• Title/Summary/Keyword: Manipulation

Search Result 2,313, Processing Time 0.03 seconds

The Significance of the Narrative Failure of The Conjure Woman: A Black Author's Experiment on a Socio-ethical Literary Voice

  • Kim, EunHyoung
    • Journal of English Language & Literature
    • /
    • v.55 no.6
    • /
    • pp.1163-1191
    • /
    • 2009
  • As many critics do, this article starts from the premise that Charles Waddell Chesnutt wrote The Conjure Woman with a distinct socio-ethical view to ameliorating white readers' racism. For this purpose of social activism, first, the author uses a racially submissive genre and narrator- antebellum plantation-dialect fiction and an old ex-slave Julius-in order to win the attention of white racists, who constituted the majority of the reading public of postbellum America. Chesnutt then allows this seemingly submissive ex-slave consecutively to wage narrative battles against a Northern white capitalist, John. This fiction's structure is thus based on interracial narrative conflict. Granted, the result of these narrative battles is Julius's defeat. Even though he sometimes has narrative success through his manipulation of either his white female auditor's sentimentalism or the white capitalist's racial prejudice, it does not lead to any fundamental change in the white audience members' awareness: John still regards Julius's tacitly reformoriented tales merely as nonsensical ghost stories invented by the absurd imagination of a subservient, entertaining, and exploitable black coachman. Admitting his defeat, Julius relinquishes his original goal of deterring John's capitalist exploitation of both racial Others and the natural environment of the South and finally decides to serve the economic power of white capitalism. This self-defeating conclusion, however, should not be identified with Chesnutt's failure as an author. Rather, it should be understood as an interim result of the black author's earnest experiment with literary media best suited to his reform project. In fact, this narrative failure reveals Chesnutt's accurate diagnosis of the postbellum literary world: a black voice is still feebly heard and even easily buried by the whites' capitalist ambition and consequently intensifying racism. Conclusively, Julius's narrative failure should be positively evaluated as Chesnutt's one step further in his gradual and lifelong progress to a narrative goopher effectively to engage whites' imagination and sympathy for a vision of equal interracial coexistence.

True History of the Kelly Gang and the Politics of Memory (『켈리 일당의 실화』와 기억의 정치학)

  • Rhee, Suk Koo
    • Journal of English Language & Literature
    • /
    • v.55 no.2
    • /
    • pp.337-357
    • /
    • 2009
  • Ned Kelly, the bushranger, is a legendary figure of special significance to the Australians of today. The Aussies' affection for this "horse thief" derives from the fact that the latter has become a national ideal of the "battler" who does not give up in the face of hardships. Peter Carey's is considered to be one of the "national narratives" that not only heroize but also give voice to the Irish rebels who fought for "fair go" in the colonial Australia. However, this paper asserts that there are more to the novel than merely paying a tribute to the national icon, especially when the novel is examined in the context of the "republic controversy." In 1999, the preceding year of the novel's publication, Australia had a national referendum on the issue of whether or not to secede from the Commonwealth. Due to the procedural manipulation of the royalist ruling party, republicanism was voted down. At the time when the majority of Australians were irate with the result of the referendum, Carey's retelling of the supposedly anti-British rebel failed to promote the lost cause. This paper investigates how the narrativization of the legendary figure, whose anti-British and anti-authoritarian attitude can be easily translated into the cause of republicanism, came to appeal to the general reading public. In so doing, this paper compares Carey's novel with the historical Kelly's two epistles: Jerilderie and Cameron Letter. This comparison brings to light what is left out in the process of Carey's narrativization of the rebel's life: the subversive militant voice of an Irish nationalist. The conclusion of this paper is that the possibility for Kelly's life to surface again in the 21st century as a sort of counter-memory is contained by Carey through its inclusion in a highly personalized domestic narrative.

Chronic kisspeptin delays puberty and reduces feed intake and body weight in female rats

  • Sathagopam, Sriravali;Ullewar, Meenal Prabhakar;Harne, Rakhi;Velmurugan, Sathya
    • Journal of Animal Reproduction and Biotechnology
    • /
    • v.36 no.1
    • /
    • pp.25-34
    • /
    • 2021
  • Kisspeptin is a key player in the central control of reproductive axis. Central administration of kisspeptin has been shown to advance puberty in rats. Stimulation of hypothalamic GnRH pulse generating mechanism by kisspeptin has been proposed to be the mechanism behind the onset of puberty. We hypothesized that chronic high doses of kisspeptin administration suppresses the reproductive axis and hence delays the pubertal onset. Hence, we investigated the effect of peripheral administration of chronic high doses of kisspeptin on pubertal onset, feed intake and body weight in female rats. Rats were treated with saline or kisspeptin (100 nmoles per day; intraperitoneal) for 26 days (day 25 to day 50 postnatal) and the day of vaginal opening was marked as day of puberty. Kisspeptin treated rats had delayed pubertal onset and reduced feed intake and body weight. Gonadal GPR54 mRNA was reduced suggesting that chronic high doses of kisspeptin may suppress the reproductive functions possibly by downregulation of GPR54 receptor. However, delay in puberty due to reduction in feed intake and body weight could not be ruled out in this study. Further, our study emphasizes the importance of dosage and duration of kisspeptin administration in the manipulation of reproductive axis. Our study, for the first time, suggests that kisspeptin and its analogues, if proven beneficial, could be used to treat precocious puberty in children. It appears that, though a promising tool for enhancing fertility, kisspeptin acts as a double-edged sword and has to be cautiously used to manipulate reproduction.

