• Title/Summary/Keyword: Cyber world

Search Result 372, Processing Time 0.023 seconds

Future Image Expressed in Contemporary Fashion Design (현대 의상 디자인에 나타난 미래 이미지)

  • 이유경
    • The Research Journal of the Costume Culture
    • /
    • v.6 no.4
    • /
    • pp.188-202
    • /
    • 1998
  • The purpose of this study is to analyze how future images are embodied in contemporary fashion design. To find out future images expressed in contemporary fashion design, this paper characterized the future society as information society, network society, pluralistic society, and global village. Cyber design and techno-style expressed through metal or lustrous material which is influenced by information symbolize future image. Also, minimalism which is characterized as simplicity and purity affects the contemporary fashion design. The network society which affets t the horizontal and functional social system diminishes the meaning of socio-economic status. Therefore, street fashion has diffused to high fashion, and the formal wear has tendency to be changed into casual wear. In addition, the meaning of status symbol in contemporary fashion design become decreased. The pluralistic society affects to search for one's own personality and identity. Also, contemporary fashion design is influenced by post-modernism and deconstructionism. In order words, genderless, ageles, seasonless, and infra fashion appeared. The global village emphasizes extension of universality in life style and search for world quality. so, ethnic fashions appear frequently in contemporary fashion design. Also, the effects of Korean traditional costume to contemporary fashion design has increased.

  • PDF

An Efficient Digital Contents Cryptosystem using Elliptic Curve Cryptography Algorithm (타원곡선 암호알고리즘을 이용한 효율적인 디지털 컨텐츠 암호화 시스템)

  • Hwang Suntae;Lee Seunghyuk
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.4
    • /
    • pp.25-33
    • /
    • 2004
  • Recently, as network and computer technologies are growing rapidly, most of business transactions are performed in cyber world. In spite of many advantages, the most concerns in Electronic Commerce are the information security matters, and the cryptosystem has been claimed as one of the proper means to settle this problem. In this paper, a partial encryption/decryption algorithm has been in-troduced to show the efficiency against the conventional method in which all the data are completely encoded. In our proposed scheme, the multimedia data can be efficiently encoded in a short time providing good data security. For example, the MP3 data can be securely protected with 10% encryption in our scheme. Moreover, 1he shuffling process at the end of partial encryption procedure provides higher level of data security.

  • PDF

Supply Chain Management from the Strategic Perspective through the Theory of Constraints (TOC 이론을 기반으로 한 전략적 관점에서의 공급사슬관리)

  • 간형식;김기주;황재훈
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.3
    • /
    • pp.95-106
    • /
    • 2002
  • As the information technology including Internet not only opened the cyber world but also has evolved as a platform that enables a new generation of businesses and remolds the shape of thinking and the rules of supply chain management (SCM). By using the Theory of Constraints, which seems simple but robust to review the traditional SCM context, the paper proposes a conceptual framework to handle the SCM issues. From the strategic perspective, this paper focuses on three policy constraints: supplier-manufacturer oriented constraints, manufacturer-distributor oriented constraints, and supply chain oriented constraints. To optimize the throughput and sustain the competitiveness of supply chain members in the dynamic business environment, the companies should utilize the potential competency of information technology and consistently perform the activities of removing and/or reinforcing the constraints.

  • PDF

Fish Schooling Animation System for Constructing Contents of Cyber Aquarium

  • Kim, Jong-Chan;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.3
    • /
    • pp.157-162
    • /
    • 2007
  • The goal of researching a proper crowd animation is to design system that is satisfied with the reality of scenes, performance of system, and interaction with users to show the crowd vividly and effectively in virtual underwater world. In this paper, we smartly expressed the behavior patterns for flocks of fish in virtual underwater and we made up for the weak points in spending time and cost to produce crowd animation. We compared with the number of mesh, the number of fish, the number of frame, elapsed time, and resolution and analyzes them with the fish behavior simulating system. We developed a virtual underwater simulator using this system.

  • PDF

Design and Implementation of avatar behaving on Internet Using EAI (EAI를 이용한 인터넷 상에서의 아바타 동작에 관한 설계 및 구현)

  • 정회경;안성옥;정재길
    • The Journal of Information Technology
    • /
    • v.4 no.1
    • /
    • pp.97-108
    • /
    • 2001
  • This thesis is about the design and implementation of the system for controlling Avatar, user's alter ego in a simulated world using the EAI(External Authoring Interface) technology to be able to control VRML(Virtual Reality Modeling Language). In this thesis, user's Avatar described in VRML language embodied interactions to move and show an expression by JAVA according to a user's demand. In the future, this would be able to develop into a research to try to embody and construct a simulated society based on web for the purpose of various integration of society such as cyber government, lecture, trial performance, and auction.

