• Title/Summary/Keyword: Message-In-Message

Search Result 4,408, Processing Time 0.038 seconds

A Study on the Role of Comic Strips through Analysis on the Social Phenomenon of "How are you, really?" as a Material for Satirical Cartoon (만평의 소재로써 "안녕들 하십니까?"의 사회현상 분석을 통한 만화의 역할 연구)

  • Park, Kyeong-Cheol
    • Cartoon and Animation Studies
    • /
    • s.34
    • /
    • pp.167-195
    • /
    • 2014
  • A handwritten poster named "How are you, really?" appeared on December 10, 2013. And other handwritten posters sympathizing with it followed in places and are on everyone's lips hotly through internet and SNS. Such a social phenomenon is delivered to readers as a form of article in different meanings according to the viewpoint of each press. It is also delivered to readers as a material for delivering a meaning of a specific case in four panel comics strips and satirical cartoon of newspaper. This is because that comic strips of the press are now having a power to enlighten readers on the key point of a case easily and intuitively together with catharsis from the position of meditating the world. Notwithstanding differences depending on the viewpoints of the press or cartoonist, four panel comics strips and satirical cartoon on the newspaper are fulfilling their social role having their own voice. Of the genres of comic strips, social role of the comics of the press can be divided largely into two things. First, they actively intervene in social phenomena. In other words, comics of the press make their position and insistence on social phenomena clearly by exaggeration and emphasis. Second, they persuade or enlighten readers by concrete directions, which means that comics of the press make reader with similar viewpoint emphasize by delivering a clear message. This study aims to assert that comic strips are the most important medium with social role and responsibility. As part of studies on the social role of comics, this study wish that comic strips can be able to deviate from vicious circle of being socially condemned for reason of negative portion.

Cluster-based P2P scheme considering node mobility in MANET (MANET에서 장치의 이동성을 고려한 클러스터 기반 P2P 알고리즘)

  • Wu, Hyuk;Lee, Dong-Jun
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1015-1024
    • /
    • 2011
  • Mobile P2P protocols in ad-hoc networks have gained large attention recently. Although there has been much research on P2P algorithms for wired networks, existing P2P protocols are not suitable for mobile ad-hoc networks because they do not consider mobility of peers. This study proposes a new cluster-based P2P protocol for ad hoc networks which utilizes peer mobility. In typical cluster-based P2P algorithms, each cluster has a super peer and other peers of the cluster register their file list to the super peer. High mobility peers would cause a lot of file list registration traffic because they hand-off between clusters frequently. In the proposed scheme, while peers with low mobility behave in the same way as the peers of the typical cluster-based P2P schemes, peers with high mobility behave differently. They inform their entrance to the cluster region to the super peer but they do not register their file list to the super peer. When a peer wishes to find a file, it first searches the registered file list of the super peer and if fails, query message is broadcasted. We perform mathematical modeling, analysis and optimization of the proposed scheme regarding P2P traffic and associated routing traffic. Numerical results show that the proposed scheme performs much better than or similar to the typical cluster-based P2P scheme and flooding based Gnutella.

Complexity Metrics for Analysis Classes in the Unified Software Development Process (Unified Process의 분석 클래스에 대한 복잡도 척도)

  • 김유경;박재년
    • The KIPS Transactions:PartD
    • /
    • v.8D no.1
    • /
    • pp.71-80
    • /
    • 2001
  • Object-Oriented (OO) methodology to use the concept like encapsulation, inheritance, polymorphism, and message passing demands metrics that are different from structured methodology. There are many studies for OO software metrics such as program complexity or design metrics. But the metrics for the analysis class need to decrease the complexity in the analysis phase so that greatly reduce the effort and the cost of system development. In this paper, we propose new metrics to measure the complexity of analysis classes which draw out in the analysis phase based on Unified Process. By the collaboration complexity, is denoted by CC, we mean the maximum number of the collaborations can be achieved with each of the collaborator and detennine the potential complexity. And the interface complexity, is denoted by IC, shows the difficulty related to understand the interface of collaborators each other. We prove mathematically that the suggested metrics satisfy OO characteristics such as class size and inheritance. And we verify it theoretically for Weyuker' s nine properties. Moreover, we show the computation results for analysis classes of the system which automatically respond to questions of the it's user using the text mining technique. As we compared CC and IC to CBO and WMC, the complexity can be represented by CC and IC more than CBO and WMC. We expect to develop the cost-effective OO software by reviewing the complexity of analysis classes in the first stage of SDLC (Software Development Life Cycle).

