Earticle

현재 위치 Home

The International Journal of Advanced Smart Convergence

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    국제인공지능학회(구 한국인터넷방송통신학회) [The International Association for Artificial Intelligence]
  • pISSN
    2288-2847
  • eISSN
    2288-2855
  • 간기
    계간
  • 수록기간
    2012 ~ 2025
  • 주제분류
    공학 > 전자/정보통신공학
  • 십진분류
    KDC 326 DDC 380
Volume 8 Number 1 (26건)
No
1

HCoV-IMDB: Database for the Analysis of Interactions between HCoV and Host Immune Proteins

Mi-Ran Kim, Ji-Hae Lee, Hyeon Seok Son, Hayeon Kim

국제인공지능학회(구 한국인터넷방송통신학회) The International Journal of Advanced Smart Convergence Volume 8 Number 1 2019.03 pp.1-8

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Coronaviruses are known respiratory pathogens. In the past, most human coronaviruses were thought to cause mild symptoms such as cold. However recently, as seen in the Severe Acute Respiratory Syndrome (SARS) and the Middle East Respiratory Syndrome (MERS), infectious diseases with severe pulmonary disease and respiratory symptoms are caused by coronaviruses, making research on coronaviruses become important. Considering previous studies, we constructed ‘HCoV-IMDB (Human Corona Virus Immune Database)’ to systematically provide genetic information on human coronavirus and host immune information, which can be used to analyze the interaction between human coronavirus and host immune proteins. The ‘HCoV-IMDB’ constructed in the study can be used to search for genetic information on human coronavirus and host immune protein and to download data. A BLAST search specific to the human coronavirus, one of the database functions, can be used to infer genetic information and evolutionary relationship about the query sequence.

2

In this article, we present a performance enhancement scheme for mobile applications by adopting persistent memory. The proposed scheme supports the deadline guarantee of real-time applications like a video player, and also provides reasonable performances for non-real-time applications. To do so, we analyze the program execution path of mobile software platforms and find two sources of unpredictable time delays that make the deadline-guarantee of real-time applications difficult. The first is the irregular activation of garbage collection in flash storage and the second is the blocking and time-slice based scheduling used in mobile platforms. We resolve these two issues by adopting high performance persistent memory as the storage of real-time applications. By maintaining real-time applications and their data in persistent memory, I/O latency can become predictable because persistent memory does not need garbage collection. Also, we present a new scheduler that exclusively allocates a processor core to a real-time application. Although processor cycles can be wasted while a real-time application performs I/O, we depict that the processor utilization is not degraded significantly due to the acceleration of I/O by adopting persistent memory. Simulation experiments show that the proposed scheme improves the deadline misses of real-time applications by 90% in comparison with the legacy I/O scheme used in mobile systems.

3

Non-glasses Stereoscopic 3D Floating Hologram System using Polarization Technique

Pyeongho Choi, Yoonhee Choi, Misoo Park, Soonchul Kwon, Seunghyun Lee

국제인공지능학회(구 한국인터넷방송통신학회) The International Journal of Advanced Smart Convergence Volume 8 Number 1 2019.03 pp.18-23

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The image projected onto the screen of the floating hologram is no more than a two-dimensional image. Although it creates an illusion that an object appears to float in space as it moves around while showing its different parts. This paper has proposed a novel method of floating 3D hologram display to view stereoscopic three-dimensional images without putting on glasses. The system is comprised of a sharkstooth scrim screen, projector, polarizing filter for the projector, and a polarizing film to block the image projected from the sham screen. As part of the polarization characteristics, the background image and the front object have completely been separated from each other with the stereoscopic 3D effect successfully implemented by the binocular disparity caused by the distance between the two screens.

4

In this research, a practical deep learning framework to differentiate the lesions and nodules in breast acquired with ultrasound imaging has been proposed. 7408 ultrasound breast images of 5151 patient cases were collected. All cases were biopsy proven and lesions were semi-automatically segmented. To compensate for the shift caused in the segmentation, the boundaries of each lesion were drawn using Fully Convolutional Networks(FCN) segmentation method based on the radiologist’s specified point. The data set consists of 4254 benign and 3154 malignant lesions. In 7408 ultrasound breast images, the number of training images is 6579, and the number of test images is 829. The margin between the boundary of each lesion and the boundary of the image itself varied for training image augmentation. The training images were augmented by varying the margin between the boundary of each lesion and the boundary of the image itself. The images were processed through histogram equalization, image cropping, and margin augmentation. The networks trained on the data with augmentation and the data without augmentation all had AUC over 0.95. The network exhibited about 90% accuracy, 0.86 sensitivity and 0.95 specificity. Although the proposed framework still requires to point to the location of the target ROI with the help of radiologists, the result of the suggested framework showed promising results. It supports human radiologist to give successful performance and helps to create a fluent diagnostic workflow that meets the fundamental purpose of CADx.

