• Title/Summary/Keyword: Copying

Search Result 305, Processing Time 0.022 seconds

Study on Designing Wedding Dress Considering Wedding Culture in Korea - Focus on Body Shapes and Image of the Korean Women - (한국 웨딩문화에 적합한 웨딩드레스 디자인 개발 연구 - 한국 여성들의 체형과 이미지를 중심으로 -)

  • O, Ji-Hye;Lee, In-Seong
    • The Research Journal of the Costume Culture
    • /
    • v.20 no.3
    • /
    • pp.363-377
    • /
    • 2012
  • Most of the wedding shops in the domestic market are more focusing on simply copying the designs of foreign wedding dress designers than making their own designs. Beyond the purpose of how to improve the wedding dress designs which is what other previous studies were aiming, this study goes deeper than that, concentrating on separate designing of dress for a wedding celebration and a rehearsal with photo shoots. Add to this, the study also differentiates itself from others in the past, investigating how to make a gown that hides a bride's physical shortcomings. For this study, the researcher studied the literature in terms of theoretical review, and conducted the empirical research through the photo analysis of 2,725 wedding dresses which brides really wore according to domestic brides' body shapes, their images, and situations. The researcher designed 8 wedding dresses for wedding ceremony and rehearsal shooting for brides with thick arms or wide shoulder under the concept of 'Romantic Story in Your Heart'. The wedding dress's image types for photo analysis were limited to the romantic type, the elegance type, the modern type, and the classic type. The researcher applied the empire-silhouette, the one-shoulder neckline, the raglan sleeves, the cap sleeves, and the shoulder accessories to the wedding dress designs judged as effectively making up defects in body shape and making nice images as well as other design factors seen from the analysis result.

A Study on Nail Art Applying the Paranoiac Critical Method of Salvador Dali (살바도르 달리(Salvador Dali)의 회화에 나타난 편집광적 비판방법(Paranoiac Critical Method)을 활용한 네일아트에 관한 연구)

  • Jeong, Seung-Eun;Kim, Jeong-Mee
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.16 no.2
    • /
    • pp.151-161
    • /
    • 2014
  • This study suggests method of expression of nail art utilizing Salvador Dali's Paranoiac Critical Method and produced the actual works based on discussions on Salvador Dali's painting, Paranoiac Critical Method, Nail Art's artistry and technique of expression. The result of the study is as follows: 1) Characteristic of Dali's painting is a Paranoiac Critical Method. If suggesting this characteristic in a method of expression of nail art, a good work which can be expressed on a small space, a nail, representing Dali is selected and 5 tips which are very similar to the rate of the painting are used in order to obtain an aesthetic effect just like a painting. And after composing on tips using the whole paining or part of painting, actual techniques of expression such as Hand Painting, Protranse or Water Decal are used. 2) the result of nail art produced utilizing Dali's Paranoiac Critical Method is as follows. Most of all, for nail art I with the topic of "The Persistence of Memory" (1931), after giving changes to 5 tips for the watch which is a part of the painting, Hand Painting technique is used using Acrylic Painting with colors which are similar colors to the painting. Then for nail art II which adopted "Slave Market with Invisible Bust of Voltaire" (1940), the whole painting is divided into 5 tips and Protranse technique which attaches printed paper onto nails was used. Lastly, for nail art III with the subject of "The Enigma of Desire My Mother, My Mother, My Mother" (1929), Water Decal which is emphasizing the parts of the painting and composing on 5 tips and copying printed picture onto Water Transfer Paper in order to attach on the nails is used. These nail arts show aesthetic characteristics such as fantasy, unconsciousness, grotesque, infinity, non-realism and horror just like paintings.

