• Title/Summary/Keyword: Fashion communication

Search Result 573, Processing Time 0.023 seconds

Development of bicycle device to strengthen safety (안전 강화를 위한 자전거 장치 개발)

  • Oh, Byung-Wuk
    • Journal of Industrial Convergence
    • /
    • v.17 no.4
    • /
    • pp.125-129
    • /
    • 2019
  • With the growing number of people using bicycle, the number of bicycle accidents also has been increasing. It is said that bicycle accident can be reduced up to 11%~44% when riding a bicycle if LED light is used. The headlight of the bicycle makes exposure effect to the opposite side of bike rider while taillight makes exposure effect to the rear bike rider for improving safety. Bicycle safety device capable of displaying a change of direction by LED is implemented in this study in response to control button signal. This signal makes LED light which is installed in pedal and wheel of bicycle as a module type emitting or flickering during the fixed hour. Bicycle auxiliary device in pedal which is able to improve safety using LED when bikers are riding a bike at night is developed in this study. Bicycle safety device applying wireless communication technology will be expected alternative technology in the future to solve a social problem such as energy, environment, and safety.

Operation of the Effective VMD utilizing the Information Design (정보디자인을 이용한 효과적인 VMD운영)

  • Yang, Keun-Young
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.8
    • /
    • pp.177-186
    • /
    • 2011
  • VMD should be shifted from the store for the exhibition to the top selling store, the store that has something people want to buy, the store where people want to visit and the store that is convenient for shopping. To become the top selling store by using VMD to the information design, the primary research has been conducted on the females in Gwangju Metropolitan City by the questionnaire on the propensity to consume and purchase type. The secondary research has been conducted on the females in university who are fashion conscious. The tertiary research, by the questionnaire, has been conducted on the apparel store at the department store in Gwangju Metropolitan City. As a result of the research, it can be said that the best effect of VMD has been shown in the department store, and as the overall problem, it has become obvious that the standardized design was followed without taking advantage of the characteristics of each store.

Orientation-based Adaptive Prediction for Effective Lossless Image Compression (효과적인 무손실 영상압축을 위한 방향성 기반 적응적 예측 방법)

  • Kim, Jongho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2409-2416
    • /
    • 2015
  • This paper presents an orientation-based adaptive prediction method for effective lossless image compression. For a robust prediction, the proposed method estimates the directional information and the property near the current pixel in a support region-based fashion, not a pixel-based one which is sensitive to a small variation. We improve the prediction performance effectively by selection of the prediction pixel adaptively according to the similarity between support regions of the current pixel and the neighboring pixels. Comprehensive experiments demonstrate that the proposed scheme achieves excellent prediction performance measured in entropy of the prediction error compared to a number of conventional prediction methods such as MED, GAP, and EDP. Moreover the complexity of the proposed algorithm measured by average execution time is low compared to MED which is the simplest prediction method.

Design and Implementation of a Hadoop-based Efficient Security Log Analysis System (하둡 기반의 효율적인 보안로그 분석시스템 설계 및 구현)

  • Ahn, Kwang-Min;Lee, Jong-Yoon;Yang, Dong-Min;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1797-1804
    • /
    • 2015
  • Integrated log management system can help to predict the risk of security and contributes to improve the security level of the organization, and leads to prepare an appropriate security policy. In this paper, we have designed and implemented a Hadoop-based log analysis system by using distributed database model which can store large amount of data and reduce analysis time by automating log collecting procedure. In the proposed system, we use the HBase in order to store a large amount of data efficiently in the scale-out fashion and propose an easy data storing scheme for analysing data using a Hadoop-based normal expression, which results in improving data processing speed compared to the existing system.

Implementation of 3Dimension Cloth Animation based on Cloth Design System (의복 디자인 시스템을 이용한 웹 3차원 의복 애니메이션 구현)

  • Kim, Ju-Ri;Lee, Hae-Jung;Joung, Suck-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2157-2163
    • /
    • 2011
  • In this paper, we designed 2D, 2.5D cloth design system and a 3D cloth animation system. They make the 3D cloth animation possible by using coordinate points extracted from 2D and 2.5D cloth design system in order to realize a system that allows customers to wear clothes in the virtual space. To make natural draping, it uses for description the mesh creation and transformation algorithms, path extraction algorithm, warp algorithm, and brightness extraction and application algorithms. The coordinate points extracted here are received as text format data and inputted as clothing information in the cloth file. Moreover, the cloth file has a 2D pattern and is realized to be used in the 3D cloth animation system. The 3D cloth animation system generated in this way builds a web-based fashion mall using ISB (Internet Space Builder) and lets customers view the clothing animation on the web by adding the animation process to the simulation result.

Towards efficient sharing of encrypted data in cloud-based mobile social network

  • Sun, Xin;Yao, Yiyang;Xia, Yingjie;Liu, Xuejiao;Chen, Jian;Wang, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1892-1903
    • /
    • 2016
  • Mobile social network is becoming more and more popular with respect to the development and popularity of mobile devices and interpersonal sociality. As the amount of social data increases in a great deal and cloud computing techniques become developed, the architecture of mobile social network is evolved into cloud-based that mobile clients send data to the cloud and make data accessible from clients. The data in the cloud should be stored in a secure fashion to protect user privacy and restrict data sharing defined by users. Ciphertext-policy attribute-based encryption (CP-ABE) is currently considered to be a promising security solution for cloud-based mobile social network to encrypt the sensitive data. However, its ciphertext size and decryption time grow linearly with the attribute numbers in the access structure. In order to reduce the computing overhead held by the mobile devices, in this paper we propose a new Outsourcing decryption and Match-then-decrypt CP-ABE algorithm (OM-CP-ABE) which firstly outsources the computation-intensive bilinear pairing operations to a proxy, and secondly performs the decryption test on the attributes set matching access policy in ciphertexts. The experimental performance assessments show the security strength and efficiency of the proposed solution in terms of computation, communication, and storage. Also, our construction is proven to be replayable choosen-ciphertext attacks (RCCA) secure based on the decisional bilinear Diffie-Hellman (DBDH) assumption in the standard model.

