• Title/Summary/Keyword: Original article

Search Result 361, Processing Time 0.024 seconds

El Greco as an Intersection of Counter-Reformation and Byzantine picture -Focused on of El Greco (비잔틴 화풍과 반종교개혁의 교차점으로서의 엘 그레코 - 엘 그레코의 <참회하는 막달라 마리아를 중심으로>)

  • Lim, Juin
    • Cross-Cultural Studies
    • /
    • v.26
    • /
    • pp.43-71
    • /
    • 2012
  • In this article, we recognize the cross-cultural communication between Greece and Spain through El Greco's pictures. The Greeks of Crete kept to their culture and continued to look to the declining Byzantine Empire for spiritual and political guidance. For two centuries after the conquest, the strength of the Byzantine tradition had become the moral and spiritual sustenance of the conquered in Crete. The basic contribution of Cretan intellectuals or artists such as El Greco of the fifteenth and sixteenth centuries was the forging of connecting links between the Hellenism of the old Byzantine East and the rising, youthful Hellenism of the Renaissance West. In this way, Crete served as an important halfway point between East and West. The saint Mary Magdalene was symbol of Christian penitence, which represents the penitential life personified and became widespread during the Counter Reformation, when new emphasis was put on the value of prayer and repentance in the forgiveness of sin. In Spain, the Penitent Magdalene was popular and El Greco painted many versions, which at the first time, were reflected by Tiziano, on the contrary, at the time of Toledo, were recreated by his own style. Although El Greco was converted to Catholic in Spain, his faith in Greek Orthodox Church influenced on his original painting world. El Greco had never painted a picture whose subject treat with the emphasis of identification between Mary Magdalene and Mary, younger sister of Martha.

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.

Experimental training of shape memory alloy fibres under combined thermomechanical loading

  • Shinde, Digamber;Katariya, Pankaj V;Mehar, Kulmani;Khan, Md. Rajik;Panda, Subrata K;Pandey, Harsh K
    • Structural Engineering and Mechanics
    • /
    • v.68 no.5
    • /
    • pp.519-526
    • /
    • 2018
  • In this article, experimental training of the commercial available shape memory alloy fibre (SMA) fibre under the combined thermomechanical loading is reported. SMA has the ability to sense a small change in temperature (${\geq}10^{\circ}C$) and activated under the external loading and results in shape change. The thermomechanical characteristics of SMA at different temperature and mechanical loading are obtained through an own lab-scale experimental setup. The analysis is conducted for two types of the medium using the liquid nitrogen (cold cycle) and the hot water (heat cycle). The experimental data indicate that SMA act as a normal wire for Martensite phase and activated behavior i.e., regain the original shape during the Austenite phase only. To improve the confidence of such kind of behavior has been verified by inspecting the composition of the wire. The study reveals interesting conclusion i.e., while SMA deviates from the equiatomic structure or consist of foreign materials (carbon and oxygen) except nickel and titanium may affect the phase transformation temperature which shifted the activation phase temperature. Also, the grain structure distortion of SMA wire has been examined via the scanning electron microscope after the thermomechanical cycle loading and discussed in details.

Systemic Review and Meta-analysis of the Effect of Acupuncture for Migraine Prophylaxis (편두통 예방에 대한 침치료의 체계적 문헌고찰 및 메타 분석 - Pubmed를 중심으로 -)

  • Bae, Ji-yong;Kwon, Jung-yeon;Kong, Kyung-hwan;Go, Ho-yeon
    • The Journal of Internal Korean Medicine
    • /
    • v.40 no.4
    • /
    • pp.637-648
    • /
    • 2019
  • Objective: The aim of this study was to investigate the effect of acupuncture on migraine prophylaxis. Method: Articles were searched from the online databases: PubMed, OASIS, NDSL, and RISS. The search keywords were "migraine prophylaxis" and "acupuncture." The inclusion criterion was randomized clinical trial. The exclusion criteria were in vivo, vitro, and review articles. Results: Eighty-nine articles were found among those published until March 2019. After reviewing the title, abstract, and original article, 10 articles were selected to show the effect of acupuncture for migraine prophylaxis. Conclusion: The effect of acupuncture for the frequency and number of days of a migraine and for the intensity of the pain seems to be effective, but the mechanism does not appear to be clear. Therefore, further research is needed in future acupuncture for migraine prevention.

