• Title/Summary/Keyword: 플러그 인

Search Result 133, Processing Time 0.02 seconds

Creating Expressive and Experimental Typography and Typeface by Utilizing Scriptographer: Focused on Rush Type and Celestial Type (스크립토그래퍼를 활용한 표현적 실험 타이포그래피 및 활자체의 창작: <질주하는 활자>와 <천상의 활자>를 중심으로)

  • Kim, Namoo
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.6
    • /
    • pp.203-214
    • /
    • 2015
  • Before the digital age, the main tools used for printing out letters were pen and brush. Therefore, forms and styles of the languages modelled out during the age also revolved around the pen and brush. However, new tools and techniques introduced in the digital age to express typography put this limit in the shade. In other words, the user can make expressive and experimental typography and typefaces quickly and easily, by learning and utilizing new tools efficiently. As such, this study is to explore those cases, to understand characters and meanings of expressive and experimental typography within the context of typography history, to introduce a new tool, 'Scriptographer' developed by means of the open-source scripting plug-in for Adobe Illustrator, and to discuss the advantages, disadvantages and applicability of this tool. Further on, through case analysis of successful preceding projects, the researcher arranges a practical foundation, and estimates the practicality of this research through experimental typography series, Rush Type and Celestial Type, created by using Scriptographer.

A Study of Information Leakage Prevention through Certified Authentication in Phishing, Vishing, SMiShing Attacks (Phishing, Vishing, SMiShing 공격에서 공인인증을 통한 정보침해 방지 연구)

  • Park, Dea-Woo;Seo, Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.171-180
    • /
    • 2007
  • The financial crime that used morale anger Phishing, Pharming, Vishing, SMiSing etc. will gain during recent cyber crimes. We are study systematically whether or not leakage of information and infringement can how easily occur to Phishing, Vishing, SMiSing using a social engineering technique and VoIP at these papers through experiment. A hacker makes Phishing, Vishing site, and test an information infringement process of a user through PiSing mail and a virus, a nasty code, Vishing, a SMiSing character, disarmament of Keylogger prevention S/W etc. as establish server. Information by Phishing, Vishing, SMiSing is infringed with leakage in the experiment results, and confirm, and test certified certificate and White List and a certified authentication mark, plug-in program installation etc. to prevention, and security becomes, and demonstrate. Technical experiment and prevention regarding Phishing of this paper and Vishing attack reduce the damage of information infringement, and be education for Ubiquitous information security will contribute in technical development.

  • PDF

A Design of AI Middleware for Making Interactive Animation Characters (인터랙티브한 애니메이션 캐릭터 제작을 위한 인공지능 미들웨어 설계)

  • Lee, Seung-Sub;Um, Ky-Hyun;Cho, Kyung-Eun
    • Journal of Korea Game Society
    • /
    • v.8 no.1
    • /
    • pp.91-101
    • /
    • 2008
  • Most designers use professional 3D animation tools such as 3DS MAX to manually create animation. This manual method requires a great deal of time and efforts, and does not allow animation characters to interact with one another. In this paper, we design an AI middleware of form as 3DS MAX plug-in to solve these issues. We present an AI expression structure and internal processing method for this middleware, and the method for creating AI character's structure. It creates AI character's structure by drawing figures and lines for representing AI elements. For experiment, we have produced same animations with the traditional method and our method, and measured the task volume in both methods. This result verifies that the task volume is similar or higher than the traditional method in small-scale tasks, but up to 43% of the task volume is reduced in large-scale tasks. Using the method proposed in this paper, we see that characters in an animation interact each other, and task volume in large-scale tasks are reduced.

