• Title/Summary/Keyword: Expose

Search Result 649, Processing Time 0.023 seconds

A Study on 3D Animation Emotional Lighting Style (3D애니메이션의 감성적 라이팅 스타일 연구)

  • Cho Jung-Sung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.153-160
    • /
    • 2005
  • It is within bounds to say that the mood expressed in the Scenes of 3D Animation influences by mostly setting up of 3D CG lighting. Tn the context of CG, lighting is the process of illuminating digital scenes in an artistic and technical manner so the audience can perceive what the director intends to display on the screen with the appropriate clarity and mood. The lighting has the role of making the scenes beautiful and harmonious as an aesthetics of light and color created and controlled by people. It can be also stylized in symbolic and metaphorical methods environmental mood which we pursue to expose and story which we want to express. It thus appears that the concept of lighting style is intimately related to the particular context and art direction of animation film. But unfortunately, there are no foolproof formulas to the process of lighting a scene. In short, the lighting contributes to define the style of the scene as a conditional lighting setups' elements including position, color, intensity, shadow's area and scope. But at the same time, we must not overlook the artistic aspects that the lighting might suggest over all moods the animation genre and the style of scene like tranquility, suspense, and high-drama.

  • PDF

The Study of Vigorous Tang Dynasty′s Feminine Dress Infected by the Culture Interchange Between Itself and the Western Regions of China

  • Abe, Yoshiko
    • Proceedings of the Korea Society of Costume Conference
    • /
    • 2001.08a
    • /
    • pp.81-81
    • /
    • 2001
  • R.O.C. has experienced successively the development of previous dynasties that creates out the unique traditional culture of each stage. The Chinese nation is not a one-fold race; each dynasty absorbs the culture of the outside race. It is Tang Dynasty blends mutually however yield unusually brilliant results. The Tang Dynasty's national strength is forceful and the economy is prosperous. Above all, social custom and current of thought both break the constraint of previous dynasties' conservative thinking and keep positive and aggressive. While in the contact with extraterritorial culture, not only changes the feminine social status, but also produces unprecedented innovation and reform on the feminine dress. The Tang Dynasty's varied feminine suit is affected by the western regions of China culture, such as expose of chest, low collar, short top garment and skirt with narrow sleeves or wide sleeves, sleeve gown with plate collar or turndown collar, man's wear, and military dress, etc. An epoch can be known by Tang Dynasty feminine dress's special features, for example, the make-up of Tang-Shien-lon's Uan-Ho period presents dress style of late Tang days. However, the Chinese people compete mutually pursuing the strange costume, and accepting different cultural incitement This reveals that the changes of popular culture would result in the big transform of the Tang's dress style. This paper studies inherit of Tang Dynasty's culture and east-spread of the western regions of China culture. While understanding the Tang's favor in the western regions of China customs, all follow the western regions of China without exception, such as dance music, painting, dress, food, amusement, etc. Because of emperor's progressive race policy and forgiveness attitude to the foreign tribe that makes Tang Dynasty's feminine dress much easier to accept and blend the special features of the foreign tribe culture. While joined with west culture, and pick the dress's essence of the western regions of China, the original possessed of culture consciousness and esthetic sense improve and create their own dress, as well as enrich more inner part of dress art and the spirit.

  • PDF

A Study of the Concept of Futuristic Image in Fashion Since 2000 (2000년 이후 패션에 나타난 미래적 이미지의 개념에 관한 연구)

  • Kim, Yoon-Hee
    • Journal of the Korean Society of Costume
    • /
    • v.58 no.2
    • /
    • pp.107-119
    • /
    • 2008
  • This study aims to define the concept of the futuristic image in fashion since 2000. In this study, earlier studies of the futuristic images in the fashion are analyzed and it is discovered that the most important characteristics of the futuristic images are the cosmic space and virtual reality. An analysis of actual data of the futuristic images of the fashion since 2000 produces the following conclusions. First, since 2000 the futuristic fashion to convey the image of space tends to be minimalist, taking H or A silhouette and using white, silver, or other vivid colors. Second, since 2000 the image of virtual reality is often expressed in the fashion of futuristic image as female fighters or vampires of the future who mostly wear pants suit or skirts that expose the body line. Materials of advanced technology or shiny leather are often used and dark colors including black are dominant in these images. Third, when the space image is expressed, the androgynous youth is emphasized. However when female fighters or vampires of the future are shown, sexual image of gloomy atmosphere is often stressed. Fourth, the fashion of futuristic image since 2000 takes up the space age look of the 1960s and the techno-cyber look of the 1980s and the 1990s. However their internal meanings are lost and only external forms are repeated. In sum, the current fashion of futuristic image emulates the past look of the fashion which was circulated as futuristic images and may be considered as a result of combination of futuristic image and retrospective image.

