• Title/Summary/Keyword: message objects

Search Result 121, Processing Time 0.025 seconds

A Study on the Surrealism Expressed in Fashion Illustrations (패션일러스트레이션에 나타난 초현실주의 표현에 관한 연구)

  • Kim Soo-Kyong
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.6 no.3
    • /
    • pp.123-138
    • /
    • 2004
  • The objective of this study is to review the expressive effect of fashion illustrations and to enlarge its expressive range by analysing the correlations between fashion illustrations and surrealistic expressive characteristics. The results are as follows. The surrealistic expressive methods of fashion illustration such as depaysement and automatism have been used by many foreign and domestic fashion illustrators. I think that these methods reinforce the subjective aspect of expressive effects and enlarge the transmitting function of fashion message. The elements of expression are divided into color, texture, shape/form and space. Subjective colors rather than natural colors are used for the surrealistic expressive effect of color in fashion illustrations, and illusion of space is expressed by the change of brightness. The surrealistic expressive effect in fashion illustrations distorted the experience of factual texture and disturbed the visual texture. The use of tactile texture presented strange effects perspectively. The objects of shape in fashion illustrations were mainly human body. The form of human body presents reconstituted and reinterpreted figure by transformation or distortion according to the intention of the artist rather than realistic and physical form. In fashion illustration, the transformation of the human body itself whose body parts get separated, superposition of exterior material and human body, and the distortion of human body by the change are done. Space is where background and shapes are inter-penetrated because they are ambiguous and untransparent, and where all are in disorder and unbalance. The method of projection uses distance perspective, multiple perspective and amplified perspective representation, and forms a psychological space feeling. And I think the use of surrealistic expressive methods are very useful for the subjective sensitiveness and the transmission of a fashion message, and presents a possibility to develop a new expressive method.

  • PDF

Spatio-temporal Query Processing Systems for Ubiquitous Environments (유비쿼터스 환경을 위한 시공간 질의 처리 시스템)

  • Lee, Ki-Young;Lim, Myung-Jae;Kim, Kyu-Ho;Kim, Joung-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.145-152
    • /
    • 2010
  • With the recent development of the ubiquitous computing technology, there are increasing interest and research in technologies such as sensors and RFID related to information recognition and location positioning in various ubiquitous fields. Especially, RTLS(Real-Time Locating Services) dealing with spatio-temporal data is emerging as a promising technology. For these reasons, the ISO/IEC published the RTLS standard specification for compatibility and interoperability in RTLS. Therefore, in this paper, we designed and implemented Spatio-temporal Query Processing Systems for efficiently managing and searching the incoming Spatio-temporal data stream of moving objects. Spatio-temporal Query Processing Systems's spatio-temporal middleware maintains interoperability among heterogeneous devices and guarantees data integrity in query processing through real time processing of unceasing spatio-temporal data streams and two way synchronization of spatio-temporal DBMSs. Web Server uses the SOAP(Simple Object Access Protocol) message between client and server for interoperability and translates client's SOAP message into CQL(Continuous Query Language) of the spatio-temporal middleware. Finally, this thesis proved the utility of the system by applying the spatio-temporal Query Processing Systems to a real-time Locating Services.

Real-Time Monitoring System Based on IPv6 over BLE (BLE 상의 IPv6 기반의 실시간 모니터링 시스템)

  • Kim, Seong-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.309-315
    • /
    • 2017
  • Recently it has drawn much attention on the technologies about Internet of Things (IoT) which connects objects with constrained resource and heterogenous communication module in order to communicate information via internet. We propose a real-time sensor monitoring system based on IPv6 over Bluetooth Low Energy (BLE), which is included in Bluetooth 4.2 Specification. Since this system uses a publish-subsribe based IoT protocol, so called Message Queueing Telemetry Transport (MQTT), neither transforming network data nor any proxy server is needed in order to transmit data. Through the web client connected to this system, you can monitor sensor data sent by BLE device in real-time, intermediated via MQTT broker and then delivered to the client via HTTP and websocket protocol. In this paper we evaluated network capacity and availability of the implemented test platform. Thus by using this system it is possible to make development cost low and to construct IoT network with heterogenous devices easily.

Distributed Test Method using Logical Clock (Logical Clock을 이용한 분산 시험)

  • Choi, Young-Joon;Kim, Myeong-Chul;Seol, Soon-Uk
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.9
    • /
    • pp.469-478
    • /
    • 2001
  • It is difficult to test a distributed system because of the task of controlling concurrent events,. Existing works do not propose the test sequence generation algorithm in a formal way and the amount of message is large due to synchronization. In this paper, we propose a formal test sequence generation algorithm using logical clock to control concurrent events. It can solve the control-observation problem and makes the test results reproducible. It also provides a generic solution such that the algorithm can be used for any possible communication paradigm. In distributed test, the number of channels among the testers increases non-linearly with the number of distributed objects. We propose a new remote test architecture for solving this problem. SDL Tool is used to verify the correctness of the proposed algorithm and it is applied to the message exchange for the establishment of Q.2971 point-to-multipoint call/connection as a case study.

  • PDF

Formal Specification and Modeling Techniques of Component Workflow Variability (컴포넌트 워크플로우 가변성의 정형 명세 및 모델링 기법)

  • Lee, Jong-Kook;Cho, Eun-Sook;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.10
    • /
    • pp.703-725
    • /
    • 2002
  • It is well recognized that component-based development (CBD) is an effective approach to manage the complexity of modem software development. To achieve the benefits of low-cost development and higher productivity, effective techniques to maximize component reusability should be developed. Component is a set of related concepts and objects, and provides a particular coarse-grained business service. Often, these components include various message flows among the objects in the component, called 'business workflow`. Blackbox components that include but hide business workflow provide higher reusability and productivity. A key difficulty of using blackbox components with business workflow is to let the workflow be customized by each enterprise. In this paper, we provide techniques to model the variability of family members and to customize the business workflow of components. Our approach is to provide formal specification on the component variability, and to define techniques to customize them by means of the formalism.

A feedback Scheme for Synchronization in a Distributed Multimedia (분산 멀티미디어 프리젠테이션 시스템에서 동기화를 위한 피드백 기법)

  • Choi, Sook-Young
    • The KIPS Transactions:PartB
    • /
    • v.9B no.1
    • /
    • pp.47-56
    • /
    • 2002
  • In the distributed multimedia document system, media objects distributed over a computer network are retrieved from their sources and presented to users according to specified temporal relations. For effective presentation, synchronization has to be supported. Furthermore, since the presentation in the distributed environment is influenced by the network bandwidth and delay, they should be considered for synchronization. This paper proposes a distributed multimedia presentation system that performs presentation effectively in the distributed environment. And it also suggests a method to supports synchronization, in which, network situation and resources are monitored when media objects are transferred from servers to a client. Then a feedback message for the change of them is sent to the server so that the server might adjust the data sending rate to control synchronization. To monitor the situation of network, we use two methods together. One is to manage the level of the buffer by setting thresholds on a buffer and the other is to check the difference between the sending time of a packet from the server and the arrival time of the packet to the client.

Fashion Exhibition as Fashion Communication Media -Focus on the 2012 Nora Noh La Vie en Rose Exhibition- (패션 커뮤니케이션 매체로서의 패션 전시에 관한 연구 -2012 노라 노 <라 비 엥 로즈> 전시 사례를 중심으로-)

  • Hahn, Soo-Yeon
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.36 no.9
    • /
    • pp.966-978
    • /
    • 2012
  • Fashion exhibitions in museums and galleries is a form of fashion communication media. This thesis examines the messages, objects, and space of fashion exhibitions as fashion communication media as well as analyzes the method of fashion communication. This thesis first provides a theoretical study on fashion exhibition and conducts a case study of the 2012 Nora Noh Retro Exhibition La Vie en Rose (2012/5/23-6/2, Horim GNB Gallery, Seoul), dedicated to the first Korean female fashion designer. The message of the exhibition was the fashion philosophy and the fashion style of the designer as well as the intention of the curator. The objects presented were the dresses kept by the loyal customers of the brand, and the homage items by designers of present generation. The space designs of the exhibition were the layout and total coordination of the opening event. The methods of fashion communication for the fashion exhibition, in the case of the La Vie en Rose exhibition, were communicated (1) from the past to the present, (2) from designers to celebrities and (3) from the designer to the celebrity and the viewers. From the past to the present, the designer's style throughout the 60 years of her fashion career is conveyed to the present generation fashion people, in the form of homage designs and collaboration works. From designers to celebrities, her fashion philosophy was delivered in the form of movie and stage costumes. Some present generation celebrities tried reinterpretations of the garment. From the designer to the celebrity and the viewers of the exhibition, the intention of the curator and the designer were individualized and internalized by the viewers.

A Method to Improve Energy Efficiency for IoT Using SSL/TLS on Wireless Network (무선 환경에서 SSL/TLS를 사용하는 IoT의 에너지 효율성 향상을 위한 기법)

  • Chung, Jin Hee;Cho, Tae Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.661-666
    • /
    • 2016
  • The Internet of Things (IoT) is an infrastructure of physical objects that could be connected to the Internet. Most of these are low performance to ensure a reasonable cost for the smart physical objects. Thus, these devices usually use a lightweight messaging protocol: message queue telemetry transport with SSL/TLS. Cipher suites in device are fixed by default and selected based on preference in SSL/TLS. However, the selected cipher suite provides high security level more than expected. This limitation causes energy waste and overhead of devices. In order to counter this problem, we proposed fuzzy logic based cipher suite decision method to improve energy efficiency. Our proposed method saved 36.03% energy.

High Level Object Oriented Real-Time Simulation Programming and TMO Scheme (High Level 객체 지향에서 실시간 시뮬레이션 프로그램과 TMO 설계)

  • Song, Sun-Hee;Ra, Sang-Dong
    • The KIPS Transactions:PartA
    • /
    • v.10A no.3
    • /
    • pp.199-206
    • /
    • 2003
  • The object-oriented (OO) distributed real-time (RT) programming movement started in 1990´s and is growing rapidly at this turn of the century. Distributed real-time simulation is a field in its infancy but it is bounded to receive steadily growing recognition for its importance and wide applicability. The scheme is called the distributed time-triggered simulation scheme which is conceptually simple and easy to use but widely applicable. A new generation object oriented (OO) RT programming scheme is called the time-triggered message triggered object(TMO) programming scheme and it is used to make specific illustrations of the issues. The TMO structuring scheme is a general-style components structuring scheme and supports design of all types of component including hard real time objects and non real time objects within one general structure.

A Study on Group Key Generation and Exchange using Hash Collision in M2M Communication Environment (M2M 통신 환경에서 해시 충돌을 이용한 그룹키 생성 및 교환 기법 연구)

  • Song, Jun-Ho;Kim, Sung-Soo;Jun, Moon-Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.9-17
    • /
    • 2019
  • As the IoT environment becomes more popular, the safety of the M2M environment, which establishes the communication environment between objects and objects without human intervention, becomes important. Due to the nature of the wireless communication environment, there is a possibility of exposure to security threats in various aspects such as data exposure, falsification, tampering, deletion and privacy, and secure communication security technology is considered as an important requirement. In this paper, we propose a new method for group key generation and exchange using trap hash collision hash in existing 'M2M communication environment' using hash collision, And a mechanism for confirming the authentication of the device and the gateway after the group key is generated. The proposed method has attack resistance such as spoofing attack, meson attack, and retransmission attack in the group communication section by using the specificity of the collision message and collision hash, and is a technique for proving safety against vulnerability of hash collision.