  • PDF

Implementation of Property Input Automation Program for Building Information Modeling (BIM) Property Set (BIM 속성분류체계 구축을 위한 속성입력 자동화 프로그램 구현)

  • Nam, Jeong-Yong;Joo, Jae-Ha;Kim, Tae-Hyung
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.33 no.2
    • /
    • pp.73-79
    • /
    • 2020
  • Building Information Modeling (BIM) tools have not only increased the use of technology in the design process, but also increased the need for more information standard systems. The object classification system consists of 327 types of construction results obtained from 25 kinds of facilities, 174 types of parts, and 207 types of construction parts. In the previous study, the property classification system was developed into 4 major classifications, 13 middle classifications, 58 small classifications (category), and 333 attribution information of roads and rivers. It is extremely difficult to input the property information according to such extensive object classification. In addition, the development of external applications such as Revit plug-ins has created a need to automate specific and repetitive tasks. Therefore, following the BIM property classification system, an attribute input program was implemented for the system to enhance the productivity and convenience of the BIM users.

Cognitive Approach to Anti-Phishing and Anti-Pharming: Survey (피싱/파밍 예방을 위한 인지기반 접근 방법)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.2
    • /
    • pp.33-39
    • /
    • 2013
  • Recently, lots of anti-phishing schemes have been developed. Several products identify phishing sites and show the results on the address bar of the internet browser. However, they determine only by domain names or IP addresses. Although this kind of method is effective against recent DNS Pharming attacks, there is still a possibility that hidden attacks which modifies HTML codes could incapacitate those anti-phishing programs. In this paper, the cognitive approach which compares images to decide phishing or Pharming is presented by using system tray and balloon tips that are hard to fake with pop-ups or flash in order for users to compare pictures from connecting sites and system tray. It differs from an old method that a program analyzes IP or domains to judge if it is phishing or Pharming. Therefore, proposed method effective cognitive approach against phishing and Pharming attacks.

  • PDF

IPMP information editing system of MPEG-4 authorizing tool base for digital contents management and protection (디지털 콘텐츠 보호 및 관리를 위한 MPEG-4 저작도구 기반의 IPMP 정보 편집 시스템)

  • 박철민;최종근;김광용;홍진우;정회경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.225-228
    • /
    • 2004
  • Digital contents is used already in near place with us. Contents of MPEG-4 standard is used to process multimedia data in field of communication, computer, broadcasting mobile etc. However, absence of copyright management and protection system and interoperability problem of right system between each corporation happened. Because MPEG establish IPMP(Intellectual Property Management and Protection) system standard in agreement with MPEG-4 system standard, proposed cooperation method to manage and protect copyright. Accordingly, in this paper, put in copyright of authorized contents management and protection extension system implementation adding MPEG-4 IPMP system like plug-in into existing MPEG-4 authorizing tool. Therefore, author edits IPMP information to protect contents or object, and process the information in system and authorize MPEG-4 digital contents that have management and protection sign according to IPMP standard. This system designed and implemented to divided into IPMP information save processor, IPMP information creation processor, media IPPM processor, XMT-A to MP4 converter IPMP extension.

  • PDF

Cognitive Approach to Anti-Phishing and Anti-Pharming (피싱 및 파밍 방지를 위한 인지 기반의 접근 방법)

  • Kim, Ju-Hyun;Maeng, Young-Jae;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.113-124
    • /
    • 2009
  • Recently, lots of anti-phishing schemes have been developed. Several products identify phishing sites and show the results on the address bar of the internet browser, but they determine only by domain names or IP addresses. Although this kind of method is effective against recent DNS pharming attacks, there is still a possibility that hidden attacks which modifies HTML codes could incapacitate those anti-phishing programs. In this paper, the cognitive approach which compares images to decide phishing or pharming is presented, using system tray and balloon tips that are hard to fake with pop-ups or flash in order for users to compare pictures from connecting sites and system tray. It differs from an old method that a program analyzes IP or domains to judge if it is phishing or pharming, but observes if there were HTML code changing between plug-ins and a server.

