• Title/Summary/Keyword: Screen Capture

Search Result 81, Processing Time 0.027 seconds

A Study on the Voluptuous Beauty Represented on Jean Paul Gaultier's Fashion Design - Mainly the Movie ${\ulcorner}$The 5th Element${\lrcorner}$ - (장 폴 고티에(Jean Paul Gaultier) 의상디자인에 나타난 관능미 연구 - 영화 "제5원소"를 중심으로 -)

  • Byun, Mi-Yeon;Lee, In-Seong
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.8 no.2
    • /
    • pp.37-45
    • /
    • 2006
  • Jean Paul Gaultier, debuted in 1970's and referred to as a bad boy in Paris fashion industry with his abnormal and ingenious ideas such as skirts for men, underwear outfit, etc, is a leading fashion designer. This study nay find its meaning from the fact that this study defines how the voluptuous beauty, one of the figurative beauties inherent in Jean Paul Gaultier's design, expresses in the movie costume and understands the world of the designer's fashion to provide a foundation to fashion designers who are looking for a new area where they can actively involve in. For the study, the 'The Fifth Element (1997)', in which the voluptuous beauty, Jean Paul Gaultier's representative figurative beauty, is fully revealed, and also it is his latest movie he participated in as costume designer, was selected and costume design is analyzed using DVD screen capture program. Also, this study reviewed his design with his collections from 1997 when he was invited to Haute Couture and began to actively perform his works down to date and also referred to numerous materials, fashion magazines, movie magazines, Internet data and etc. From the results of analyzing Jean Paul Gaultier collections, firs, the beauty he is pursuing is projected broadly in three types- the voluptuous beauty from clothing innovation, the voluptuous beauty from unpolished nature, the voluptuous beauty from exposure. Second, the movie ${\ulcorner}$The Fifth Element${\lrcorner}$ is well revealed the world of Jean Paul Gaultier's art presenting visual amusement and variety of attractions. Finally, the results of analyzing costume by characters say that the clothing innovation and the voluptuous beauty from exposure on Leeloo's costume, the voluptuous beauty from exposure on Korben Dallas's costume, the voluptuous beauty from unpolished nature on Zorg and Ruby Rhod's costumes are well shown respectively.

  • PDF

A Design of Cooperative Works Platform for software Development Productivity (소프트웨어 개발 생산성 향상을 위한 공동 작업 플랫폼 설계)

  • Cho, Sung-Been;Kim, Jin-Suk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.1
    • /
    • pp.73-85
    • /
    • 1998
  • Today's Software Systems are becoming bigger, larger and more complex than ever before. To develop largerscale projects, it is required that many experts of different fields participate and cooperate in the same project. So, it is an applied area of CSCW(Computer Supported Cooperative Works} that centers around methodologies and tools that enable cooperative works by geographically distributed people engaged in all aspects of product development. In this paper, we designed a multi-user cooperative works platform, SPACE(Software Platform for distributed Application sharing under Cooperative Environment} as a infrastructure that support to CSCW based system development for telecommunication and information system. SPACE has a fully distributed architecture under Windows 95 environment, has an application sharing mechanism enabling collaborative use of mteractive application adapt to a mixed GUI sharing technology which capture GUI and screen information, and also, an event sharing technology that has a replicated architecture.

  • PDF

A Study on Treatment Way of a Malicious Code to injected in Windows System File (Windows 시스템 파일에 기생하는 악성코드의 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.255-262
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs. or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe. csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment way that experimented on at these papers and a plan to solve will become a researcher or the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

Development of a Horse Robot for Indoor Leisure Sports (실내 레저 스포츠를 위한 승마 로봇의 개발)

  • Lee, Wonsik;Lee, Youngdae;Moon, Chanwoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.161-166
    • /
    • 2014
  • Recently, indoor sports simulator equipped with virtual reality devices, like screen golf system, are riding high. There have been many attempts to develop the indoor simulator systems which can make people enjoy exercises in various sports area. A real horseback riding could not have been popularized, because of the cost involved, difficulty to learn and its dangerousness. In this research, a robotic horseback riding platform based on parallel mechanism and virtual reality device is proposed. The proposed platform provides realistic riding feels and various levels of riding difficulty. The equipped motion capture system with a vision sensor enables riders to correct their riding posture based on expert's one. The developed horseback riding platform make it possible to enjoy a horseback riding in all weather, and also can be used for systematic horseback riding training.

Preliminary Study on Global Clipboard System (글로벌 클립보드 시스템에 대한 기초 연구)

  • Hwang, Kitae;Kwon, Heejeong;Lee, Sanghoon;Park, Doyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.223-229
    • /
    • 2017
  • This paper proposes the Global Clipboard System and presents a preliminary study on it. The clipboard is a temporary storage used to copy and paste some contents between application programs in Windows Operating System. The proposed Global Clipboard is a contents delivery system that extends the concept of the existing local clipboard to Internet. The Global Clipboard System operates in two steps. An application user can upload selected contents to the Global Clipboard by typing consecutive keys of Ctrl-C and Ctrl-Shift-C easily. And other users can download and utilize the contents from the Global Clipboard by typing Ctrl-Shift-V and Ctrl-V keys consecutively. The proposed Global Clipboard can deal almost data like simple texts, screen capture images, files, and directories. In this paper, we developed a global clipboard server, a Windows application, and an Android application. We have conducted experiments about functions of the Global Clipboard and also compared delay times between 4 applications such as e-mail, Kakao, Google Drive, and the Global Clipboard. The results of the evaluation show that the time delay spending in sending and receiving contents is shortest when the Global Clipboard is used.

