• Title/Summary/Keyword: 사용자 개입

Search Result 207, Processing Time 0.024 seconds

A Study on the Interactive Art Created by Embodiment of 2-D Paintings Into 3-D Imaging (2차원 회화작품이 3차원 영상으로 구현되어 창작된 참여예술에 대한 연구)

  • 김진희
    • Archives of design research
    • /
    • v.14 no.3
    • /
    • pp.127-134
    • /
    • 2001
  • This study suggests a model of experimental visual artworks with interactive art forms in which 2-D paintings are transformed to interactive 3-D animation works. Multimedia programming was employed to evolve objective still paintings to the animation of computer 3-D images with respect to visual ideas derived from visual components in the still painting and to response to the reactions users. The format and technique of the art works are based upon the contents developed by the author and the research materials are selected from the surrealistic paintings of tile world-famous Belgian painter, Rene Magritte. In the present paper, following topics are discussed in detail: a study of various visual cases occurring in transforming still paintings to animation works containing interactive components; a study of 3-D imaging and image processing techniques to transform 2-D paintings to 3-D images; animation techniques for interaction and overall structuring techniques; multimedia programming and user interface.

  • PDF

A Scheme of VoIP Spam Detection Using Improved Multi Gray-Leveling (향상된 Multi Gray-Leveling을 통한 VoIP 스팸 탐지 기법)

  • Chae, Kang-Suk;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8B
    • /
    • pp.630-636
    • /
    • 2012
  • In this paper, we propose an improved Multi Gray-Leveling scheme which reduces the problems of the existing Multi Gray-Leveling scheme suggested as a way of prevention against call spam in VoIP environment. The existing scheme having two different time period distinguishes the possibility of call spam by checking the call interval, so that it prevents the spammer's avoidance controlling the call interval. This is the strength of the existing one but it can misunderstand the normal user as a spammer due to taking long term time period. To solve this problem, this paper proposes the upgrade scheme which utilizes the receiver's action pattern as well as the caller's action pattern. It has such a good strength that can do gray leveling via the collected information in the database of VoIP service provider without user's direct involvement. Hence it can be a very effective way of VoIP spam detection.

Design and Implementation of SyncML based Application Management System for Mobile Devices (이동 단말을 위한 SyncML 기반 응용 관리 시스템의 설계 및 구현)

  • Park, Ji-Eun;Kim, Sang-Wook
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.1
    • /
    • pp.62-70
    • /
    • 2002
  • The purpose of this paper in that users can use mobile device applications more easily and efficiently through MoDAM (Mobile Device Application Management) system. MoDAM automates the process of web retrieval for obtaining mobile device applications and the process of installing or updating it on mobile devices and then supply users with these automated services in a step form by combining two separated processes. We implement a web agent conforming to OSD (Open Software Description) specification for automating software retrieval and downloading and also a mobile device based software management module conforming to SyncML (Synchronization Markup Language) specification for synchronizing common data between server and client. The method of automated software retrieval and management for mobile devices using these standard specifications minimizes users' interrupts and also can be applied to traditional several different mobile devices, operating systems or downloading web sites without platform dependent considerations.

One-time Session Key based HTTP DDoS Defense Mechanisms (일회성 세션 키 기반 HTTP DDoS 공격 방어기법)

  • Choi, Sang-Yong;Kang, Ik-Seon;Kim, Yong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.8
    • /
    • pp.95-104
    • /
    • 2013
  • DDoS attacks have became as a social threat since 2009 7.7 DDoS turmoil. Even though defence techniques have been developing to provide against those threats, they become much more sophisticate. In recent years, the attack form of DDoS is changing from high amount of traffic attack of network layers to highly sophisticate small amount of application layers. To make matters worse, attack agent for the attack has became very intelligent so that it is difficult to be blocked since it can't be distinguished from normal PCs. In the user authentication system(such as CAPTCHA) User intervention is required to distinguish normal PCs and intelligent attack agents and in particular, in a NAT environment, IP-based blocking method can be cut off the normal users traffic at the same time. This research examined defense techniques which are able to distinguish between agent and normal PC and effectively block ways the HTTP DDoS offense applying one-time session key based authentication method using Cookie which is used in HTTP protocol to protect web sever from sophisticate application layer of DDoS.

