• 제목/요약/키워드: signature items

검색결과 24건 처리시간 0.031초

패션 하우스의 디자인 정체성 연구 - 생 로랑 하우스를 중심으로 - (A Study on Design Identity of Fashion House - Focused on Saint Laurent House -)

  • 황혜림;박은경
    • 복식
    • /
    • 제65권2호
    • /
    • pp.105-124
    • /
    • 2015
  • This research was started to study how the design identity of an overseas fashion house was formed, changed and connected. For the purpose of the study, Saint Laurent House was selected as the subject of the study, because it began as a couture house and launched the $pr\hat{e}t-\grave{a}-porter$ for the first time among the designer brands, and also contributed to the development of modern women's fashion. Literature survey on related books and papers was performed to study the Saint Laurent House. Then, fashion collection photos of the house from 1962 SS to 2014 SS were collected to analyze and compare the features of the designs. The photos were collected from related books, fashion magazines and internet sites. The results are as follows: The features of Yves Saint Laurent's early designs were contemporarily sensational with their couture tradition. His representative designs including Le Smoking, Pea Coat, Loose Fit Blouse, Safari Look, Jumpsuit, Ethnic Look and Art Look became the signature looks of the Saint Laurent House. His designs expressed the liberation of sex, multi-cultural sensitivity and the fusion of art and fashion. His successor, chief designer Tom Ford designed with strong sensitivity of his own. He dealt with Yves Saint Laurent's design themes and signature looks in sensual as well as trendy and sophisticated way. Stefano Pilati showed the Parisienne chic and elegance. He re-made the legacies of Yves Saint Laurent with his own design style using new materials or cutting technique. Hedi Slimane reinterpreted the signature looks of the house with his rock' n roll mood for young, modern women while reflecting the spirit of Yves Saint Laurent's early stage. In conclusion, the design identity of Saint Laurent House is not just a fixed one. By the subsequent chief designers, the signature items and design spirit of Yves Saint Laurent have been succeeded, reintroduced or changed to be trendy and to reflect the designers' design sensitivity. All of these make and maintain the design identity of the fashion house.

퍼지서명볼트스킴을 이용한 인증 프로토콜 (An Authentication Protocol using Fuzzy Signature Vault Scheme)

  • 문현이;김애영;이상호
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제35권4호
    • /
    • pp.172-177
    • /
    • 2008
  • 본 논문에서는 경량화된 서명의 특징추출기법을 이용하여 사용자의 편의성 및 전자상거래의 효율성을 높일 수 있는 퍼지볼트스킴 기반의 인증 프로토콜을 설계한다. 서명은 간편하고 저렴한 생체정보 중 하나이기 때문에 전자상거래에서 보편적으로 사용되는 인중수단이지만, 전자상거래시 저비용의 안전성을 확보한 프로토콜의 부재라는 취약성을 가진다. 이러한 문제를 해결하기 위하여, 비밀정보를 정확하게 생성해내는 퍼지볼트스킴 및 서명의 특성에 적합한 특징추출기법을 설계하고, 이 특징추출 과정에서 적용된 매개변수들을 활용하여 서명 기반의 효율적인 인증 프로토콜을 설계한다. 본 프로토콜을 적용시의 효과는 1) 간편하고 저렴한 서명의 이용, 2) 서명처리 및 인증에 약 1초의 시간소비로 실시간 사용자 검증 가능, 3) 로그인 및 검증시 통신횟수 1회로 최저, 4) 사용자 인증과 동시에 비밀 값 획득 등이다.

해상에서 적외선신호의 계측절차 및 분석기법 연구 (A Study on Measuring Procedure and Analysis Technique of Ship Infrared Signature at Sea)

  • 조용진
    • 한국해양공학회지
    • /
    • 제23권3호
    • /
    • pp.53-58
    • /
    • 2009
  • A scale model test for ship Infra-Red signature measurements at sea is impossible, because it is sensitive to the environment. Since we can't control the meteorological environment of the real sea, it can't be carried out with the desired maritime environments. Therefore, in the sea, we made measurements of the weather, operating conditions of the ship, and ship IR signatures under given conditions, and then analyzed them. Conversely, we compared the results of the test with a prediction for a given scenario condition. This paper describes the test items, procedures, and measuring instruments of the experiments at sea and the results from basic researches for methods of estimation and analysis of the measured data.

