciousness in its range. Moreover, since human psyche is as individualistic as is a collective phenomenon, the collective psyche is thought to be pervasive at the bottom of the psychic functioning and the conscious and the personal unconscious comprising the upper level of the psychic functioning. Through clinical and personal experience, Jung had come to a realization that the unconscious has the self-regulatory function. The unconscious can make "demands" and also can retract its demands. Jung saw this as the autonomous function of the unconscious. And this autonomous unconscious creates, through dreams and fantasies, images that include an abundance of ideas and feelings. These creative images the unconscious produces assist and lead the "individuation process" which leads to the discovery of the Self. Because this unconscious process compensates the conscious ego, it has the necessary ingredients for self-regulation and can function in a creative and autonomous fashion. Jung saw religion as a special attitude of human psyche, which can be explained by careful and diligent observation about a dynamic being or action, which Rudolph Otto called the Numinosum. This kind of being or action does not get elicited by artificial or willful action. On the contrary, it takes a hold and dominates the human subject. Jung distinguished between religion and religious sector or denomination. He explained religious sector as reflecting the contents of sanctified and indoctrinated religious experiences. It is fixated in the complex organization of ritualized thoughts. And this ritualization gives rise to a system that is fixated. There is a clear goal in the religious sector to replace intellectual experiences with firmly established dogma and rituals. Religion as Jung experienced is the attitude of contemplation about Numinosum, which is formed by the images of the collective unconscious that is propelled by the creativity and autonomy of the unconscious. Religious sector is a religious community that is formed by these images that are ritualized. Jung saw religion as the relationship with the best or the uttermost value. And this relationship has a duality of being involuntary and reflecting free will. Therefore people can be influenced by one value, overcome with the unconscious being charged with psychic energy, or could accept it on a conscious level. Jung saw God as the dominating psychic element among humans or that psychic reality itself. Although Jung grew up in the atmosphere of the traditional Swiss reformed church, it does not seem that he considered himself to be a devoted Christian. To Jung, Christianity is a habitual, ritualized institution, which lacked vitality because it did not have the intellectual honesty or spiritual energy. However, Jung's encounter with the dramatic religious experience at age 12 through hallucination led him to perceive the existence of living god in his unconscious. This is why the theological questions and religious problems in everyday life became Jung's life-long interest. To this author, the reason why Jung delved into problems with religion has to do with his personal interest and love for the revival of the Christian church which had lost its spiritual vitality and depth and had become heavily ritualized.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Comparison of CT based-CTV plan and CT based-ICRU38 plan in Brachytherapy Planning of Uterine Cervix Cancer (자궁경부암 강내조사 시 CT를 이용한 CTV에 근거한 치료계획과 ICRU 38에 근거한 치료계획의 비교)

  • Cho, Jung-Ken;Han, Tae-Jong
    • Journal of Radiation Protection and Research
    • /
    • v.32 no.3
    • /
    • pp.105-110
    • /
    • 2007
  • Purpose : In spite of recent remarkable improvement of diagnostic imaging modalities such as CT, MRI, and PET and radiation therapy planing systems, ICR plan of uterine cervix cancer, based on recommendation of ICRU38(2D film-based) such as Point A, is still used widely. A 3-dimensional ICR plan based on CT image provides dose-volume histogram(DVH) information of the tumor and normal tissue. In this study, we compared tumor-dose, rectal-dose and bladder-dose through an analysis of DVH between CTV plan and ICRU38 plan based on CT image. Method and Material : We analyzed 11 patients with a cervix cancer who received the ICR of Ir-192 HDR. After 40Gy of external beam radiation therapy, ICR plan was established using PLATO(Nucletron) v.14.2 planing system. CT scan was done to all the patients using CT-simulator(Ultra Z, Philips). We contoured CTV, rectum and bladder on the CT image and established CTV plan which delivers the 100% dose to CTV and ICRU plan which delivers the 100% dose to the point A. Result : The volume$(average{\pm}SD)$ of CTV, rectum and bladder in all of 11 patients is $21.8{\pm}6.6cm^3,\;60.9{\pm}25.0cm^3,\;111.6{\pm}40.1cm^3$ respectively. The volume covered by 100% isodose curve is $126.7{\pm}18.9cm^3$ in ICRU plan and $98.2{\pm}74.5cm^3$ in CTV