A Study on the Application Development for the Drawing Test (디지털 기기에서의 그림검사를 위한 Application 개발 연구)

  • Kim, Sunhee K.;Kim, Sun-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.707-717
    • /
    • 2021
  • The purpose of this study was to explore whether PPAT drawing using an application can be developed on digital devices for game addicts. The PPAT drawing test is useful and reliable for verifying problem-solving skills in how people pick apples. As a result of this study, the over-immersion group scored lower than the average user group in the "problem Solving" category of the PPAT drawing test using the PPAT drawing applicaion on digital devices, and expressed by not reaching for apples, or by picking apples without reasonable support. The findings in this study suggest that the PPAT drawing test application on digital devices has significantly demonstrated its original purpose of 'problem resolution', as well as future psychotherapeutic interventions for Internet over-immersion subjects as well as users who are familiar with digital devices.

Shape region segmentation based on color and edge characteristics of moving images (동영상의 컬러 및 에지 정보에 기초한 shape 영역 segmentation 기법 연구)

  • Park, Jin-Nam;Lee, Jae-Duck;Yoon, Sung-Soo;Huh, Young;Jung, Sung-Hwan
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2001.11b
    • /
    • pp.149-154
    • /
    • 2001
  • 멀티미디어 정보표현 기술인 MPEG-7 표준이 빠른 속도의 진전을 보임에 따라 이를 활용한 검색 기술 개발도 활발히 진행 중에 있다 방대한 량의 동영상 내용 검색 기술 연구에 있어서 우선적으로 고려되어야 할 부분이 내용이 연속되는 프레임들의 분류이다. 이를 위해서는 물리적인 장면전환이 이루어지는 부분에 대한 실시간 자동 cut detection 기술 및 이 컷 프레임 영상에 대한 내용 기술을 자동적으로 수행할 필요성이 있다. 각 컷 프레임의 자동 내용 기술의 전처리로써 본 논문에서는 장면전환이 생기는 프레임의 영상의 어떠한 정보도 사전 정보로 취하지 않고 사용자의 개입이 없는 상황에서 영상의 컬러 특성 및 에지 정보만을 가지고 shape 영역 segmentation을 자동으로 실행하는 방법을 제안한다. 제안한 방법의 성능은 segmentation된 영상과 원 영상과의 영역비교를 통한 유사도에 의해 평가하며, 시뮬레이션 결과에서 제안한 알고리즘은 평균 90%이상의 영역 분할이 정확하게 됨을 알 수 있었고, 컬러의 구분이 명확하지 않은 자연영상에서도 robust한 segmentation 결과를 나타냄을 본 연구를 통하여 알 수 있었다.

  • PDF

Comparison of Code Generation Tools from Formal Specification of Security Function (정형명세 보안기능의 코드생성 도구 비교)

