• Title/Summary/Keyword: 문자 분류

Search Result 351, Processing Time 0.024 seconds

Concept and Expression Method of 'Fun' Presented in Fashion Design (패션디자인에서'재미'의 개념과 표현방식)

  • Jang, Nam-Kyung
    • Archives of design research
    • /
    • v.18 no.4 s.62
    • /
    • pp.225-236
    • /
    • 2005
  • As a fresh trial using humorous items to escape from economic recession and uncertain state of mind regarding politics and society, fun is emerging as a keyword in design area. This study classified various use of fun reflected in modern fashion design according to the theme, and analyzed the mod of expression to identify formative characteristics. Through these processes, this study built conceptual structure of fun in fashion design. 412 fashion designs which represent fun were collected from 2001 $S/S{\sim}2005$ F/W collections. Data were analyzed and categorized. Results showed that the theme of fun in the modern fashion design could be classified into humor, kidult, irony, satire/parody, storytelling, and play. The design elements mainly used were color silhouette, letter, object, and drawing, while the design principles were distortion/exaggeration, incongruity, and repetition. In addition, these expressions were related to the traditional humor theory: incongruity-resolution, superior, and relief theories. The fun in modern fashion design has such value as affirmation, warmness, entertainment, youth, contradiction, surprise, deviate, allusion, attack, and description, Finally, in regard to the subject, the fun provides active experience like play as well as passive acceptance.

  • PDF

Algorithm of Decoding the Base 256 mode in Two-Dimensional Data Matrix Barcode (이차원 Data Matrix 바코드에서 Base 256 모드의 디코딩 알고리즘)

  • Han, Hee June;Lee, Hyo Chang;Lee, Jong Yun
    • Journal of the Korea Convergence Society
    • /
    • v.4 no.3
    • /
    • pp.27-33
    • /
    • 2013
  • Conventional bar code has the appearance of line bars and spaces, called as one-dimensional bar code. In contrast, the information in two-dimensional bar code is represented by either a small, rectangular or square with the types of mosaic and Braille. The two-dimensional bar code is much more efficient than one-dimensional bar code because it can allow to store and express large amounts of data in a small space and so far there is also a little information about decoding the Data Matrix in base 256 mode. According to the ISO international standards, there are four kinds of bar code: QR code, Data Matrix, PDF417, and Maxi code. In this paper, among them, we focus on describing the basic concepts of Data Matrix in base 256 mode, how to encode and decode them, and how to organize them in detail. In addition, Data Matrix can be organized efficiently depending on the modes of numeric, alphanumeric characters, and binary system and expecially, we focus on describing how to decode the Data Matrix code by four modes.

A Study of Formativeness in the Western Symbolic Icons of Evil (서양 악의 상징물에 나타난 조형성 연구)

  • Lee, Young hwa
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.127-135
    • /
    • 2018
  • Men are ambivalent since they have good and evil at the same time. To concretize this evil further, men created symbolic icons of evil with formative elements by giving shape to it. Thus, this researcher would investigate and analyze the concept of evil and the formativeness appearing when the essence of humans' evil is expressed as symbolic icons. For this purpose, items for the classification of formativeness were constructed, and questionnaires were prepared to draw the results of an analysis as follows. As for the type of composition, symbolic icons of evil were expressed by pictures or signs, rather than letters. The objects of expression were characters and animals in myths. As for the layout, most were expressed in a radial shape. As for the method of description, most were in the forms of simplicity and complexity, and as for the outer form, most were circles. It was noted that the symbolic icons in which items with these types of composition had high scores, were drawn, used and developed in formative relations with each other.

Extraction of Text Regions from Spam-Mail Images Using Color Layers (색상레이어를 이용한 스팸메일 영상에서의 텍스트 영역 추출)

  • Kim Ji-Soo;Kim Soo-Hyung;Han Seung-Wan;Nam Taek-Yong;Son Hwa-Jeong;Oh Sung-Ryul
    • The KIPS Transactions:PartB
    • /
    • v.13B no.4 s.107
    • /
    • pp.409-416
    • /
    • 2006
  • In this paper, we propose an algorithm for extracting text regions from spam-mail images using color layer. The CLTE(color layer-based text extraction) divides the input image into eight planes as color layers. It extracts connected components on the eight images, and then classifies them into text regions and non-text regions based on the component sizes. We also propose an algorithm for recovering damaged text strokes from the extracted text image. In the binary image, there are two types of damaged strokes: (1) middle strokes such as 'ㅣ' or 'ㅡ' are deleted, and (2) the first and/or last strokes such as 'ㅇ' or 'ㅁ' are filled with black pixels. An experiment with 200 spam-mail images shows that the proposed approach is more accurate than conventional methods by over 10%.

High-Speed Search Mechanism based on B-Tree Index Vector for Huge Web Log Mining and Web Attack Detection (대용량 웹 로그 마이닝 및 공격탐지를 위한 B-트리 인덱스 벡터 기반 고속 검색 기법)

  • Lee, Hyung-Woo;Kim, Tae-Su
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.11
    • /
    • pp.1601-1614
    • /
    • 2008
  • The number of web service users has been increased rapidly as existing services are changed into the web-based internet applications. Therefore, it is necessary for us to use web log pre-processing technique to detect attacks on diverse web service transactions and it is also possible to extract web mining information. However, existing mechanisms did not provide efficient pre-processing procedures for a huge volume of web log data. In this paper, we proposed both a field based parsing and a high-speed log indexing mechanism based on the suggested B-tree Index Vector structure for performance enhancement. In experiments, the proposed mechanism provides an efficient web log pre-processing and search functions with a session classification. Therefore it is useful to enhance web attack detection function.

