• Title/Summary/Keyword: chin

Search Result 3,656, Processing Time 0.027 seconds

A Study of Wedding Ceremonies during the Early Stage in Chosun Dynasty (조선초기 혼례 풍속 연구 - 家禮輯賢을 중심으로 -)

  • 조효순
    • The Research Journal of the Costume Culture
    • /
    • v.5 no.1
    • /
    • pp.29-42
    • /
    • 1997
  • Our ancestors had done their best for the moral training and home management, further more for the governing a country through observing the decorums. The 4 main decorums, i. e. the Coming-of-Age Ceremony, Wedding Ceremony, Funeral Rites and the Ancestor worship Ceremony during the Chosun Dynasty had guided well our ancestors'life harmoiously. The Wedding Ceremonies of them was one of the most happy events in their lives meaningful of the filial piety and the union of two families. The Wedding ceremonies consist of the 6 etiquetes, i. e., Eui-Hon (matchmaking), N뮤-Chae (present), Nab-Pye(bride's presents to her parents-in-law), Chung-Gi(ask the other part about an auspicious day), Moon-Myung(choice of an auspicious day), Chin-Young(take and meet a bride) in order of sequence. Chin-Young consists of Cho-Hon, Sa-Dang-Go-Woo, Sung-Bok, Cho-Rye, Boo-Myung-Ji & Mo-Song, Jun-An-Rye, Hab-Geun-Rye, Sin-Bang-Chi-Reu-Gi, Hyun-Goo-Rye, Myo-Hyun and Jae-Haeng ete, considerably complicated programs in order.

  • PDF

Researches Related to Seismic Hazard Mitigation in Taiwan

  • Loh, Chin-Hsiung;Yeh, Chin-Hsun
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.2 no.3
    • /
    • pp.13-26
    • /
    • 1998
  • In view of the rapid development of economics and technology, perilous meteorological and geological conditions often cause natural disasters and result in severe loss of lives and properties in Taiwan. To promote multi-hazard mitigation strategies in an integrated a, pp.oach, the National Science Council established a National Science and Technology Program for Disaster Mitigation in January 1998. This program emphasizes on the implementation of research results in the National Disaster Management System. This paper describes the earthquake loss estimation methodology that is currently developed in Taiwan. Topics of potential earth science hazards (PESH) and building vulnerability analysis are described in detail.

  • PDF

Analysis of Production Process Improvement with Life Cycle Assessment $Technology{\sim}$ Example of HDPE Pipe Manufacturing

  • Tien, Shiaw-Wen;Chiu, Chung-Ching;Chung, Yi-Chan;Tsai, Chih-Hung;Chang, Chin-Fa
    • International Journal of Quality Innovation
    • /
    • v.8 no.2
    • /
    • pp.32-56
    • /
    • 2007
  • Life Cycle Assessment (LCA) aims to analyze possible impact upon manufacturing process and availability of products, and also study the environmental considerations and potential influence during entire life cycle ranging from procurement, production and utilization to treatment (namely, from cradle to tomb). Based on high-density polyethylene (HDPE) pipe manufacturing of company A, this case study would involve evaluation of environmental influence during the production process. When the manufacturing process has been improved during "production process" and "forming cooling" stage, it is found that capital input on "electric power" and "water supply" could be reduced, thus helping to sharpen the competitive power of company A, and also ensure sustainable economic and industrial development in accordance with national policies on environmental protection.

A STUDY ON THE EFFECT OF TREATMENT IN THE SKELETAL CLASS III MALOCCLUSION PATIENT WITH ANTERIOR CROSSBITE (전치부 반대 교합을 동반한 골격성 3급 부정교합 환자의 치료에 관한 연구)

  • Moon, Yoon-Shik
    • The korean journal of orthodontics
    • /
    • v.23 no.4 s.43
    • /
    • pp.475-483
    • /
    • 1993
  • The purpose of this study was to investigate the treatment effects on anterior crossbite patients using chin cap and labiolingual arch appliance. In the present study, I statistically evaluated measurement values on a cephalogram before and after treatment form twenty anterior crossbite cases. The results were as follows: 1. In the craniofacial patterns, cranial base increased after treatment. 2. In the maxillo-mandibular relationship, ANB and Facial convexity significantly increased. 3. In the denture patterns, occlusal plane, Ul to FH and Overjet significantly increased. On the contrary overbite decreased significantly. Lower incisors inclined lingually. 4. In the soft tissue profile changes, lower lip protrusion was signifacantly improved.