Consumer's Recognitions on Style Identity of the Contemporary Korean Woman's Apparel Brands (국내 캐릭터 커리어 여성복 브랜드의 스타일 정체성에 대한 소비자 인식 연구)

  • Park, Jae-Min;Chun, Jong-Suk;Choi, Sun-Hee;Choi, Eun-Ah
    • The Research Journal of the Costume Culture
    • /
    • v.18 no.2
    • /
    • pp.337-347
    • /
    • 2010
  • The purpose of this study was to figure out consumer's recognition on brand's peculiar style on Korean contemporary women's apparel brand. The contemporary women's apparel brands show advanced and stylish merchandise at better price points. This segment of the Korean ready-to-wear market has been growing fast in last decades. Four contemporary women's apparel brands(I, K, M, and T) were participated in this study. The data(n=216) were collected with questionnaire survey at 24 apparel retail shops in metro Seoul area. The questionnaire measured the consumers' recognition on each brand's peculiar style. The subjects evaluated each brand's typical silhouette, materials, and style image. The results of the survey showed that the style image factors were 'stylish', 'simple', 'casual', 'feminine', and 'classic'. The style image of each brand was differentiated from others. The brand T had classic image, the brand K had simple and casual image, brand M had stylistic image, and the brand I had feminine image. The features of materials that used at the four brands were not very different by the brands. They used the high valued materials. The common features of the materials were 'smooth', 'thin' and 'light weight.'

Design and Symbolism of Underwear Shown in Movie Costumes -Focusing on Historical Dramas Set in Europe between the $16^{th}$ and the $18^{th}$ Century- (영화의상에 표현된 언더웨어의 디자인과 상징성 -16세기부터 18세기까지 유럽 배경의 시대극을 중심으로-)

  • Kim, Hee-Jung
    • The Research Journal of the Costume Culture
    • /
    • v.19 no.5
    • /
    • pp.1102-1118
    • /
    • 2011
  • The purpose of this study was to investigate the underwear design shown in historical dramas set in Europe between the $16^{th}$ and the $18^{th}$ century, woman's bodies were highly restricted, in order to analyze the symbolism of the movie costume and provide basic data for the future education of the department of movie costume design. For a study method, literature relating to movie costumes and underwear as well as captured images from 29 historical dramas set in Europe between the $16^{th}$ and the $18^{th}$ century was reviewed. Among them, data from 17 movies where underwear and crinoline were observed was analyzed. Historical movies, set in the $18^{th}$ century Europe exposed underwear more frequently and decisively than movies set in the $16^{th}$ and $17^{th}$ centuries. For the figure wearing underwear, its expression effect was maximized by the implication function of costumes. Underwear can easily express the time and space background and symbolize the character's social and economic position, attitudes, and values. In addition, the exposure of underwear can reveal characters' internal expressions, such as mental status, taste, temper, intention, mood, time and space display. The result of observing the underwear shown in movies reveals that underwear plays a subjective role in expressing ideal femininity as a woman of a particular age, modesty, social position symbolism and eroticism that depended on the situation. It is expected that the study will provide an opportunity to reconsider the function of underwear, which is different from the meaning of costume history, and its role as a means of communication by considering the change of underwear by age.

Simulation Analysis of Network Load of Application Level Security Protocol for Smart grid (시뮬레이션을 이용한 스마트 그리드 통신망 상의 응용 계층 보안 프로토콜의 부하 분석)

  • Lee, Kwang-Sik;Han, Seung-Chul
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.1
    • /
    • pp.17-24
    • /
    • 2015
  • Smart grid is a modernized electrical grid that uses information and communication technologies to gather and act on information, such as information about the behaviors of suppliers and consumers, in an automated fashion to improve the efficiency, reliability, economics, and sustainability of the production and distribution of electricity. However, with the advent of cyber crime, there are also concerns on the security of the infrastructure, primarily that involving communications technologies. In this work, we make an in-depth investigation on the issue of security services and network loads on Smart grid. Through simulation, we analyze the relations between security services and network loads. The experimental results of this study will contribute toward designing an advanced Smart grid system that offers better quality of services. Also, the approach proposed in this study can be utilized to derive new and valuable insights in security aspects.

Performance Evaluation of Group Key Management Scheme Blocking Collusion Attack (공모공격의 차단기능을 갖는 그룹 키 관리기법의 성능평가)

  • Chung, Jong-In
    • The Journal of Korean Association of Computer Education
    • /
    • v.9 no.2
    • /
    • pp.111-124
    • /
    • 2006
  • Multicast services are provided on the Internet in fast increasing. Therefore it is important to keep security for multicast communication. If a member of the group is removed, new group key has to be generated and distributed to all remaining members of group. Minimizing number of messages and operation cost for generation of the composite keys to be used to encrypting group key are important evaluating criteria of multicast key management scheme since generation and distribution of new keys for rekeying require expensive operation. Periodic batch rekeying can reduce these important parameters rather than rekeying sequentially in fashion one after another. In this paper, Hamming distance is calculated between every members to be removed. In batch rekeying the members with Hamming distance less than threshold are selected for rekeying procedure. With running the round assignment algorithm in the case of removing several members simultaneously, our scheme has advantages of reducing messages and operation cost for generation of the composite keys and eliminating possibility of collusion attack for rekeying. We evaluate performance of round assignment algorithm through simulation and show that our scheme is excellent after performance comparison of existent schemes and our scheme.

  • PDF