지문 인식 기반의 개인키 위탁 시스템의 설계 (Design of a Private Key Escrow System based on the Fingerprint Identification)

  • 신용녀;이용준
    • 디지털산업정보학회논문지
    • /
    • 제4권2호
    • /
    • pp.21-28
    • /
    • 2008
  • There are some problems on the system that uses a password comprising a digital signature to identify the secret key owner under the public key infrastructure. For example, the password can be difficult to remember or easy to be disclosure, and users should make more complex password to protect it. A number of studies have been proceeded in order to overcome these defects using the fingerprint identification technologies, but they need to change the current standard of public key infrastructure. On the suggested private key escrow system, the private key can be withdrawn only through the enrollment and identification of a fingerprint template after it is saved to a reliable third system. Therefore, this new private key escrow system can remove previous inconveniences of managingthe private key on current public key infrastructure, and it exhibited superior results in terms of the evaluation items when compared with the integrated method of the existing fingerprint identification and public key infrastructure.

국내 무인매장 쇼핑경험 개선을 위한 가이드라인 - 세븐일레븐 시그니처 매장을 중심으로 - (Guideline for Improvement of Unmanned Shopping Experience - Focusing on Seven Eleven Signature -)

  • 이은주;김승인
    • 디지털융복합연구
    • /
    • 제17권3호
    • /
    • pp.389-394
    • /
    • 2019
  • 본 연구는 국내외에서 점차 확대되고 있는 무인 매장, 그중 세븐일레븐 시그니처 매장을 중심으로 더 나은 사용 경험을 위한 가이드라인을 제안하는 데 그 목적이 있다. 연구방법으로 사례연구를 통해 미국과 중국의 무인 매장에 대한 특징을 조사하였고, 세븐일레븐 시그니처 매장과 비교연구를 진행하였다. 그 결과, 무인 매장 쇼핑 경험 개선에 도움이 되는 주요한 7가지 항목인 Easy, Simplified, Accessible, Findable, Informative, Flexible, Credible을 도출해낼 수 있었다. 이 연구는 국내 최초의 무인 편의점 세븐일레븐 시그니처를 중심으로 국내 무인 매장의 쇼핑경험 개선을 위한 가이드라인을 제시했다는 점에 의의가 있다. 후속 연구를 통해 국내 무인매장 개선 방안을 보완하고, 경험 개선에 도움이 되기를 기대한다.

A Probabilistic Test based Detection Scheme against Automated Attacks on Android In-app Billing Service

  • Kim, Heeyoul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1659-1673
    • /
    • 2019
  • Android platform provides In-app Billing service for purchasing valuable items inside mobile applications. However, it has become a major target for attackers to achieve valuable items without actual payment. Especially, application developers suffer from automated attacks targeting all the applications in the device, not a specific application. In this paper, we propose a novel scheme detecting automated attacks with probabilistic tests. The scheme tests the signature verification method in a non-deterministic way, and if the method was replaced by the automated attack, the scheme detects it with very high probability. Both the analysis and the experiment result show that the developers can prevent their applications from automated attacks securely and efficiently by using of the proposed scheme.

메뉴 분석 방법론의 비교 연구 (What's the Best Technique on Menu Analysis?)