  • PDF

A Method for Spam Message Filtering Based on Lifelong Machine Learning (Lifelong Machine Learning 기반 스팸 메시지 필터링 방법)

  • Ahn, Yeon-Sun;Jeong, Ok-Ran
    • Journal of IKEEE
    • /
    • v.23 no.4
    • /
    • pp.1393-1399
    • /
    • 2019
  • With the rapid growth of the Internet, millions of indiscriminate advertising SMS are sent every day because of the convenience of sending and receiving data. Although we still use methods to block spam words manually, we have been actively researching how to filter spam in a various ways as machine learning emerged. However, spam words and patterns are constantly changing to avoid being filtered, so existing machine learning mechanisms cannot detect or adapt to new words and patterns. Recently, the concept of Lifelong Learning emerged to overcome these limitations, using existing knowledge to keep learning new knowledge continuously. In this paper, we propose a method of spam filtering system using ensemble techniques of naive bayesian which is most commonly used in document classification and LLML(Lifelong Machine Learning). We validate the performance of lifelong learning by applying the model ELLA and the Naive Bayes most commonly used in existing spam filters.

Development of a Smart Application for Protecting Dementia Patients (치매환자의 보호를 위한 스마트 앱 개발)

  • Hwang, Hyun Suk;Ko, Yun Seong;Ban, Ga Un;Kim, Chang Soo
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.9
    • /
    • pp.1089-1097
    • /
    • 2013
  • The applications for considering their position and daily patterns of dementia patients have been developed in an early stage even if the older patients who have weaker or serious symptoms has increased in various forms. In this paper, we develop an android-based application which displays positions and pathways of patients on maps and provide messages in the cases of dangerous situations. Guardians need to register schedules including safe areas and personal information of their patients. This system registers behavior status categorized as normal or abnormal each position which is sent to a database. In particular, the deviation status is assigned in case the patients are not within the safe areas that their guardians registered on their schedule. The wandering status is assigned in case the patients are repeatedly passed by their pathways. This smart application contains the modules such as patient position sending, guardian and patient information, patient schedule and safe zone registration, position and behavior status registration, pathway display and message sending, and rescue request. This system sends the notification and alarm service providing normal and abnormal behavior with deviation and wandering status of patients respectively.

A Performance Comparison of On-Demand Routing Protocols for Application Services in MANET (MANET에서 응용 서비스 데이터 유형에 따른 요구기반 라우팅 프로토콜의 성능비교)

  • Jang Jun-Young;Lee Kil-Sup;Lee Sung Jong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.871-878
    • /
    • 2004
  • Recenty, there has been great interest in MANET from various areas. In this paper we focus on performance analysis of on demand routing protocols surf as DSR, AODV, and TORA in MANET. We have conducted several simulations concerned with application service data such as sensor, text. voice, and video data. And then, we have evaluated the performance of three protocols in a pre-designed ad hoc network, which is consisted of 20 nodes. As a result, we have obtained quantitative data for packet delivery fraction, average end to-end delay, routing load, channel utilization from upper layer and supportable routing protocol for application service data. The results can be used for designing specific-purposed ad-hoc networks.

Patient Classification Scheme for Patient Information Management in Hospital U-Healthcare System (병원 의료시설 내 U-Healthcare 환경에서 환자 정보 관리를 위한 환자 세분화 기법)

  • Lee, Ki-Jeong;Park, Sung-Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.131-137
    • /
    • 2010
  • UMSN (Ubiquitous Medical Sensor Network) is being used in u-Healthcare system of various medical facilities to identify objects and get information from sensors in real-time. RFID using radio frequency determines objects using Reader, which reads Tags attached to patients. However, there is a security vulnerability wherein Tag send its ID to illegal Reader because Tags always response to Readers request regarding of its Tag ID. In this paper, we propose Tag ID Classification Scheme to reduce Back-end Server traffic that caused by requests to authenticate between Readers and Tags that are attached to medical devices, patients, and sensors; To reduce security threats like eavesdropping and spoofing that sometimes occurred during authentication procedure. The proposed scheme specifies the patient category as a group based on patients Tag ID string. Only allowed Reader can perform authentication procedure with Back-end Server. As a result, we can reduce Back-end Server traffic and security threats.

Research on Effects of Three Different Designs and Implementations on Cyber Education (정보활용기술 발전에 따른 효과적 사이버 교육을 위한 설계 및 구현의 차이에 대한 연구)

  • Ha, Tai-Hyun;Kang, Jung-Hwa
    • The Journal of Korean Association of Computer Education
    • /
    • v.6 no.4
    • /
    • pp.71-83
    • /
    • 2003
  • This study is aimed to develop and evaluate different approaches for cyber education. The project involved the development of sample cyber education programs using different design approaches, with built-in evaluation mechanisms. The different design approaches depend on what delivery technologies are involved. In the First Generation, the delivery technologies use text, flash and animation, whereas the synchronized content to video and audio are used in the Second and the Third Generations but the difference is the delivery method used by the videoclip. Tests were carried out through self-assessment to measure and analyze the efficient teaching. The results show that the Third generation technologies were the most effective method for cyber education. However, since the Third generation program is developed in multimedia, it tends 10 require higher development costs, and more advanced hardware and software as well as a higher bandwidth for network. Therefore, the research indicates that the development of technical supports, like loading speed, has to be solved simultaneously with the development of multimedia products for effective cyber education.

  • PDF