• Title/Summary/Keyword: Internet Search

Search Result 1,634, Processing Time 0.024 seconds

3D Special Makeup Mask Program Development and Utilization (Ver. 2) (3D 특수 분장 마스크 시뮬레이션 프로그램 개발과 활용 (제2보))

  • Barng, Kee-Jung;Kim, Jin-Seo
    • Journal of Fashion Business
    • /
    • v.19 no.5
    • /
    • pp.63-76
    • /
    • 2015
  • The purpose of this study was to design a training program for utilization of 3D special makeup mask program. This study was conducted with a 3D computer graphics software program, for special makeup mask using a variety of creative educational models and case study with comparative analysis. The makeup program applied to the majors and liberal arts classes for program design. Inthis study, the selected major courses included ' stage make up ', make up application', and illustrations and color '. Students were required to take a class targeted to questionnaire completion and analysis. The research method included literature search, and Internet navigation, of experimental research. The research targeted select college students attending a 4-year university located in Dae-jeon, Korea. ETRI's "3D mask special makeup simulation program" was used in support. A survey of the study conducted from September 1, 2013, to August 30, 2014, showed a total of 94 additional statistical analyses. First, grade 3 44.6% was attained by 91.7% of the first year student majoring in liberal arts classes, Second, students' in the 3D special dress up mask program Interestingly, attained high recognition in its mastering, usability, and creativity. Furthermore, the major student satisfaction was higher for the '3D special makeup mask program. Third, students '3D special dress up was one of the biggest advantages of the program', the mask ' that models 3D ' faces. In addition, the student's delicate dress called for critical technology skills. It is thought to be suitable for practical training and improving the efficiency and performance if applied to universities and beauty schools, such as the regular high school curriculum through research.

A Study on the Privacy Policy of Behavioral Advertising (행태 광고의 개인정보 조치사항에 관한 연구)

  • Kong, Hee-Kyung;Jun, Hyo-Jung;Yoon, Seokung
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.231-240
    • /
    • 2018
  • Recently, personal information processing are becoming more important in the behavioral advertising based on online and mobile platform. The behavioral advertising analyzes and utilizes individual's search & purchase history, hobbies, and tendency based on the personal behavior information collected using the automatic collection device. Therefore, it collects and stores other types of personal information which did't defined in Privacy Act and can analyze personal behavior. This characteristics may cause disclosure of personal information and exposure to intrusion. In this paper, we investigate and analyze the privacy policy of the advertising agencies, and discussded the measures to be taken in collecting, storing and using personal information suitable for behavior information.

An Efficient Neighbor Discovery Method for Cooperative Video Surveillance Services in Internet of Vehicles (차량 인터넷에서 협업 비디오 감시 서비스를 위한 효율적인 이웃 발견 방법)

  • Park, Taekeun;Lee, Suk-Kyoon
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.97-109
    • /
    • 2016
  • The rapid deployment of millions of mobile sensors and smart devices has resulted in high demand for opportunistic encounter-based networking. For the cooperative video surveillance of dashboard cameras in nearby vehicles, a fast and energy-efficient asynchronous neighbor discovery protocol is indispensable because a dashboard camera is an energy-hungry device after the vehicle's engine has turned off. In the existing asynchronous neighbor discovery protocols, all nodes always try to discover all neighbors. However, a dashboard camera needs to discover nearby dashboard cameras when an event is detected. In this paper, we propose a fast and energy-efficient asynchronous neighbor discovery protocol, which enables nodes : 1) to have different roles in neighbor discovery, 2) to discover neighbors within a search range, and 3) to report promptly the exact discovery result. The proposed protocol has two modes: periodic wake-up mode and active discovery mode. A node begins with the periodic wake-up mode to be discovered by other nodes, switches to the active discovery mode on receiving a neighbor discovery request, and returns to the periodic wake-up mode when the active discovery mode finishes. In the periodic wake-up mode, a node wakes up at multiples of number ${\alpha}$, where ${\alpha}$ is determined by the node's remaining battery power. In the active discovery mode, a node wakes up for consecutive ${\gamma}$ slots. Then, the node operating in the active discovery mode can discover all neighbors waking up at multiples of ${\beta}$ for ${\beta}{\leq}{\gamma}$ within ${\gamma}$ time slots. Since the proposed protocol assigns one half of the duty cycle to each mode, it consumes equal to or less energy than the existing protocols. A performance comparison shows that the proposed protocol outperforms the existing protocols in terms of discovery latency and energy consumption, where the frequency of neighbor discovery requests by car accidents is not constantly high.

