• Title/Summary/Keyword: 보편문자

Search Result 58, Processing Time 0.023 seconds

Design and implementation of e-mail extraction engine for mobile with image conversion facilities. (이미지 변환 엔진을 탑재한 모바일용 전자우편 추출 엔진의 설계 및 구현)

  • 윤호범;김명삼
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.628-634
    • /
    • 2003
  • In existing internet, e-mail protocols including POP3 and IMAP4, provide e-mail services for exchanging messages with texts, hypertext and images as well. For the e-mail services in wireless mobile network, mobile e-mail service Providers have to install a mobile exclusive e-mail server or have to convert e-mail to mobile exclusive e-mail with wireless application format in case of POP3 protocol. In the e-mail service of IMAP4 case known as web-mail, It is difficult to view e-mail directly from server without IMAP4 mobile client because e-mail is stored in mail server side with remote file server. In either case, it also has the problems of viewing the e-mail of hypertext and image information at mobile, This Paper Provides e-mail extraction engine with image and hypertext conversion facilities that can be applied in wireless mobile internet and it is optimized In mobile communication environments such as a small display, small size of memory with web-mail protocol based on IMAP4 as well as POP3 mail protocol.

  • PDF

Shoulder-Surfing Resistant Password Input Method for Mobile Environment (모바일 환경에서 엿보기 공격에 강한 패스워드 입력방법)

  • Kim, Chang-Soon;Youn, Sun-Bum;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.93-104
    • /
    • 2010
  • The advent of various mobile devices and mobile services has caused diversification of information stored in a mobile device, e.g., SMS, photos, movies, addresses, e-mails, digital certificates, and so on. Because mobile devices are lost or stolen easily, user authentication is critical to protect the information stored in mobile devices. However, the current user authentication methods using Personal Identification Numbers (PINs) and passwords are vulnerable to Shoulder Surfing Attacks (SSAs), which enables an attacker to obtain user's information. Although there are already several SSA-resistant authentication methods in the literature, most of these methods lack of usability. Moreover, they are not suitable for use in mobile devices. In this paper, we propose a user friendly password input method for mobile devices which is secure against SSA. We also perform user tests and compare the security and usability of the proposed method with those of the existing password input methods.

Widget Guideline for TV Environment (TV 시청 환경에 적합한 위젯 가이드라인 제안)

  • Wi, Seung-Yong;Yi, Sang-Sun
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.1001-1008
    • /
    • 2009
  • Newsweek 가 2007 년을 '위젯의 해'라고 선언할 정도로 IT산업에서 위젯에 대한 관심이 커져가고 있다. 위젯은 인터넷으로부터 정보를 전달 받아 화면에 표시하는 작은 그래픽 사용자 인터페이스 도구의 일종을 뜻한다. 위젯은 웹 사이트와 연동하여 제 기능을 다할 뿐 아니라 데스크톱, 모바일, 심지어 TV로까지 연동될 채비까지 갖추어 가고 있다. 그러나 현재 TV 환경에서는 TV용 위젯 그래픽 가이드라인이 없는 실정이다. 본 연구의 목적은 TV 시청 환경에 적합한 위젯 가이드라인을 제안함에 있다. TV와 PC의 사용 환경은 서로 다르며 크게 세 가지 측면으로 볼 수 있다. 첫째는 목적적 측면이다. PC는 주로 작업, 검색의 목적을 가지고 있는 반면, TV는 즐기고, 쉬기 위한 목적을 가지고 있다. 둘째는 조작적 측면이다. PC는 키보드, 마우스와 같은 다양한 입력 도구를 사용하여 문자와 위치 등을 쉽게 입력하고 다양한 조작을 할 수 있는 반면, TV는 리모컨으로 제한적인 조작을 한다. 셋째는 시청 환경적 측면이다. TV의 시청거리는 PC나 모바일 보다 멀다. 그리고 보편적으로 가족이 공유하는 미디어라는 점을 알 수 있다. 본 연구를 위하여 세 가지 선행연구를 종합하였다. 첫째, 위젯의 정의와 유형에 대해서 연구하였다. 둘째, TV와 PC환경의 차이를 연구하였다. 셋째, 위젯과 TV의 가이드라인을 분석하였다. 이와 같은 선행연구를 종합하여 TV 환경에 적합한 위젯 디자인 가이드라인을 도출하였다. 연구자는 가이드라인을 콘텐츠, 그래픽, 인터랙션 세 부분으로 나누어 각각에 대한 가이드라인을 제안한다. 또한 연구자가 제안하는 가이드라인의 적합성을 검증하기 위하여 이 가이드라인에 토대로 한 TV 용 위젯을 제안한다. 연구의 범위는 국내의 40 인치 HDTV를 중심으로 제한한다. PC 에서처럼 TV 에서 위젯이 정착하기 까지 많은 시행착오가 있을 것이라 예상된다. 본 연구가 TV 환경에 적합한 위젯에 관한 연구의 시작이 되기를 기대한다.