A Novel RGB Image Steganography Using Simulated Annealing and LCG via LSB

  • Bawaneh, Mohammed J.;Al-Shalabi, Emad Fawzi;Al-Hazaimeh, Obaida M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2021
  • The enormous prevalence of transferring official confidential digital documents via the Internet shows the urgent need to deliver confidential messages to the recipient without letting any unauthorized person to know contents of the secret messages or detect there existence . Several Steganography techniques such as the least significant Bit (LSB), Secure Cover Selection (SCS), Discrete Cosine Transform (DCT) and Palette Based (PB) were applied to prevent any intruder from analyzing and getting the secret transferred message. The utilized steganography methods should defiance the challenges of Steganalysis techniques in term of analysis and detection. This paper presents a novel and robust framework for color image steganography that combines Linear Congruential Generator (LCG), simulated annealing (SA), Cesar cryptography and LSB substitution method in one system in order to reduce the objection of Steganalysis and deliver data securely to their destination. SA with the support of LCG finds out the optimal minimum sniffing path inside a cover color image (RGB) then the confidential message will be encrypt and embedded within the RGB image path as a host medium by using Cesar and LSB procedures. Embedding and extraction processes of secret message require a common knowledge between sender and receiver; that knowledge are represented by SA initialization parameters, LCG seed, Cesar key agreement and secret message length. Steganalysis intruder will not understand or detect the secret message inside the host image without the correct knowledge about the manipulation process. The constructed system satisfies the main requirements of image steganography in term of robustness against confidential message extraction, high quality visual appearance, little mean square error (MSE) and high peak signal noise ratio (PSNR).

A Study of Wedding Dress Materials Using the Characteristics of Hanji: Focusing on Making Minimal Wedding Dresses (한지의 특성을 이용한 웨딩드레스 소재 연구: 미니멀 웨딩드레스 제작을 중심으로)

  • Lee, Jihyun;Kan, Hosup
    • Journal of Fashion Business
    • /
    • v.25 no.1
    • /
    • pp.80-95
    • /
    • 2021
  • In the modern fashion industry, the application of different materials along with an emotional design is emerging as an important factor stimulating consumer sentiment. This has led to the diversity of materials and continued active research on materials. Traditional Korean paper is expressed in various ways in the field of visual arts based on Korean sentiment and unique formative characteristics. Hanji costumes have been produced in various ways over the past 20 years utilizing Hanji's physical characteristics, showing unique surface texture and various techniques that differentiate them from existing fabrics, making it symbolic in expanding the area of fashion materials. In this work, various techniques were developed by utilizing the nonwoven characteristics and excellent variability of Hanji while considering visual images, focusing on the delicate decorations and materialistic representations of wedding dresses. In addition, minimal wedding dresses with unique textures were produced to realize fantasy ideas and show surface aesthetics, confirming as a fashion material different from that of existing wedding dresses. The direction of high value-added creation for the industrialization and globalization of Hanji wedding dresses was presented, and the usefulness and scalability of Hanji materials for practical and industrialization were identified in materials that expressed visual art. To in the fashion industry, which is changing in both the wedding industry and the global market, the development of materials with high sensitivity images and original and solid identity should continue.

A Study on the Gesture Based Virtual Object Manipulation Method in Multi-Mixed Reality

  • Park, Sung-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.125-132
    • /
    • 2021
  • In this paper, We propose a study on the construction of an environment for collaboration in mixed reality and a method for working with wearable IoT devices. Mixed reality is a mixed form of virtual reality and augmented reality. We can view objects in the real and virtual world at the same time. And unlike VR, MR HMD does not occur the motion sickness. It is using a wireless and attracting attention as a technology to be applied in industrial fields. Myo wearable device is a device that enables arm rotation tracking and hand gesture recognition by using a triaxial sensor, an EMG sensor, and an acceleration sensor. Although various studies related to MR are being progressed, discussions on developing an environment in which multiple people can participate in mixed reality and manipulating virtual objects with their own hands are insufficient. In this paper, We propose a method of constructing an environment where collaboration is possible and an interaction method for smooth interaction in order to apply mixed reality in real industrial fields. As a result, two people could participate in the mixed reality environment at the same time to share a unified object for the object, and created an environment where each person could interact with the Myo wearable interface equipment.

