• Title/Summary/Keyword: copy paper

Search Result 502, Processing Time 0.028 seconds

A Comparative Study on Art of Paul Poiret and Gabrielle Chanel - focusing on Their Influence on Haute Couture - (Paul Poiret와 Gabrielle Chanel의 작품세계 비교 연구 - Haute Couture에 미친 영향을 중심으로 -)

  • 이윤정
    • The Research Journal of the Costume Culture
    • /
    • v.11 no.4
    • /
    • pp.525-540
    • /
    • 2003
  • This survey paper aims to compare two significant figures in the history of Haute Couture e.g, Paul Poiret and Coco Chanel, who played a leading role between 1910 and 1930. It is found here that they have common features with respect to giving freedom to body through costume, enlarging Garconne Mode, creating more value of Costume Jewelry, exploiting advertisement strategy using models, proving exotic styles, and last but not the least contributing to Haute Couture. The research shows, however, that Poiret differs from Chanel in that he made most of various natural colors whereas Chanel used black or beige colors that had been rarely used woman wear previously. They also differed in using fabric, permitting copy by others, ingredients and bottling of perfume, meaning of silhouette. This kind of comparative research is expected to provide more understanding of fashion history and to contribute to more rigorous analysis of key success factors of designers in his or her age of fashion.

  • PDF

System for Individual Creation and Evaluation of Various Types of Assignments (다양한 과제 유형에 적용가능한 개인별 과제 부여 및 관리 시스템 구성)

  • Han, Hyungseok
    • Journal of Engineering Education Research
    • /
    • v.15 no.6
    • /
    • pp.49-57
    • /
    • 2012
  • This paper deals with the individual homework creating and management system. The proposed system can be applied to various types of homeworks such as problem solving, experiment and watching some video material related to lecture. Every authorized student can connect the web server in which the proposed system is implemented and download his assignment which is different from other student's. Also we provide real application examples to show the feasibility and effectiveness of the proposed system regarding 3 types of assignments and expect to help the students to do self-regulated study and improve their professional capability.

Real Time Watermark Embedding/Detecting System for HDTV

  • Hahm Sang Jin;Lee KeunSik;Park KenuSoo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2004.11a
    • /
    • pp.285-288
    • /
    • 2004
  • High-quality digital broadcasting contents are susceptible to illegal copy and unauthorized redistribution, which makes broadcasters difficult to protect valuable media assets. So, broadcasters and content providers need the technology for copyright protection of professional digital content. Digital watermarking technology is one of the most actively developed solutions for the copyright protection. This paper suggests the requirements of watermarking technology in DTV(Digital TV) environment for copyright protection and shows the developed real-time watermark embedding/detecting system for HD(High Definition)/SD(Standard Definition) video and experimental results of the system against watermark attack tests. Our watermarking system meets the watermarking requirements of invisibility, robustness and security of DTV environment.

  • PDF

Global Recovery Management Protocol for Heterogeneous System in Security Environments (보안환경에서 이질형 시스템의 전역 복구 관리 프로토콜)

  • Jeong, Hyun Cheol
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.51-59
    • /
    • 2009
  • Many failures are due to incorrectly programmed transactions and data entry errors. System failure causes the loss or corruption of the contents of volatile storage. Although global processing protects data values to detect direct or indirect information effluence, security environments are very important in the recovery management of heterogeneous systems. Although transaction can't control system fault, the restart for the system can cause information effluence by low bandwith. From various faults, it is not easy to maintain the consistency and security of data. This paper proposes recovery management protocols to assure global multilevel secure one-copy quasi-serializability in security environments of heterogeneous systems with replicated data and proves its correctness. The proposed secure protocols guarantee the reliability and security of system when the system fault is happened.

A Study on Union Utilization of Academic Journals (학술지 공동이용에 관한 연구)

  • Chun, Young-Choon;Im, Song-Ok
    • Journal of Information Management
    • /
    • v.29 no.3
    • /
    • pp.43-62
    • /
    • 1998
  • This study examines the way of making use of the science journals sharing with many users, who even do not work for the same institute. It may help to make the information as much as available with minimum financial burden to users. This is needed expecially when we recognize the fact that the amount of information supply is being increased rapidly while the financial environments around us are becoming aggravated.