Towards a Student-centred Approach to Translation Teaching

  • Almanna, Ali;Lazim, Hashim
    • Cross-Cultural Studies
    • /
    • v.36
    • /
    • pp.241-270
    • /
    • 2014
  • The aim of this article is to review the traditional methodologies of teaching translation that concentrate on text-typologies and, as an alternative, to propose an eclectic multi-componential approach that involves a set of interdisciplinary skills with a view to improving the trainee translators' competences and skills. To this end, three approaches, namely a minimalist approach, a pre-transferring adjustment approach and a revision vs. editing approach are proposed to shift the focus of attention from teacher-centred approaches towards student-centred approaches. It has been shown that translator training programmes need to focus on improving the trainee translators' competences and skills, such as training them how to produce and select among the different versions they produce by themselves with justified confidence as quickly as they can (minimalist approach), adjust the original text semantically, syntactically and/or textually in a way that the source text supplely accommodates itself in the linguistic system of the target language (pre-transferring adjustment), and revise and edit others' translations. As the validity of the approach proposed relies partially on instructors' competences and skills in teaching translation, universities, particularly in the Arab world, need to invest in recruiting expert practitioners instead of depending mainly on bilingual teachers to teach translation.

Swerve, Trope, Peripety: Turning Points in Criticism and Theory

  • Tally, Robert T. Jr.
    • Journal of English Language & Literature
    • /
    • v.64 no.1
    • /
    • pp.25-37
    • /
    • 2018
  • The turning point is one of the more evocative concepts in the critic's arsenal, as it is equally suited to the evaluation and analysis of a given moment in one's day as to those of a historical event. But how does one recognize a turning point? As we find ourselves always "in the middest," both spatially and temporally, we inhabit sites that may be points at which many things may be seen to turn. Indeed, it is usually only possible to identify a turning point, as it were, from a distance, from the remove of space and time which allows for a sense of recognition, based in part on original context and in part of perceived effects. In this article, Robert T. Tally Jr. argues that the apprehension and interpretation of a turning point involves a fundamentally critical activity. Examining three models by which to understand the concept of the turning point-the swerve, the trope, and peripety (or the dialectical reversal)-Tally demonstrates how each represents a different way of seeing the turning point and its effects. Thus, the swerve is associated with a point of departure for a critical project; the trope is connected to continuous and sustained critical activity in the moment, and peripety enables a retrospective vision that, in turn, inform future research. Tally argues for the significance of the turning point in literary and cultural theory, and concludes that the identification, analysis, and interpretation of turning points is crucial to the project of criticism today.

Enhanced Privacy Preservation of Cloud Data by using ElGamal Elliptic Curve (EGEC) Homomorphic Encryption Scheme

  • vedaraj, M.;Ezhumalai, P.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4522-4536
    • /
    • 2020
  • Nowadays, cloud is the fastest emerging technology in the IT industry. We can store and retrieve data from the cloud. The most frequently occurring problems in the cloud are security and privacy preservation of data. For improving its security, secret information must be protected from various illegal accesses. Numerous traditional cryptography algorithms have been used to increase the privacy in preserving cloud data. Still, there are some problems in privacy protection because of its reduced security. Thus, this article proposes an ElGamal Elliptic Curve (EGEC) Homomorphic encryption scheme for safeguarding the confidentiality of data stored in a cloud. The Users who hold a data can encipher the input data using the proposed EGEC encryption scheme. The homomorphic operations are computed on encrypted data. Whenever user sends data access permission requests to the cloud data storage. The Cloud Service Provider (CSP) validates the user access policy and provides the encrypted data to the user. ElGamal Elliptic Curve (EGEC) decryption was used to generate an original input data. The proposed EGEC homomorphic encryption scheme can be tested using different performance metrics such as execution time, encryption time, decryption time, memory usage, encryption throughput, and decryption throughput. However, efficacy of the ElGamal Elliptic Curve (EGEC) Homomorphic Encryption approach is explained by the comparison study of conventional approaches.