plan(p=0.0001), respectively. In (On) ICRU planning, $22.0cm^3$ of CTV volume was not covered by 100% isodose curve in one patient whose residual tumor size is greater than 4cm, while more than 100% dose was irradiated unnecessarily to the normal organ of $62.2{\pm}4.8cm^3$ other than the tumor in the remaining 10 patients with a residual tumor less than 4cm in size. Bladder dose recommended by ICRU 38 was $90.1{\pm}21.3%$ and $68.7{\pm}26.6%$ in ICRU plan and in CTV plan respectively(p=0.001) while rectal dose recommended by ICRU 38 was $86.4{\pm}18.3%$ and $76.9{\pm}15.6%$ in ICRU plan and in CTV plan, respectively(p=0.08). Bladder and rectum maximum dose was $137.2{\pm}50.1%,\;101.1{\pm}41.8%$ in ICRU plan and $107.6{\pm}47.9%,\;86.9{\pm}30.8%$ in CTV plan, respectively. Therefore, the radiation dose to normal organ was lower in CTV plan than in ICRU plan. But the normal tissue dose was remarkably higher than a recommended dose in CTV plan in one patient whose residual tumor size was greater than 4cm. The volume of rectum receiving more than 80% isodose (V80rec) was $1.8{\pm}2.4cm^3$ in ICRU plan and $0.7{\pm}1.0cm^3$ in CTV plan(p=0.02). The volume of bladder receiving more than 80% isodose(V80bla) was $12.2{\pm}8.9cm^3$ in ICRU plan and $3.5{\pm}4.1cm^3$ in CTV plan(p=0.005). According to these parameters, CTV plan could also save more normal tissue compared to ICRU38 plan. Conclusion : An unnecessary excessive radiation dose is irradiated to normal tissues within 100% isodose area in the traditional ICRU plan in case of a small size of cervix cancer, but if we use CTV plan based on CT image, the normal tissue dose could be reduced remarkably without a compromise of tumor dose. However, in a large tumor case, we need more research on an effective 3D-planing to reduce the normal tissue dose.

A Review Examining the Dating, Analysis of the Painting Style, Identification of the Painter, and Investigation of the Documentary Records of Samsaebulhoedo at Yongjusa Temple (용주사(龍珠寺) <삼세불회도(三世佛會圖)> 연구의 연대 추정과 양식 분석, 작가 비정, 문헌 해석의 검토)

  • Kang, Kwanshik
    • MISULJARYO - National Museum of Korea Art Journal
    • /
    • v.97
    • /
    • pp.14-54
    • /
    • 2020
  • The overall study of Samsaebulhoedo (painting of the Assembly of Buddhas of Three Ages) at Yongjusa Temple has focused on dating it, analyzing the painting style, identifying its painter, and scrutinizing the related documents. However, its greater coherence could be achieved through additional support from empirical evidence and logical consistency. Recent studies on Samsaebulhoedo at Yongjusa Temple that postulate that the painting could have been produced by a monk-painter in the late nineteenth century and that an original version produced in 1790 could have been retouched by a painter in the 1920s using a Western painting style lack such empirical proof and logic. Although King Jeongjo's son was not yet installed as crown prince, the Samsaebulhoedo at Yongjusa Temple contained a conventional written prayer wishing for a long life for the king, queen, and crown prince: "May his majesty the King live long / May her majesty the Queen live long / May his highness the Crown Prince live long" (主上殿下壽萬歲, 王妃殿下壽萬歲, 世子邸下壽萬歲). Later, this phrase was erased using cinnabar and revised to include unusual content in an exceptional order: "May his majesty the King live long / May his highness the King's Affectionate Mother (Jagung) live long / May her majesty the Queen live long / May his highness the Crown Prince live long" (主上殿下壽萬歲, 慈宮邸下壽萬歲, 王妃殿下壽萬歲, 世子邸下壽萬歲). A comprehensive comparison of the formats and contents in written prayers found on late Joseon Buddhist paintings and a careful analysis of royal liturgy during the reign of King Jeongjo reveal Samsaebulhoedo at Yongjusa Temple to be an original version produced at the time of the founding of Yongjusa Temple in 1790. According to a comparative analysis of formats, iconography, styles, aesthetic sensibilities, and techniques found in Buddhist paintings and paintings by Joseon court painters from the eighteenth and nineteenth centuries, Samsaebulhoedo at Yongjusa Temple bears features characteristic of paintings produced around 1790, which corresponds to the result of analysis on the written prayer. Buddhist paintings created up to the early eighteenth century show deities with their sizes determined by their religious status and a two-dimensional conceptual composition based on the traditional perspective of depicting close objects in the lower section and distant objects above. This Samsaebulhoedo, however, systematically places the Buddhist deities within a threedimensional space constructed by applying a linear perspective. Through the extensive employment of chiaroscuro as found in Western painting, it expresses white highlights and shadows, evoking a feeling that the magnificent world of the Buddhas of the Three Ages actually unfolds in front of viewers. Since the inner order of a