• Title/Summary/Keyword: signature items

Search Result 24, Processing Time 0.029 seconds

A Study on Design Identity of Fashion House - Focused on Saint Laurent House - (패션 하우스의 디자인 정체성 연구 - 생 로랑 하우스를 중심으로 -)

  • Hwang, Hyerim;Park, Eun Kyung
    • Journal of the Korean Society of Costume
    • /
    • v.65 no.2
    • /
    • pp.105-124
    • /
    • 2015
  • This research was started to study how the design identity of an overseas fashion house was formed, changed and connected. For the purpose of the study, Saint Laurent House was selected as the subject of the study, because it began as a couture house and launched the $pr\hat{e}t-\grave{a}-porter$ for the first time among the designer brands, and also contributed to the development of modern women's fashion. Literature survey on related books and papers was performed to study the Saint Laurent House. Then, fashion collection photos of the house from 1962 SS to 2014 SS were collected to analyze and compare the features of the designs. The photos were collected from related books, fashion magazines and internet sites. The results are as follows: The features of Yves Saint Laurent's early designs were contemporarily sensational with their couture tradition. His representative designs including Le Smoking, Pea Coat, Loose Fit Blouse, Safari Look, Jumpsuit, Ethnic Look and Art Look became the signature looks of the Saint Laurent House. His designs expressed the liberation of sex, multi-cultural sensitivity and the fusion of art and fashion. His successor, chief designer Tom Ford designed with strong sensitivity of his own. He dealt with Yves Saint Laurent's design themes and signature looks in sensual as well as trendy and sophisticated way. Stefano Pilati showed the Parisienne chic and elegance. He re-made the legacies of Yves Saint Laurent with his own design style using new materials or cutting technique. Hedi Slimane reinterpreted the signature looks of the house with his rock' n roll mood for young, modern women while reflecting the spirit of Yves Saint Laurent's early stage. In conclusion, the design identity of Saint Laurent House is not just a fixed one. By the subsequent chief designers, the signature items and design spirit of Yves Saint Laurent have been succeeded, reintroduced or changed to be trendy and to reflect the designers' design sensitivity. All of these make and maintain the design identity of the fashion house.

An Authentication Protocol using Fuzzy Signature Vault Scheme (퍼지서명볼트스킴을 이용한 인증 프로토콜)

  • Moon, Hyun-Yi;Kim, Ae-Young;Lee, Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.4
    • /
    • pp.172-177
    • /
    • 2008
  • In this paper, we design an authentication protocol based on Fuzzy Signature Vault Scheme using a light signature feature extraction method for user convenience and efficiency of electronic commerce. The signature is used broadly in electronic commerce because it is one of the simple and low-cost biometric items. However, signature has a problem that there are few low-cost and safe protocols. To solve this problem, we design a feature extraction method which is adequate for characters of signature and Fuzzy Vault Scheme. In addition, we design and analyze an efficient authentication protocol with some parameters used in this procedure. The followings are advantages when this protocol is applied to authentication procedure; 1) using convenient and low-cost signatures, 2) being possible to verify users with spending only about second for signature processing and authentication, 3) one time on transmission for sign-in and verification and 4) getting user authentication with secret value at the same time.

A Study on Measuring Procedure and Analysis Technique of Ship Infrared Signature at Sea (해상에서 적외선신호의 계측절차 및 분석기법 연구)

  • Cho, Yong-Jin
    • Journal of Ocean Engineering and Technology
    • /
    • v.23 no.3
    • /
    • pp.53-58
    • /
    • 2009
  • A scale model test for ship Infra-Red signature measurements at sea is impossible, because it is sensitive to the environment. Since we can't control the meteorological environment of the real sea, it can't be carried out with the desired maritime environments. Therefore, in the sea, we made measurements of the weather, operating conditions of the ship, and ship IR signatures under given conditions, and then analyzed them. Conversely, we compared the results of the test with a prediction for a given scenario condition. This paper describes the test items, procedures, and measuring instruments of the experiments at sea and the results from basic researches for methods of estimation and analysis of the measured data.

Design of a Private Key Escrow System based on the Fingerprint Identification (지문 인식 기반의 개인키 위탁 시스템의 설계)

  • Shin, Yong-Nyuo;Lee, Yong-Jun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.2
    • /
    • pp.21-28
    • /
    • 2008
  • There are some problems on the system that uses a password comprising a digital signature to identify the secret key owner under the public key infrastructure. For example, the password can be difficult to remember or easy to be disclosure, and users should make more complex password to protect it. A number of studies have been proceeded in order to overcome these defects using the fingerprint identification technologies, but they need to change the current standard of public key infrastructure. On the suggested private key escrow system, the private key can be withdrawn only through the enrollment and identification of a fingerprint template after it is saved to a reliable third system. Therefore, this new private key escrow system can remove previous inconveniences of managingthe private key on current public key infrastructure, and it exhibited superior results in terms of the evaluation items when compared with the integrated method of the existing fingerprint identification and public key infrastructure.