  • PDF

Study of emoticon as an emotional sign under the digital communication environment (디지털 커뮤니케이션 환경에서 감성기호로서 이모티콘에 관한 연구)

  • 조규명;김경숙
    • Archives of design research
    • /
    • v.17 no.1
    • /
    • pp.319-328
    • /
    • 2004
  • The communication environment made by digital technologies has made it possible to exchange information and deliver messages fast and easily among people of various classes in virtual space beyond time and space. Net-generation, who is accustomed to this virtual space, couldn't be satisfied with the linear text-oriented language any more, and began to make signs by use of computers in order to differentiate itself from others and to express its desires. Among the signs, emoticon created by joint of popular culture and digital communication centering around young generation is a new visual sign and emotional sign that can deliver a sender's feelings contained in a message. This paper has studied social phenomena, their relationships with emoticon and background of its creation through documentary review of media development, changes in the communication environment and popular culture. Furthermore, it has analyzed the meaningful action and roles of emoticon as a sign in terms of semiotics and also, studied a possibility of using emoticon as a new emotional sign. The study results say that emoticon can play the roles of a non-linguistic sign just like general signs that make mutual exchange through meaningful action, and also that it can be used to effectively deliver messages not only in virtual space, but also in advertising, posters, magazines and CI. However, emoticon is better at emotional expressions yet than other textual signs or visual signs, but in order to position itself as a universal and popular sign, emotional expressions should be clear, any difference in understanding messages should be removed, and message delivery should be more efficient.

  • PDF

The linguistic characteristics of Chinese character and Reading for the Analects of Confucius (한자(漢字)의 언어적 특성과 『논어(論語)』 읽기)

  • Kim, Sang-Rae
    • The Journal of Korean Philosophical History
    • /
    • no.30
    • /
    • pp.191-225
    • /
    • 2010
  • This paper is the outcome of attempting to approach for reading the Analects of Confucius through the polysemy of Chinese character and indecidability of articles. For this purpose at first, I explained which this Chinese character can be applied for 'philosophy language'. In the 16th century Matteo Ricci had tried to find out the possibility of ideographic script as standing for a universal language. On the other hand, Hegel and Heidegger strictly insisted on the Chinese character is inappropriate for expressing the logic thought of the human being. The reason was as next; firstly, this character had not the preposition and articles, and secondly the only one word could not indicates the bisemy including the meaning of opposition, lastly this language system expresses and communicates only with the change of word order without inflection. But With some scholar like Cassirer, Saussure and Derrida we can confirm the possibility which will discover the Chinese character for using the logic and reasoning language of from different view. Because in the language system of this Chinese character the connection of words in contexts is more important other than meaning as the individual word, in comparison to the language of the West. The Chinese character hides the original meaning until being what kind of event and thing relationship watch inside with different letters. So to speak, the Chinese character is called as 'language of indecidability'. For these points, even though The Chinese character lacks of preposition, articles, and inflection speech etc. the letter systematic, this language system can play a role for expressing as the philosophic language which manages with the complicated problems of the human being.

Recognition and formative Enblem of Pictorial Sign in TTX (TTX 픽토리얼 사인의 인지성과 조형적 표상)

  • Han, Seok-Woo;Han, Sung-Ho
    • Proceedings of the KSR Conference
    • /
    • 2011.05a
    • /
    • pp.1059-1068
    • /
    • 2011
  • This study is aimed to systematically grasp the visual and informative needs of sign system and secure the formativeness sample for standardization model. This study, therefore, will help building the requirements to create design value and secure objectiveness for realization of practical use of the communication design plan, and means transference of the external and internal information system of railroad vehicles for practical use into the standardization model. The pictorial sign based information delivery is a communication process and way gained through vision and perception, so that grasping the formative structure connoted in message is not less than understanding the characteristics of the essence. In this study, I defined the symbolic expressions inherent in TTX sign system to be perceptional action and value norms as general signatures and signifiers.

