• Title/Summary/Keyword: Human Communication

Search Result 3,214, Processing Time 0.029 seconds

A Study on the Visual Expression of the Characters for the Narrative in Animation - A Focus on Skeleton Character in "Coco(2017)" by Pixar - (장편 애니메이션 내러티브를 위한 캐릭터의 시각적 표현에 관한 연구 -픽사(PIXAR) "코코(2017)"의 해골 캐릭터를 중심으로-)

  • Kim, Soong-Hyun
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.451-459
    • /
    • 2019
  • This study is aims to examine how the skeleton character in Pixar's Animation is visualized for the narrative of the film and suggests the direction of attractive character development corresponding to the story. First of all, it was conducted the case studies on the narrative of animation, character design, character's emotion expression, and animations featuring skeleton character. Based on this study, it was derived the visual representation of the skeleton character featuring in and analyzed the role and function in the animation. As a result, the expressions by the skeleton's eyes, eyebrows, mouth, lips, and jaw played the most important role for the emotional expression and lines in , and the major characteristic for human facial expression was reflected in the design of the skeleton character. In addition, the various props were used to provide the detailed informations of the skeleton's character, and it was expressed the movement emphasizing its essential attribute. Finally, the skeleton's symbolic image was strengthened by composing and arranging the skeleton's image through Mise en scene. It is expected that this study will be used as a reference for the animation character related researchers and practitioners in the business and it helps develop attractive characters fir the narrative animation in the future.

Flexible Intelligent Exit Sign Management of Cloud-Connected Buildings

  • Lee, Minwoo;Mariappan, Vinayagam;Lee, Junghoon;Cho, Juphil;Cha, Jaesang
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.58-63
    • /
    • 2017
  • Emergencies and disasters can happen any time without any warning, and things can change and escalate very quickly, and often it is swift and decisive actions that make all the difference. It is a responsibility of the building facility management to ensure that a proven evacuation plan in place to cover various worst scenario to handled automatically inside the facility. To mapping out optimal safe escape routes is a straightforward undertaking, but does not necessarily guarantee residents the highest level of protection. The emergency evacuation navigation approach is a state-of-the-art that designed to evacuate human livings during an emergencies based on real-time decisions using live sensory data with pre-defined optimum path finding algorithm. The poor decision on causalities and guidance may apparently end the evacuation process and cannot then be remedied. This paper propose a cloud connected emergency evacuation system model to react dynamically to changes in the environment in emergency for safest emergency evacuation using IoT based emergency exit sign system. In the previous researches shows that the performance of optimal routing algorithms for evacuation purposes are more sensitive to the initial distribution of evacuees, the occupancy levels, and the type and level of emergency situations. The heuristic-based evacuees routing algorithms have a problem with the choice of certain parameters which causes evacuation process in real-time. Therefore, this paper proposes an evacuee routing algorithm that optimizes evacuation by making using high computational power of cloud servers. The proposed algorithm is evaluated via a cloud-based simulator with different "simulated casualties" are then re-routed using a Dijkstra's algorithm to obtain new safe emergency evacuation paths against guiding evacuees with a predetermined routing algorithm for them to emergency exits. The performance of proposed approach can be iterated as long as corrective action is still possible and give safe evacuation paths and dynamically configure the emergency exit signs to react for real-time instantaneous safe evacuation guidance.

Typology Study on and Attendant Assistant Image of ODA(Official Development Assistance) Experts (공적개발원조(ODA) 전문가의 이미지에 관한 Q유형 분석)

  • Jeong, Baek;Kim, Kyoung-Won
    • Management & Information Systems Review
    • /
    • v.35 no.1
    • /
    • pp.117-141
    • /
    • 2016
  • This Research Paper was based on practical method to examine a subjectivity of ODA experts' images. It was used Q-methodology to solve the research problems. I found 4 types of images out throughout the process totally. The perception patterns came out in the research were divided into 4 types in Q-methodology. The results is following ; Those are separated 4 types like Type 1(called operationally individual type), Type 2(arbitrary type), Type 3(mellow type), Type 4(onlooking type). These types consist of each elements to evaluate ODA experts from the people minds. Therefore, This study give us one way to take an assessment of ODA projects. The results reveal that korean ODA policy more has to depend on the scientific evaluation of the person participated in each projects. And the findings demonstrate good questions in comparing with trends of ODA distributors of international development cooperation such as OECD/DAC.

