• Title/Summary/Keyword: Windows 8

Search Result 579, Processing Time 0.026 seconds

국내 방송 드라마의 유통 구조 및 창구의 특성 (Distribution Mechanism of TV Dramas and Its Windows)

  • 이문행
    • 한국콘텐츠학회논문지
    • /
    • 제8권10호
    • /
    • pp.104-113
    • /
    • 2008
  • 1990년대 중반 케이블 TV의 등장과 함께 국내에도 방송 유통 시장이 형성되면서 최고의 유통 상품으로 떠오르게 된 TV 드라마는 그 후 비디오 플랫폼이 지속적으로 증가하면서 2008년 현재까지 가장 선호되는 콘텐츠로 주목받고 있다. 이 연구는 IP-TV를 비롯한 인터넷 유통으로 또 하나의 유통 창구를 확보하게 된 방송 드라마를 중심으로 부가수익 창출 구조를 살펴보고 유통 창구들의 특성 및 방식에 대해 살펴보았다. 분석 결과, 2000년 이후 방송 드라마 유통의 최고 수익 처는 해외 시장이라고 할 수 있다. 한편, 최근에는 온라인 유통이 활성화 되면서 드라마 판매가 더욱 활기를 띄고 있다. 이와 같은 창구 유통뿐만 아니라, 최근에는 포맷 판매와 리메이크 등 다양한 유통 방식의 변화가 목격됨으로써 유통 메커니즘의 새로운 변화로 여겨지고 있다.

COVID-19 Pandemic and the Reaction of Asian Stock Markets: Empirical Evidence from Saudi Arabia

  • SHAIK, Abdul Rahman
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권12호
    • /
    • pp.1-7
    • /
    • 2021
  • The study examines the influence of COVID-19 on the stock market returns of Saudi Arabia. The data was analyzed through event study methodology using daily price data of Tadawul All Share Index (TASI). The study examines the behavior pattern of the Saudi Arabian stock market in different phases during the event period by selecting six-event windows with a range of 10 days. The results report a negative Abnormal Return (AR) of -0.003 on the event date, while the abnormal returns reversed the next day to 0.005 positively. The result of Cumulative Abnormal Return (CAR) is negative and significant at the 1 percent level in all the six-event windows starting from the event date to day 59 after the event for the TASI index. Even though the influence of the COVID-19 pandemic decreased after 30 days of the event date, it increased during the last ten days of the event window. The stock market volatility of Saudi Arabia increased during the post-event period compared to the pre-event period with a negative mean return of -0.326 and a greater standard deviation. In a conclusion, the study found a significant influence of the COVID-19 pandemic on the stock market returns of TASI.

실시간 제어에 의한 개방형 CNC 소프트웨어 모듈의 설계 및 구현 (The Design and Implementation of Open Architecture CNC Software Module by a Real-time Control)

  • 이제필
    • 한국생산제조학회지
    • /
    • 제8권5호
    • /
    • pp.54-62
    • /
    • 1999
  • This paper describes the design and implementation of a PC(personal computer) based open architecture machine tool controller. The hardware of open architecture CNC has generally a motion control board on a PC for controlling a servo motor. But this paper describes open architecture hardware that consists of a PC, a counter board a DAC board and a DIO board only. This makes it easy to generate CNC software module in a hardware-independent way. The proposed open architecture CNC software runs on the MS-Windows NT. The paper describes a method of con-trolling servo motors using a real-time timer of MS-Windows NT and a commercial real-time operating system on the MS-Windows. NT. An open and reconfigurable software module is made up of an object and an API(application programming interface). Using the object and the API a new CNC system can be quickly configured to control dif-ferent machine tools. The proposed open architecture CNC system is applied to 4-axis lettering center.

  • PDF

A Realtime Analytical System of Football Game

  • Min, Dae-kee
    • Communications for Statistical Applications and Methods
    • /
    • 제8권2호
    • /
    • pp.557-564
    • /
    • 2001
  • The objective of he study is to record the real conditions along with the soccer ball that is, each player's ball keeping time, the number football keeping, accuracy of passing to other player, direction, etc., on a real-time basis, measure them in numbers and get necessary analyzed output as much as one needs. The study consists of the following stages: (1) Record the data by drawing through Visual Interface on a real-time basis; (2) Graphic windows to display the recorded data item by item in graphic; (3) Form windows to display the individual or team scores anytime when needed; (4) Windows to display the analyzed data in visualized form. The effect of the study is threefold: (1) It inputs all the game-related data on a real-time basis, which was impossible before and shows analyzed contents during the game enabling each tea manager o use; (2) In cse of TV broadcasting or newspaper articles, it explains objectively the situations of he game to the TV viewers or readers; (3) After the game, it provides importance information on each team's playing ability and individual player's technical improvement through data analysis.

  • PDF

건축물 창호 프레임의 연소특성에 따른 방화성능 검증에 관한 실험적 연구 (An Experimental Study on the Verification of Fire Extinguishing Performance According to the Combustion Characteristics of Building Window Frame)

  • 이병흔;권영진
    • 한국건축시공학회:학술대회논문집
    • /
    • 한국건축시공학회 2021년도 가을 학술논문 발표대회
    • /
    • pp.54-55
    • /
    • 2021
  • This study compared the fire safety standards for windows of Korea, the U.S. and Japan to prevent fire expansion through exterior wall openings, and conducted experiments using PVC and aluminum window frames, which are widely used in Korea.The experiment is KS F 2845 which combines frames of the same thickness and area with single-window form and 1 hour fire resistance glass with 8T thickness. Experiments showed that the PVC window was about 9 minutes and the aluminum window was about 26 minutes. However, in Korea, there are no test standards for windows installed at the opening of the exterior wall. In addition, fire safety standards for windows shall be established along with the designation of fire prevention zones.