linear perspective and the outer illusion of chiaroscuro shading are intimately related to each other, it is difficult to believe that the white highlights were a later addition. Moreover, the creative convergence of highly-developed Western painting style and techniques that is on display in this Samsaebulhoedo could only have been achieved by late-Joseon court painters working during the reign of King Jeongjo, including Kim Hongdo, Yi Myeong-gi, and Kim Deuksin. Deungun, the head monk of Yongjusa Temple, wrote Yongjusa sajeok (History of Yongjusa Temple) by compiling the historical records on the temple that had been transmitted since its founding. In Yongjusa sajeok, Deungun recorded that Kim Hongdo painted Samsaebulhoedo as if it were a historical fact. The Joseon royal court's official records, Ilseongnok (Daily Records of the Royal Court and Important Officials) and Suwonbu jiryeong deungnok (Suwon Construction Records), indicate that Kim Hongdo, Yi Myeong-gi, and Kim Deuksin all served as a supervisor (gamdong) for the production of Buddhist paintings. Since within Joseon's hierarchical administrative system it was considered improper to allow court painters of government position to create Buddhist paintings which had previously been produced by monk-painters, they were appointed as gamdong in name only to avoid a political liability. In reality, court painters were ordered to create Buddhist paintings. During their reigns, King Yeongjo and King Jeongjo summoned the literati painters Jo Yeongseok and Kang Sehwang to serve as gamdong for the production of royal portraits and requested that they paint these portraits as well. Thus, the boundary between the concept of supervision and that of painting occasionally blurred. Supervision did not completely preclude painting, and a gamdong could also serve as a painter. In this light, the historical records in Yongjusa sajeok are not inconsistent with those in Ilseongnok, Suwonbu jiryeong deungnok, and a prayer written by Hwang Deok-sun, which was found inside the canopy in Daeungjeon Hall at Yongjusa Temple. These records provided the same content in different forms as required for their purposes and according to the context. This approach to the Samsaebulhoedo at Yongjusa Temple will lead to a more coherent explanation of dating the painting, analyzing its style, identifying its painter, and interpreting the relevant documents based on empirical grounds and logical consistency.

A study on the Greeting's Types of Ganchal in Joseon Dynasty (간찰(簡札)의 안부인사(安否人事)에 대한 유형(類型) 연구(硏究))

  • Jeon, Byeong-yong
    • (The)Study of the Eastern Classic
    • /
    • no.57
    • /
    • pp.467-505
    • /
    • 2014
  • I am working on a series of Korean linguistic studies targeting Ganchal(old typed letters in Korea) for many years and this study is for the typology of the [Safety Expression] as the part. For this purpose, [Safety Expression] were divided into a formal types and semantic types, targeting the Chinese Ganchal and Hangul Ganchal of modern Korean Language time(16th century-19th century). Formal types can be divided based on whether Normal position or not, whether Omission or not, whether the Sending letter or not, whether the relationship of the high and the low or not. Normal position form and completion were made the first type which reveal well the typicality of the [Safety Expression]. Original position while [Own Safety] omitted as the second type, while Original position while [Opposite Safety] omitted as the third type, Original position while [Safety Expression] omitted as the fourth type. Inversion type were made as the fifth type which is the most severe solecism in [Safety Expression]. The first type is refers to Original position type that [Opposite Safety] precede the [Own Safety] and the completion type that is full of semantic element. This type can be referred to most typical and normative in that it equipped all components of [Safety Expression]. A second type is that [Safety Expression] is composed of only the [Opposite Safety]. This type is inferior to the first type in terms of set pattern, it is never outdone when it comes to the appearance frequency. Because asking [Opposite Safety] faithfully, omitting [Own Safety] dose not greatly deviate politeness and easy to write Ganchal, it is utilized. The third type is the Original position type showing the configuration of the [Opposite Safety]+Own Safety], but [Opposite Safety] is omitted. The fourth type is a Original position type showing configuration of the [Opposite Safety+Own Safety], but [Safety Expression] is omitted. This type is divided into A ; [Safety Expression] is entirely omitted and B ; such as 'saving trouble', the conventional expression, replace [Safety Expression]. The fifth type is inversion type that shown to structure of the [Own Safety+Opposite Safety], unlike the Original position type. This type is the most severe solecism type and real example is very rare. It is because let leading [Own Safety] and ask later [Opposite Safety] for face save is offend against common decency. In addition, it can be divided into the direct type that [Opposite Safety] and [Own Safety] is directly connected and indirect type that separate into the [story]. The semantic types of [Safety Expression] can be classified based on whether Sending letter or not, fast or slow, whether intimate or not, and isolation or not. For Sending letter, [Safety Expression] consists [Opposite Safety(Climate+Inquiry after health+Mental state)+Own safety(status+Inquiry after health+Mental state)]. At [Opposite safety], [Climate] could be subdivided as [Season] information and [Climate(weather)] information. Also, [Mental state] is divided as receiver's [Family Safety Mental state] and [Individual Safety Mental state]. In [Own Safety], [Status] is divided as receiver's traditional situation; [Recent condition] and receiver's ongoing situation; [Present condition]. [Inquiry after health] is also subdivided as receiver's [Family Safety] and [Individual Safety], [Safety] is as [Family Safety] and [Individual Safety]. Likewise, [Inquiry after health] or [Safety] is usually used as pairs, in dimension of [Family] and [Individual]. This phenomenon seems to have occurred from a big family system, which is defined as taking care of one's parents or grand parents. As for the Written Reply, [Safety Expression] consists [Opposite Safety (Reception+Inquiry after health+Mental state)+Own safety(status+Inquiry after health+Mental state)], and only in [Opposite safety], a difference in semantic structure happens with Sending letter. In [Opposite Safety], [Reception] is divided as [Letter] which is Ganchal that is directly received and [Message], which is news that is received indirectly from people. [Safety] is as [Family Safety] and [Individual Safety], [Mental state] also as [Family Safety Mental state] and [Individual Safety Mental state].

The actual aspects of North Korea's 1950s Changgeuk through the Chunhyangjeon in the film Moranbong(1958) and the album Corée Moranbong(1960) (영화 <모란봉>(1958)과 음반 (1960) 수록 <춘향전>을 통해 본 1950년대 북한 창극의 실제적 양상)

  • Song, Mi-Kyoung
    • (The) Research of the performance art and culture
    • /
    • no.43
    • /
    • pp.5-46
    • /
    • 2021
  • The film Moranbong is the product of a trip to North Korea in 1958, when Armangati, Chris Marker, Claude Lantzmann, Francis Lemarck and Jean-Claude Bonardo left at the invitation of Joseon Film. However, for political reasons, the film was not immediately released, and it was not until 2010 that it was rediscovered and received attention. The movie consists of the narratives of Young-ran and Dong-il, set in the Korean War, that are folded into the narratives of Chunhyang and Mongryong in the classic Chunhyangjeon of Joseon. At this time, Joseon's classics are reproduced in the form of the drama Chunhyangjeon, which shares the time zone with the two main characters, and the two narratives are covered in a total of six scenes. There are two layers of middle-story frames in the movie, and if the same narrative is set in North Korea in the 1950s, there is an epic produced by the producers and actors of the Changgeuk Chunhyangjeon and the Changgeuk Chunhyangjeon as a complete work. In the outermost frame of the movie, Dong-il is the main character, but in the inner double frame, Young-ran, who is an actor growing up with the Changgeuk Chunhyangjeon and a character in the Changgeuk Chunhyangjeon, is the center. The following three OST albums are Corée Moranbong released in France in 1960, Musique de corée released in 1970, and 朝鮮の伝統音樂-唱劇 「春香伝」と伝統樂器- released in 1968 in Japan. While Corée Moranbong consists only of the music from the film Moranbong, the two subsequent albums included additional songs collected and recorded by Pyongyang National Broadcasting System. However, there is no information about the movie Moranbong on the album released in Japan. Under the circumstances, it is highly likely that the author of the record label or music commentary has not confirmed the existence of the movie Moranbong, and may have intentionally excluded related contents due to the background of the film's ban on its release. The results of analyzing the detailed scenes of the Changgeuk Chunhyangjeon, Farewell Song, Sipjang-ga, Chundangsigwa, Bakseokti and Prison Song in the movie Moranbong or OST album in the 1950s are as follows. First, the process of establishing the North Korean Changgeuk Chunhyangjeon in the 1950s was confirmed. The play, compiled in 1955 through the Joseon Changgeuk Collection, was settled in the form of a Changgeuk that can be performed in the late 1950s by the Changgeuk Chunhyangjeon between 1956 and 1958. Since the 1960s, Chunhyangjeon has no longer been performed as a traditional pansori-style Changgeuk, so the film Moranbong and the album Corée moranbong are almost the last records to capture the Changgeuk Chunhyangjeon and its music. Second, we confirmed the responses of the actors to the controversy over Takseong in the North Korean creative world in the 1950s. Until 1959, there was a voice of criticism surrounding Takseong and a voice of advocacy that it was also a national characteristic. Shin Woo-sun, who almost eliminated Takseong with clear and high-pitched phrases, air man who changed according to the situation, who chose Takseong but did not actively remove Takseong, Lim So-hyang, who tried to maintain his own tone while accepting some of modern vocalization. Although Cho Sang-sun and Lim So-hyang were also guaranteed roles to continue their voices, the selection/exclusion patterns in the movie Moranbong were linked to the Takseong removal guidelines required by North Korean musicians in the name of Dang and People in the 1950s. Second, Changgeuk actors' response to the controversy over the turbidity of the North Korean Changgeuk community in the 1950s was confirmed. Until 1959, there were voices of criticism and support surrounding Taksung in North Korea. Shin Woo-sun, who showed consistent performance in removing turbidity with clear, high-pitched vocal sounds, Gong Gi-nam, who did not actively remove turbidity depending on the situation, Cho Sang-sun, who accepted some of the vocalization required by the party, while maintaining his original tone. On the other hand, Cho Sang-seon and Lim So-hyang were guaranteed roles to continue their sounds, but the selection/exclusion patterns of Moranbong was independently linked to the guidelines for removing turbidity that the Gugak musicians who crossed to North Korea had been asked for.

DEVELOPMENT OF STATEWIDE TRUCK TRAFFIC FORECASTING METHOD BY USING LIMITED O-D SURVEY DATA (한정된 O-D조사자료를 이용한 주 전체의 트럭교통예측방법 개발)

  • 박만배
    • Proceedings of the KOR-KST Conference
    • /
    • 1995.02a
    • /
    • pp.101-113
    • /
    • 1995
  • The objective of this research is to test the feasibility of developing a statewide truck traffic forecasting methodology for Wisconsin by using Origin-Destination surveys, traffic counts, classification counts, and other data that are routinely collected by the Wisconsin Department of Transportation (WisDOT). Development of a feasible model will permit estimation of future truck traffic for every major link in the network. This will provide the basis for improved estimation of future pavement deterioration. Pavement damage rises exponentially as axle weight increases, and trucks are responsible for most of the traffic-induced damage to pavement. Consequently, forecasts of truck traffic are critical to pavement management systems. The pavement Management Decision Supporting System (PMDSS) prepared by WisDOT in May 1990 combines pavement inventory and performance data with a knowledge base consisting of rules for evaluation, problem identification and rehabilitation recommendation. Without a r.easonable truck traffic forecasting methodology, PMDSS is not able to project pavement performance trends in order to make assessment and recommendations in the future years. However, none of WisDOT's existing forecasting methodologies has been designed specifically for predicting truck movements on a statewide highway network. For this research, the Origin-Destination survey data avaiiable from WisDOT, including two stateline areas, one county, and five cities, are analyzed and the zone-to'||'&'||'not;zone truck trip tables are developed. The resulting Origin-Destination Trip Length Frequency (00 TLF) distributions by trip type are applied to the Gravity Model (GM) for comparison with comparable TLFs from the GM. The gravity model is calibrated to obtain friction factor curves for the three trip types, Internal-Internal (I-I), Internal-External (I-E), and External-External (E-E). ~oth "macro-scale" calibration and "micro-scale" calibration are performed. The comparison of the statewide GM TLF with the 00 TLF for the macro-scale calibration does not provide suitable results because the available 00 survey data do not represent an unbiased sample of statewide truck trips. For the "micro-scale" calibration, "partial" GM trip tables that correspond to the 00 survey trip tables are extracted from the full statewide GM trip table. These "partial" GM trip tables are then merged and a partial GM TLF is created. The GM friction factor curves are adjusted until the partial GM TLF matches the 00 TLF. Three friction factor curves, one for each trip type, resulting from the micro-scale calibration produce a reasonable GM truck trip model. A key methodological issue for GM. calibration involves the use of multiple friction factor curves versus a single friction factor curve for each trip type in order to estimate truck trips with reasonable accuracy. A single friction factor curve for each of the three trip types was found to reproduce the 00 TLFs from the calibration data base. Given the very limited trip