5

Design Issues on a Metropolitan WDM Ring Network

Jong-Hyung Lee

국제인공지능학회(구 한국인터넷방송통신학회) The International Journal of Advanced Smart Convergence Volume 8 Number 1 2019.03 pp.35-43

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A metro ring network using WDM technology requires many issues to be considered even though its transmission distance is shorter and its transmission capacity is lower than a long-haul WDM system. Unlike a long-haul WDM system, which is basically point-to-point configuration, a metro ring network usually equips with capabilty of wavelength reconfiguration. Therefore network performance considering crosstalk within OADM and the network behavior when the ring network is closed should be analyzed before implemented. We discussed some of results analyzed for the issues. Furthermore we proposed a novel method to design a dispersion map for a ring network, and demonstrated the methodology with an exemplary 8-node ring network of 399km circumference.

6

Evolution of PKI Internet Banking in Korea

Seungchul Park

국제인공지능학회(구 한국인터넷방송통신학회) The International Journal of Advanced Smart Convergence Volume 8 Number 1 2019.03 pp.44-57

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Most banks in Korea have provided Internet banking services based on PKI(Public Key Infrastructure) certificates since the early 2000s when Internet banking began in Korea. To support PKI Internet banking, the Korean government backed the electronic signature law and supported the rapid spread of PKI-based Internet banking by regulating the application of PKI certificates to be compulsory in Internet banking until 2015. PKI Internet Banking in Korea has been developed as a pioneer in this field through many challenges and responses until its present success. Korea’s PKI banking, which started with soft-token-based closed banking, has responded to various types of cyber attack attempts and promoted the transition to open banking by accepting various criticisms due to lack of compatibility with international standards. In order to improve the convenience and security of PKI Internet banking, various attempts have been made, such as biometric-integrated smartphone-based PKI authentication. In this paper, we primarily aim to share the experience and lessons of PKI banking by analyzing the evolution process of PKI Internet banking in Korea. It also has the purpose of presenting the challenges of Korea’s PKI Internet banking and sharing its development vision.

7

In recent years, small mobile devices called personal mobility or smart mobility have attracted attention. Personal mobility refers to electric-driven personal transportation that can travel at close range and medium distance, including small electric vehicles, electric bicycles, electric motorcycles and electric scooters. Most of the electric scooters used in Korea are mainly imported from China. This is due to the fact that the price competitiveness of major components of electric scooters is owned in China. At this point, the domestic research direction is preferable for the composition and design of the electric scooter body rather than cost reduction for the components. In this study, we propose a new model of portable folding structure that is easy to use for electric scooters, which are personal vehicles using electric energy. We also made a prototype for practical use.

8

A Study on the Performance Comparison of 3D File Formats on the Web

Geon-hee Lee, Pyeong-ho Choi, Jeong-hwan Nam, Hwa-seop Han, Seung-hyun Lee, Soon-chul Kwon

국제인공지능학회(구 한국인터넷방송통신학회) The International Journal of Advanced Smart Convergence Volume 8 Number 1 2019.03 pp.65-74

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

3D file formats typically include OBJ (Wavefront file format), STL (STereoLithography), and FBX (Filmbox). Each format has limitations depending on its configuration and usage, and supported formats are different depending on the software application. glTF helps uniform integration of 3D file formats and allows for more efficient transmission of large 3D geometry files by organizing them in a binary format. This paper presents explanation on OBJ, FBX, and STL which are major examples of existing 3D file formats. It also explains the concept and characteristics of glTF and compares its performance with other 3D file formats on the web. The loading time and packets of each 3D file format are measured according to the web browser environment by means of Google Chrome, Firefox and Microsoft Edge. Experimental results show that glTF is the most efficient and that it exhibits the best performance. As to STL, relatively excessive traffic was observed. This study is expected to contribute to reducing rendering time on the web as 3D file formats are used.

