Journal of Information Technology Applications and Management
/
v.27
no.1
/
pp.187-198
/
2020
With the development of technology and the creation of an entertainment environment for leisure, various marketing strategies are being used in the film industry. Among them, the use of the credit cookie of ending credits was very effective in producing the series. The ending credit is the time it takes to show the names of the people who made the movie, which is meaningless to the audience. There is a cost to produce a ending credit but It wasn't made because no revenue was generated. The credit cookie was inserted into this ending credit area, which brought new pleasure to the audience. Most of them were epilogue images showing the story behind the movie, NG images showing the NG situation during film production, and In videos mentioned in the movie but not shown in the movie itself. As various ideas about credit cookie were connected with marketing, a series movie and a spin-off foretelling the derivative works after the screening work were produced and have a new meaning. As a result, the time of ending credits, which had no commercial value, became the methodology of the most powerful promotional strategy. Looking at the difference between live-action film and animation in producing such credit cookie, unlike live-action films that edit the remaining parts after shooting, the NG video of the animation has a lot of time and money to produce. So, it hasn't try very well, and it seems to have been actively produced when moving from 2D animation to 3D animation. This is because 3D animation, which has already been modeled, can create new NG scenes by simply adding animating based on the layout of the created scene. Since it is possible to produce an episode movie at a low cost and time, and to use the scenes of the movie after the production, it will be necessary to strategically produce credit cookie for promotion in animation.
Journal of the Korean Society of Environmental Restoration Technology
/
v.17
no.6
/
pp.61-72
/
2014
We implemented ecological linkage assessment, through the connection components of the urban forests, rivers and parks, for the ecological connection of the urban parks which are standing out as the core of the urban green networks, so as to suggest basic data to compare, evaluate and improve urban green networks, as a basic study for the evaluation of the ecological connectabilities between the cities. For the ecological linkage assessment, we analyzed to see if the urban parks of Goyang, Ansan and Yongin, which are the subject cities, are actually ecologically connected with forests and rivers, using distance and roads, which are physical connection elements, in consideration of the mobility of the wild animals, and greening ratios and impervious pavement ratios, which are ecological connectabilities in consideration of the ecological values. The overall result of the ecological linkage assessment the physical connection elements and the ecological connection elements shows that the ecological green network ratio through direct connection states is 36.62% in Goyang, 42.55% in Ansan and 64.00% in Yongin, respectively, giving the ecological connectability ratio of less than half, with the average urban ecological green network ration of 47.72%. The comparison result of the ecological connectabilities between the object cities employing the connection elements indicates that when you set up green networks, you should consider together the physical connection elements, such as the roads, which will lower the ecological connectabilities - rather than do it simply based on areas and distances - while the ecological connection elements with the forests and the streams should be reinforced, so that the ecological connectabilities of the urban parks may be enhanced.
In the midst of a continued discourse and development concerning design education and its impact on innovation and creativity, I believe that design education still holds the key to enhancing design methodology while increasing creativity by having students take on several creative roles in an interactive and enjoyable studio course. Clearly, there exist impediments that block the creative process in our standard track in design education; however, a course entitled "The Creative Workshop" can overcome such obstacles. Through this course, a student can learn the essential skills of a designer: inventive thinking, a sense of aesthetics, and a spirit of collaboration. In addressing each of the three essential elements, this course has devised role-plays in the way of projects. Simply put, students will be required to demonstrate and, therefore, express their unique creativity that may have otherwise gone muted. Such creative expression can take form in a low stakes, open forum that heralds the invaluable attribute in design such as creative freedom. As a result, the true spirit of creativity is fostered rather than mere aesthetics and styling. Moreover, through role plays, the focus shifts its center from design, allowing each student to explore the uncharted areas of one's own creativity which may come naturally to some extend while disconcerting to others. It may prove particularly uncomfortable for Korean students whose ideas about education have been directly connected to the strict and regimented school system that stresses adherence to standardization such as the national college entrance exam. This course, therefore, is aimed stretch the scope and scale of students' creativity as they learn to collaborate on role plays, utilizing diverse skills from various disciplines.