  • PDF

Development of Competitive Port Model Using the Hybrid Mechanism of System Dynamic Method and Hierarchical Fuzzy Process Method (SD법과 HFP법의 융합을 이용한 항만경쟁모델의 개발)

  • 여기태;이철영
    • Korean System Dynamics Review
    • /
    • v.1 no.1
    • /
    • pp.103-131
    • /
    • 2000
  • If a system such as a port has a large boundary and complexity, and the system's substance is considered as a black box, forecast accuracy will be very low. Futhermore various components in a port exert significant influence on each other. To copy with these problem the form of structure models were introduced by using SD method. The Competitive Ports Model had several sub-systems consisting of each Unit Port models, and each Unit Port model was made by quantitative, qualitative factors and their feedback loops. The fact that all components of one port have influence on the components of the other ports should be taken into account to construct Competitive Port Models. However, with the current approach that is impossible, and in this paper therefore, models were simplified by HFP adapted to integrate level variables of unit port models. Although many studies on modelling of port competitive situation have been conducted, both theoretical frame and methodology are still very weak. In this study, a new algorithm called ESD(Extensional System Dynamics) for the evaluation of port competition was presented, and applied to simulate port systems in northeast asia.

  • PDF

Real-Time HD Watermarking System in DTV environment

  • Hahm Sangjin;Lee Keunsik;Park Keunsoo
    • Journal of Broadcast Engineering
    • /
    • v.10 no.2
    • /
    • pp.131-138
    • /
    • 2005
  • High-quality digital broadcasting contents are susceptible to illegal copy and unauthorized redistribution, which makes broadcasters difficult to protect valuable media assets. So, broadcasters and content providers need the technology for copyright protection of professional digital content. Digital watermarking technology is one of the most actively developed solutions for the copyright protection. This paper suggests the requirements of watermarking technology in DTV(Digital TV) environment for copyright protection and shows the developed real-time watermark embedding/detecting system for HD(High Definition)/SD(Standard Definition) video and experimental results of the system against watermark attack tests. Our watermarking system meets the watermarking requirements of invisibility, robustness and security of DTV environment.

Design of document security to maximize knowledge value (지식가치를 극대화하기 위한 다큐먼트 보안 디자인)

  • Jang, Deok-Seong
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2003.12a
    • /
    • pp.161-170
    • /
    • 2003
  • Knowledge management system building knowledge acquisition, knowledge share, and knowledge maintenance for the member of corporation is expanded throughout whole industry to cope with rapid business environment. Electronic document basing knowledge management system can copy, print, and transfer knowledge to another party, so it is being regarded as a essential infrastructure to share knowledge. However, considering most of information leakage is sprung up by insider of organization, it is considered to provide countermeasure to protect illegal use from information leakage. The purpose of this paper is to establish digital information security system through design of document and manage digital information assets safely through electronic document security system protecting illegal leakage of digital information assets.

  • PDF

Analysis of Packet Transmission Probability under Flooding Routing

  • Hong, Jung-Sik;Lie, Chang-Hoon;Lee, Hae-Sang
    • Journal of the military operations research society of Korea
    • /
    • v.18 no.2
    • /
    • pp.126-139
    • /
    • 1992
  • In this paper, the computational problems of packet transmission probability (PTP) in a computer communication network (CCN) under flooding routing are investigated. To avoid a congestion under this routing, two control methods are considerd, i. e., copy storage control and hop count control. Problems of PTP under flooding routings with these two control methods are respectively shown to be equivalent to those of source-to-terminal reliability(STR) with an exception for a case of hop count control where the hop count is less than the length of the longest path. For this exceptional case, an efficient computational algorithm for PTP is developed. This algorithm is proposed as an efficient tool for the determination of hop count which satisfies a given reliability constraint. A numerical example illustrates a proposed algorithm.

  • PDF

A Study on the KORMARC Format for Shared Cataloging System (분담목록용 형식으로서의 KORMARC 형식에 관한 연구)

  • Choe, Seok-Du;Lee, Sang-Heon
    • Journal of the Korean Society for information Management
    • /
    • v.8 no.1
    • /
    • pp.16-32
    • /
    • 1991
  • This paper described the general concept of shared cataloging system and discussed the KORMARC format in the view of shared cataloging system format, including control number, copy statement, holdings statement, modifying information, transcribing MARC, character code of cataloging, nonfiling characters, delimiter codes, report number processing.

  • PDF