Guideline for Improvement of Unmanned Shopping Experience - Focusing on Seven Eleven Signature - (국내 무인매장 쇼핑경험 개선을 위한 가이드라인 - 세븐일레븐 시그니처 매장을 중심으로 -)

  • Lee, Eun-Joo;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.17 no.3
    • /
    • pp.389-394
    • /
    • 2019
  • The purpose of this study is to suggest guideline for better user experience of unmanned store focusing on the Seven Eleven signature. The case study was conducted to investigate the characteristics of unmanned stores in the US and China, and to conduct comparative studies with the Seven Eleven Signature Store. As a result, I was able to derive 7 items, Easy, Simplified, Accessible, Findable, Informative, Flexible, Credible that help to improve the shopping experience. We hope that the follow up study will help to improve the unmanned store in Korea and improve the experience.

A Probabilistic Test based Detection Scheme against Automated Attacks on Android In-app Billing Service

  • Kim, Heeyoul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1659-1673
    • /
    • 2019
  • Android platform provides In-app Billing service for purchasing valuable items inside mobile applications. However, it has become a major target for attackers to achieve valuable items without actual payment. Especially, application developers suffer from automated attacks targeting all the applications in the device, not a specific application. In this paper, we propose a novel scheme detecting automated attacks with probabilistic tests. The scheme tests the signature verification method in a non-deterministic way, and if the method was replaced by the automated attack, the scheme detects it with very high probability. Both the analysis and the experiment result show that the developers can prevent their applications from automated attacks securely and efficiently by using of the proposed scheme.

What's the Best Technique on Menu Analysis? (메뉴 분석 방법론의 비교 연구)

  • 이해영;양일선;도현욱;신서영
    • Journal of Nutrition and Health
    • /
    • v.36 no.3
    • /
    • pp.319-326
    • /
    • 2003
  • The purposes of this study were to : (a) analyze the menus of food service operations using the menu analysis techniques of Kasavana & Smith, Miller, Merricks & Jones, Pavesic and Uman, (b) closely examine the characteristics of the five analysis techniques. Calculations for the menu analysis were done by computer using the MS 2000 Excel spreadsheet program. Menu mix% and unit contribution margin were used as variables by Kasavana & Smith, sales volume and food cost% by Miller, sales volume and cash contribution by Merrick & Jones, weighted contribution margin and food cost% by Pavesic, and total cash contribution and unit contribution margin by Uman. In each case, a four-cell matrix was created, and menu items were located in each according they achieved high or low scores with respect to two variables. Items that scored favorably on both variables were rated in the top category (e.g., star, prime, signature, group A, winner) and those that scored below average on both were rated in the lowest category (e.g., dog, problem, loser, group D, loser). While the 3 methods of Kasavana & Smith, Miller, Merrick & Jones focus on customers' viewpoints, the others consider the managers' viewpoints. Therefore, it is more likely to be desirable for decision-making on menus if the menu analysis technique chosen is suited to its purpose.

Development and Evaluation of a Legal Communicable Disease Electronic System for Infection Control (법정전염병 감염관리를 위한 정보시스템 개발 및 효과)

  • Choi, Jeong-Sil
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.15 no.3
    • /
    • pp.371-379
    • /
    • 2008
  • Purpose: The objective of the present study was to develop and evaluate a legal communicable diseases (LCDs) electronic system for infection control. Method: The system was developed through the procedure of analysis, design, implementation, application and evaluation, and was applied within an OCS (order communication system). Results: As indicated by the main menu, the present system is composed of an improved perception system for enhancing perception of LCDs, LCDs identification system, and improved efficiency in the report system. Detailed items included in the main menu are introduction and log-in screen, pop-up window for checking the outbreaks of LCDs, decision making icon, electronic signature icon, electronic report form, email system, etc. The total number of reports was greater after the application of the system (n=99) than before (n=80), and the adequacy of report time was statistically significantly higher after application of the system (P<0.05) Conclusion: The present system suggests a new method for LCDs report and infection control, and is expected to be adopted by other medical institutions in the future.

  • PDF

A New Approach to the Verification of a Message Protocol : Fuzzy Integral (퍼지적분을 이용한 메시지 프로토콜 검증)

  • Shin, Seung-Jung;Park, In-Kue
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.6
    • /
    • pp.1903-1910
    • /
    • 2000
  • The objective of this paper was to cope with the verification of the message transfer protocol that integrates the electronic signature and the distribution and authentication of public key in TCP/IP using fuzzy integral. They were classified into the security technology, the security policy, the electronic document processing, the electronic document transportation and the encryption and decryption keys in its function. The measures of items of the message security protocol were produced for the verification of the implemented document in every function.

  • PDF

The Design and Implementation of Secure XML Messaging System (안전한 XML 메시징 시스템 설계 및 구현)

  • 이영교;안경림
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.9
    • /
    • pp.1233-1238
    • /
    • 2001
  • Security is very important at EC(Electronic Commerce) Environments. The reason is that exchanged data(that is user private information(accounts, card-no, password), transaction items, etc) is various and is very sensitive. In this paper, we propose the Secure-XML Messaging System(S-XMS) which is implemented to support Message Level Security, Encryption and Digital Signature. And we implement Message Confidentiality Service, User Authentication & Message Integrity Service and Non-Repudiation Service among the various Security Services.

  • PDF