An XML Access Control Method through Filtering XPath Expressions (XPath 표현식의 필터링을 통한 XML 접근 제어 기법)

  • Jeon Jae-myeong;Chung Yon Dohn;Kim Myoung Ho;Lee Yoon Joon
    • Journal of KIISE:Databases
    • /
    • v.32 no.2
    • /
    • pp.193-203
    • /
    • 2005
  • XML (extensible Markup Language) is recognized as a standard of data representation and transmission on Internet. XPath is a standard for specifying parts of XML documents anda suitable language for both query processing and access control of XML. In this paper, we use the XPath expression for representing user queries and access control for XML. And we propose an access control method for XML, where we control accesses to XML documents by filtering query XPath expressions through access control XPath expressions. In the proposed method, we directly search XACT (XML Access Control Tree) for a query XPath expression and extract the access-granted parts. The XACT is our proposedstructure, where the edges are structural summary of XML elements and the nodes contain access-control information. We show the query XPath expressions are successfully filtered through the XACT by our proposed method, and also show the performance improvement by comparing the proposed method with the previous work.

The Effect on Science-Related Attitudes of High School Students for Newspaper in Education(NIE) (NIE 수업이 고등학생들의 과학과 관련된 태도에 미치는 영향)

  • Joo, Min-Sun;Youn, Seok-Tai;Koh, Yeong-Koo;Kim, Jong-Hee;Oh, Kang-Ho
    • Journal of the Korean Society of Earth Science Education
    • /
    • v.9 no.1
    • /
    • pp.27-38
    • /
    • 2016
  • Through the systematic analysis on articles about the environment in newspapers, the news reports were considered as effective materials, so after being reconstructed, they were used as learning materials in a lesson on environment contamination which is newly introduced in Earth Science I from the 2009 curriculum revision. To examine students' attitude toward science, before and after NIE application to the students, Test of Science Related Attitudes(TOSRA) as a test tool was carried out which was composed of 7 categories - four optional questionnaires for each category, 28 in total were used. The result was as follows: in a pretest, based upon the average scores by factors the factors ranked from the highest to the lowest as follows: the social meaning of science, the acceptance of the scientific attitude, the commonness of a scientist, the attitude to scientific exploration, the pleasure in science class, the vocational interest in science, the concern over science as a hobby, and in posttest, their ranking as follows: the acceptance of the scientific attitude, the pleasure in science class, the commonness of a scientist, the social meaning of science, the attitude to scientific exploration, the vocational interest in science, the concern over science as a hobby. Also they were all statistically significant at a significant level p<0.05. However, the test revealed that there were some negative effects on the social meaning of science and the attitude to scientific exploration and therefore it is judged that in order to overcome those influences, some bright articles about solving the environment contamination should be applied to the lessons and be complemented effectively by experiments and various media: NIE as well as science magazines, data from Internet search and treatises on science.

A Study on the Symbolic Features and Wearing Types of Pearl Necklaces (진주목걸이의 상징적 특성과 착용유형에 대한 연구)

  • Cho, Jungmee
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.37 no.8
    • /
    • pp.1029-1043
    • /
    • 2013
  • The pearl is a highly valuable gem that has historically represented wealth and power. Pearl necklaces have developed intro various types and represent an essential status item for modern women. This study first examines the symbolic and various meanings of pearls. Second, this study examines wearing types and pearl necklace patterns based on historical figures and modern fashion icons famous for personal displays of pearls. This study examines and analyzes various specialty publications about jewels, history of costumes, fashion magazines, academic research data, and internet search results. The conclusion of this study is as follows. Pearls have various symbolic meanings that are unlike other gems. Pearls represent purity, innocence, marital fidelity, an intimate relationship with the moon, frozen tears of God, solitude, triumph over adversity, wisdom, and sensual attraction. The societies and people traditionally famous for pearls were the Roman Empire, Queen Cleopatra of Egypt, Queen Theodora of the Byzantine Empire, Queen Elizabeth I, Queen Marie Antoinette, Empress of Eugenie Napoleon III, and Queen Alexandra. They showed a special affection for pearl necklaces and various wearing patterns unique to the time. Their pearl necklaces became a historic and symbolic legacy. Reestablished through the costume jewelry of cultivated pearls designed by Coco Chanel in the $20^{th}$ century, the pearl necklace has showed a variety of fashion trends in addition to a traditional symbolism of wealth and power. Josephine Baker, Louise Brooks, Marilyn Monroe, Elizabeth Taylor, Jacqueline Kennedy, Queen Elizabeth II, Princess Diana, Michelle Obama and Sarah Jessica Parker have worn notable pearl necklaces and established an individual style that utilizes the adornment of fashionable and stylish pearl necklaces. They have worn pearl necklaces while applying various fashion trend motifs to symbolic pearl features of that have changed the perception of the pearl and themselves.