9

Data imbalance problem is common and causes serious problem in machine learning process. Sampling is one of the effective methods for solving data imbalance problem. Over-sampling increases the number of instances, so when over-sampling is applied in imbalanced data, it is applied to minority instances. Under-sampling reduces instances, which usually is performed on majority data. We apply under-sampling and over-sampling to imbalanced data and generate sampled data sets. From the generated data sets from sampling and original data set, we construct a heterogeneous ensemble of classifiers. We apply five different algorithms to the heterogeneous ensemble. Experimental results on an intrusion detection dataset as an imbalanced datasets show that our approach shows effective results.

10

A Study on Efficient Building Energy Management System Based on Big Data

Young-Hyun Chang, Chang-Bae Ko

국제인공지능학회(구 한국인터넷방송통신학회) The International Journal of Advanced Smart Convergence Volume 8 Number 1 2019.03 pp.82-86

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

We aim to use public data different from the remote BEMS energy diagnostics technology and already established and then switch the conventional operation environment to a big-data-based integrated management environment to operate and build a building energy management environment of maximized efficiency. In Step 1, various network management environments of the system integrated with a big data platform and the BEMS management system are used to collect logs created in various types of data by means of the big data platform. In Step 2, the collected data are stored in the HDFS (Hadoop Distributed File System) to manage the data in real time about internal and external changes on the basis of integration analysis, for example, relations and interrelation for automatic efficient management.

11

Data mining technology is applied to various fields because it is a technique for analyzing vast amount of data and finding useful information. In this paper, we propose a big data analysis method that uses Apriori algorithm, which is a data mining technique, to find the related factors that have negative and positive influences on school adjustment. Among Korea Child and Youth Panel Survey(KCYPS), data related to adjustment to school life and data showing parental inclinations were extracted from the data of fourth grade elementary school students, first year middle school students, and high school freshman students, respectively and we have mapped the useful association rules among them. As a result, the factors affecting school adjustment were different according to the timing of the growth process, we were able to find interesting rules by looking for connections between rules. On the other hand, the factors that positively influenced school adjustment were not significantly different from each other, and overall, they were associated with positive variables.

12

A Robot System Maintained with Renewable Energy

Jaehyun Kim, Chanwoo Moon

국제인공지능학회(구 한국인터넷방송통신학회) The International Journal of Advanced Smart Convergence Volume 8 Number 1 2019.03 pp.98-105

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Energy autonomy is a system that is sustained by energy from an independent and distributed source such as renewable energy. In this paper, we propose a robotic energy autonomy in which a robot obtains energy from a renewable energy source with a limited storage capacity. As an energy transfer method, wireless power transfer is used to solve the problem of the conventional contact charging method, mechanical complexity, and to obtain high energy transfer efficiency, the image information is used to align the transmitting and receiving coils accurately. A small scale thermoelectric energy source with boost converter, battery charger, and wireless power transfer coil is constructed and an actual charging experiment is conducted to verify the proposed autonomy system.

13

Detection of the Popple Spot on the Pulse Variance of the Sonance

Jeong-lae Kim, Hye-ju Kim, Kee-young Lee

국제인공지능학회(구 한국인터넷방송통신학회) The International Journal of Advanced Smart Convergence Volume 8 Number 1 2019.03 pp.106-112

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Pulsation variance technique is blended the bumpy popple-sonance status of the brilliant-disparity understanding level (BDUL) on pulsation understanding gestalt. The understanding level condition by the pulsation understanding gestalt system is composed with the popple-sonance system. As to look for a two-node white-small dot of the brilliant situation, we are to take of the pulsation value with two-node white-small dot by the output signal. The concept of understanding level is composed the reference of brilliant-disparity level for variance signal by the pulsation sonance gestalt. Moreover indicating a bumpy variance of the BDUL of the maximum-minimum in terms of the popple-sonance gestalt, and pulsation two-node white-small dot sonance that was the a pulsation value of the far variance of the Pul-ug-FA-πMAX-MIN with 23.24±3.36 units, that was the a pulsation value of the convenient variance of the Pul-ug-CO-πMAX-MIN with 7.97±1.60 units, that was the a pulsation value of the flank variance of the Pul-ug-FL-πMAX-MIN with 3.02±0.47 units, that was the a pulsation value of the vicinage variance of the Pul-ug-VI-πMAX-MIN with 0.50±(-0.01) units. The popple sonance will be to evaluate at the bumpy ability of the popple-sonance gestalt with two-node white-small dot by the pulsation understanding level on the BDUL that is indicated the brilliant-disparity gestalt by the understanding level system. We will be possible to suppress of a gestalt by the special signal and to utilize a pulsation data of popple sonance level by the popple understanding system.

