• Title/Summary/Keyword: event collection

Search Result 166, Processing Time 0.026 seconds

The Behavioral Analysis of Dance Sports Judge's Visual Searching Strategies: Focusing on the Skating System

  • Kim, Mi-Sun;Lee, Ki-Kwang;Kim, Kwantae
    • Korean Journal of Applied Biomechanics
    • /
    • v.30 no.3
    • /
    • pp.235-245
    • /
    • 2020
  • Objective: The purpose of this study was to investigate the differences between visual search, eye fixation positions, and eye fixation position on whole body regions while judging final matches of dance sports. Method: Ten experienced judges (male 6, female 4) and six dance sports couples belonging to the top Korean leagues in the Korea Dance sports Federation were participated. Wearable eye trackers were used for data collection. The independent t-test was conducted to examine the effects of gender, and the two-way ANOVA was conducted to examine the effects of judges' gender, dance event, and ranking. Results: It was found that the movement of male contestants was preferred, and the gaze fixation was high for torso movements in the judges' evaluations. Moreover, attention was focused on the upper body rather than the lower body; this was maintained for about seven seconds to evaluate each couple. Conclusion: This find was the relative comparison between the two couples was the determining factor in winning or losing.

Exploring the values of Marc Jacobs's fashion collaboration (Marc Jacobs 패션 콜래보레이션의 가치 탐색)

  • Kim, Sun Young
    • The Research Journal of the Costume Culture
    • /
    • v.22 no.3
    • /
    • pp.383-398
    • /
    • 2014
  • This research worked on the cooperative case by Marc Jacobs, who was involved in innovative collaboration in the field of fashion, and the analysis on imbedded values. With assessment of it, this paper aims at providing the theoretical ground on prevalence of fashion collaboration for creative innovation and presenting the basic material in establishing the design and marketing in the fashion industry. In methodology, the review was followed up about literature regarding Marc Jacobs and collaboration and his cases in 2001 through 2012. Results showed that his collaboration cases could be divided into those with modern artist, those with fashion brand or designer, those with other field brand than fashion, and those with the public star. They were processed into such a form as development of new product and collection, shop display, and exhibition event. The value could be drawn from this case examination of Marc Jacobs' fashion collaboration, which includes the design innovation through reinterpretation of tradition, innovation of maximized brand value, and transboundary innovation toward a vast extension of realm. Namely, the collaboration of Marc Jacobs would be the driving force for design innovation and the creative process for both parties concerned through endless cooperation and would generate the innovative value for fashion field.

A Study on Contemporary Fashion Expressed in Haute Couture (오뜨꾸뛰르(Haute Couture) 작품에 표현된 현대패션의 경향 연구)

  • 김선영;임영자
    • Journal of the Korean Society of Costume
    • /
    • v.51 no.6
    • /
    • pp.147-165
    • /
    • 2001
  • Haute couture denotes a luxurious made-to-order dressmaker's shop. In principle, it refers to a place that is registered with the Paris Apparel Association and has met the size and criteria specified by the association. The features of modern fashion expressed in haute couture have been contemplated by categorizing them into mixed impression appearing in haute couture work pieces. turning the collection event into a spectacle and commercialization for the succession of haute couture. Mixed impression manifested in the haute couture has engendered (1) the creative and dynamic feature (2) eclecticism with popular culture (3) mixed impression of reactionism (4) ethnic characteristics. From the above considerations, one could say that the factors drive the very existence of haute couture and comprise three elements of impeccable backgrounds, They are (1) organizing ability and protective policies of the French fashion industry, (2) relentless experimental spirit of the haute couture designers and (3) Paris that supports creativity and fashion fabrication, have coincided with rising up of the value of persistence on originality of work pieces in accordance with diversifying cultural transformations. consumer-oriented patterns by way of capital symbolized by consumers and restructuring of company operation by each shop. This report describes comprehensive understanding of haute couture, creativity and dynamic power of the haute couture work pieces. Akin to the efforts to maintain the existence of high-grade cultures throughout the overall cultures themselves, haute couture, on the basis of these factors, should also become the motive power through which luxurious culture in fashion is created in the days ahead.