Baeja(背子), which was excavated from the tomb of Sim, Su-ryun(沈秀崙, 1534-1589), a civil official, has a distinctive pattern. Two rectangles are connected by button knots on both shoulders and below the armpits, and surround the front and back of the upper body. Also, the back is shorter than the front, while the center-front is not opened. It also has a round neckline without a collar. Jeojuji(楮注紙), which is a traditional Korean paper made from mulberry bark, is put between the outer shell and lining of this clothing as an interlining. The purpose of this study is to perform a morphological feature analysis of the Baeja to examine its characteristics and name, and clothes with similar features, attire relic, pictorial and ceramic materials as well as precedent studies were used in the analysis. The Baeja, which was excavated from the tomb of Sim, Su-ryun, has the same pattern as Yangdang(裲檔), which was worn in the ancient northern region and China. Its composition and the way it was worn are very simple. Also, the shorter back length can be used as evidence that it was worn as everyday outer clothing, and not in a ceremony. Jeojuji, used as an interlining, made it easy to sew and maintain attire pattern and played a role of maintaining warmth. Therefore, this Baeja is presumed to be an outer clothing simply worn in the everyday life for convenience and warmth. In regards to its morphological feature, it was most likely a Yangdang in Joseon Dynasty.
Journal of the Korea Institute of Information Security & Cryptology
/
v.27
no.6
/
pp.1491-1498
/
2017
As the use of smartphones and the launch of various apps have increased rapidly, the number of malicious apps has also increased, and the damage is continuing. The Google Market where Android apps are registered is inevitably present at the same time as normal apps and malicious apps even though there are regulations for app registration. Especially, as social networks are activated, users are connected with social networks, and the ratings, downloads and awareness information are reflected in the number of downloaded apps. As a result, when users choose their apps by simply reflecting ratings, popularity, popular comments, and highly-categorized apps, malicious app downloads can sometimes cause significant harm. Therefore, this study first analyzed the tendency of malicious apps by directly crawling and analyzing long-term social information in the currently active Android market.
The effect of moistening and air-drying of acid-conditioned dentin before priming on the formation of resin-dentin hybrid zone was investigated, Freshly extracted human molars were used and divided at random into 5 groups, Groups 1 - 3 consisted of specimens conditioned with 10 % phosphoric acid for 20 seconds; Group 1 served as a control in which the conditioned dentin was simply blot-dried with a damp facial tissue; Group 2 was air dried for 30 seconds ; Group 3 was air dried for 30 seconds and immediately remoistened for 10 seconds with air-water syringe. and then the specimen was blot-dried with a damp facial tissue. Groups 4-5 were not acid conditioned ; In group 4, the smear layer on the dentin was blot dried before primer placement; Group 5 was air dried only for 30 seconds, The acetone-based primer and bonding agent of All Bond 2 (Bisco. Inc., USA) and composite resin (Z-100, 3M Dental products, USA) were applied for acid conditioned dentin and non-conditioned dentin. The morphologic ultrastructure of resin-dentin hybrid zone was examined by the use of SEM and TEM. and the existence of inorganic material and analysis of Ca/P weight-percent ratio in the resin-dentin hybrid zone were revealed by the EDAX, The results were as follows : 1. In the moistened specimens from acid-conditioned groups, the resin penetrated about 3-$4{\mu}m$ into dentin and the denatured collagen smear layer was not present at the surface. The resin tag was formed to a thickeness of 3-$4{\mu}m$ at the upper part of dentinal tubule and compactively connected to each other by means of many lateral branching. 2. In the air-dried specimens from acid-conditioned groups, the resin penetrated about 2.0-$2.5\;{\mu}m$ into dentin and an upper thin black layer to a thickness of 30-35nm was identified between adhesive resin and demineralized collagen layer. The resin tag to have a diameter of $2.5{\mu}m$ was formed at the upper part of dentinal tubule. However the funnel shape of the tag was not notable compared to the moistened specimens. 3. In the remoistened specimens from acid conditioned groups, the resin penetrated about 2.0-$2.5{\mu}m$ into dentin and an upper black layer was not present. The resin tag at the upper part of dentinal tubule was formed less than $2{\mu}m$ and was weakly connected to each other by means of few lateral branching. 4. In the non-conditioned groups, the smear layer was formed to a thickness of $0.5{\mu}m$ at dentin surface. However, the resin-dentin hybrid zone was not identified by TEM. The evidence of resin penetration into intertubular and intratubular dentin did not show. 5. All the acid-conditioned groups showed that the detected calcium and phosphorus weight percent ratios at the $2{\mu}m$ upper portion from the resin-dentin interface into the resin were much higher than that at the $2{\mu}m$ lower portion from the resin-dentin interface to dentin. (P<0.01).