Proactive Network Optimizer for Critical Applications (크리티컬한 응용을 위한 능동형 네트워크 최적화기)

  • Park, Bongsang;Park, Pangun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.9
    • /
    • pp.1250-1256
    • /
    • 2018
  • Recently, wireless networks are becoming an important infrastructure for the critical large-scale applications such as cyber-physical systems and next generation industrial automations. However, the fundamental performance uncertainty of wireless networks may incur the serious instability problem of the overall systems. This paper proposes the proactive network optimizer to guarantee the application demands without any real-time link monitoring information of the networks. In particularly, the proposed proactive optimizer is the cross-layer approach to jointly optimize the routing path and traffic distribution in order to guarantee the performance demand within a maximum k number of link faults. Through the simulations, the proposed proactive network optimizer provides better robustness than the traditional existing reactive networks. Furthermore, the proactive network does not expose to the major weakness of the reactive networks such as the performance degradation due to the erroneous link monitoring information and the network reconfiguration cost.

Design and Analysis of the Web Stegodata Detection Systems using the Intrusion Detection Systems (침입탐지 시스템을 이용한 웹 스테고데이터 검출 시스템 설계 및 분석)

  • Do, Kyoung-Hwa;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.39-46
    • /
    • 2004
  • It has been happening to transfer not only the general information but also the valuable information through the universal Internet. So security accidents as the expose of secret data and document increase. But we don't have stable structure for transmitting important data. Accordingly, in this paper we intend to use network based Intrusion Detection System modules and detect the extrusion of important data through the network, and propose and design the method for investigating concealment data to protect important data and investigate the secret document against the terrorism. We analyze the method for investigating concealment data, especially we use existing steganalysis techniques, so we propose and design the module emphasizing on the method for investigating stego-data in E-mail of attach files or Web-data of JPG, WAVE etc. Besides, we analyze the outcome through the experiment of the proposed stego-data detection system.

A Study on the Singularity of Mise en $sc{\acute{e}}ne$ in the Contemporary Interior Architecture (현대실내건축의 미장센적 특이성에 관한 연구)

  • An, Eun-Hee;Lee, Jung-Wook
    • Korean Institute of Interior Design Journal
    • /
    • v.17 no.5
    • /
    • pp.51-60
    • /
    • 2008
  • This thesis sets out to study the immanent mechanism of architectural space which had been classified as external space in general. The mise en $sc{\acute{e}}ne$ could consider one among various immanent tools to deal with the singularity of interior architecture. An imaginary interrelationship between cinema and architecture offers a possibility which a mise en $sc{\acute{e}}ne$ could be used with a space making equipment. The mise en $sc{\acute{e}}ne$ is a conscious equipment to lead a meta-function of simple visual-perception. The mise en $sc{\acute{e}}ne$-space has been supposed to visual-perception cases and conscious cases in interior architecture. In particular, as a result of analysis, it becomes clear that the mise en $sc{\acute{e}}ne$-space is a kind of something signifer to expose designers's an abyss of conscious and unconscious. In my opinion, this is the very way that the contemporary interior architecture is exposed to its singularity by a mechanism of mise en $sc{\acute{e}}ne$-space. In conclusion, the psychoanalysis-frame of mise en $sc{\acute{e}}ne$-space has brought out any possibility of an interpretation about architectural immanent themes like a subject, meaning creation, and construction logic, and it has also been useful to reveal the architectural singularity.

Mineral content analysis of root canal dentin using laser-induced breakdown spectroscopy

  • Eren, Selen Kucukkaya;Uzunoglu, Emel;Sezer, Banu;Yilmaz, Zeliha;Boyaci, Ismail Hakki
    • Restorative Dentistry and Endodontics
    • /
    • v.43 no.1
    • /
    • pp.11.1-11.10
    • /
    • 2018
  • Objectives: This study aimed to introduce the use of laser-induced breakdown spectroscopy (LIBS) for evaluation of the mineral content of root canal dentin, and to assess whether a correlation exists between LIBS and scanning electron microscopy/energy dispersive spectroscopy (SEM/EDS) methods by comparing the effects of irrigation solutions on the mineral content change of root canal dentin. Materials and Methods: Forty teeth with a single root canal were decoronated and longitudinally sectioned to expose the canals. The root halves were divided into 4 groups (n = 10) according to the solution applied: group NaOCl, 5.25% sodium hypochlorite (NaOCl) for 1 hour; group EDTA, 17% ethylenediaminetetraacetic acid (EDTA) for 2 minutes; group NaOCl+EDTA, 5.25% NaOCl for 1 hour and 17% EDTA for 2 minutes; a control group. Each root half belonging to the same root was evaluated for mineral content with either LIBS or SEM/EDS methods. The data were analyzed statistically. Results: In groups NaOCl and NaOCl+EDTA, the calcium (Ca)/phosphorus (P) ratio decreased while the sodium (Na) level increased compared with the other groups (p < 0.05). The magnesium (Mg) level changes were not significant among the groups. A significant positive correlation was found between the results of LIBS and SEM/EDS analyses (r = 0.84, p < 0.001). Conclusions: Treatment with NaOCl for 1 hour altered the mineral content of dentin, while EDTA application for 2 minutes had no effect on the elemental composition. The LIBS method proved to be reliable while providing data for the elemental composition of root canal dentin.

