• Title/Summary/Keyword: Cyber world

Search Result 372, Processing Time 0.026 seconds

A Balanced and Unbalanced Analysis of the DNA Matrix Code of The Taegeuk Pattern (태극 패턴 DNA 행렬 코드의 평형과 불평형 해석)

  • Kim, Jeong Su;Lee, Moon Ho
    • Journal of Engineering Education Research
    • /
    • v.21 no.1
    • /
    • pp.77-89
    • /
    • 2018
  • The chromosomes of all the world are the same in all 24 pairs, but the key, skin color and appearance are different. Also, it is the resistance of adult disease, diabetes, cancer. In 1953, Watson, Crick of Cambridge University experimentally discovered a DNA double helix structure, and in 1962, They laureates the Nobel Prize. In 1964, Temin, University of Wisconsin, USA, experimentally identified the ability to copy gene information from RNA to DNA and received the Nobel Prize in 1975. In this paper, we analyzed 24 pairs of DNA chromosomes using mathematical matrices based on the combination order sequence of four groups, and designed the Taegeuk pattern genetic code for the first time in the world. In the case of normal persons, the middle Yin-Yang taegeuk is designed as a block circulant Jacket matrix in DNA, and the left-right and upper-lower pairs of east-west and north-south rulings are designed as pair complementary matrices. If (C U: A G) chromosomes are unbalanced, that is, people with disease or inheritance become squashed squirming patterns. In 2017, Professor Michel Young was awarded a Nobel by presenting a biological clock and experimentally explained the bio-imbalance through a yellow fruit fly experiment.This study proved mathematical matrices for balanced and unbalanced RNA.

A Study on the Application of World Wide Web(WWW) Image Files to Visual Material in Lecture -In Case of Landscape Aesthetics- (WWW 이미지 자료의 시청각교재 활용방안에 관한 연구 -조경미학 관련논제를 중심으로-)

  • 정기호
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.27 no.2
    • /
    • pp.108-118
    • /
    • 1999
  • This study aims to apply World Wide Web(WWW) image files to visual material in lectures. Especially handles "Aesthetics of Landscape Architecture." Visual Materials of 800 web sites were searched and analyzed. It is found that web search needs a subject oriented web guide. It says now a need of application web material to lectures. Matching the web images with the subjects of lecture, above all, is the main approach of this study. Thus, a list up method is supposed, series of web image data to be inclusive in two tables. The data distribute on sub-subject, and applicant as materials in picturing objects of slide show, web guide, and single image. Two cases of lecture subjects were chosen in this study. A case that needs various visual materials and other case of advanced materials that needs a special web guide. Chance of results of this study is not yet fully clear in real lecture. It is sure, as an article of cyber lecture that provided result of increasingly participant's interest. By this study, it will be possible a fully made lecture material by further study.her study.

  • PDF

An Effective Visualization of Intricate Multi-Event Situations by Reusing Primitive Motions and Actions

  • Park, Jong Hee;Choi, Jun Seong
    • International Journal of Contents
    • /
    • v.15 no.4
    • /
    • pp.16-26
    • /
    • 2019
  • The efficient implementation of various physical actions of agents to respond to dynamically changing situations is essential for the simulation of realistic agents and activities in a cyber world. To achieve a maximum diversity of actions and immediate responsiveness to abrupt changes in situations, we have developed an animation technique in which complex actions are recursively constructed by reusing a set of primitive motions, and agents are designed to react in real-time to abrupt ambient changes by computationally satisfying kinematic constraints on body parts with respect to their goals. Our reusing scheme is extended to visualize the procedure of realistic intricate situations involving many concurring events. Our approach based on motion reuse and recursive assembly has clear advantages in motion variability and action diversity with respect to authoring scalability and motion responsiveness compared to conventional monolithic (static) animation techniques. This diversity also serves to accommodate the characteristic unpredictability of events concurring in a situation due to inherent non-determinism of associated conditions. To demonstrate the viability of our approach, we implement several composite and parallel actions in a dynamically changing example situation involving events that were originally independent until coincidentally inter-coupled therein.

A Study of Cyberfeminism in fashion in the digital era (Part II) - Focused on aesthetic values - (디지털시대 패션에 나타난 사이버페미니즘 연구 (제2보) -미적가치를 중심으로-)

  • 김현수;양숙희
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.28 no.2
    • /
    • pp.200-211
    • /
    • 2004
  • The Purpose of this study was to review the effects of the cyberspace mentality on fashion as a visible symbol of feminity and to analyze terms of its aesthetic values. As for the research methodology, relevant theories across cultures and disciplines are reviewed and an experimental study is conducted to explore spiritual objectives in cyberspace. Then, major issues facing the digital society. symbolized in the computer networks, are reviewed in terms of feminine identity and physical beauty from a feminist's viewpoint. Lastly, the aesthetic values found in the spatial meditation of a new dimension (reality versus virtuality) is comparatively analyzed. The virual reality technology and bio-medical technology are combined to be represented in fashion to create a more realistic virtual world than the real one. Such a world may well be characterized by virtuality, artificiality, masquerade, and fantasy. The intrinsic values which are revealed as psychiatrical or psychological implicated values featuring virtual or artificial implications may well be characterized by distopia, hyper, hybridity and Sur Reality.