  • PDF

Analysis on Oh, hein-kuhn's Portrait Photograph (오형근 초상사진 분석)

  • Kim, Ji-Young
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.3
    • /
    • pp.103-112
    • /
    • 2014
  • Oh, hein-kuhn is a representative portrait photographer in Korea. His works, , , , which treated portraits of women are a bit different from those of the past that described the appearance of characters. The artist expressed the figure of inner side that conflicts and feels uneasy between 'family and society' and 'child and woman' along with the look of character. That is, he included specific aura which the whole of aunts and girls' group radiates by showing similar photos repeatedly, that we can be aware of 'aunt' and 'girl' by seeing them. The important technique of Oh, hein-kuhn's Portrait Photograph is 'repetition' of image. The artist delivers the meaning of the photo by looking at the character upright in the front and showing photos with similar frame repeatedly. Such form and content of the work as this might feel a bit boring, since it's very simple just like identification picture. However, the photos in the frames which do not move in the fixed position can deliver the meaning of work more clearly rather than the image which expresses flowing time and moving space, we can grasp the message that the artist intends to deliver rather quickly. In the environment of photograph production mainly with image transformation, Oh, hein-kuhn's works of authentic original work method definitely stand forth. Through the portraits of aunts and girls, the artist tells an aspect of our society and we reconfirm the reality through the portraits made by him.

A Study of the Narrative Features in Animation as an Art Form - Focusing on Brad Bird's "The Iron Giant(1999)", "The Incredibles(2004)", "Ratatouille(2007)" - (예술 형식으로서의 애니메이션의 서사적 특성 연구 - 브래드 버드 감독의 "아이언 자이언트(1999)", "인크레더블(2004)", "라따뚜이(2007)"를 중심으로 -)

  • Kim, Soong-Hyun;Lee, Tae-Hoon
    • Journal of Digital Convergence
    • /
    • v.16 no.3
    • /
    • pp.429-438
    • /
    • 2018
  • Brad Bird, a screenwriter and animation director in the United States, criticized the situation in which most animations were produced and released for the children since the early 2000s. He said that animation is an art form capable of conveying messages not only to children but also to adults, and that their development potential is high. In this study, I analyzed overall components such as narrative structure, character, subplot, symbol, and foreshadow of Brad Bird's animated feature films , , and examined his narrative features and strategies. As a result, the narrative features of animation as an art form are as follows: First, conveying the message of a serious subject that will deeply sympathize with adults as well as children. Second, expressing the social agenda which criticizes the contradiction of the real world and the periodic mistakes. Third, solid narrative structure through a dense plot based on realistic situation setting. I hope that this study will be used as basic research material for various animation production in the future.

T-Chord Ring System based on Overlay Network for Service Discovery and Delivery in MANET (MANET에서 서비스 발견 및 전달을 위한 오버레이 네트워크 기반의 T-Chord 링 시스템)

  • Han, Insung;Jeong, Hongsik;Park, Moosung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.51-63
    • /
    • 2013
  • Recently with base apply MANET with the application for the service discovery and delivery which are various techniques are being proposed the result of such MANET base research techniques from actual inside. This dissertation proposes T-Chord(Trustworthy-based Chord) Ring system for MANET to guarantees from such requirements. T-Chord Ring system in order to manage Efficiently the services which the mobile nodes provide is the service discovery system which uses P2P overlay network Technique in mobile environment. The system which is proposed MANET communications in order to accomplish a service discovery operation with physical network class and logical network class will be able to minimize problems from about MANET service discoveries, and uses the dispersive hash table technique for a service discovery and effectiveness of service discovery improves and will be able to guarantee the expandability of network size. The mobile nodes(mobile device) have a mobility from MANET and operate with service request node, service provide node and service transmit node. The mobile nodes will be able to elect cluster header using Trustworthy that was evaluated service request, provision and delivery in each other. The system which is proposed a service discovery and a delivery efficiently will compose the cluster head which will grow of P2P overlay networks and will be able to accomplish. The system which proposes from dissertation is composed of Trustworthy evaluations of MANET mobile nodes, service information collection which is dispersed and P2P overlay networks that composed of Chord algorithm modules which provide O(Log N) efficiencies. The system comparison evaluation analyzes an efficiency from the expandability side of effectiveness and the network of service discovery technique and the service discovery message over head, service discovery and delivery of former times and service discovery and delivery is excellent gives proof from MANET.

Estimation of VMS Traffic Information Value Using Contingent Valuation Method (조건부 가치측정법을 활용한 VMS 교통정보 가치 추정)

  • Choi, Jung Yoon;Yu, Jeong Whon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.3
    • /
    • pp.42-52
    • /
    • 2013
  • In this study, value of VMS (Variable Message Sign) traffic information is estimated by using CVM (Contingent Valuation Method), which is developed to quantify the value of non-marketable goods in environmental economics. CVM is used to estimate the value of goods provided by a project under consideration and then the project feasibility can be indirectly examined on the basis of the estimated value. This study focuses on estimating to estimate value of traffic information provided through VMS, a part of the transportation system enhancement project by Korea Expressway Corporation which is aimed at mitigating traffic problems on expressways. In particular, this study analyzes value of information separately by trip purpose, information type, and traffic flow condition. A state preference survey was designed to estimate the value of non-marketable traffic information. To maximize reliability of the survey results, a pilot survey was taken before the main survey. The open-ended question method was adopted in capturing users' willingness-to-pay. Both Tobit and binary Probit models were applied in estimating the value of VMS traffic information and their parameters were estimated using the maximum likelihood estimation. The estimation results suggests that the value of traffic information perceived by users is 518.28 KRW.