  • PDF

A realization Fuzzy PI and Fuzzy PD Controller using a compensation Fuzzy Algorithms

  • Kim, Seung-Cheol;Choo, Yeon-Gyu;Kang, Shin-Chul;Lim, Young-Do;Park, Boo-Kwi;Lee, Ihn-Yong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.101.4-101
    • /
    • 2002
  • I. Introduction ▶The PID(Proportional-Integral-Derivative) controller is widely used in the industry it can be implemented easily for a typical second order plant. ▶The parameters of PID controller should be adapted complicatedly if a plant is various or the load is present. ▶For solving the problem, many control techniques have been developed. ▶A major method is a hybrid Fuzzy-PID controller. But, in case of using this method, we can not obtain characteristic of rapidly response and not achieved compensation on disturbance. ▶Therefore, we will use compensator fuzzy controller a front Hybrid type fuzzy-PID controller...

  • PDF

A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images

  • Lee, Chin-Feng;Chang, Chin-Chen;Li, Guan-Long
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2554-2575
    • /
    • 2020
  • Data hiding technology hides secret information into the carrier, so that when the carrier is transmitted over network, it will not attract any malicious attention. Using data compression, it is possible to reduce the data size into a small compressed code, which can effectively reduce the time when transmitting compressed code on the network. In this paper, the main objective is to effectively combine these two technologies. We designed a data hiding scheme based on two techniques which are turtle-shell information hiding scheme and absolute moment block truncation coding. The experimental results showed that the proposed scheme provided higher embedding capacity and better image quality than other hiding schemes which were based on absolute moment block truncation coding.

Stepwise Training for Reconstructive Microsurgery: The Journey to Becoming a Confident Microsurgeon in Singapore

  • Ramachandran, Savitha;Ong, Yee-Siang;Chin, Andrew Y.H.;Song, In-Chin;Ogden, Bryan;Tan, Bien-Keem
    • Archives of Plastic Surgery
    • /
    • v.41 no.3
    • /
    • pp.209-212
    • /
    • 2014
  • Microsurgery training in Singapore began in 1980 with the opening of the Experimental Surgical Unit. Since then, the unit has continued to grow and have held microsurgical training courses biannually. The road to becoming a full-fledged reconstructive surgeon requires the mastering of both microvascular as well as flap raising techniques and requires time, patience and good training facilities. In Singapore, over the past 2 decades, we have had the opportunity to develop good training facilities and to refine our surgical education programmes in reconstructive microsurgery. In this article, we share our experience with training in reconstructive microsurgery.

A Chinese Spam Filter Using Keyword and Text-in-Image Features

  • Chen, Ying-Nong;Wang, Cheng-Tzu;Lo, Chih-Chung;Han, Chin-Chuan;Fana, Kuo-Chin
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.32-37
    • /
    • 2009
  • Recently, electronic mail(E-mail) is the most popular communication manner in our society. In such conventional environments, spam increasingly congested in Internet. In this paper, Chinese spam could be effectively detected using text and image features. Using text features, keywords and reference templates in Chinese mails are automatically selected using genetic algorithm(GA). In addition, spam containing a promotion image is also filtered out by detecting the text characters in images. Some experimental results are given to show the effectiveness of our proposed method.

  • PDF

A Robust and Removable Watermarking Scheme Using Singular Value Decomposition

  • Di, Ya-Feng;Lee, Chin-Feng;Wang, Zhi-Hui;Chang, Chin-Chen;Li, Jianjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5268-5285
    • /
    • 2016
  • Digital watermarking techniques are widely applied to protect the integrity and copyright of digital content. In a majority of the literature for watermarking techniques, the watermarked image often causes some distortions after embedding a watermark. For image-quality-concerned users, the distortions from a watermarked image are unacceptable. In this article, we propose a removable watermarking scheme that can restore an original-like image and resist signal-processing attacks to protect the ownership of an image by utilizing the property of singular value decomposition (SVD). The experimental results reveal that the proposed scheme meets the requirements of watermarking robustness, and also reestablishes an image like the original with average PSNR values of 59.07 dB for reconstructed images.

A Study on a Modeling of the Inhibitory Reflex Mechanism of Jaw Muscle Induced by Electrical Stimulation (전기자극에 대한 턱근육의 억제반사 메카니즘의 모델링에 관한 연구)

  • 김성환;김태훈;조일준;유세근
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.52 no.9
    • /
    • pp.560-567
    • /
    • 2003
  • EMG recordings of the electrical activity of muscle have proved to be a valuable tool in studying muscle function and reflex activity. SP(silent period) is elicited by a electrical stimulation on the chin during isometric contraction of jaw muscle. This paper proposes a model of the inhibitory reflex mechanism of jaw muscle after electrical stimulation. The SPs of jaw muscle after a electrical stimulation to the chin were divided into SP1 and SP2. SP1 is produced by the activation of periodontal receptors. The activation of nociceptors contributes to the SP2. As a result, the EMG signal generated by a proposed a model of inhibitory reflex mechanism is similar to real both EMG signal including SP1 and SP2. The present study have shown differences of SP1 and SP2 induced by inhibitory reflex mechanism.