  • PDF

치수보조선을 이용한 도면의 주벽인식 (A Main Wall Recognition of Architectural Drawings using Dimension Extension Line)

  • 권영빈
    • 정보처리학회논문지B
    • /
    • 제10B권7호
    • /
    • pp.837-846
    • /
    • 2003
  • 본 연구에서는 아파트의 설계도면을 처리의 대상으로 하고 있다. 이러한 아파트 도면은 굵고 평행한 두 개의 선으로 표현되는 주벽과 심볼(문, 창, 베란다. 타일 $\cdots$), 치수선(Dimension Line), 치수보조선, 여러 가지 수치를 나타내는 숫자(치수)와 문자 등으로 구성되어 있다. 본 연구에서는 이러한 아파트 도면 내에서 아파트 건물의 골격을 이루는 주벽을 인식하는 방법을 제시하고 있다. 이를 위해서 가는 라인을 제거하고 굵은 라인만을 남기는 이진화 방법을 사용하여, 이러한 라인들을 벡터화하고, 주벽의 존재위치를 한정하였다. 이를 이용해 치수보조선을 구하고 찾은 피수보조선을 이용하여 주벽을 검출하고, 찾아진 주벽에 연결되는 다른 주벽으로 영역을 확장해 나가는 방법을 구현하였다. 마지막으로, 주벽사이에 있는 창문은 비록 주벽이 아닌 창문 심볼로 표현되어 있더라도 주벽으로 인식해야 하기 때문에, 찾아진 주벽을 이용해 이들 주벽사이에 존재하는 창문을 찾는다. 실험결과 인식률에서 본 연구에서 제시하는 방법이 96.5%의 인식율을 나타내어 Karl Tombre 연구팀의 방법 90.7%보다 5.8% 더 우수하게 나타났고, 오인식의 수도 작게 나타났다.

Detecting Crime Hot Spots Using GAM and Local Moran's I

  • Cheong, Jin-Seong
    • International Journal of Contents
    • /
    • 제8권2호
    • /
    • pp.89-96
    • /
    • 2012
  • Scientific analysis of crime hot spots is essential in preventing and/or suppressing crime. However, results could be different depending on the analytic methods, which highlights the importance of choosing adequate tools. The purpose of this study was to introduce two advanced techniques for detecting crime hot spots, GAM and Local Moran's I, hoping for more police agencies to adopt better techniques.GAM controls for the number of population in study regions, but local Moran's I does not. That is, GAM detects high crime rate areas, whereas local Moran's I identifies high crime volume areas. For GAM, physical disorder was used as a proxy measure for population at risk based on the logic of the broken windows theory. Different regions were identified as hot spots. Although GAM is generally regarded as a more advanced method in that it controls for population, it's usage is limited to only point data. Local Moran's I is adequate for zonal data, but suffers from the unavoidable MAUP(Modifiable Areal Unit Problem).

Windows 7·8 IconCahe.db 파일 포맷 분석 및 활용방안 (The analysis of Windows 7·8 IconCache.db and its application)

  • 이찬연;이상진
    • 정보보호학회논문지
    • /
    • 제24권1호
    • /
    • pp.135-144
    • /
    • 2014
  • 디지털 포렌식 조사를 회피하기 위한 안티포렌식이 발전하고 있는 가운데, 안티포렌식 행위를 찾아내기 위한 포렌식 방법들 또한 다각도로 연구되고 있다. 사용자 행위분석을 위한 여러 요소 중 응용프로그램의 아이콘 정보를 저장하고 있는 IconCache.db 파일은 디지털 포렌식 조사를 위한 의미 있는 정보들을 제공하고 있다. 본 논문은 IconCache.db 파일의 특성을 알아보고 안티포렌식에 대응할 수 있는 활용방안을 제시한다.

Digital Forensic for Location Information using Hierarchical Clustering and k-means Algorithm

  • Lee, Chanjin;Chung, Mokdong
    • 한국멀티미디어학회논문지
    • /
    • 제19권1호
    • /
    • pp.30-40
    • /
    • 2016
  • Recently, the competition among global IT companies for the market occupancy of the IoT(Internet of Things) is fierce. Internet of Things are all the things and people around the world connected to the Internet, and it is becoming more and more intelligent. In addition, for the purpose of providing users with a customized services to variety of context-awareness, IoT platform and related research have been active area. In this paper, we analyze third party instant messengers of Windows 8 Style UI and propose a digital forensic methodology. And, we are well aware of the Android-based map and navigation applications. What we want to show is GPS information analysis by using the R. In addition, we propose a structured data analysis applying the hierarchical clustering model using GPS data in the digital forensics modules. The proposed model is expected to help support the IOT services and efficient criminal investigation process.

Data Hiding in NTFS Timestamps for Anti-Forensics

  • Cho, Gyu-Sang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권3호
    • /
    • pp.31-40
    • /
    • 2016
  • In this paper, we propose a new anti-forensic method for hiding data in the timestamp of a file in the Windows NTFS filesystem. The main idea of the proposed method is to utilize the 16 least significant bits of the 64 bits in the timestamps. The 64-bit timestamp format represents a number of 100-nanosecond intervals, which are small enough to appear in less than a second, and are not commonly displayed with full precision in the Windows Explorer window or the file browsers of forensic tools. This allows them to be manipulated for other purposes. Every file has $STANDARD_INFORMATION and $FILE_NAME attributes, and each attribute has four timestamps respectively, so we can use 16 bytes to hide data. Without any changes in an original timestamp of "year-month-day hour:min:sec" format, we intentionally put manipulated data into the 16 least significant bits, making the existence of the hidden data in the timestamps difficult to uncover or detect. We demonstrated the applicability and feasibility of the proposed method with a test case.