generation data available for this research, additional refinement of the gravity model using multiple mction factor curves for each trip type was not warranted. In the traditional urban transportation planning studies, the zonal trip productions and attractions and region-wide OD TLFs are available. However, for this research, the information available for the development .of the GM model is limited to Ground Counts (GC) and a limited set ofOD TLFs. The GM is calibrated using the limited OD data, but the OD data are not adequate to obtain good estimates of truck trip productions and attractions .. Consequently, zonal productions and attractions are estimated using zonal population as a first approximation. Then, Selected Link based (SELINK) analyses are used to adjust the productions and attractions and possibly recalibrate the GM. The SELINK adjustment process involves identifying the origins and destinations of all truck trips that are assigned to a specified "selected link" as the result of a standard traffic assignment. A link adjustment factor is computed as the ratio of the actual volume for the link (ground count) to the total assigned volume. This link adjustment factor is then applied to all of the origin and destination zones of the trips using that "selected link". Selected link based analyses are conducted by using both 16 selected links and 32 selected links. The result of SELINK analysis by u~ing 32 selected links provides the least %RMSE in the screenline volume analysis. In addition, the stability of the GM truck estimating model is preserved by using 32 selected links with three SELINK adjustments, that is, the GM remains calibrated despite substantial changes in the input productions and attractions. The coverage of zones provided by 32 selected links is satisfactory. Increasing the number of repetitions beyond four is not reasonable because the stability of GM model in reproducing the OD TLF reaches its limits. The total volume of truck traffic captured by 32 selected links is 107% of total trip productions. But more importantly, ~ELINK adjustment factors for all of the zones can be computed. Evaluation of the travel demand model resulting from the SELINK adjustments is conducted by using screenline volume analysis, functional class and route specific volume analysis, area specific volume analysis, production and attraction analysis, and Vehicle Miles of Travel (VMT) analysis. Screenline volume analysis by using four screenlines with 28 check points are used for evaluation of the adequacy of the overall model. The total trucks crossing the screenlines are compared to the ground count totals. L V/GC ratios of 0.958 by using 32 selected links and 1.001 by using 16 selected links are obtained. The %RM:SE for the four screenlines is inversely proportional to the average ground count totals by screenline .. The magnitude of %RM:SE for the four screenlines resulting from the fourth and last GM run by using 32 and 16 selected links is 22% and 31 % respectively. These results are similar to the overall %RMSE achieved for the 32 and 16 selected links themselves of 19% and 33% respectively. This implies that the SELINICanalysis results are reasonable for all sections of the state.Functional class and route specific volume analysis is possible by using the available 154 classification count check points. The truck traffic crossing the Interstate highways (ISH) with 37 check points, the US highways (USH) with 50 check points, and the State highways (STH) with 67 check points is compared to the actual ground count totals. The magnitude of the overall link volume to ground count ratio by route does not provide any specific pattern of over or underestimate. However, the %R11SE for the ISH shows the least value while that for the STH shows the largest value. This pattern is consistent with the screenline analysis and the overall relationship between %RMSE and ground count volume groups. Area specific volume analysis provides another broad statewide measure of the performance of the overall model. The truck traffic in the North area with 26 check points, the West area with 36 check points, the East area with 29 check points, and the South area with 64 check points are compared to the actual ground count totals. The four areas show similar results. No specific patterns in the L V/GC ratio by area are found. In addition, the %RMSE is computed for each of the four areas. The %RMSEs for the North, West, East, and South areas are 92%, 49%, 27%, and 35% respectively, whereas, the average ground counts are 481, 1383, 1532, and 3154 respectively. As for the screenline and volume range analyses, the %RMSE is inversely related to average link volume. 