  • PDF

Security Knowledge Classification Framework for Future Intelligent Environment (미래 융합보안 인력양성을 위한 보안교육과정 분류체계 설계)

  • Na, Onechul;Lee, Hyojik;Sung, Soyung;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.47-58
    • /
    • 2015
  • Recently, new information security vulnerabilities have proliferated with the convergence of information security environments and information and communication technology. Accordingly, new types of cybercrime are on the rise, and security breaches and other security-related incidents are increasing rapidly because of security problems like external cyberattacks, leakage by insiders, etc. These threats will continue to multiply as industry and technology converge. Thus, the main purpose of this paper is to design and present security subjects in order to train professional security management talent who can deal with the enhanced threat to information. To achieve this, the study first set key information security topics for business settings on the basis of an analysis of preceding studies and the results of a meeting of an expert committee. The information security curriculum taxonomy is developed with reference to an information security job taxonomy for domestic conditions in South Korea. The results of this study are expected to help train skilled security talent who can address new security threats in the future environment of industrial convergence.

Effective Performance Analysis of Disease-oriented Translational Research from a Point of View of Biotechnology (생명공학기술적 관점에서 질병중심 중개연구의 효율적 성과분석에 대한 실증연구)

  • Cheon, Su-Hwan;Jung, Sung-Chul;Je, Young-Tae;Kim, Gi-Tae;Kim, Myung-Hwan;Park, Seong-Ho;Jeon, Hye-Kyoung;Kwon, Jun-Young;Kim, Dong-Il;Kim, Dong-Seok;Lee, Kyung-Min;Sun, Kyung
    • KSBB Journal
    • /
    • v.27 no.1
    • /
    • pp.1-8
    • /
    • 2012
  • Recently, translational research (TR) in health technology (HT) has been considered as an emerging alternative research system for the improvement of human health. TR from bench to bedside involves a strong bidirectional relationship between basic science discovery and clinical practice. To support R&D planning and policy in HT effectively, the performance of TR programs was analyzed and evaluated in a R&D project on health and medical technology. TR programs were classified into three parts: unilateral TR, bilateral TR and multilateral TR. Bibliometrics and citation analysis were performed to assess research papers and gather information for the performance analysis of TR programs. In addition, both quantitative and qualitative analysis were successfully carried out using ISI Web of Science, Google Scholar Citations, SCOPUS and Knowledgematrix. In conclusion, the performance analysis of TR programs could significantly improve the efficiency of R&D plans, R&D management and evaluation for a safe and healthy life.

Design of Intrusion Detection System to be Suitable at the Information System Organized by Homogeneous Hosts (동질형 호스트들로 구성된 정보시스템에 적합한 침입탐지시스템의 설계)

  • 이종성;조성언;조경룡
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.1
    • /
    • pp.267-282
    • /
    • 2000
  • With the development of computer&network technology and the growth of its dependance, computer failures not only lose human and material resources but also make organization's competition weak as a side-effect of information society. Therefore, people consider computer security as important factor. Intrusion Detection Systems (IDS) detect intrusions and take an appropriate action against them in order to protect a computer from system failure due to illegal intrusion. A variety of methods and models for IDS have been developed until now, but the existing methods or models aren't enough to detect intrusions because of the complexity of computer network the vulnerability of the object system, insufficient understanding for information security and the appearance of new illegal intrusion method. We propose a new IDS model to be suitable at the information system organized by homogeneous hosts and design for the IDS model and implement the prototype of it for feasibility study. The IDS model consist of many distributed unit sensor IDSs at homogeneous hosts and if any of distributed unit sensor IDSs detect anomaly system call among system call sequences generated by a process, the anomaly system call can be dynamically shared with other unit sensor IDSs. This makes the IDS model can effectively detect new intruders about whole information system.

