• Title/Summary/Keyword: Message-In-Message

Search Result 4,393, Processing Time 0.033 seconds

The study of analysis film-making style in Stanley Kubrick's film (Focusing on his' film "The Clockwork orange(1971)") (스탠리 큐브릭 감독의 영상 스타일 분석 연구 (그의 영화"시계태엽오렌지(1971)"를 중심으로))

  • Lee, Tae-Hoon
    • Journal of Digital Convergence
    • /
    • v.15 no.9
    • /
    • pp.453-461
    • /
    • 2017
  • The video image in the movie has become more spectacular than ever, and the expression area and the subject have been infinitely expanded, but it can not be said that the range of imagination has expanded. Instead, the 60s and 70s, which were the epochs of popular culture, The film that implements the artististic visual style and expression style of the artist. Stanley Kubrick's "Clockwork Orange", which has been pursuing technological perfection and experimental style, was created using traditional video grammar and gained a great repercussion with outstanding material and high artistic expression technique at that time. These techniques have led audiences to rational observation through irony, rather than emotional sympathy for the situation, for extreme violence and sensational films. This is because the purpose of the director was not to be in technological perfection but to reveal the contradictions of the real society and to reflect on the meaning of the existence of society itself. These creative traditional visual grammar and expression methods are a good visual style that enables the intentionally transmitted message to be transmitted more intensely and effectively, and the artistic depth can be created at the same time by unconsciously perceiving the meaning present on the back to the audience.

Design and Implementation of Response type of Flickering Green Signal System using Beacon Message (비콘메세지를 이용한 반응형 녹색점멸 신호시스템 설계 및 구현)

  • An, Hyo-In;Mun, Hyung-Jin;Kim, Chang-Geun
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.241-247
    • /
    • 2016
  • As a domestic traffic control signal system, either the system with which a traffic signal turns into green at regular intervals or the system with which an amber or a red signal flickers on local roads without heavy traffic at midnight has been utilized. However, when the former system is used for roads with light traffic at midnight, delays and congestion can be incurred. Besides, in case of the latter signal system, the risk of vehicle crash is high. This study proposes a response type of flickering green signal system that rearranges signal system after analyzing beacon messages including sensor data. The proposed system, on a trunk road or a branch road at midnight, makes the signal keep flickering in green; When a vehicle enters the range of RSE, the transfer coverage, it transmits beacon messages regularly and Agent System analyzes the messages and alters the signal. It is a system by which vehicles move following the altered signal system, which will not only ensure smooth flow but also prevent vehicles from crashing on a road with light traffic. As a result of a simulation, traffic throughput and the average waiting time displayed 10 to 30 percent better improvement than existing signal systems, in terms of performance.

An Analysis on the Prevention Effects of Forward and Chain Collision based on Vehicle-to-Vehicle Communication (차량 간 통신 기반 전방추돌 및 연쇄추돌 방지 효과 분석)

  • Jung, Sung-Dae;Kim, Tae-Oh;Lee, Sang-Sun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.4
    • /
    • pp.36-43
    • /
    • 2011
  • The forward collision of vehicles in high speed can cause a chain collisions and high fatality rate. Most of the forward collisions are caused by insufficient braking distance due to detection time of driver and safe distance. Also, accumulated detection time of driver is cause of chain collisions after the forward collision. The FVCWS prevents the forward collision by maintaining the safety distance inter-vehicle and reducing detection time of driver. However the FVCWS can cause chain collisions because the system that interacts only forward vehicle has accumulated detection time of driver. In this paper, we analyze forward and chain collisions of normal vehicles and FVCWS vehicles on static traveling scenario. And then, we analyze and compare V2V based FVCWS with them after explaining the system. The V2V FVCWS reduces detection time of driver alike FVCWS as well as remove accumulated detection time of driver by broadcasting emergence message to backward vehicles at the same time. Therefore, the system decrease possibility of forward and chain collisions. All backward normal vehicles and 3~4 backward FVCWS vehicles have possibility of forward and chain collisions in result of analysis. However V2V FVCWS vehicles almost do not chain collisions in the result.

A Study on the Securing Technological Safety of Mobile Electronic Notification Service in Public and Administrative Agencies (공공·행정기관 모바일전자고지서비스의 기술적인 안전성 확보 방안에 대한 연구)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.7-16
    • /
    • 2020
  • The mobile electronic notification service delivers notifications through mobile phone text or app-based message push to solve various problems of the paper-based mail service. And it is a service that an electronic document relay company proves to prove delivery. In order for public and administrative agencies to provide mobile electronic notification service, the user's identification information of the mobile phone number or the subscribed app is required. To overcome these limitations, ICT-regulated sandbox system was used to allow collective conversion of users' resident registration numbers into connecting information (CI). Therefore, in this paper, we propose a technical method for safe management of user CI in mobile electronic notice service, identity verification of electronic notice readers, and prevention of forgery and forgery of electronic notices. Through the proposed method, it is confirmed that the service can be activated by minimizing the adverse function of the mobile electronic notification service by securing the user's convenience and technical safety for the CI.