14

The radish skin and radish greens are an edible part of the radish. But they are removed before eating the radish and used as a byproduct or an animal feed material because of their tough and rough texture. This study was conducted to investigate the effect of supercritical heat-treated radish-extract on UV-induced HRM-2 wrinkled mouse animal model on anti-aging wrinkles. Supercritical heat-treated radish-extract was applied on the back of seven-weeks old HRM-2 mice. The effect of HRE on skin thickness, elasticity and wrinkle formation of the mice was observed by using UVB lamp to induce melanogenesis and wrinkle formation. As the result, increased depth of wrinkles was observed in the negative control group in comparison to the normal group. In contrast, decreased depth of wrinkles was observed in the radish-extract-free group compared to the negative control group. In the study of the effect of radish-extract on wrinkle-formation related gene expression and protein what protein expression, MMP-2 and MMP-9 gene expression significantly increased in the negative control group compared to the normal group. The gene expression reduced in dependence to the mass of radish-extract treated. Similar to quantitative results of mRNA expression, the expression of MMP-2 protein increased as a result of UVB-irradiation. The MMP-2 expression was inhibited in dependence to the mass of radish-extract treated. In conclusion, the supercritical heat-treated radish-extract has an effect on improving skin wrinkles not only when it is applied to the skin but also when orally ingested. Thus, it can be effectively used as a composition to health functional products. Therefore we can also conclude that radish a food that does not show any side-effects even upon long-term intake can reduce wrinkle formation as well as improve skin elasticity when taken regularly for a long period.

15

Associative Interactive play Contents for Infant Imagination

Eun-Jung Jang, Chankyu Lee, Chan Lim

국제인공지능학회(구 한국인터넷방송통신학회) The International Journal of Advanced Smart Convergence Volume 8 Number 1 2019.03 pp.126-132

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Creative thinking appears even before it is expressed in language, and its existence is revealed through emotion, intuition, image and body feeling before logic or linguistics rules work. In this study, Lego is intended to present experimental child interactive content that is applied with a computer vision based on image processing techniques. In the case of infants, the main purpose of this content is the development of hand muscles and the ability to implement imagination. The purpose of the analysis algorithm of the OpenCV library and the image processing using the 'VVVV' that is implemented as a 'Node' in the midst of perceptual changes in image processing technology that are representative of object recognition, and the objective is to use a webcam to film, recognize, derive results that match the analysis and produce interactive content that is completed by the user participating. Research shows what Lego children have made, and children can create things themselves and develop creativity. Furthermore, we expect to be able to infer a diverse and individualistic person's thinking based on more data.

16

In this paper, we present an algorithm for adjusting degree of belief for consistency on the evidence dependency network where various sets of evidence support different sets of hypotheses. It is common for experts to assign higher degree of belief to a hypothesis when there is more evidence over the hypothesis. Human expert without knowledge of uncertainty handling may not be able to cope with how evidence is combined to produce the anticipated belief value. Belief in a hypothesis changes as a series of evidence is known to be true. In non-monotonic reasoning environments, the belief retraction method is needed to clearly deal with uncertain situations. We create evidence dependency network from rules and apply the evidence retraction algorithm to refine belief values on the hypothesis set. We also introduce negative belief values to reflect the reverse effect of evidence combination.

17

High Representation based GAN defense for Adversarial Attack

Richard Evan Sutanto, Suk Ho Lee

국제인공지능학회(구 한국인터넷방송통신학회) The International Journal of Advanced Smart Convergence Volume 8 Number 1 2019.03 pp.141-146

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

These days, there are many applications using neural networks as parts of their system. On the other hand, adversarial examples have become an important issue concerining the security of neural networks. A classifier in neural networks can be fooled and make it miss-classified by adversarial examples. There are many research to encounter adversarial examples by using denoising methods. Some of them using GAN (Generative Adversarial Network) in order to remove adversarial noise from input images. By producing an image from generator network that is close enough to the original clean image, the adversarial examples effects can be reduced. However, there is a chance when adversarial noise can survive the approximation process because it is not like a normal noise. In this chance, we propose a research that utilizes high-level representation in the classifier by combining GAN network with a trained U-Net network. This approach focuses on minimizing the loss function on high representation terms, in order to minimize the difference between the high representation level of the clean data and the approximated output of the noisy data in the training dataset. Furthermore, the generated output is checked whether it shows minimum error compared to true label or not. U-Net network is trained with true label to make sure the generated output gives minimum error in the end. At last, the remaining adversarial noise that still exist after low-level approximation can be removed with the U-Net, because of the minimization on high representation terms.