  • 이해영;양일선;도현욱;신서영
    • Journal of Nutrition and Health
    • /
    • 제36권3호
    • /
    • pp.319-326
    • /
    • 2003
  • The purposes of this study were to : (a) analyze the menus of food service operations using the menu analysis techniques of Kasavana & Smith, Miller, Merricks & Jones, Pavesic and Uman, (b) closely examine the characteristics of the five analysis techniques. Calculations for the menu analysis were done by computer using the MS 2000 Excel spreadsheet program. Menu mix% and unit contribution margin were used as variables by Kasavana & Smith, sales volume and food cost% by Miller, sales volume and cash contribution by Merrick & Jones, weighted contribution margin and food cost% by Pavesic, and total cash contribution and unit contribution margin by Uman. In each case, a four-cell matrix was created, and menu items were located in each according they achieved high or low scores with respect to two variables. Items that scored favorably on both variables were rated in the top category (e.g., star, prime, signature, group A, winner) and those that scored below average on both were rated in the lowest category (e.g., dog, problem, loser, group D, loser). While the 3 methods of Kasavana & Smith, Miller, Merrick & Jones focus on customers' viewpoints, the others consider the managers' viewpoints. Therefore, it is more likely to be desirable for decision-making on menus if the menu analysis technique chosen is suited to its purpose.

법정전염병 감염관리를 위한 정보시스템 개발 및 효과 (Development and Evaluation of a Legal Communicable Disease Electronic System for Infection Control)

  • 최정실
    • 기본간호학회지
    • /
    • 제15권3호
    • /
    • pp.371-379
    • /
    • 2008
  • Purpose: The objective of the present study was to develop and evaluate a legal communicable diseases (LCDs) electronic system for infection control. Method: The system was developed through the procedure of analysis, design, implementation, application and evaluation, and was applied within an OCS (order communication system). Results: As indicated by the main menu, the present system is composed of an improved perception system for enhancing perception of LCDs, LCDs identification system, and improved efficiency in the report system. Detailed items included in the main menu are introduction and log-in screen, pop-up window for checking the outbreaks of LCDs, decision making icon, electronic signature icon, electronic report form, email system, etc. The total number of reports was greater after the application of the system (n=99) than before (n=80), and the adequacy of report time was statistically significantly higher after application of the system (P<0.05) Conclusion: The present system suggests a new method for LCDs report and infection control, and is expected to be adopted by other medical institutions in the future.

  • PDF

퍼지적분을 이용한 메시지 프로토콜 검증 (A New Approach to the Verification of a Message Protocol : Fuzzy Integral)

  • 신승중;박인규
    • 한국정보처리학회논문지
    • /
    • 제7권6호
    • /
    • pp.1903-1910
    • /
    • 2000
  • 본 논문은 TCP/IP상에서 전자서병고 공개키 분배 및 인증 등의 기능이 포함된 메시지전송 프로토콜로 구현된 프로그램의 검증문제를 퍼지적분을 이용하여 해결하였다. 기능별로 보안기술, 보안정책, 전자문서처리, 전자문서전송, 임.복호화키로 나누어 분류하여 구현된 내용을 기능별점수와 전문가의 요구사항을 구현된 크로토콜에서 산출 값과 비교하여메시지 보안프로토콜을 기능별로 점수화하여 검증하였다.

  • PDF

안전한 XML 메시징 시스템 설계 및 구현 (The Design and Implementation of Secure XML Messaging System)

  • 이영교;안경림
    • 한국컴퓨터산업학회논문지
    • /
    • 제2권9호
    • /
    • pp.1233-1238
    • /
    • 2001
  • 전자상거래가 활성화되면서 상거래 기능과 거래되는 업무가 증가함에 따라 교환되는 메시지도 다양하게 되어, 개인정보, 결제정보(계좌번호, 카드번호, 비밀번호 등), 개인정보 등, 이러한 메시지에 대한 보안이 요구된다. 그래서 본 논문에서는 인터넷 환경 하에서 안전하게 메시지를 전송하기 위해 암호와 전자서명을 적용한 안전한 XML 메시징 시스템인 Secure-XML Messaging 시스템(S-XMS)은 위해 제안하였으며, 여러 보안 서비스 중 메시지 비밀보장 서비스, 사용자 인증 서비스, 메시지 무결성 서비스, 부인불능 서비스를 선정하여 구현하였다.

  • PDF