• Title/Summary/Keyword: Black and White Pattern

Search Result 125, Processing Time 0.026 seconds

The Study of the Culture of Dyeing in Koguryo (고구려의 염색문화 연구)

  • Jang, Hyun-Joo
    • Journal of the Korean Society of Costume
    • /
    • v.56 no.3 s.102
    • /
    • pp.42-56
    • /
    • 2006
  • The purpose of this study is to review the literatures and the wall paintings of the ancient tombs of Koguryo in an effort to try to understand the characteristics of the culture of dyeing in Koguryo. The research findings follow: 1. The colors that were in vogue in Koguryo are five cardinal colors (red, blue, white, black, and yellow) and compound colors, like purple and green. Those colors were used in some or all parts of the clothing and even on some parts of the body. 2. Some clothing of Koguryo as shown in the wall paintings were made with a single and solid color by dip dyeing method. But the majority of the clothing had a variety of patterns. Among the patterns, the geometrical dot pattern took the majority. 3. The dyeing techniques used in Koguryo were printing, yarn dyeing, embroidery, wax resist dyeing, drawing and painting. The development of yarn dyeing method, weaving with silk-threads dyed in various colors, enabled to produce Geum fabrics, which were used for the upper classes' clothing. 4. The esthetic features represented in the colors of Koguryo include the beauty of contrast coloring, preference for red, preference for geometrical patterns, and the harmony of yin and yang.

A Method to Express Audio Binary Files by Color QR Codes and Its Application (오디오 바이너리 파일을 컬러 QR코드로 표현하는 방법과 그 응용)

  • Lee, Choong Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.19 no.2
    • /
    • pp.47-53
    • /
    • 2018
  • This paper proposes a method to express an MP3 audio file by a series of color QR codes which can be printed on the paper. Moreover, the method can compress the data considerably. Firstly, an MP3 file is divided into many small files which have maximum capacity of binary file of a QR code. Secondly, the multiple files are converted to multiple black-and-white QR codes. Lastly, every three QR codes are combined into color QR codes. When combining, each of three black-and-white QR codes are regarded as red, green, blue components respectively. In this method, the areas of a color QR code where two QR codes are overlapped are expressed by the colors Cyan, Magenta and Yellow. And the areas where three components are overlapped are expressed by white color. Contrarily, the areas that no components are overlapped are expressed by white color. Experimentation result shows that an MP3 file with 8.5MB the original MP3 files are compressed with the compression rate around 15.7. This method has the advantage that can be used in the environments that the internet access is impossible.

A Study on Textile Design Preferences in Outdoor Clothing According to New Senior Women's Psychological Comfort

  • Seo, Min Nyoung;Koo, Young Seok
    • Journal of Fashion Business
    • /
    • v.20 no.3
    • /
    • pp.1-16
    • /
    • 2016
  • The purpose of this study is to analyze the differences in color, pattern, and texture of functional materials of outdoor clothing according to new senior women's psychological comfort. The data were collected from 163 female respondents aged 55-64 living in Busan. The results of the study are as follows. First, both the high and low psychological comfort groups preferred soft material the most. The high psychological comfort group particularly preferred soft textures and highly evaluated textured material in general. Second, both groups mostly preferred plain patterns while the high psychological comfort group preferred the dot pattern more. Third, in terms of colors, the high psychological comfort group preferred navy and purple, while the low psychological comfort group preferred brown. As to achromatic colors, both groups preferred black the most with the high psychological comfort group preferred gray and white more than the other group. Fourth, the high psychological comfort group preferred colors and patterns of clothing that made one look the most slimming, while the low psychological comfort group strongly preferred colors and patterns of clothes. Therefore, our results suggest that new senior women have a strong interest in outdoor clothing, not only in terms of textile functions, but also having interest in textile designs. In particular, the new silver women value psychological comfort in colors more than patterns of textile design.

Research of Fashion Trend through Analysis on Cue II (단서분석(端緖分析)을 통(通)한 패션트렌드 연구(硏究) II)

  • Lee, Young-Jae
    • Journal of Fashion Business
    • /
    • v.6 no.2
    • /
    • pp.67-76
    • /
    • 2002
  • This research examines the characteristic trends through analysis on cue in the contemporary fashion distinctly and systematically. It is carried out by both qualitative analysis and quantitative analysis. In the qualitative analysis, the four important street fashions of neo-mods/jazz, neo-hippie/grunge, sportivecasual and technos/cyber-punk are grouped. In the quantitative analysis, statistical data are sampled from Collection II of the 1990s S/S. It takes frequency, percentage, $\chi^2$-test and etc. by using the comprehensive tools for statistical treatment. There were significant differences between the S/S fashion. According to the cues, there are also significant differences between the fashion in the 1990s. In 'Neo-Mos/Jazz' style shows highly androgynous look, deep and strong tone, green/blue colors, natural fabric, stripe pattern, long hair style, and hided make-up. 'Neo-hippie/gnenge' style shows highly folklore look, vivid tone purple colors, seethrough/knit fabric, natural /traditional pattern, decorative hair special makeup. 'Sportive casuals' style shows highly sportive look, greish tone, white/grey colours, natural fabric, solid patten, bobbed hair, and natural make-up. 'Techno/cyber punk style shows highly comocorps look, pale tone black colors avangard fabric, solid patten, punk/dyed hair special make-up.