The Design and Implementation of Secure Instant Messaging System (안전한 단문 전송 시스템 설계 및 구현)

  • Song, Gi-Pyeung;Sohn, Hong;Jo, In-June;Ju, Young-Ki;Lee, Dal-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.2
    • /
    • pp.357-364
    • /
    • 2001
  • The Instant Messenger(IM) is the most popular personal communication tool today. IM is a tool that can substitute E-mail for a person, and can secure the user for a company. Further, it is claimed as it has a limitless potential. However, there has been several reports on security issues. It has known that the transmitting message is not secured for the attacks, and hacking tools has been developed. In addition, several reports has been made regards to the vulnerability. In other words, anyone can peep through and manipulate the messages that are sent or received via IM. This is a barrier for the IM to be developed as a corporate's strategic tool, and furthermore, it will create serious personal privacy issue. IETF IMPP Working (:roup is preparing a standard mutual relationship between IM. However, it is complicated due to the American On-Lines's absence, whom has ensured the most number of IM users. There was a discussion only about the form of the transmitting data, but it is insufficient state to discuss the security service for general. In this paper, 1 design and implement the Secure Instant Messaging System, to solve the IM's vulnerability and the security issue presented above.

  • PDF

Social Factors Affecting Internet Searches on Cyber Bullying in Korea and America Using Social Big Data and Google Search Trends (소셜 빅데이터와 Google 검색트렌드를 활용한 한국과 미국의 사이버불링 검색에 영향을 미치는 요인 분석)

  • Song, Tae-Min;Song, Juyoung;Cheon, Mi-Kyung
    • The Journal of Bigdata
    • /
    • v.1 no.1
    • /
    • pp.67-75
    • /
    • 2016
  • The study analyzed big data extracted from Google and social media to identify factors related to searches on cyber bullying in Korea and America. Korea's cyber bullying analysis was conducted social big data collected from online news sites, blogs, $caf{\acute{e}}s$, social network services and message for between January 1, 2011 and March 31, 2013. Google search trends for the search words of stress, exercise, drinking, and cyber bullying were obtained for January 1, 2004 and December 22, 2013. The main results of this study were as follows: first, the significant factors stress were cyber bullying that Korea more than America. Secondly, a positive relationship was found between stress and drinking, exercise and cyber bullying both Korea and America. Thirdly, significant differences were found all path both Korea and America. The study shows that both adults and teenagers are influenced in Korea. We need to develop online application that if cyber bullying behavior was predicted can intervene in real time because these actual cyber bullying-related exposure to psychological and behavioral characteristic.

  • PDF

A study on a plasticity analysis for the Gilt-bronze Incense Burner of Baekje -Through a comparative analysis with Chinese Inlaid Gold Boshan Xianglu- (백제금동대향로의 조형성분석에 관한 연구(중국 금상감박산향로와 비교분석))

  • Shin, Dae-Teak;Park, Seung-Chul
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.325-331
    • /
    • 2013
  • The Baekje Gilt-bronze Incense Burner which was excavated in an ancient temple site in Neungsan-ri, within the City wall of Buyeo-Gun on 23rd December 1993, was a quintessence of the Bakje Arts that people could not have imagined until that time. The Baekje Gilt-bronze Incense Burner transcended 1400 years of time and space. The censer that finally came up to us delivered a kind of a powerful message to us. The power was so strong and mysterious that as if an ancestor who had been sleeping in the grave with a great silent had woken up and become alive to tell us something very precious. Baekje Gilt-bronze Incense Burner, unlike any other existing artifacts, might have a possibility that could provide an insight of the ancients' psych who once lived on our land. This kind of view from several archaeologists, therefore, made our hearts be filled with excitement and flutter. We call 21st century as an era of culture. This era requests that the culture needs to be ethnical but the culture also needs to go beyond that ethnic. In other words, a culture without an ethnic cannot exist, and a culture that puts an ethnic the very first before any other things cannot exist as well. Regaining our identities first and then embracing and harmonizing various cultures can be an wise way overcoming above problem. Hence, through this study, I intend to recognize characteristic of plasticity for Baekje Gilt-bronze Incense Burner, understand the world of Baekje people's spirit and thus provide an opportunity to shed new light on the Baekje Arts. By doing so, I would like to publicize a metal craft of Korea to the world. I also try to seek for an identity of Korea's craft culture which is receding and find a direction for the Korea's craft.