  • 유희준;김일곤;최진영;김상호;노병규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.829-831
    • /
    • 2002
  • 최근 들어 보안에 대한 관심이 높아지고 있으며, 많은 보안 관련 프로그램이 사용되고 있는 상황이다. 하지만 안전성을 예측하기 어려운 보안 기능을 완벽하게 구현하기 위해서 현재의 테스팅 방법론만으로는 완전성을 보장할 수 없으므로 보다 안전한 보안 기능을 구현하기 위해서 정형명세 방법은 반드시 필요하다. 또한 실제로 시스템들이 개발되는 과정에 있어서 설계될 당시와는 달리 결함을 가질 수 있다. 시스템에 대한 명세가 정확하다 하더라도 개발자인 사람의 개입으로 인해서 개발하는 도중에 명세와 다른 결과를 초래하여 결함이 발생할 수 있다. 이러한 결함은 개발자나 사용자에 의해 쉽게 발견되기 어렵다. 만일 보안 시스템이 알져지지 않은 결함이 있다면 비밀 정보가 쉽게 누설될 수 있다는 큰 문제가 발생할 수 있다. 통신망을 사용하는 인구의 확대와 더불어 다양한 형태의 통신 서비스가 제공됨에 따라 시스템의 특성이 복잡해지고 불법적인 자료 접근의 위험도 많이 노출되고 있다. 따라서 명확한 정형명세 보안기능으로부터 자동 코드 생성은 반드시 필요하다. 본 논문에서는 여러 정형 도구를 사용해서 보안기능에 대한 정형명세를 작성한 후에 소스코드 생성한 후, 정형명세를 이용하여 설계 및 구현한 프로그램에 대한 명세와 소스코드간 일치성 검토 방법을 개발하여, 정형명세를 통해 생성된 보안기능 소스코드의 보안성 측면과 성능적 측면의 Teade-Off 분석하는 것이다. 논문에서는 인증 관련 보안 기능인 S/KRY에 대해서 4개(STATEMATE MAGMUM, Rational Rose 98, SPEAR, VDM-SL)의 정형도구를 사용하여 명세 후, 소스 코드를 생성하여 생성된 각 코드에 대하여 비교하였으며, 현재 상용화 되어있는 Bellcore 의 S/KEY 시스템과의 비교를 수행하였다. 분석에서는 제품의 효율성뿐만 아니라 보안성을 중요하게 생각하였으며, 앞으로 보안 관련 소프트웨어 개발에 사용될 수 있는 도구들이 가이드 라인에 대한 정보를 제공한다.

  • PDF

Aspect of Human-Centered Design in Contemporary Design of Time and Change : Focus on Analysis of Affordance and Psychological Bases (현대 시간성 디자인의 인간중심 디자인적 측면 : 어포던스에 의거한 행태지원 측면 분석을 중심으로)

  • Hong, Eui-Taek;Lee, Jeong-Min
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.4
    • /
    • pp.91-102
    • /
    • 2007
  • Post-modern period differentiates itself from Modern period in many aspects. One of these is the emphasis on phenomena which are ephemeral and changing. This paper looks at the psychological bases of these expressions of time & change in contemporary design and their affordances on human behavior. It also analyzes the types of time & change design on the basis of the behaviors they afford. This will lead us to the understanding of how the design including time & change expresses the spirit of the age and how it can play positive roles in human psychology.

An Autonomic Self-management Mechanism for High-available Home Service Networked System (고가용성 홈 서비스 네트워크 시스템을 위한 오토노믹 자가 관리 메커니즘)

  • Choi, Chang-Yeol;Kim, Sung-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.2
    • /
    • pp.119-130
    • /
    • 2007
  • Home service networked systems require a high-availability service with a proactive and practical fault management. However, as the system complexity grows, it is not easy to meet the requirement. Moreover, user may want to pay no attention to a sequence of complex or nervous maintenance jobs for system fault managements. Therefore, the home service networked systems must have self & remote fault management capability with a minimal human intervention for meeting high-availability requirement of the integrated systems that consist of the networked appliances or devices. In this paper, we present an autonomic healing utility equipped with a remote self-managing mechanism in order to both increase the availability of home service networked systems and decrease the maintenance cost.

A Complementary Approach of a Psychosocial and Cultural Perspective to Gaming Disorder (게임 이용 장애에 대한 심리사회적 관점과 문화적 관점의 상호보완적 접근)

  • Seo, Dowon;Song, Yongsu
    • Journal of Korea Game Society
    • /
    • v.20 no.1
    • /
    • pp.83-92
    • /
    • 2020
  • The WHO has defined gaming disorder as a disorder, and there are arguments for and against it from different perspectives. In response, this paper tried to identify the disease model, psychosocial, and cultural perspective for complementing them with an interdisciplinary attitude. First, universal prevention should be provided for general game users to get literacy. Second, selective prevention should be provided for a potentially risky group to find out the alternative activity. Finally, indicated prevention should be provided for a risky group to be treated.