A Study of Fashion Art Illustration

  • Kang, Hee-Myung;Kim, Hye-Kyung
    • Journal of Fashion Business
    • /
    • v.6 no.3
    • /
    • pp.94-109
    • /
    • 2002
  • The advent of the information age, advancement of the multi-media, and proliferation of internet are all ushering-in a new era of a cyber world. The artistic expression is unfolding into a new genre of a new era.. In the modern art, the boundary between the fine art and the applied art is becoming blurred, and further, distinction of fine art from popular art is also becoming meaningless. The advancement of science and technology, by offering new materials and visual forms, is contributing to the expansion of the morden art's horizon. As fashion illustration is gaining recognition as a form of art which mirrors today's realities, it has also become increasingly necessary to add variety and newness. Fashion illustration is thus becoming the visual language of the modern world, capable of conveying artistic emotion, and at the same time able to effectively communicate the image of fashion to the masses. The increasing awareness of artistic talent and ingenuity as essential components of fashion illustration is yielding greater fusion between fashion illustration and art & technology. This has resulted in the use of the advanced computer technology as a tool for crafting artistic expressions, such as fashion illustration, and this new tool has opened-up new possibilities for expressing images and colors. Further, the computer-aided fashion illustration is emerging as a new technique for expression. The concept of fashion illustration, history of fashion illustration from its incepton to modern date is reviewed and the simplicity has been researched throughout past studies published in Korean and overseas Journals.

Companies Entering the Metabus Industry - Major Big Data Protection with Remote-based Hard Disk Memory Analysis Audit (AUDIT) System

  • Kang, Yoo seok;Kim, Soo dong;Seok, Hyeonseon;Lee, Jae cheol;Kwon, Tae young;Bae, Sang hyun;Yoon, Seong do;Jeong, Hyung won
    • Journal of Integrative Natural Science
    • /
    • v.14 no.4
    • /
    • pp.189-196
    • /
    • 2021
  • Recently, as a countermeasure for cyber breach attacks and confidential leak incidents on PC hard disk memory storage data of the metaverse industry, it is required when reviewing and developing a remote-based regular/real-time monitoring and analysis security system. The reason for this is that more than 90% of information security leaks occur on edge-end PCs, and tangible and intangible damage, such as an average of 1.20 billion won per metaverse industrial security secret leak (the most important facts and numerical statistics related to 2018 security, 10.2018. the same time as responding to the root of the occurrence of IT WORLD on the 16th, as it becomes the target of malicious code attacks that occur in areas such as the network system web due to interworking integration when building IT infrastructure, Deep-Access-based regular/real-time remote. The concept of memory analysis and audit system is key.

Analysis of Security Trends in Smart Cities(A focus on grids, buildings, and transportation) (스마트시티(그리드, 빌딩, 교통 중심)보안 동향 분석)

  • Jeom-goo, Kim
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.37-47
    • /
    • 2022
  • The need for smart city is emerging all over the world to solve these urban problems such as urban resource and infrastructure shortage, traffic congestion, energy problems and to preemptively respond to the fourth industrial revolution. The analysis that the security of smart city technology is dangerous is dominant all over the world. In this paper, we analyze the technology, security threats and responses of smart city, which are the main security issues of smart city, limited to smart grid, smart building, and smart traffic. In the future, the analysis of various technologies of smart city construction and the research on cyber security are actively progressing, and this paper is expected to be the beginning of the solution plan.

Analysis of Cybersecurity Threats and Vulnerabilities in Metaverse Environment (메타버스 환경에서 사이버보안 위협과 취약점 분석)

  • Jinwon Choi;Jaewoo, Kwon;Sehee Lee;Wonhyung Park;Tae-Kyung Cho
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.19-24
    • /
    • 2022
  • Metaverse is a compound word of the English words 'meta', meaning 'virtual' and 'transcendence', and 'universe' meaning the universe. dimensional virtual world. Metaverse is a concept that has evolved one step further than virtual reality (VR, a cutting-edge technology that enables people to experience life-like experiences in a virtual world created by a computer). It has the characteristic of being able to engage in social and cultural activities similar to reality. However, there are many security issues related to this, and cybersecurity vulnerabilities may occur. This paper analyzes cybersecurity threats that may occur in the metaverse environment and checks vulnerabilities.

The Development of a Cyber World Culture Expo and Electronic Tourism Market System (가상 경주세계문화엑스포와 전자관광시장의 개발)

  • 주재훈
    • The Journal of Information Systems
    • /
    • v.9 no.1
    • /
    • pp.87-108
    • /
    • 2000
  • The tourist industry is expecially one of the successful areas for the application of electronic commerce because it is an information-intensive and consumer-oriented industry where information and services play a large part in transaction processes. A electronic tourism market which integrates tourist information systems, reservation systems, and real-time broadcasting systems based on the Internet Web was developed by a collaborative team of Dongguk University and Daou Tech. Inc. with sponsorship of Kyongbuk province and Minister of Information Communications of Korea. Based on the development case of the system, this paper proposes development and operations strategies of electronic market in the tourist industry. The paper reviews the development strategies in the perspective of potential travelers, technology, cooperation among players, and development methodology. The paper also discusses strategies which are able to be employed as the guideline in order to operate the system.

  • PDF

Asset tracking system architecture using sensor network technology (센서 네트워크를 이용한 자산 모니터링 시스템 구조)

  • Kang, Jeong-Hoon;Lee, Min-Goo;Lee, Sang-Won;Ham, Kyung-Sun;Lee, Sang-Hak
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.426-428
    • /
    • 2004
  • Sensor network supports data delivery from physical world to cyber space Sensors get physical events then wireless network transfers sensor data to service server. We use sensor network technology to manage location information of asset. In ubiquitous computing environment, user localization is basic context for intelligent service. A lot of research group make effort to develop low cost localization technology. In this paper, we propose asset monitoring system using wireless sensor network. It is implemented using ad hoc network technology which can be adopted to smart home and this system can monitor the asset location and movement.

  • PDF