A Study on the Development Plan to Increase Supplement of Voice over Internet Protocol (인터넷전화의 보급 확산을 위한 발전방안에 관한 연구)

  • Park, Jae-Yong
    • Management & Information Systems Review
    • /
    • v.28 no.3
    • /
    • pp.191-210
    • /
    • 2009
  • Internet was first designed only for sending data, but as the time passed, internet started to evolve into a broadband multi-media web that is capable of transmitting sound, video, high-capacity data and more due to the demands of internet users and the rapid changing internet-communication technology. Domestically, in January, 2000 Saerom C&T, launched a free VoIP, but due to limited ways of conversation(PC to PC) and absence of a revenue model, and bad speech quality, it had hit it's growth limit. This research studied VoIP based on technological enhancement in super-speed internet. According to IDC, domestic internet market's size was 80,800 million in 2008, and it formed a percentage of 12.5% out of the whole sound-communication market. in case of VoIP, it is able to maximize it's profit by connecting cable and wireless network, also it has a chance of becoming firm-concentrated monopoly market by fusing with IPTV. Considering the fact that our country is insignificant in MVNO revitalization, regulating organizations will play a significant roll on regulating profit between large and small businesses. Further research should be done to give VoIP a secure footing to prosper and become popularized.

  • PDF

Study on development of the remote control door lock system including speeker verification function in real time (화자 인증 기능이 포함된 실시간 원격 도어락 제어 시스템 개발에 관한 연구)

  • Kwon, Soon-Ryang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.6
    • /
    • pp.714-719
    • /
    • 2005
  • The paper attempts to design and implement the system which can remotely check visitors' speech or Image by a mobile phone. This system is designed to recognize who a visitor is through the automatic calling service, not through a short message, via the mobile phone, even when the home owner is outside. In general, door locks are controlled through the home Server, but it is more effective to control door locks by using DTMF signal from a real-time point of view. The technology suggested in this paper makes it possible to communicate between the visiter and the home owner by making a phone call to tile home owner's mobile phone automatically when the visiter visits the house even if the home owner is outside, and if necessary, it allows for the home owner to control the door lock remotely. Thanks to the system, the home owner is not restricted by time or space for checking the visitor's identification and controlling the door lock. In addition, the security system is improved by changing from the existing password form to the combination of password and speaker verification lot the verification procedure required for controlling the door lock and setting the environment under consideration of any disadvantages which may occur when the mobile Phone is lost. Also, any existing problems such as reconnection to tile network for controlling tile door lock are solved by controlling the door lock in real time by use of DTMF signal while on the phone.

Cluster-Based Routing Mechanism for Efficient Data Delivery to Group Mobile Users in Wireless Ad-Hoc Networks (그룹 이동성을 가지는 모바일 사용자들 간의 효율적인 데이터 공유를 위한 클러스터 기반 그룹 라우팅 기법 메커니즘)

  • Yoo, Jinhee;Han, Kyeongah;Jeong, Dahee;Lee, HyungJune
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.1060-1073
    • /
    • 2013
  • In this paper, we present a cluster-based routing scheme for efficiently delivering data to group mobile users by extracting and clustering mobile user group simply from beacon message information in wireless ad-hoc networks. First, we propose an online-clustering mechanism that uses a local neighbor table on each node by recursively transmitting to neighbor nodes, and forms a group table where a set of listed nodes are classified as group members, without incurring much overhead. A node that appears the most frequently from neighbor tables throughout the network is selected as the cluster-head node, serving as a data gateway for the intra-cluster. Second, we design an inter-cluster routing that delivers data from stationary data sources to the selected cluster-head node, and a intra-cluster routing to deliver from the cluster-head node to users. Simulation results based on ns-2 in the ad-hoc networks consisting of 518 stationary nodes and 20 mobile nodes show that our proposed clustering mechanism achieves high clustering accuracy of 96 % on average. Regarding routing performance, our cluster-based routing scheme outperforms a naive one-to-one routing scheme without any clustering by reducing routing cost up to 1/20. Also, our intra-cluster routing utilizing a selected cluster-head node reduces routing cost in half as opposed to a counterpart of the intra-cluster routing through a randomly-selected internal group member.