  • PDF

Obscene Material Searching Method in WWW (WWW상에서 음란물 검색기법)

  • 노경택;김경우;이기영;김규호
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.2
    • /
    • pp.1-7
    • /
    • 1999
  • World-Wide Web(WWW) is a protocol for changing information exchanges which is central to text documents in the existing network to make a multimedia data exchanges. It is possible for a beginner to search and access data which he wants to find as data were stored in the form of hypertext. The easiness for searching and accessing the multimedia data in WWW makes a important role for obscene materials to be toward generalization and multimedia and occurs social problems for them to be commercialized, while other researchers have actively studied the way to block effectively the site providing obscene materials for solving such problems. This paper presents and implements the blocking method for the sites having obscene material as it effectively search them. The proposed model was based on Link-Based information retrieval method and proved that it accomplished more efficient retrieval of relevant documents than probabilistic model when compared the one with the other which is known to generate the most correct results. The improvements in the average recall and precision ratio were shown as 12% and 8% respectively. Especially, the retrieval capability of relevant documents which include non-text data and have a few links increased highly.

  • PDF

A study of Implementing An Embedded System for Conversion from Text to Speech (문서-음성 변환 임베디드 시스템 구축에 관한 연구)

  • Lee, Hyun-Chang;Seo, Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.77-83
    • /
    • 2008
  • According to the development and expansion of software and hardware about recent information technologies(IT), disabled persons in using IT seem to feel more information gap. Devices for IT are important tools for users including disabled persons to communicate with each other and get information. Although the Korea faces ageing society rapidly, products for disabled persons are seldom shown in time for use. As getting older especially, one of the body function disorders is visual disturbance. There are tools, braille lettering, for disabled persons with visual disturbance to communicate or get information from book. Compared to general books, however, braille lettering book is lack of including all of information of our society. Therefore, in this paper, we implement and show an embedded system for disabled person with visual disturbance to get information by scanning text, extγacting characters and converting the text to speech automatically.

  • PDF

Novelty Detection on Web-server Log Dataset (웹서버 로그 데이터의 이상상태 탐지 기법)

  • Lee, Hwaseong;Kim, Ki Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1311-1319
    • /
    • 2019
  • Currently, the web environment is a commonly used area for sharing information and conducting business. It is becoming an attack point for external hacking targeting on personal information leakage or system failure. Conventional signature-based detection is used in cyber threat but signature-based detection has a limitation that it is difficult to detect the pattern when it is changed like polymorphism. In particular, injection attack is known to the most critical security risks based on web vulnerabilities and various variants are possible at any time. In this paper, we propose a novelty detection technique to detect abnormal state that deviates from the normal state on web-server log dataset(WSLD). The proposed method is a machine learning-based technique to detect a minor anomalous data that tends to be different from a large number of normal data after replacing strings in web-server log dataset with vectors using machine learning-based embedding algorithm.

A New Relationship between Poetry and Music - music as Creative Principle of Poetry in Mallarmé's World (시와 음악 간의 새로운 관계 - 말라르메에게 있어 시 창작원리로서의 음악)

  • Do, Yoon-Jung
    • Cross-Cultural Studies
    • /
    • v.44
    • /
    • pp.211-237
    • /
    • 2016
  • This paper seeks to explore the new relationship between music and poetry established in the beginning of the Modern Era. This was a period when reading silently was the dominant culture rather than reading aloud and orality was limited due to the emergence of literacy and print culture. A poet sensitive to the characteristics of the period, $Mallarm{\acute{e}}$ created his own concept of music and new creative principles of poetry from it. We analyze his "Divigation" and letters, in particular, the "Crisis of vers", "Music and Literature", "Mystery in the letters", and "About the book." Firstly, $Mallarm{\acute{e}}$ connects music with the mystery and the sacred: the mystery surrounds the music and the music is oriented with the sacred. The sanctity is that of the human race and has existed within humans since the beginning. Transposing the characteristics of this music to the poetry is his first creative principle of poetry. However, $Mallarm{\acute{e}}$ called music a totality of relationships that exist between objects without reducing the dimension to only the instruments or the sound. His definition is abstract, regarding music as a complete rhythm, the atmosphere and the air. Secondly, we have the question of how to realize music in a poem. As the music is surrounded by the mystery, $Mallarm{\acute{e}}$ can transpose the sacred to a poem in mysterious ways. This leads to his second principle of poetry: make a poem as a structure. In other words, 'musically', based on the disappearance of real objects and the initiative of the poet, he created a structure with only the words. We can create an acoustic structure but $Mallarm{\acute{e}}$ created a visible structure to overcome the incompleteness of the sound of a word in the diffusion of print culture. In this manner, the use of silence as much as sound and the use of visual as much as aural components were introduced in poetry as important motifs and the essentials of creation. This new relationship between poetry and music and the creative principles drawn from it appear to be the areas to which attention should be focused in the research of poetry.