18

This study aims to explore the understanding of and the interest in realistic digital contents and examine their effectiveness, by implementing and applying VR around the science subject in middle schools. It organized each group of two for cooperative activities, in order to implement VR for 52 middle school students located at Y-county, who understood study contents and agreed to participate in the study. Then, it implemented and applied realistic digital contents regarding a change in the science geosphere and many kinds of forces, by extracting and designing them. As they implemented and applied VR around contents interest in science subject. VR assisted lessons made statistically significant differences in understanding and effectiveness of realistic digital contents. It will provide basic data used to cultivate future talents who can prepare for a change in the educational paradigms along with the fourth industrial revolution and adapt to the future knowledge-based society.

19

Authority of Image in Internet Space

Seo-Youn Jang, Chan Lim

국제인공지능학회(구 한국인터넷방송통신학회) The International Journal of Advanced Smart Convergence Volume 8 Number 1 2019.03 pp.153-158

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Language and letter are represented by a combination of its signifier and signified. All symblos are commonly calling direct attention to people who are living in the physical world. However, in cyberspace, the image takes control once inhabited by the language. Cyberspace with anonymity and deoent physical nature has something with physical laws. In this space the statue transcends the imaginary realm. Ideology gives a greater connotation by giving a series of regulation to images floating in cyberspace. Even if various media have the same image, the meaning of the image changes depending on which ideology is used. The impact of this on the public is great. In this study, I discuss the ideology in cyberspace where is supposedly wide open to who visits and spreads all the thoughts without suppression and the human body. The main ideas would be who owns the ideology and what does it want to control and how the people would react to the ideology. This paper would eventually head the prototype that visualizes above ideas. Though the interactive media it will also show the subject in the real world is accept the images floating in the cyberspace without any doubts.

20

'4th Industrial Revolution' is accelerating as a core part of creating new growth engines and enhancing competitiveness of businesses. The fourth industrial revolution means the transformation of society and industries that are brought by IoT (Internet of Things), big data analysis, AI (Artificial Intelligence), and robot technology. Information and Communication Technology (ICT), which is a major factor, is affecting production and manufacturing systems and as ICT technologies become more advanced, intelligent information technology is generally utilized in all areas of society, leading to hyper-connected society where new values are created and developed. ICT technology is not just about connecting devices and systems and making smart, it is about constantly converging and harmonizing new technologies in a number of fields and driving innovation and change. It is no exception to the agro-fisheries trade. In particular, ICT technology is applied to the agricultural sector, reducing labor, providing optimal environment for crops, and increasing productivity. Due to the nature of agriculture, which is a labor-intensive industry, it is predicted that the ripple effects of ICT technologies will become bigger. We are expected to use the Smart Concentration using ICT convergence technology as a useful resource for changing smart farms, and to help develop new service markets.

21

Grit, a concept conceived in 2007 by Duckworth and others in the United States, is based on positive psychology that focuses on growth and development through individual strengths. Recently, "Grit", which means patience and enthusiasm for long-term goals, has emerged as a key factor of personality strength. In Korea, Joo-hwan Kim (2013) was the first to conceptualize and study the subject of Grit. However, there have been no overview studies that systematically summarize the overall trends and flow in the research of Grit so far. There have been 147 research papers on Grit published so far in Korea. The purpose of this study was to conduct trend analysis on the subject of Grit by analyzing forty-three (43) master’s and doctoral dissertations, thus presenting the direction of future research on Grit through careful analysis. In the studies conducted, it was found that Grit is a very significant variable linked to self-efficacy. It is also a subjective belief that can help an individual achieve his/her educational goals, and go through failure resynchronization. In addition, Grit is very significant as a practical core indicator of how fusion talent is fostered for the fourth industrial revolution. Therefore, there is a need for more in-depth research from the viewpoints of workplace learning, experiential learning, or informal learning, as well as research into Grit characteristics.