  • PDF

Implementation of Efficient Mobile Monitoring System of the GreenHouse Environment Data (온실 환경 데이터의 효과적인 모바일 모니터링 시스템 구현)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.572-579
    • /
    • 2009
  • A monitoring system needs many parameters to increase devices for monitoring data and to support various services. In particular, monitoring the status of a device in a wireless mobile environment has a difficulty in displaying multi data in a limited screen size, and transfer of the status data of a device into a network is largely related with network traffic. The research aims at designing a control board that collects data in order to effectively manage a greenhouse environment system. Also, the research tries to appropriately operate devices, environment data monitoring, and the control of each device by realizing a multiplexed interface based on a web. Thus, in the case in which a distributed client was a computer, monitoring and control were obtained with a web browser through the Lab VIEW web server of a server or local control module in order to effectively monitor and control according to the status of a user. In the case in which a client was a PDA, application of a wireless mobile considering the scale and data processing capacity of a displayer was connected. As a result of the research, we could confirm a satisfactory outcome from the viewpoint of a human-centered design by supplying adaptability and mobility according to the environment of a user.

e-Gov's Big Data utilization plan for social crisis management (사회 위기관리를 위한 전자정부의 빅데이터 활용 방안)

  • Choung, Young-chul;Choy, Ik-su;Bae, Yong-guen
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.435-442
    • /
    • 2017
  • Our anxiousness has risen for recent increase in unpredicatable disaster. Accordingly, for the future society's preventing measure in advance against current considerable disasters due to societal crisis, we need to prepare secure measure ahead. Hence, we need to recognize the significance of governmental role and the value of Big Data application as ICT developed country in order to manage social crisis all the time. This manuscript analyzes human anxiety from listed disasters and describes that our government seeks new way to utilize Big Data in public in order to visualize Big Data related issues and its significance and urgency. Also, it suggests domestic/international application trend of Big Data's public sector with new practical approach to Big Data. Then, it emphasizes e-Gov's role for its Big Data application and suggests policies implying governmental use of Big Data for social crisis management by case-studying disaster measures against unpredictable crisis.

Performance improvement on mobile devices using MVC+Prefetch Controller Pattern (MVC+Prefetch Controller 패턴을 사용한 모바일 기기의 성능향상 기법)

  • Im, Byung-Jai;Lee, Eun-Seok
    • The KIPS Transactions:PartD
    • /
    • v.18D no.3
    • /
    • pp.179-184
    • /
    • 2011
  • Current mobile devices have surpassed its boundaries as a more communication tool to a smart device which provides additional features. These features have supported the smart life of its users, but have reached its limit from low-performance processors and short-battery time. These issues can be resolved b implementing higher performing hardware, but they come with a burden of high cost. This paper introduces a new way of managing computing resources in a mobile device by enhancing the quality of human-computer interaction. The real-speed felt by users are mainly influenced by the time it takes form a user's input to the device to display the completed result on the screen. Since the size of the screen for mobile devices are small, if the processor only fetch data to be used for displaying on screen, the time can be significantly reduced. MVC+Prefetch Controller pattern accomplished this goal by using the minimum amount of data from DB to fetch display and still manages to support high-speed data transfer to achieve seamless display. This idea has been realized by practice using Samsung mobile phone S8500, which demonstrated the superior performance on user's perspective.

Comparative Analysis of Written Language and Colloquial Language for Information Communication of Multi-Modal Interface Environment (다중 인터페이스 환경에서의 문자언어와 음성언어의 차이에 관한 비교 연구)

  • Choi, In-Hwan;Lee, Kun-Pyo
    • Archives of design research
    • /
    • v.19 no.2 s.64
    • /
    • pp.91-98
    • /
    • 2006
  • The product convergence and complex application environment raise the need of multi-modal interface which enables us to interact products through various human senses. The sense of vision has been used predominantly more than any other senses for the traditional and general information gathering situation, but in the future which will be developed based on the digital network technology, the practical use of the various senses will be desired for more convenient and rational usage of the information appliances. The sense of auditory which possibility of practical use is becoming higher than ever with the sense of vision, the possible usage will be developed broader and in the various ways in the future. Based on this situation, the characteristics of the written language and the colloquial language and the comparative analysis of the difference between male and female's reaction for each language were examined through this study. To achieve this purpose, the literature research about the diverse components of the language system was peformed. Then, some peculiar characters of the sense of vision and auditory were reviewed and the appropriate experimentation was planned and carried out. The result of the accomplished experimentation was examined by the objective analysis method. The main results of this study are as follows: first, the reaction time for written language is shorter than colloquial language, second, there is a partial difference between the male's and female's reaction for those two stimuli, third, there is no selection bias between the sense of sight and the sense of hearing. I think the continuous development of the broad and diverse ways of study for various senses is needed based on this study.

  • PDF