• Title/Summary/Keyword: Chen Man

Search Result 66, Processing Time 0.023 seconds

A Note to the Stability of Fuzzy Closed-Loop Control Systems

  • Hong, Dug-Hun
    • Journal of the Korean Data and Information Science Society
    • /
    • v.12 no.1
    • /
    • pp.89-97
    • /
    • 2001
  • Chen and Chen(FSS, 1993, 159-168) presented a reasonable analytical model of fuzzy closed-loop systems and proposed a method to analyze the stability of fuzzy control by the relational matrix of fuzzy system. Chen, Lu and Chen(IEEE Trans. Syst. Man Cybern., 1995, 881-888) formulated the sufficient and necessary conditions on stability of fuzzy closed-loop control systems. Gang and Chen(FSS, 1996, 27-34) deduced a linguistic relation model of a fuzzy closed loop control system from the linguistic models of the fuzzy controller and the controlled process and discussed the linguistic stability of fuzzy closed loop system by a linguistic relation matrix. In this paper, we study more on their models. Indeed, we prove the existence and uniqueness of equilibrium state $X_e$ in which fuzzy system is stable and give closed form of $X_e$. The same examples in Chen and Chen and Gang and Chen are treated to analyze the stability of fuzzy control systems.

  • PDF

A Study on the Application of Traditional Elements in Chinese Fashion Photography -Focused on Chenman's Photographs (중국 패션사진에 나타난 전통요소 활용에 관한 연구 -첸만(陳漫)의 사진을 중심으로-)

  • Yuan, Tong Shi;Lee, Sang Eun;Yang, Jong Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.3
    • /
    • pp.330-341
    • /
    • 2018
  • In recent years, a number of Chinese artists are interested in 'Chinese-style'. 'Chinese-style' can be understood as an art form in which Chinese elements are combined with modernized sensibilities. This paper analyzed how Chinese traditional elements can be effectively implemented in fashion photography, focusing on Chen Man, a leading fashion photographer in China. Our research shows that Chen Man looks to the traditions and history of China to inspire her modern work, which makes her unique as a Chinese fashion photographer. She tried not to repetitively express typical images of Chinese elements but to visualize the symbolic meaning of traditional elements as new images of modern China. Through this practice, she were able to effectively communicate the images of products and brands promoted in fashion photos. Furthermore, her works are being recognized by not only the fashion industry but also the international art elite as they contribute to building and promoting Chinese fashion identity. Research on Chen Man's work is significant in providing a new way for 'Chinese-style' fashion photographers to reinterpret Chinese traditional elements without following Chinese tradition.

A Study on Efficient Animated Character Based on the Hunlock Effect

  • Chen, Ye;Cho, Dong Min
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.9
    • /
    • pp.1268-1278
    • /
    • 2021
  • Combined with expert interviews and questionnaire investigations, this paper aims at analyzing the different characteristics of the animated characters Spider-Man from Spider-Man: Into the Spider-Verse based on Hunlock Effect, in order to provide appropriate guidance for animation characters designers and limited inspiration for creative practices. First, Spider-Man: Into the Spider-Verse is chosen as the case to analyze 6 Spider-Man with different personalities, who appear at the same time. Then, Spider-Man's characteristics are analyzed through interviews with experts. At last, the key study focuses on the influence of environmental factors on the formation of Spider-Man's roles in the theory of Hunlock Effect, in light of the principle of personality formation in psychology. From the perspective of psychology, interdisciplinary study on animated characters provides scientific and effective support for animation character design, and increases the fascination of animation characters' personalities.

Preparation of CdSe QDs-carbohydrate Conjugation and its Application for HepG2 Cells Labeling

  • Jiang, Mingxing;Chen, Yan;Kai, Guiqing;Wang, Ruijun;Cui, Huali;Hu, Meili
    • Bulletin of the Korean Chemical Society
    • /
    • v.33 no.2
    • /
    • pp.571-574
    • /
    • 2012
  • In present study, CdSe quantum dots (QDs) were prepared with a novel but simple, effective and exercisable method. Nine different types of carbohydrate molecules were used to modify CdSe QDs. D-mannose (Man)-coated quantum dots were prepared for labeling human hepatoma (HepG2) cells, because of the high expression of mannose receptor (MR) on HepG2 cells. The uptake characteristics of CdSe QDs-Man were investigated in HepG2 cells. The absorption rate result of MTT assay in 48 h suggested the extremely low cytotoxicity of CdSe QDs-Man. The presence of quantum dots was confirmed with fluorescence microscopy. These results were encouraging regarding the application of QDs molecules for early detection of HepG2 cells.