'The SELINK adjustments of productions and attractions resulted in a very substantial reduction in the total in-state zonal productions and attractions. The initial in-state zonal trip generation model can now be revised with a new trip production's trip rate (total adjusted productions/total population) and a new trip attraction's trip rate. Revised zonal production and attraction adjustment factors can then be developed that only reflect the impact of the SELINK adjustments that cause mcreases or , decreases from the revised zonal estimate of productions and attractions. Analysis of the revised production adjustment factors is conducted by plotting the factors on the state map. The east area of the state including the counties of Brown, Outagamie, Shawano, Wmnebago, Fond du Lac, Marathon shows comparatively large values of the revised adjustment factors. Overall, both small and large values of the revised adjustment factors are scattered around Wisconsin. This suggests that more independent variables beyond just 226; population are needed for the development of the heavy truck trip generation model. More independent variables including zonal employment data (office employees and manufacturing employees) by industry type, zonal private trucks 226; owned and zonal income data which are not available currently should be considered. A plot of frequency distribution of the in-state zones as a function of the revised production and attraction adjustment factors shows the overall " adjustment resulting from the SELINK analysis process. Overall, the revised SELINK adjustments show that the productions for many zones are reduced by, a factor of 0.5 to 0.8 while the productions for ~ relatively few zones are increased by factors from 1.1 to 4 with most of the factors in the 3.0 range. No obvious explanation for the frequency distribution could be found. The revised SELINK adjustments overall appear to be reasonable. The heavy truck VMT analysis is conducted by comparing the 1990 heavy truck VMT that is forecasted by the GM truck forecasting model, 2.975 billions, with the WisDOT computed data. This gives an estimate that is 18.3% less than the WisDOT computation of 3.642 billions of VMT. The WisDOT estimates are based on the sampling the link volumes for USH, 8TH, and CTH. This implies potential error in sampling the average link volume. The WisDOT estimate of heavy truck VMT cannot be tabulated by the three trip types, I-I, I-E ('||'&'||'pound;-I), and E-E. In contrast, the GM forecasting model shows that the proportion ofE-E VMT out of total VMT is 21.24%. In addition, tabulation of heavy truck VMT by route functional class shows that the proportion of truck traffic traversing the freeways and expressways is 76.5%. Only 14.1% of total freeway truck traffic is I-I trips, while 80% of total collector truck traffic is I-I trips. This implies that freeways are traversed mainly by I-E and E-E truck traffic while collectors are used mainly by I-I truck traffic. Other tabulations such as average heavy truck speed by trip type, average travel distance by trip type and the VMT distribution by trip type, route functional class and travel speed are useful information for highway planners to understand the characteristics of statewide heavy truck trip patternS. Heavy truck volumes for the target year 2010 are forecasted by using the GM truck forecasting model. Four scenarios are used. Fo~ better forecasting, ground count- based segment adjustment factors are developed and applied. ISH 90 '||'&'||' 94 and USH 41 are used as example routes. The forecasting results by using the ground count-based segment adjustment factors are satisfactory for long range planning purposes, but additional ground counts would be useful for USH 41. Sensitivity analysis provides estimates of the impacts of the alternative growth rates including information about changes in the trip types using key routes. The network'||'&'||'not;based GMcan easily model scenarios with different rates of growth in rural versus . . urban areas, small versus large cities, and in-state zones versus external stations. cities, and in-state zones versus external stations.

  • PDF

Territorial Expansion the King Võ (Võ Vương, 1738-1765) in the Mekong Delta: Variation of Tám Thực Chi Kế (strategy of silkworm nibbling) and Dĩ Man Công Man (to strike barbarians by barbarians) in the Way to Build a New World Order (무왕(武王, 1738-1765) 시기 메콩 델타에서의 영토 확장 추이: 제국으로 가는 길, '잠식지계(蠶食之計)'와 '이만공만(以蠻攻蠻)'의 변주)

  • CHOI, Byung Wook
    • The Southeast Asian review
    • /
    • v.27 no.2
    • /
    • pp.37-76
    • /
    • 2017