  • PDF

International discussions and enactment directions for e-business (e-비즈니스 관련 법규의 논의동향과 제정방향)

  • Kyung, Yeun-Beom
    • The Journal of Information Technology
    • /
    • v.7 no.1
    • /
    • pp.23-41
    • /
    • 2004
  • It is estimated that electronic commerce facilitates international trade and lower transaction cost and help firms make the best of the opportunities of market access. The comprehensive programs had been implemented to provide better electronic commerce environments by international organizations such as OECD, UNCITRAL, APEC, ICC and etc. Especially, WTO plays the most important role to implement efficient forms and rules on electronic commerce after Doha Ministerial Conference. Member countries recognize the need to conduct the electronic commerce in compliance with the principles and rules of WTO. However, there are many issues to be solved such as the clarifications of concepts and definitions, the possibility of adaptation of technological neutrality in GATS, the imposition of taxation in electronic commerce transactions and the methods of protecting copying as well as trademark. The Implementation of concrete forms and rules of electronic commerce in the WTO will be influential to international trade as the member countries have to adapt them in their transactions. Considering that further discussion will be continued in GATS, we need to analyze the problems and strategies for electronic commerce. As there are not concrete international laws for e-commerce, the existing laws must be revised and changed and each country need to present the enactment direction of e-commerce law to streamline e-commerce and to prevent trading partners from conflicting due to legal problems.

  • PDF

Data Sharing Technique between Heterogeneous based on Cloud Service (클라우드 서비스 기반 이기종간의 데이터 공유 기법)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.391-398
    • /
    • 2018
  • There are many problems caused by data sharing between general heterogeneous digital devices due to various interfaces. To solve this problem, this paper proposes heterogeneous data sharing with cloud service and mobile through D2D communication that supports communication between different devices. The proposed technique is used to reduce the load on the server to perform data synchronization. Also, in order to minimize data latency caused by data replication between different devices, a technique to enhance the speed of data writing with copying only the modified parts in the chunk list is adopted and cloud service model integrated with mobile environment is realized in order to minimize the network bandwidth consumed for synchronization for data sharing. Therefore, it is possible to share data in different spaces efficiently with maintaining data integrity and minimizing latency in data.

The Design and Implementation of the Multimedia End-to-End Server I/O System based on Linux (멀티미디어 End-to-End 서버용 리눅스 기반 I/O 시스템 설계 및 구현)

  • Nam, Sang-Jun;Lee, Byeong-Rae;Park, Nam-Seop;Lee, Yun-Jeong;Kim, Tae-Yun
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.311-318
    • /
    • 2001
  • In recent years, users\` demands for multimedia service are increasing because of a diffusion of internet. Server systems, however, offer inefficient multimedia data service to users. Multimedia applications often transfer the same data between shared devices at very high rates, and therefore require an efficient I/O subsystem. Data copying and context switching have long been identified as sources of I/O inefficiency. Therefore we propose the new Multimedia Stream System Call (MSSC) mechanism, which is inserted into a Linux kernel: The MSSC mechanism operates in kernel domain with RTP (Real-time Transport Protocol). We present measurements indicating that use of our techniques resulted in a 12.5%∼14% gain in throughput as compared with a conventional Linux system.

  • PDF

Case Study of a Patient with Callosal Disconnection Syndrome Secondary to an ACA Infarction (전대뇌동맥 경색으로 인한 뇌량 분리 증후군 환자의 치험 1례)

  • Jung, Hyun-Jung;Hwang, Joo-Won;Jo, Eun-Young;Choi, Dong-Jun;Han, Chang-Ho;Jung, Seung-Hyun;Sin, Gil-Jo;Lee, Won-Chul
    • The Journal of Internal Korean Medicine
    • /
    • v.27 no.3
    • /
    • pp.762-769
    • /
    • 2006
  • A callosal disconnection syndrome results in the functional independence of each hemisphere caused by ACA infarction, head injury or callosal operation for epilepsy. Clinical features are characterized by left unilateral tactile anomia, left unilateral agraphia, left unilateral apraxia, difficulty in copying drawings, dyscalculia and alien hand syndrome. Taeumchowe-tang(太陰調胃湯) is used to treat Taeumin(太陰人) Wewansuhanpyohanbyung(胃脘受寒表寒病). A 47 year-old man, following callosal infarction, was detected on MRI with left agraphia, dyscalculia and alien hand syndrome, but no left ideomotor apraxia or left apraxia. He was treated with Taeumchowe-tang. Significant improvement of clinical symptoms was seen, so it is here reported.