A Building and Application of Enterprise Ontology with $Prot{\acute{e}}g{\acute{e}}$ - Representation and Analysis of Shipbuilding Process - ($Prot{\acute{e}}g{\acute{e}}$를 이용한 기업 온톨로지 기반 구축 및 활용 -조선 건조공정 표현과 분석 -)

  • Park, Ji-Hyun;Yang, Jae-Gun;Bae, Jae-Hak J.
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.3
    • /
    • pp.27-39
    • /
    • 2009
  • This paper describes a case study on an enterprise ontology(30) based analysis and representation of the production operation in shipbuilding. The production operation consists of steel fabrication, assembly, election, launching, sea trial and delivery process. We represent and analyze the steel fabrication process and the piping design business of the assembly process among them. First, we build an ontology on concepts of steel fabrication process and the piping design business of assembly process. And then we merge it with the original EO. We represent each process and analyze current state of production process with the merged EO and $Prot{\acute{e}}g{\acute{e}}$ plug-ins. Moreover, we can analyze dependency relations among the workflow elements. Through the case study, we have found the effectiveness of EO in business management and process management in complex heavy industries.

Effect of Mixture Rate of Used Media and Perlite on Physico-Chemical of Properties Root Media and Seedling Quality in Fruit Vegetables Plug Nursery System (공정육묘시 재활용 상토에 신규상토 및 펄라이트의 혼합비율이 상토의 이화학적 특성과 과채류 묘소질에 미치는 영향)

  • Byun, Hyo-Jeung;Kim, Young Shik;Kang, Ho-Min;Kim, Il Seop
    • Journal of Bio-Environment Control
    • /
    • v.21 no.3
    • /
    • pp.213-219
    • /
    • 2012
  • Improving the physico-chemical properties of used media by mixing ratio of new plug media (NPM), used plug media (UPM) and perlite is necessary to improve seedling quality. In this study, five treatments were designed to investigate mixing ratio of UPM and NPM by ratio of volume 0 : 100, 25 : 75, 50 : 50, 75 : 25, 100 : 0, respectively. On the other hand, nine treatments were designed to investigate of perlite volumes were added to UPM and mixed media (UPM : NPM (50 : 50)) with 0, 5, 10, and 20% of ratio volume. The physicochemical properties of all mediums and their effect on growth response of tomato and cucumber seedlings were determined. The result indicates that physical properties was improved when NPM was mixed with UPM and at mixed ratio of volume 50 : 50 (v : v) has similar pore spare, bulk density and water retention to NPM. Seedling quality of tomato and cucumber in mixed media (50 : 50) are better than other mixed ratio and similar to NPM. Addition perlite to UPM and mixed media 50 : 50 (v : v) increased the pore space and water retention. Physical properties such as particle density, pore space and bulk density were increased when perlite volume increased. However, the best of seedling quality was observed by the addition at 10% volume of perlite. These results suggested that optimum of mixed ratio for recycled used media is new media and used media 1 : 1 mixed.

Performance Evaluation of Workstation System within ATM Integrated Service Switching System using Mean Value Analysis Algorithm (MVA 알고리즘을 이용한 ATM 기반 통합 서비스 교환기 내 워크스테이션의 성능 평가)

  • Jang, Seung-Ju;Kim, Gil-Yong;Lee, Jae-Hum;Park, Ho-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.4
    • /
    • pp.421-429
    • /
    • 2000
  • In present, ATM integrated switching system has been developed to a mixed modules that complexed switching system including maintenance, operation based on B-ISDN/LAN service and plug-in module, , which runs on workstation computer system. Meanwhile, workstation has HMI operation system feature including file system management, time management, graphic processing, TMN agent function. The workstation has communicated with between ATM switching module and clients. This computer system architecture has much burden messages communication among processes or processor. These messages communication consume system resources which are socket, message queue, IO device files, regular files, and so on. Therefore, in this paper we proposed new performance modeling with this system architecture. We will analyze the system bottleneck and improve system performance. In addition, in the future, the system has many additional features should be migrated to workstation system, we need previously to evaluate system bottleneck and redesign it. In performance model, we use queueing network model and the simulation package is used PDQ and C-program.

  • PDF