Activity Object Detection Based on Improved Faster R-CNN

  • Zhang, Ning;Feng, Yiran;Lee, Eung-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.3
    • /
    • pp.416-422
    • /
    • 2021
  • Due to the large differences in human activity within classes, the large similarity between classes, and the problems of visual angle and occlusion, it is difficult to extract features manually, and the detection rate of human behavior is low. In order to better solve these problems, an improved Faster R-CNN-based detection algorithm is proposed in this paper. It achieves multi-object recognition and localization through a second-order detection network, and replaces the original feature extraction module with Dense-Net, which can fuse multi-level feature information, increase network depth and avoid disappearance of network gradients. Meanwhile, the proposal merging strategy is improved with Soft-NMS, where an attenuation function is designed to replace the conventional NMS algorithm, thereby avoiding missed detection of adjacent or overlapping objects, and enhancing the network detection accuracy under multiple objects. During the experiment, the improved Faster R-CNN method in this article has 84.7% target detection result, which is improved compared to other methods, which proves that the target recognition method has significant advantages and potential.

Modern Methods of Text Analysis as an Effective Way to Combat Plagiarism

  • Myronenko, Serhii;Myronenko, Yelyzaveta
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.242-248
    • /
    • 2022
  • The article presents the analysis of modern methods of automatic comparison of original and unoriginal text to detect textual plagiarism. The study covers two types of plagiarism - literal, when plagiarists directly make exact copying of the text without changing anything, and intelligent, using more sophisticated techniques, which are harder to detect due to the text manipulation, like words and signs replacement. Standard techniques related to extrinsic detection are string-based, vector space and semantic-based. The first, most common and most successful target models for detecting literal plagiarism - N-gram and Vector Space are analyzed, and their advantages and disadvantages are evaluated. The most effective target models that allow detecting intelligent plagiarism, particularly identifying paraphrases by measuring the semantic similarity of short components of the text, are investigated. Models using neural network architecture and based on natural language sentence matching approaches such as Densely Interactive Inference Network (DIIN), Bilateral Multi-Perspective Matching (BiMPM) and Bidirectional Encoder Representations from Transformers (BERT) and its family of models are considered. The progress in improving plagiarism detection systems, techniques and related models is summarized. Relevant and urgent problems that remain unresolved in detecting intelligent plagiarism - effective recognition of unoriginal ideas and qualitatively paraphrased text - are outlined.

Review of the History of Animals that Helped Human Life and Safety for Aerospace Medical Research and Space Exploration

  • Lee, Won-Chang;Kim, Kyu-Sung;Kwon, Young Hwan
    • Korean journal of aerospace and environmental medicine
    • /
    • v.30 no.1
    • /
    • pp.18-24
    • /
    • 2020
  • In 2019, the Aerospace Medical Association of Korea celebrated its 30th anniversary. On the other side of the world, it was also the 62nd anniversary of Russian launch Sputnik 1 of the world's first artificial satellite on October 4, 1957. In additionally, the world, especially the United States was shocked, when on November 3, 1957, Sputnik 2 blasted into Earth orbit with a dog named "Laika"; it was the role of veterinarian's activities for aerospace medical research and exploration. Veterinarians (Vets) are responsible for the health of all the animals for aerospace medicine whether on the ground or in space. Vets can enhance animal and public health and this knowledge of Vets and astronauts can extend their mission durations, go to nearby Earth Asteroids, Mars and other heavenly bodies to study their living and non-living characteristics. This review article is the brief history of the original growth of the veterinarian's activities for the aerospace medical research, in order to stimulate future strategies for improvements in the space life sciences and exploration.