Design and Implementation of a Reprocessing Transaction Model for Mobile Computing Environments (모바일 컴퓨팅 환경을 위한 재수행 트랜잭션 모델의 설계 및 구현)

  • 김동현;홍봉희
    • Journal of KIISE:Databases
    • /
    • v.30 no.2
    • /
    • pp.184-196
    • /
    • 2003
  • Mobile transactions updating spatial objects are long transactions that can update independently local objects of mobile clients during disconnection. Validation based protocols that are well known to be appropriate for mobile transactions are required to abort a conflicted transaction in order to keep data consistent. Since abortion leads to cancel of all of tile updates, it is not desirable to use the abortion for resolving conflicts of mobile transactions. In this paper, we propose a reprocessing transaction model to resolve the update conflicts between mobile transactions without aborting them. We also design a mobile transaction server to support the reprocessing transaction and build a prototype of a mobile field system. The reprocessing transaction is a subtransaction of a newly committed mobile transaction and re-executes only conflicted objects with foreign conflicted objects. We also introduce a progressive reprocessing scheme to expose non-conflicted objects of the mobile transaction to other transactions in order to reduce starvation of reprocessing transactions.

The Usefulness of Bolus of Radiation Therapy in Patients with Whole Breast Cancer

  • Min, Jung-Whan;Son, Jin-Hyun;Park, Hoon-Hee;Dong, Kyung-Rae
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.13 no.3
    • /
    • pp.99-103
    • /
    • 2011
  • Radiation Therapy has been used in the treatment of breast cancer for over 80 years. Technically, it should include a part or all of such areas as chest wall or breast, axilla, internam mammary nodes and supraclavicular nodes. The purpose of this study is treated breast cancer patient to use 6 MV, 10 MV with bolus so that we observe changing of skin dose and evaluate those usefulness. Using woman's phantom, after CT simulate scanning, Through RTP system to make treatment plan, select three any place. And then, we measure that dose rate. After moving the phantom to linac, we put for TLD to three point same as RTP system which we put on the phantom. We exposed 6 MV, 10 MV with bolus and without so that it is measured dose by TLD device(4000 Harshaw). As a reult expose 6 MV,10 MV, it differences 10%, 15% according to bolus and withoout bolus where lateral point from RAO, LPO beam, other one is 20% where the furthest from both beams. To use bolus in the hospital is material to include closely part at skin among tissue of breast cancer. Acquired skin dose from RTP system is uncertainity. So it has to test another system likely TLD or other dosimetry system. Also exposed field of breast cancer is included inhomogeneity such as lung, bone and so on. Therefore it has to be accomplished a dose calculating of inhomogeneity part from treatment plan.

  • PDF

Pseudo type HIV-1 Particles Carrying CD4

  • Park, Seung-Won;Kim, Tai-Gyu;You, Ji-Chang;Schubert, Manfred;Paik, Soon-Young
    • The Journal of Korean Society of Virology
    • /
    • v.30 no.1
    • /
    • pp.83-99
    • /
    • 2000
  • A defective HIV-1 helper virus DNA, pHyPC, was assembled by deleting the RNA packaging signal, env, nef and the 3'LTR sequences. HIV-1 like virus particles that carry the HIV-1 receptor, CD4 were generated by co expression of pHyPC and plasmid DNAs encoding different chimeric CD4 proteins. The CD4 particles, sharing the CD4 ectodomain, precisely fused to different membrane anchors. CD4(+) particles specifically bound to HIV-1 Env expressing cells, but any signs of infection into these cells were not detected. Binding was only partially blocked by either polyclonal anti-CD4 antibodies or by high concentrations of soluble CD4. Surprisingly, CD4(+) particles also adsorbed to HeLa, CHO, NIH3T3 and COS-7 cells in the absence of HIV-1 Env expression. Adsorption was comparable in strength and speed to the highly specific CD4-Env interaction. CD4(-) particles exhibited only background levels of binding. Cell binding was CD4. dependent, but it was independent of the cell type from which the CD4(+) particles originated. Interestingly, CD4-dependent/Env-independent binding was only found when CD4 was present on virus particles. This suggests that the micro-environment of CD4 on virus particles uniquely expose this new cell binding activity. Its high affinity could explain in part why infection of Env(+) cells by CD4(+) particles was not detected. Further experiments will be required to evaluate whether this strong membrane interaction could represent one step in the multiple-step viral entry process.

  • PDF