Journal of the Korea Academia-Industrial cooperation Society
/
v.17
no.10
/
pp.732-742
/
2016
This study suggests methods of defense against low-level high-bandwidth DDoS attacks by adding a solution with a time limit factor (TLF) to an existing high-bandwidth DDoS defense system. Low-level DDoS attacks cause faults to the service requests of normal users by acting as a normal service connection and continuously positioning the connected session. Considering this, the proposed method makes it possible for users to show a down-related session by considering it as a low-level DDoS attack if the abnormal flow is detected after checking the amount of traffic. However, the service might be blocked when misjudging a low-level DDoS attack in the case of a communication fault resulting from a network fault, even with a normal connection status. Thus, we made it possible to reaccess the related information through a certain period of blocking instead of a drop through blacklist. In a test of the system, it was unable to block the session because it recognized sessions that are simply connected with a low-level DDoS attack as a normal communication.
This paper investigates the manner in which house prices affect macroeconomic variables through a house price channel by applying the method of Iacoviello (2005) to Korean data, and establishing a DSGE model with complementarity. This paper found that higher LTV ratio coupled with stronger complementarity results in the co-movement in both consumption and housing. For instance, the results show that when the LTV ratio and complementarity stands respectively at 50% and 0.42, an 1% rise in house prices increases consumption by 0.057%, and when the complementarity parameter increases to 0.52 with LTV remains unchanged at 50%, consumption rises by 0.047% per 1% increase in house prices. An increase in house prices leads credit constraints for borrowers to become more loose as value of a house rises as a collateral. The increase in household credit enables more consumer spending, eventually leading to increased consumption. A key link in which house prices are connected to macroeconomic variables is change in consumption. To put it simply, a rise in house prices leads to an increase in consumption, which consequently impacts the overall macro-economy. At this point, complementarity is found, in that the elasticity of intra-temporal substitution between housing and consumption is estimated at 0.42, which plays an important role in the house price channel by amplifying the effects of house prices on consumption.
Journal of the Institute of Electronics Engineers of Korea CI
/
v.47
no.4
/
pp.102-108
/
2010
The photovoltaic system changes solar energy into DC by solar cell and this DC is inverted into AC which is used in general houses by inverter. Recently, the use of power of the photovoltaic system is increased. Therefore, the study of 3 phase solar system to transmit large power is very important. This paper proposes a method that finds simply faults and diagnoses the switch open faults of 3-phase pulse width modulation (PWM) inverter of grid-connected photovoltaic system. The proposed method in $\alpha\beta$ plane uses the patterns of trajectory image as the characteristic parameters and differenciates a normal state and open states of switches. Then, the result is made into tree. The tree is composed of 21 fault patterns and the parameters to classify faults are a shape, a trajectory area, a distributed angle, and a typical vector angle. The result shows that the proposed method diagnosed fault diagnoses, classified correctly them, and made a pattern tree by fault patterns.
Recently, IoT(Internet of Things) to connect the objects and people has attracted attention. And it is rapidly developing. IoT is to develop, experts are predicting that the device is connected to the Internet to break through around 100 billion within 10 years. However, the current IoT companies are having a difficult state to the other each other IoT platform for interaction between data silos effects. These silos effects will limit the IoT grow to a larger market. Thus, the IoT service supplier shall develop an open platform for interaction IoT data between each IoT platform. These web technologies for current open IoT platform has emerged. If developers are using familiar, easy-to-learn Web technologies, developers can take advantage of a variety of services for the collected data, and found the IoT devices can be bypassed if there is a problem on the network. In this paper, we investigate the data communications technology that can be used in WoT environment to overcome these silos effects. As a result, the polling method that can simply send the IoT information the fastest.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.