Design characteristics of Chinese traditional clothing of the Ming-Qing Dynasty era in contemporary women's fashion (현대 여성복에 나타난 중국 명·청 시대 전통복식의 디자인 특성)

  • Zhu, Jiayi;Ha, Seung Yeon
    • The Research Journal of the Costume Culture
    • /
    • v.23 no.6
    • /
    • pp.955-971
    • /
    • 2015
  • The purpose of this study is to consider the design characteristics of Chinese traditional clothing, especially from the Ming-Qing Dynasty era, and how they have influenced contemporary fashion. Regarding research methods, this study determined the design characteristics, such as the form, color and pattern of Chinese traditional clothing of the Ming-Qing Dynasty era. In addition, 440 photos were collected from the Paris Collection from 2005 to 2014 using www.firstviewkorea.com. The results of this study are as follows. First, the most popular silhouette from Chinese traditional clothing appearing in contemporary fashion was the H-shaped one, and the internal lines appeared in the following order: Chinese collar; narrow sleeve; symmetrical front opening; round collar; wide sleeve; and the C-shaped Biwa front-end. Second, the most popular color was achromatic black, followed by white. The chromatic colors were in the order of blue, yellow, red, green, and purple. Third, the patterns appeared in the following order: Plant patterns, complex patterns, and animal patterns. The peony pattern appeared the most commonly as a plant pattern, followed by the arabesque pattern and the plum blossom pattern which appeared with a similar proportion. Dragon, bird and phoenix patterns appeared the most for animal patterns. It is considered that the results of this study will be helpful for designing products for Korean fashion brands that will advance to the Chinese market. In addition, it will help Chinese designers apply the Chinese-style design characteristics popular among people throughout the world when they advance to the West.

Identification of Japanese Black Cattle by the Faces for Precision Livestock Farming (흑소의 얼굴을 이용한 개체인식)

  • 김현태;지전선랑;서률귀구;이인복
    • Journal of Biosystems Engineering
    • /
    • v.29 no.4
    • /
    • pp.341-346
    • /
    • 2004
  • Recent livestock people concern not only increase of production, but also superior quality of animal-breeding environment. So far, the optimization of the breeding and air environment has been focused on the production increase. In the very near future, the optimization will be emphasized on the environment for the animal welfare and health. Especially, cattle farming demands the precision livestock farming and special attention has to be given to the management of feeding, animal health and fertility. The management of individual animal is the first step for precision livestock farming and animal welfare, and recognizing each individual is important for that. Though electronic identification of a cattle such as RFID(Radio Frequency Identification) has many advantages, RFID implementations practically involve several problems such as the reading speed and distance. In that sense, computer vision might be more effective than RFID for the identification of an individual animal. The researches on the identification of cattle via image processing were mostly performed with the cows having black-white patterns of the Holstein. But, the native Korean and Japanese cattle do not have any definite pattern on the body. The purpose of this research is to identify the Japanese black cattle that does not have a body pattern using computer vision technology and neural network algorithm. Twelve heads of Japanese black cattle have been tested to verify the proposed scheme. The values of input parameters were specified and then computed using the face images of cattle. The images of cattle faces were trained using associate neural network algorithm, and the algorithm was verified by the face images that were transformed using brightness, distortion, and noise factors. As a result, there was difference due to transform ratio of the brightness, distortion, and noise. And, the proposed algorithm could identify 100% in the range from -3 to +3 degrees of the brightness, from -2 to +4 degrees of the distortion, and from 0% to 60% of the noise transformed images. It is concluded that our system can not be applied in real time recognition of the moving cows, but can be used for the cattle being at a standstill.

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

A Study of Security for a Spam Attack of VoIP Vulnerability (VoIP 취약점에 대한 스팸 공격과 보안에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.215-224
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among Vulnerability of VoIP at these papers study. Write scenario of a spam attack regarding VoIP Vulnerability, and execute Call spam. Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove. and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN. and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

The Study on Dynamic Images Processing for Finger Languages (지화 인식을 위한 동영상 처리에 관한 연구)

  • Kang, Min-Ji;Choi, Eun-Sook;Sohn, Young-Sun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.2
    • /
    • pp.184-189
    • /
    • 2004
  • In this paper, we realized a system that receives the dynamic images of finger languages, which is the method of intention transmission of the hearing disabled person, using the white and black CCD camera, and that recognizes the images and converts them to the editable text document. We use the afterimage to draw a sharp line between indistinct images and clear images from a series of inputted images, and get the character alphabet from the away of continuous images and output the accomplished character to the word editor by applying the automata theory. After the system removes the varied wrist part from the data of clean image, it gets the controid point of hand by the maximum circular movement method and recognizes the hand that is necessary to analyze the finger languages by applying the circular pattern vector algorithm. The system abstracts the characteristic vectors of the hand using the distance spectrum from the center of the hand and it compares the characteristic vector of inputted pattern from the standard pattern by applying the fuzzy inference and recognizes the movement of finger languages.

Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis (WhiteList 기반의 악성코드 행위분석을 통한 악성코드 은닉 웹사이트 탐지 방안 연구)

  • Ha, Jung-Woo;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.61-75
    • /
    • 2011
  • Recently, there is significant increasing of massive attacks, which try to infect PCs that visit websites containing pre-implanted malicious code. When visiting the websites, these hidden malicious codes can gain monetary profit or can send various cyber attacks such as BOTNET for DDoS attacks, personal information theft and, etc. Also, this kind of malicious activities is continuously increasing, and their evasion techniques become professional and intellectual. So far, the current signature-based detection to detect websites, which contain malicious codes has a limitation to prevent internet users from being exposed to malicious codes. Since, it is impossible to detect with only blacklist when an attacker changes the string in the malicious codes proactively. In this paper, we propose a novel approach that can detect unknown malicious code, which is not well detected by a signature-based detection. Our method can detect new malicious codes even though the codes' signatures are not in the pattern database of Anti-Virus program. Moreover, our method can overcome various obfuscation techniques such as the frequent change of the included redirection URL in the malicious codes. Finally, we confirm that our proposed system shows better detection performance rather than MC-Finder, which adopts pattern matching, Google's crawling based malware site detection, and McAfee.