Vulnerability Analysis and Improvement in Man-in-the-Middle Attack for Remote User Authentication Scheme of Shieh and Wang's using Smart Card (Shieh and Wang's의 스마트카드 상호인증 스킴에 대한 중간자공격 개선)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.1-16
    • /
    • 2012
  • Shieh and Wang [10] recently proposed an efficient mutual authentication scheme that combined the cost-effectiveness of operations of Lee et al. [6]. scheme and the security and key agreement of Chen and Yeh scheme. Shieh and Wang [10] scheme, however, does not satisfy the security requirements against a third party (the man-in the middle, attacker) that have to be considered in remote user authentication scheme using password-based smart cards. Shieh and Wang weaknesses are the inappropriateness that it cannot verify the forged message in 3-way handshaking mutual authentication, and the vulnerability that the system (server) secret key can easily be exposed. This paper investigates the problems of Shieh and Wang scheme in the verification procedure of the forged messages intercepted by the eavesdrop. An enhanced two-way remote user authentication scheme is proposed that is safe and strong against multiple attacks by adding the ability to perform integrity check on the server and proposed scheme is not expose user password information and the system's confidential information.

An Analytical Study on the Visual Innovation of the Animation <Spider-Man: Across the Spider-Verse>

  • Zhihui Chen;Xinyi Shan;Jeanhun Chung
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.352-357
    • /
    • 2023
  • This study focuses on the art style research of the 3D Animation <Spider-Man: Across the Spider-Verse>, exploring the film's innovation in art design. The article first analyzes how the movie skillfully blends American comics, watercolor painting style, Pollock drip painting, and ink painting, among other artistic techniques, to present a unique visual experience for the audience. By specifically dissecting the character design and scene composition in the movie, it explores the specific application of these art styles and their methods in digital image production. Ultimately, the paper emphasizes the contribution of <Spider-Man: Across the Spider-Verse> to 3D Animated cinema, particularly its innovation in the field of art design, as well as its inspiration and possibilities for the diversity of art styles in animated films. Overall, this study aims to provide in-depth academic insight into the field of animated film art design and to promote its development and innovation.

User Authentication Protocol preserving Enhanced Anonymity and Untraceability for TMIS

  • Mi-Og Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.10
    • /
    • pp.93-101
    • /
    • 2023
  • In this paper, as a result of analyzing the TMIS authentication protocol using ECC and biometric information proposed by Chen-Chen in 2023, there were security problems such as user impersonation attack, man-in-the-middle attack, and user anonymity. Therefore, this paper proposes an improved authentication protocol that provides user anonymity to solve these problems. As a result of analyzing the security of the protocol proposed in this paper, it was analyzed to be secure for various attacks such as offline password guessing attack, user impersonation attack, smart-card loss attack, insider attack, perfect forward attack. It has also been shown to provided user privacy by guaranteeing user anonymity and untraceability, which must be guaranteed in TMIS. In addition, there was no significant increase in computational complexity, so the efficiency of execution time was achieved. Therefore, the proposed protocol in this paper is a suitable user authentication protocol for TMIS.

Meta Analysis of Association of the IL-17F rs763780T>C Gene Polymorphism with Cancer Risk

  • Chen, Xiang-Jun;Zhou, Tao-You;Chen, Min;Pu, Dan
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.19
    • /
    • pp.8083-8087
    • /
    • 2014
  • Purpose: To investigate the association of IL-17F rs763780T>C with cancer risk. Materials and Methods: We searched the Cochrane Central Library, PubMed, MEDLINE, EMBASE, CNKI (China National Knowledge Infrastructure) and WangFang databases until May 2014 for a meta-analysis conducted using RevMan 5.2 software. Results: A total of ten papers were included into this meta analysis, involving 3, 336 cases and 4, 217 healthy people. There were no significant differences on association of IL-17F rs763780T>C polymorphism with cancer risk except in the CC vs TT genetic model. Although the the risk in the gastric cancer group is higher than that in control group, there were no significant differences on the association of IL-17F rs763780T>C polymorphism with other cancers. Conclusions: Our meta analysis reveal the IL-17A rs763780T>C gene polymorphism is involved in risk of gastric cancer but not other tumor types.

A Fatal Case of Naegleria fowleri Meningoencephalitis in Taiwan

  • Su, Mei-Yu;Lee, Ming-Shih;Shyu, Ling-Yuh;Lin, Wei-Chen;Hsiao, Pei-Ching;Wang, Chi-Ping;Ji, Dar-Der;Chen, Ke-Min;Lai, Shih-Chan
    • Parasites, Hosts and Diseases
    • /
    • v.51 no.2
    • /
    • pp.203-206
    • /
    • 2013
  • After bathing at a hot spring resort, a 75-year-old man presented to the emergency department because of seizure-like attack with loss of conscious. This is the first case of primary amebic meningoencephalitis (PAM) caused by Naegleria fowleri in Taiwan. PAM was diagnosed based on detection of actively motile trophozoites in cerebrospinal fluid using a wet-mount smear and the Liu's stain. The amoebae were further confirmed by PCR and gene sequencing. In spite of administering amphotericin B treatment, the patient died 25 days later.