22

Rhyme of Truce, Training Program for moral psychology in Cyberspace

JeongHee Cho, Chan Lim

국제인공지능학회(구 한국인터넷방송통신학회) The International Journal of Advanced Smart Convergence Volume 8 Number 1 2019.03 pp.176-183

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Rhyme of Truce is an educational program that helps you develop the ability to cope with cyber violence rightly. we aim to produce educational contents that will last a long time in the memory of specially children. By combining the room escape game and Leap motion / VR, the program reflects the user's motion and action in real time. The Keyboard Worrier comes into contact with the user and causes violence, and the user who is attacked by the monster see several negative messages written in red and hears abuses sound. Users enter the virtual space decorated as the cyber world. They can experience cyber-violence indirectly but vividly, and if language violence, which has been overlooked and recognized only as "letters", is executed offline, it will directly wonder if cyber-violence should also be regarded as a means of violence. Users have the opportunity to cope with violence autonomously. When a user is attacked by an in-game monster, there are two ways to choose from. First, fighting against with a keyboard (which is a symbol of language violence) just like a monster. Second, report the abuser to cyber bureau police. Both methods make them to escape the room, but when they get out of the room and return to the home and read the message through the monitor, users can recognize which action was right for.

23

This study investigates the hair restoration efficacy of selected radish saponin extracts on nude mice. Nude mice genetically predisposed to pattern balding were used in this study. Our study revealed the underlying mechanism of stimulating hair growth in athymic nude mice by repair the nu/nu follicular keratin differentiation defect. Thus, the topical application of radish saponin may represent a novel strategy for the management and therapy of certain forms of alopecia. The term of hair density of PEE treated nude mice were significantly increase as compared with of control nude mice. Histological observation of skin sample showed no hair follicle or only distorted hair follicles were observed in the control samples, in contrast, by the PEE treatment groups showed a fully formed and increased the number of hair follicles up to three times higher than that of control group in terms of the number of hair follicles in nude mouse skin.PEE treated mice the number of BrdU-labeled keratinocytes per anagen follicle increased significantly, especially in the follicular bulbs and outer root sheath compared with the control mice. Moreover, PEE-treated nude mice also exhibited a significant increase in the number of BrdU-labeled epidermal keratinocyte proliferation.

24

The Impact of Blockchain Technology on the Music Industry

Kenneth Chi Ho Kim

국제인공지능학회(구 한국인터넷방송통신학회) The International Journal of Advanced Smart Convergence Volume 8 Number 1 2019.03 pp.196-203

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

We have reviewed the potential impact of blockchain technology on the music industry by analyzing the views of academia and the industry experts. The music industry had rapid changes from the physical market to the digital market in the past decades. The consumers download and stream music online and mobile during the digital dominant market. While streaming music has been recently growing at a fast rate, fair distribution of revenue to the artists continues to be an issue. Some industry experts believe that the issue of fair distribution of revenue to the artist may be resolved using blockchain technology, while some are skeptical about the application or the duration of impact. The blockchain may enhance speedier payment using smart contracts, provide additional revenue and promote the music if excellent fan support is achieved. The positive impact on the music industry may only be possible if there are detailed consideration of the industry and careful understanding of the customers.

25

Perhaps nothing more vividly illustrates the many different ways in which traditions can be interpreted than a study of the life of Confucius in modern times. In China and Korea, Confucian values and culture are dismissed and scorned during some periods and held up as facilitators of cultural prosperity in others. This changing perception of and attitude toward the Confucian tradition in modern society embodies the long life of the Confucian tradition and its continually evolving trajectory, as well as its versatility within shifting sociopolitical milieux spanning distance and time. In this paper, I investigate the (re)emergence of Confucius in modern Korea and China with a comparative and critical gaze. I demonstrate how different modern interpretations of Confucius, both negative and positive, in these two countries bring new life to the Confucian tradition within their own complex social realities. By focusing on the recent revival of Confucius in China—Anti-tradition of Korean dramas, the Restoration of Confucian Culture in China and Korean Wave, the modernity of China in Confucius are examined, and finally, in terms of the means of realization of the Chinese dream—I illuminate how the image of Confucius serves the (re-)invention of contemporary China, with her pervasive desire to romanticize and materialize China’s past as well as her future.

26

Effect of Gender on Character Evaluation : Factors Affecting Enjoyment

Ezgi Ulusoy, Hye Eun Lee

국제인공지능학회(구 한국인터넷방송통신학회) The International Journal of Advanced Smart Convergence Volume 8 Number 1 2019.03 pp.214-221

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This study attempted to extend Korean Wave literature by investigating (a) the influence of protagonists’ personality characteristics and the role of empathy under the affective disposition theory, and (b) the power of some external factors in the entertainment media selection. After watching an episode of the popular Korean drama, Secret Garden, participants completed a survey in the United States. Results demonstrated that (a) the effect of personality characteristics varied across gender and (b) external factors affects the entertainment media selection positively. Findings indicate that media enjoyment is dependent on the audience’s external factors.

 
페이지 저장