  • $Nguy{\tilde{\hat{e}}}n$ Cư Trinh has two faces in the history of territorial expansion of Vietnam into the Mekong delta. One is his heroic contribution to the $Nguy{\tilde{\hat{e}}}n$ family gaining control over the large part of the Mekong delta. The other is his role to make the eyes of readers of Vietnamese history be fixed only to the present territory of Vietnam. To the readers, $Nguy{\tilde{\hat{e}}}n$ Cư Trinh's achievement of territorial expansion was the final stage of the nam $ti{\acute{\hat{e}}n$ of Vietnam. In fact, however, his achievement was partial. This study pays attention to the King $V{\tilde{o}}$ instead of $Nguy{\tilde{\hat{e}}}n$ Cư Trinh in the history of the territorial expansion in the Mekong delta. King's goal was more ambitious. And the ambition was propelled by his dream to build a new world, and its order, in which his new capital, $Ph{\acute{u}}$ $Xu{\hat{a}}n$ was to be the center with his status as an emperor. To improve my assertion, three elements were examined in this article. First is the nature of $V{\tilde{o}}$ Vương's new kingship. Second is the preparation and the background of the military operation in the Mekong Delta. The nature of the new territory is the third element of the discussion. In 1744, six years after this ascending to the throne, $V{\tilde{o}}$ Vương declared he was a king. Author points out this event as the departure of the southern kingdom from the traditional dynasties based on the Red River delta. Besides, the government system, northern custom and way of dressings were abandoned and new southern modes were adopted. $V{\tilde{o}}$ Vương had enough tributary kingdoms such as Cambodia, Champa, Thủy $X{\tilde{a}}$, Hoả $X{\tilde{a}}$, Vạn Tượng, and Nam Chưởng. Compared with the $L{\hat{e}}$ empire, the number of the tributary kingdoms was higher and the number was equivalent to that of the Đại Nam empire of the 19th century. In reality, author claims, the King $V{\tilde{o}}^{\prime}s$ real intention was to become an emperor. Though he failed in using the title of emperor, he distinguished himself by claiming himself as the Heaven King, $Thi{\hat{e}}n$ Vương. Cambodian king's attack on the thousands of Cham ethnics in Cambodian territory was an enough reason to the King $V{\tilde{o}}^{\prime}s$ military intervention. He considered these Cham men and women as his amicable subjects, and he saw them a branch of the Cham communities in his realm. He declared war against Cambodia in 1750. At the same time he sent a lengthy letter to the Siamese king claiming that the Cambodia was his exclusive tributary kingdom. Before he launched a fatal strike on the Mekong delta which had been the southern part of Cambodia, $V{\tilde{o}}$ Vương renovated his capital $Ph{\acute{u}}$ $Xu{\hat{a}}n$ to the level of the new center of power equivalent to that of empire for his sake. Inflation, famine, economic distortion were also the features of this time. But this study pays attention more to the active policy of the King $V{\tilde{o}}$ as an empire builder than to the economic situation that has been told as the main reason for King $V{\tilde{o}}^{\prime}s$ annexation of the large part of the Mekong delta. From the year of 1754, by the initiative of $Nguy{\tilde{\hat{e}}}n$ Cư Trinh, almost whole region of the Mekong delta within the current border line was incorporated into the territory of $V{\tilde{o}}$ Vương within three years, though the intention of the king was to extend his land to the right side of the Mekong Basin beyond the current border such as Kampong Cham, Prey Vieng, and Svai Rieng. The main reason was $V{\tilde{o}}$ Vương's need to expand his territory to be matched with that of his potential empire with the large number of the tributary kingdoms. King $V{\tilde{o}}^{\prime}s$ strategy was the variation of 'silkworm nibbling' and 'to strike barbarians by barbarians.' He ate the land of Lower Cambodia, the region of the Mekong delta step by step as silkworm nibbles mulberry leave(general meaning of $t{\acute{a}}m$ thực), but his final goal was to eat all(another meaning of $t{\acute{a}}m$ thực) the part of the Mekong delta including the three provinces of Cambodia mentioned above. He used Cham to strike Cambodian in the process of getting land from Long An area to $Ch{\hat{a}}u$ Đốc. This is a faithful application of the Dĩ Man $C{\hat{o}}ng$ Man (to strike barbarians by barbarians). In addition he used Chinese refugees led by the Mạc family or their quasi kingdom to gain land in the region of $H{\grave{a}}$ $Ti{\hat{e}}n$ and its environs from the hand of Cambodian king. This is another application of Dĩ Man $C{\hat{o}}ng$ Man. In sum, author claims a new way of looking at the origin of the imperial world order which emerged during the first half of the 19th century. It was not the result of the long history of Đại Việt empires based on the Red River delta, but the succession of the King $V{\tilde{o}}^{\prime}s$ new world based on $Ph{\acute{u}}$ $Xu{\hat{a}}n$. The same ways of Dĩ Man $C{\hat{o}}ng$ Man and $T{\acute{a}}m$ Thực Chi $K{\acute{\hat{e}}}$ were still used by $V{\tilde{o}}^{\prime}s$ descendents. His grandson Gia Long used man such as Thai, Khmer, Lao, Chinese, and European to win another man the '$T{\hat{a}}y$ Sơn bandits' that included many of Chinese pirates, Cham, and other mountain peoples. His great grand son Minh Mạng constructed a splendid empire. At the same time, however, Minh Mạng kept expanding the size of his empire by eating all the part of Cambodia and Cham territories.