  • PDF

M2M based personage information monitoring system (M2M기반 인물 정보 모니터링 시스템)

  • Lee, Jong-sung;Jeon, Min-ho;Oh, Chang-heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.1000-1003
    • /
    • 2013
  • The monitoring system using a surveillance camera, has the advantage that can be observed in real time the blind spot of the crime, case to be mounted is increasing. However, surveillance camera, is used for the purpose of verification of the crime later than risk detection of crime before advance. Therefore, in this paper, in order to supplement the weak information collection monitoring system using the monitoring camera, by using the position information of the smartphone, infers the person monitoring region, the movement path of the image information other event occurs it is a fusion iT monitoring system that provides information of the user who judged. Result of the experiment, the proposed system confirmed the improved efficiency and usability than conventional systems.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.4
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

해빈침식해역에서의 대책수립을 위한 수치해석

  • Kim, Hui-Jae;An, Hyo-Jae;Kim, Gang-Min;Lee, Jung-U
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.10a
    • /
    • pp.9-11
    • /
    • 2014
  • As Daecheon beach, which is the study area, has problem of erosion and loss of most beach under the extraordinary wave during the typhoon event, it is necessary to apply erosion control measures for short term impact. Therefore, we analyzed the status and reason of the erosion by field survey, collection of hydraulic model test, and numerical model experiment. For the erosion control measure, we adopted beach feeding and submerged reef method available at that site among various counter measures. Numerical analyses were made for both beach feeding only and beach feeding with submerged reefs and these were compared with the present status to find out the optimum design and to contribute for preparing a long term plan of beach loss protection.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

An Exploratory Study on the Activation of Book Curation in School Libraries: Focused on the Case and Current Status Analysis of Secondary School Library in Incheon (학교도서관의 북큐레이션 활성화 방안에 대한 탐색적 연구 - 인천 중등 학교도서관 사례 및 현황 분석을 중심으로 -)

  • Hyemin, Oh;Seung-Jin, Kwak
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.4
    • /
    • pp.115-137
    • /
    • 2022
  • This research aims to suggest the way of activation of book curation in secondary school libraries by analyzing examples of book curation and the recognition of the persons in charge of secondary school libraries. A documentary research and a survey is conducted. 192 school librarians are chosen for that survey in Incheon region secondary school. 4 teacher librarians of Incheon region secondary school and a professor of library and information science are interviewed. Also an investigation is executed by visiting school libraries. Augmentation of the persons in charge of secondary school libraries, coordinating and information sharing with educational teachers, establishment of manual for book curation operation, publishing examples of subject selection are suggested for the measure of activation of book curation.

Big Data Analysis of the Women Who Score Goal Sports Entertainment Program: Focusing on Text Mining and Semantic Network Analysis.

  • Hyun-Myung, Kim;Kyung-Won, Byun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.222-230
    • /
    • 2023
  • The purpose of this study is to provide basic data on sports entertainment programs by collecting data on unstructured data generated by Naver and Google for SBS entertainment program 'Women Who Score Goal', which began regular broadcast in June 2021, and analyzing public perceptions through data mining, semantic matrix, and CONCOR analysis. Data collection was conducted using Textom, and 27,911 cases of data accumulated for 16 months from June 16, 2021 to October 15, 2022. For the collected data, 80 key keywords related to 'Kick a Goal' were derived through simple frequency and TF-IDF analysis through data mining. Semantic network analysis was conducted to analyze the relationship between the top 80 keywords analyzed through this process. The centrality was derived through the UCINET 6.0 program using NetDraw of UCINET 6.0, understanding the characteristics of the network, and visualizing the connection relationship between keywords to express it clearly. CONCOR analysis was conducted to derive a cluster of words with similar characteristics based on the semantic network. As a result of the analysis, it was analyzed as a 'program' cluster related to the broadcast content of 'Kick a Goal' and a 'Soccer' cluster, a sports event of 'Kick a Goal'. In addition to the scenes about the game of the cast, it was analyzed as an 'Everyday Life' cluster about training and daily life, and a cluster about 'Broadcast Manipulation' that disappointed viewers with manipulation of the game content.

User Information Collection of Weibo Network Public Opinion under Python

  • Changhua Liu;Yanlin Han
    • Journal of Information Processing Systems
    • /
    • v.19 no.3
    • /
    • pp.310-322
    • /
    • 2023
  • Although the network environment is gradually improving, the virtual nature of the network is still the same fact, which has brought a great influence on the supervision of Weibo network public opinion dissemination. In order to reduce this influence, the user information of Weibo network public opinion dissemination is studied by using Python technology. Specifically, the 2019 "Ethiopian air crash" event was taken as the research subject, the relevant data were collected by using Python technology, and the data from March 10, 2019 to June 20, 2019 were constructed by using the implicit Dirichlet distribution topic model and the naive Bayes classifier. The Weibo network public opinion user identity graph model under the "Ethiopian air crash" on June 20 found that the public opinion users of ordinary netizens accounted for the highest proportion and were easily influenced by media public opinion users. This influence is not limited to ordinary netizens. Public opinion users have an influence on other types of public opinion users. That is to say, in the network public opinion space of the "Ethiopian air crash," media public opinion users play an important role in the dissemination of network public opinion information. This research can lay a foundation for the classification and identification of user identity information types under different public opinion life cycles. Future research can start from the supervision of public opinion and the type of user identity to improve the scientific management and control of user information dissemination through Weibo network public opinion.