A Study on Building Identification from the Three-dimensional Point Cloud by using Monte Carlo Integration Method (몬테카를로 적분을 통한 3차원 점군의 건물 식별기법 연구)

  • YI, Chaeyeon;AN, Seung-Man
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.23 no.4
    • /
    • pp.16-41
    • /
    • 2020
  • Geospatial input setting to represent the reality of spatial distribution or quantitative property within model has become a major interest in earth system simulation. Many studies showed the variation of grid resolution could lead to drastic changes of spatial model results because of insufficient surface property estimations. Hence, in this paper, the authors proposed Monte Carlo Integration (MCI) to apply spatial probability (SP) in a spatial-sampling framework using a three-dimensional point cloud (3DPC) to keep the optimized spatial distribution and area/volume property of buildings in urban area. Three different decision rule based building identification results were compared : SP threshold, cell size, and 3DPC density. Results shows the identified building area property tend to increase according to the spatial sampling grid area enlargement. Hence, areal building property manipulation in the sampling frameworks by using decision rules is strongly recommended to increase reliability of geospatial modeling and analysis results. Proposed method will support the modeling needs to keep quantitative building properties in both finer and coarser grids.

Hacking attack and vulnerability analysis for unmanned reconnaissance Tankrobot (무인정찰 탱크로봇에 대한 해킹 공격 및 취약점 분석에 관한 연구)

  • Kim, Seung-woo;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1187-1192
    • /
    • 2020
  • The dronebot combat system is a representative model of the future battlefield in the 4th industrial revolution. In dronebot, unmanned reconnaissance tankrobot can minimize human damage and reduce cost with higher combat power than humans. However, since the battlefield environment is very complex such as obstacles and enemy situations, it is also necessary for the pilot to control the tankrobot. Tankrobot are robots with new ICT technology, capable of hacking attacks, and if there is an abnormality in control, it can pose a threat to manipulation and control. A Bluetooth sniffing attack was performed on the communication section of the tankrobot and the controller to introduce a vulnerability to Bluetooth, and a countermeasure using MAC address exposure prevention and communication section encryption was proposed as a security measure. This paper first presented the vulnerability of tankrobot to be operated in future military operations, and will be the basic data that can be used for defense dronebot units.

Unstable Approach Mitigation Based on Flight Data Analysis (비행 데이터 분석 기반의 불안정 접근 경감방안)

  • Kim, Hyeon Deok
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.1
    • /
    • pp.52-59
    • /
    • 2021
  • According to the International Air Transport Association (IATA), 61% of the accidents occurred during the approach and landing phase of the flight, with 16% of the accidents caused by unstable access of the commercial aircraft. It was identified that the pilot's unstable approach and poor manipulation of correction led to accidents by continuing the excessive approach without go-around manuever. The causes of unstable access may vary, including airport approach procedures, pilot error, misplanning, workload, ATC (Air Traffic Contol) congestion, etc. In this study, we use the flight data analysis system to select domestic case airports and aircraft type where unstable approach events occur repeatedly. Through flight data analysis, including main events, airport approach procedures, pilot operations, as well as various environmental factors such as weather and geographical conditions at the airport. It aims to identify and eliminate the tendency of unstable approach events and the causes and risks of them to derive implications for mitigating unstable approach events and for developing navigation safety measures.

Blockchain Technology for Combating Deepfake and Protect Video/Image Integrity

  • Rashid, Md Mamunur;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1044-1058
    • /
    • 2021
  • Tempered electronic contents have multiplied in last few years, thanks to the emergence of sophisticated artificial intelligence(AI) algorithms. Deepfakes (fake footage, photos, speech, and videos) can be a frightening and destructive phenomenon that has the capacity to distort the facts and hamper reputation by presenting a fake reality. Evidence of ownership or authentication of digital material is crucial for combating the fabricated content influx we are facing today. Current solutions lack the capacity to track digital media's history and provenance. Due to the rise of misrepresentation created by technologies like deepfake, detection algorithms are required to verify the integrity of digital content. Many real-world scenarios have been claimed to benefit from blockchain's authentication capabilities. Despite the scattered efforts surrounding such remedies, relatively little research has been undertaken to discover where blockchain technology can be used to tackle the deepfake problem. Latest blockchain based innovations such as Smart Contract, Hyperledger fabric can play a vital role against the manipulation of digital content. The goal of this paper is to summarize and discuss the ongoing researches related to blockchain's capabilities to protect digital content authentication. We have also suggested a blockchain (smart contract) dependent framework that can keep the data integrity of original content and thus prevent deepfake. This study also aims at discussing how blockchain technology can be used more effectively in deepfake prevention as well as highlight the current state of deepfake video detection research, including the generating process, various detection algorithms, and existing benchmarks.