  • PDF

Adaptive Medium Access Control protocol for low-power wireless sensor network (저전력 무선 센서 네트워크를 위한 적응적 MAC 프로토콜)

  • Kang, Jeong-Hoon;Lee, Min-Goo;Yoon, Myung-Hyun;Yoo, Jun-Jae
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.209-211
    • /
    • 2005
  • This paper proposes a adaptive medium-access control(MAC) protocol designed for low-power wireless multi-hop sensor networks which is used for connecting physical world and cyber computing space. Wireless multi-hop sensor networks use battery-operated computing and sensing device. We expect sensor networks to be deployed in an ad hoc fashion, with nodes remaining inactive for long time, but becoming suddenly active when specific event is detected. These characteristics of multi-hop sensor networks and applications motivate a MAC that is different from traditional wireless MACs about power conservation scheme, such as IEEE 802.11. Proposed MAC uses a few techniques to reduce energy consumption. Result show that proposed MAC obtains more energy savings.

  • PDF

Journal History and Impact Revisited

  • Khan, Gohar Feroz;Park, Han Woo
    • Journal of Contemporary Eastern Asia
    • /
    • v.12 no.1
    • /
    • pp.1-3
    • /
    • 2013
  • It has been more than 11 years since The Journal of Contemporary Eastern Asia (ISSN 1684-629) was first launched in the year 2001. Since its launch, the Journal of Contemporary Eastern Asia (JCEA) has gone through several changes and developments, including a recent change in ownership. Now the JCEA is primary published by the Cyber Emotions Research Institute at YeungNam University, South Korea. In order to widen the journal's scope and readership, the Asia Triple Helix Society was also engaged as co-publisher. In this article, we detail these developments; particularly we will discus the journal's history, current status, and impact factor.

Designing an Interdisciplinary Learning Environment for Conservatory Students: Using the Liberal Arts to Expand Education and Better Support Performance Interpretation

  • Auh, Yoonil;Shin, Yeon Sook
    • International Journal of Contents
    • /
    • v.10 no.2
    • /
    • pp.1-8
    • /
    • 2014
  • This paper discusses designing an interdisciplinary learning environment to promote learning of the liberal arts for advanced music students in order to expand the boundaries of their education experience beyond the technical mastery of their musical instruments. The paper discusses the utilization of salient features of information, communications, and technology and the use of instructional theory to promote the understanding of how individual pieces of music can be connected to knowledge of the context in which they were created to support the understanding of the relationship between experience in the world and musical composition.

A Study on the Homogeneity of Objects and the Variety of Context in Addition Word Problems (덧셈 문장제에서 대상의 동질성과 상황의 다양성에 대한 소고)

  • Chang, Hye-Won
    • Journal of Educational Research in Mathematics
    • /
    • v.12 no.1
    • /
    • pp.17-27
    • /
    • 2002
  • To solve the addition word problems provides young children the chance to learn about and exercise in problem solving. This paper focuses on two aspects to be considered in addition word problems: the homogeneity of objects and the variety of contexts. The homogeneity of objects involved in addition word problems has to be kept in the following reasons: concept of unit, effectiveness of information, prevention of inappropriate variety, inconsistency of mathematics with real world, continuity between elementary and secondary mathematics. And for the variety of contexts, the additive structure proposed by G. Vergnaud, can be considered: composition, transformation, relation of comparison, composition of two transformations, composition of two relations, transformation of a relation. According to this structure, some examples, which contain homogeneous objects, were extracted from the elementary school mathematics textbooks.

  • PDF

Intelligent building light control system based on wireless sensor network (무선 센서 네트워크 기반의 빌딩 조명 제어 시스템)

  • Kang, Jeong-Hoon;Yoo, Jun-Jae;Yoon, Myung-Hyun;Lee, Myung-Soo;Lim, Ho-Jung;Lee, Min-Goo;Jang, Dong-Seop
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.174-176
    • /
    • 2006
  • Sensor network supports data delivery from Physical world to cyber space. Sensors get physical events then wireless network transfers sensor data to service server. We use sensor network technology to light control system for intelligent building. In ubiquitous computing environment. wireless sensor network is basic tool for intelligent service. In this paper, we propose intelligent building light control system based on wireless sensor network. It is implemented using previous light control product, can be adopted to present building light system.

  • PDF