A Proxy Mobile IP based Fast Layer-3 Handover scheme for Mobile WiMAX based Wireless Mesh Networks (Mobile WiMAX 기반의 무선 메쉬 네트워크를 위한 Proxy Mobile IP 기반의 고속 3계층 핸드오버 방안)

  • Kim, Min;Kim, Jong-Min;Kim, Hwa-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8B
    • /
    • pp.1129-1140
    • /
    • 2010
  • Wireless mesh networks have been widely studied as the next generation technology to solve the problems of conventional wireless networks. Particularly, Mobile WiMAX based wireless mesh networks are noticed due to many advantages. Mobile WiMAX standard provides two kinds of layer-3 handover schemes: Mobile IP and Proxy Mobile IP based handover schemes. MIP based handover scheme has a problem in that it incurs the long handover latency because mobile nodes generate a lot of handover messages. On the other hand, PMIP based handover scheme decreases the handover latency by reducing the number of handover messages, because mobile nodes do not participate in handover procedure. Therefore, layer-3 handover for Mobile WiMAX should be designed based on PMIP. However, conventional PMIP based handover still has latency overhead, because of many message exchanges between PBU and PBA after completing the layer-2 handover. Hence, in this paper, we propose a fast layer-3 handover scheme that achieves the lower handover latency for Mobile WiMAX based wireless mesh networks. Proposed scheme has advantages in terms of handover latency. Simulation results show that proposed scheme achieves low handover latency during the layer-3 handover.

Efficient Transmission Structure and Key Management Mechanism Using Key Provisioning on Medical Sensor Networks (의료 센서 네트워크에서의 효율적인 전송 구조 및 Key Provisioning을 사용한 키 관리 기법 연구)

  • Seo, Jae-Won;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.285-298
    • /
    • 2009
  • According to the development of ubiquitous technologies, sensor networks is used in various area. In particular, medical field is one of the significant application areas using sensor networks, and recently it has come to be more important according to standardization of the body sensor networks technology. There are special characteristics of their own for medical sensor networks, which are different from the one of sensor networks for general application or environment. In this paper, we propose a hierarchical medical sensor networks structure considering own properties of medical applications, and also introduce transmission mechanism based on hierarchical structure. Our mechanism uses the priority and threshold value for medical sensor nodes considering patient's needs and health condition. Through this way Cluster head can transmit emergency data to the Base station rapidly. We also present the new key establishment mechanism based on key management mechanism which is proposed by L. Eschenauer and V. Gligor for our proposed structure and transmission mechanism. We use key provisioning for emergency nodes that have high priority based on patients' health condition. This mechanism guarantees the emergency nodes to establish the key and transmit the urgent message to the new cluster head more rapidly through preparing key establishment with key provisioning. We analyze the efficiency of our mechanism through comparing the amount of traffic and energy consumption with analysis and simulation with QualNet simulator. We also implemented our key management mechanism on TmoteSKY sensor board using TinyOS 2.0 and through this experiments we proved that the new mechanism could be actually utilized in network design.

Geographical Name Denoising by Machine Learning of Event Detection Based on Twitter (트위터 기반 이벤트 탐지에서의 기계학습을 통한 지명 노이즈제거)

  • Woo, Seungmin;Hwang, Byung-Yeon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.10
    • /
    • pp.447-454
    • /
    • 2015
  • This paper proposes geographical name denoising by machine learning of event detection based on twitter. Recently, the increasing number of smart phone users are leading the growing user of SNS. Especially, the functions of short message (less than 140 words) and follow service make twitter has the power of conveying and diffusing the information more quickly. These characteristics and mobile optimised feature make twitter has fast information conveying speed, which can play a role of conveying disasters or events. Related research used the individuals of twitter user as the sensor of event detection to detect events that occur in reality. This research employed geographical name as the keyword by using the characteristic that an event occurs in a specific place. However, it ignored the denoising of relationship between geographical name and homograph, it became an important factor to lower the accuracy of event detection. In this paper, we used removing and forecasting, these two method to applied denoising technique. First after processing the filtering step by using noise related database building, we have determined the existence of geographical name by using the Naive Bayesian classification. Finally by using the experimental data, we earned the probability value of machine learning. On the basis of forecast technique which is proposed in this paper, the reliability of the need for denoising technique has turned out to be 89.6%.