Design of DRM System in P2P Network Environment (P2P네트워크 환경을 위한 DRM 시스템 설계)

  • Lee Jeong-Gi;Kim Kuk-Se;Lee Gwang;Ahn Seong-Soo;Lee Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.829-832
    • /
    • 2006
  • The word P2P implies significant changes in current business dynamics. The P2P service enables individuals to be connected to the Internet for the direct provision of information and even downloads from one another without the conventional method of passing through search engines. This can be utilized to extend the path of retrieving information from limited web sites to personal and enterprise databases. That is, it is now possible for individuals to manage their own information on a national or global scope, share various information with other members, form communities of users interested in sharing homogeneous information, and utilize remote conference and remote education using groupware.

  • PDF

Design and Implementation of A Medical Prescription Documents Based on XML (XML 기반의 의료정보시스템의 표준 처방전 설계 및 구현)

  • Seong Kyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.1055-1059
    • /
    • 2006
  • With the recent drastic development of Internet technology, electronic prescription and prescription EDI system is used for the hospital and doctor's office and the medical business area is rapidly developed and considered as the one making a very great profit. The system to reduce inconvenience caused by the result of separation of medicine activity from drug one such as receiving prescription from hospital, providing it and waiting long at drug store is studied and the service quality for patient is improved by processing prescription per patient into database. In this thesis, the first achievement is that the standard format of prescription is designed, the second one is that the standard format of prescription is developed based on XML for user to issue prescription without setting up the separate environment and considering type of operating system and the last one is the database search result based on XML is implemented to help user to manage interface and maintenance easily.

  • PDF

Big data-based information recommendation system (빅데이터 기반 정보 추천 시스템)

  • Lee, Jong-Chan;Lee, Moon-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.443-450
    • /
    • 2018
  • Due to the improvement of quality of life, health care is a main concern of modern people, and the demand for healthcare system is increasing naturally. However, it is difficult to provide customized wellness information suitable for a specific user because there are various medical information on the Internet and it is difficult to estimate the reliability of the information. In this study, we propose a user - centered service that can provide customized service suitable for users rather than simple search function by classifying big data as text mining and providing personalized medical information. We built a big data system and measured the data processing time while increasing the Hadoop slave node for efficient big data analysis. It is confirmed that it is efficient to build big data system than existing system.

An Efficient Algorithm for Mining Interactive Communication Sequence Patterns (대화형 통신 순서열 패턴의 마이닝을 위한 효율적인 알고리즘)

  • Haam, Deok-Min;Song, Ji-Hwan;Kim, Myoung-Ho
    • Journal of KIISE:Databases
    • /
    • v.36 no.3
    • /
    • pp.169-179
    • /
    • 2009
  • Communication log data consist of communication events such as sending and receiving e-mail or instance message and visiting web sites, etc. Many countries including USA and EU enforce the retention of these data on the communication service providers for the purpose of investigating or detecting criminals through the Internet. Because size of the retained data is very large, the efficient method for extracting valuable information from the data is needed for Law Enforcement Authorities to use the retained data. This paper defines the Interactive Communication Sequence Patterns(ICSPs) that is the important information when each communication event in communication log data consists of sender, receiver, and timestamp of this event. We also define a Mining(FDICSP) problem to discover such patterns and propose a method called Fast Discovering Interactive Communication Sequence Pattern(FDICSP) to solve this problem. FDICSP focuses on the characteristics of ICS to reduce the search space when it finds longer sequences by using shorter sequences. Thus, FDICSP can find Interactive Communication Sequence Patterns efficiently.