  • PDF

Anonymous Fingerprinting Method using the Secret Sharing Scheme (비밀분산법을 이용한 익명성 보장 핑거프린팅 기법)

  • 용승림;이상호
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.5_6
    • /
    • pp.353-359
    • /
    • 2004
  • The illegal copying and redistribution of digitally-stored information is a crucial problem to distributors who electronically sell digital data. Fingerprinting scheme is a techniques which supports copyright protection to track redistributors of electronic information using cryptographic techniques. Anonymous fingerprinting schemes, differ from symmetric fingerprinting, prevent the merchant from framing a buyer by making the fingerprinted version known to the buyer only. And the scheme, differ from asymmetric fingerprinting, allows the buyer to purchase goods without revealing her identity to the merchant. In this paper, a new anonymous fingerprinting scheme based on secret sharing is introduced. The merchant finds a sold version that has been distributed, and then he is able to retrieve a buyer's identity and take her to court. And Schnorr's digital signature prevents the buyer from denying the fact he redistributed. The buyer's anonymity relies on the security of discrete logarithm and secure two-party computations.

The Research Trends of the Korean Association for Political Economy After 2007 (2007년 이후 한국사회경제학회의 연구동향과 진로)

  • Park, Ji-Ung
    • 사회경제평론
    • /
    • v.31 no.1
    • /
    • pp.25-61
    • /
    • 2018
  • Nowadays 87 regimes born in the same year with the Korean Association for Political Economy(KAPE in abbreviation) have ended historically. This paper surveys the research trends of KAPE after 2007 for the 30th founding anniversary. This survey is expected to help research way forward of KAPE. The main contents of the surveys are as follows. Global finance crisis caused by subprime mortgage crisis in 2007 expanded to global economic crisis resulting in the crisis of economics. KAPE criticized the mainstream economics with different approach and methodology as well as political economy copying with the crisis of economics and then focused on economics of inequality. However, the progressive economics is depressed under the conservative regime after 2007. As a result, the progressive economics have experienced the crisis of reproduction of knowledge and have become the peripheral science in Korea. With new regimes after 87 regimes, more important than restoration of the progressive economics is rebirth as the progressive economics corresponding to new regime and new era. This is responsibility of KAPE as the single association of the progressive economics in Korea.

Efficient Assessment and Recommendations System using IRT and Data Mining (IRT와 데이터 마이닝을 이용한 효과적인 평가 및 추천시스템)

  • Kim Cheon-Shik;Jung Myung-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.109-117
    • /
    • 2006
  • E-learning method has many advantages that supplement the shortfalls of offline education. For this reason, today's offline educational institutions adopted the online education technique to improve learning effectiveness. Recently, general universities have partially adopted online learning. As a result, a study is searching for ways to improve the effectiveness of education by copying the merits of the existing offline education onto the online education. Thus a proper evaluation of learners and a feedback provision are considered necessary to improve the effectiveness of online learning. This study aims to suggest a model that will improve learning efficiency by adapting the advantages of offline education to online learning. To evaluate properly, this study conducted Item Response Test to examine the learners and finally ensure them an adequate level of education. Also, this study suggested a way to enhance learning efficiency by finding out each learner's study habits and to address the weaknesses of online learning. It is expected that the suggested method would be helpful in bettering learner's ability to study in school environment.

  • PDF

Design and Implementation of Method Generation based Watermarking Technique for Android Copyright Protection (안드로이드 저작권 보호를 위한 메소드 생성 기반 워터마킹 기법의 설계 및 구현)

  • Park, Heewan
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.1
    • /
    • pp.61-69
    • /
    • 2019
  • As smartphones become widespread, numerous applications are developed and social issues related to software copyright are emerging. Software watermarking is digital watermarking technology applied to software and is a technology that can be used to recognize copyright owners. Generally, Java language is used to develop applications on the Android environment. The Java is an object-oriented language that supports method overloading and overriding. In this paper, we propose and implement a method generation based watermarking technique. As a result of evaluating the overhead due to the watermark, it was confirmed that the increase of the executable file size and the decrease of the execution speed are not large. Using the watermarking technique proposed in this paper, it is expected that copyright information can be verified when illegal copying is suspected or actual program is stolen, and piracy attempts will be prevented in advance.