Numerical investigations on stability evaluation of a jointed rock slope during excavation using an optimized DDARF method

  • Li, Yong;Zhou, Hao;Dong, Zhenxing;Zhu, Weishen;Li, Shucai;Wang, Shugang
    • Geomechanics and Engineering
    • /
    • v.14 no.3
    • /
    • pp.271-281
    • /
    • 2018
  • A jointed rock slope stability evaluation was simulated by a discontinuous deformation analysis numerical method to investigate the process and safety factors for different crack distributions and different overloading situations. An optimized method using Discontinuous Deformation Analysis for Rock Failure (DDARF) is presented to perform numerical investigations on the jointed rock slope stability evaluation of the Dagangshan hydropower station. During the pre-processing of establishing the numerical model, an integrated software system including AutoCAD, Screen Capture, and Excel is adopted to facilitate the implementation of the numerical model with random joint network. These optimizations during the pre-processing stage of DDARF can remarkably improve the simulation efficiency, making it possible for complex model calculation. In the numerical investigations on the jointed rock slope stability evaluations using the optimized DDARF, three calculation schemes have been taken into account in the numerical model: (I) no joint; (II) two sets of regular parallel joints; and (III) multiple sets of random joints. This model is capable of replicating the entire processes including crack initiation, propagation, formation of shear zones, and local failures, and thus is able to provide constructive suggestions to supporting schemes for the slope. Meanwhile, the overloading numerical simulations under the same three schemes have also been performed. Overloading safety factors of the three schemes are 5.68, 2.42 and 1.39, respectively, which are obtained by analyzing the displacement evolutions of key monitoring points during overloading.

Value of PAX1 Methylation Analysis by MS-HRM in the Triage of Atypical Squamous Cells of Undetermined Significance

  • Li, Shi-Rong;Wang, Zhen-Ming;Wang, Yu-Hui;Wang, Xi-Bo;Zhao, Jian-Qiang;Xue, Hai-Bin;Jiang, Fu-Guo
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.14
    • /
    • pp.5843-5846
    • /
    • 2015
  • Background: Detection of cervical high grade lesions in patients with atypical squamous cells of undetermined significance (ASCUS) is still a challenge. Our study tested the efficacy of the paired boxed gene 1 (PAX1) methylation analysis by methylation-sensitive high-resolution melting (MS-HRM) in the detection of high grade lesions in ASCUS and compared performance with the hybrid capture 2 (HC2) human papillomavirus (HPV) test. Materials and Methods: A total of 463 consecutive ASCUS women from primary screening were selected. Their cervical scrapings were collected and assessed by PAX1 methylation analysis (MS-HRM) and high-risk HPV-DNA test (HC2). All patients with ASCUS were admitted to colposcopy and cervical biopsies. The Chisquare test was used to test the differences of PAX1 methylation or HPV infection between groups. Results: The specificity, sensitivity, and accuracy for detecting CIN2 + lesions were: 95.6%, 82.4%, and 94.6%, respectively, for the PAX1 MS-HRM test; and 59.7%, 64.7%, and 60.0% for the HC2 HPV test. Conclusions: The PAX1 methylation analysis by MS-HRM demonstrated a better performance than the high-risk HPV-DNA test for the detection of high grade lesions (CIN2 +) in ASCUS cases. This approach could screen out the majority of low grade cases of ASCUS, and thus reduce the referral rate to colposcopy.

A Design and Implementation of Mobile 'Moving Data' Coaching Application for Training in the Athletic Club (운동부의 훈련을 위한 모바일 '움직임 데이터' 코칭 어플리케이션 설계 및 구현)

  • Kim, Se-min;Ryu, Chang-su;You, Kang-soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1511-1516
    • /
    • 2016
  • Sports areas of the Republic of Korea has been strengthened by the sports powers in various phases of the competition. However, not all students can succeed in greatly athlete, was necessary for these measures. This paper presents the design and implementation of mobile applications to athletic coaching leaders to record dynamic data of student athletes. Stocks applicable in this paper is basketball. The development of mobile applications can choose to 'Assist Records' menu and 'Hot & Cold Zone' menu in the Main Page. Athletic director are stored in the photo file after the screen capture to allow the map to be just athletes. To a point that can be expected can be used as the training time and increasing efficiency of the training effect through the mobile application, it will be able to widen the non-coat to improve the performances.

Screening Method for Non-viable Seeds in Brassicaceae Vegetable Crops by Sinapine Leakage (Sinapine누출을 이용한 십자화과 채소의 퇴화종자 선별법)

  • 민태기
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.39 no.5
    • /
    • pp.473-479
    • /
    • 1994
  • A seed coating system was developed to screen non-viable seeds in the Brassicaceae. The crops studied were radish, chinese cabbage, broccoli, cauliflower and brussel sprout. Sinapine leaked more from artificially deteriorated seeds than non-deteriorated seeds. Seed coating with cellulose was to trap the sinapine leakage in the non-viable Brassicaceae vegetable seeds. The seeds were first hydrated, then coated with cellulose powder to capture the leakage. Coated seeds were dried, then sorted two fractions-fluorescent seeds and non-fluorescent seeds under the UV light. The ratio of the fluorescent seeds were higher in bad seedlot than good one. The germination rate were increased 3∼35% by eliminating the fluorescent seeds in tested Brassica vegetable seeds. Sowing non-fluorescent seeds resulted in a greater percent normal seedling than non-coated seeds in all seedlots. The fluorescent seeds contained a high percentage of the dead and abnormal seedlings.

  • PDF

A Study on New Treatment Way of a Malicious Code to Use a DLL Injection Technique (DLL injection 기법을 이용하는 악성코드의 새로운 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.251-258
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs, or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe, csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment wav that experimented on at these papers and a plan to solve will become a researcher of the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF