• Title/Summary/Keyword: national borders

Search Result 129, Processing Time 0.026 seconds

The two aspects of a nationalistic art in Greece, 1950 -1960 (그리스 내셔널리즘 미술의 두 얼굴, 1950~1960)

  • Papanikolaou, Miltiades M.
    • The Journal of Art Theory & Practice
    • /
    • no.4
    • /
    • pp.203-239
    • /
    • 2006
  • As it is known, during the Second World War Greece has fought on the side of the allies and the end of the war found the country on the winners' side. However, the struggle for authority right after 1945 was merciless and extremely difficult, as well as dangerous for the course of the country to the future. The political powers were divided between the legal authorities that were represented by the king and formed the exiled government on the one hand and the part of the resistance teams and the rebels of the left that had a soviet friendly direction on the other. Thus, the start of a civil war was just a matter of time. It fin ally started in 1947 and lasted for more than two years. The consequences were disastrous for the country's economy and decisive for the future course of Greece. The national army prevailed with the help of, mostly, the English. Royal parliamentary democracy was established with a clear political turn to the west, as a completion and adaptation of the Agreement of the Great Powers at Yalta. Art had a 'similar' route. Dipolar, contradictory: conservative choices on the one side, and a will for pioneering inspiration and perspective on the other side. The 'dominate' trend was first evident in sculpture and mainly in the public monuments. Their construction aimed mostly at the public propaganda and at the promotion of the sovereign ideology. On the one side we have the public sculptures composed of faces of contemporary heroes or leading figures of the civic war and the national resistance. On the other side we have monumental statues mainly that appeal to a 'public' outside of the country's borders and mostly of the north borders, where there are countries with a communistic regime, like Bulgaria, Serbia and Albania. Their subject is derived from the heroic events of the Balkan Wars (1912-1913) and ancient historical figures like Alexander the Great as the Greek army leader, his father, Philippos II and Aristotle, who was of a north-Greek origin. The political message is twofold: on the one side the 'inner enemy' the communists that were defeated and the promotion of the new liberal social system and on the other side the north neighbours, which not only represent the East Block, but they also conspire the history and the culture of the Greeks. This is the way how the 'Cold War' was resulted in a full and totalitarian expression in art.

  • PDF

Real Time Traffic Signal Recognition Using HSI and YCbCr Color Models and Adaboost Algorithm (HSI/YCbCr 색상모델과 에이다부스트 알고리즘을 이용한 실시간 교통신호 인식)

  • Park, Sanghoon;Lee, Joonwoong
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.24 no.2
    • /
    • pp.214-224
    • /
    • 2016
  • This paper proposes an algorithm to effectively detect the traffic lights and recognize the traffic signals using a monocular camera mounted on the front windshield glass of a vehicle in day time. The algorithm consists of three main parts. The first part is to generate the candidates of a traffic light. After conversion of RGB color model into HSI and YCbCr color spaces, the regions considered as a traffic light are detected. For these regions, edge processing is applied to extract the borders of the traffic light. The second part is to divide the candidates into traffic lights and non-traffic lights using Haar-like features and Adaboost algorithm. The third part is to recognize the signals of the traffic light using a template matching. Experimental results show that the proposed algorithm successfully detects the traffic lights and recognizes the traffic signals in real time in a variety of environments.

Hot Spots on Tc-99m MAA Perfusion Lung Scan (Tc-99m 거대응집알부민을 이용한 폐관류 스캔에서 관찰되는 다발성 열소)

  • Lim, Seok-Tae;Sohn, Myung-Hee
    • The Korean Journal of Nuclear Medicine
    • /
    • v.35 no.4
    • /
    • pp.288-290
    • /
    • 2001
  • A 61 year-old woman underwent perfusion and inhalation lung scan for the evaluation of pulmonary thromboembolism. Tc-99m MAA perfusion lung scan showed multiple round hot spots in both lung fields. Tc-99m DTPA aerosol inhalation lung scan and chest radiography taken at the same time showed normal findings (Fig. 1, 2). A repeated perfusion lung scan taken 24 hours later demonstrated no abnormalities (Fig. 3). Hot spots on perfusion lung scan can be caused by microsphere clumping due to faulty injection technique or by radioactive embolization from upper extremity thrombophlebitis after injection. Focal hot spots can signify zones of atelectasis, where the hot spots probably represent a failure of hypoxic vasoconstriction. Artifactual hot spots due to microsphere clumping usually appear to be round and in peripheral location, and the lesions due to a loss of hypoxic vasoconstriction usually appear to be hot uptakes having linear $borders^{1-3)}$. Although these artifactual hot spots have been well-known, we rarely encounter them. This report presents a case with artifactual hot spots due to microsphere clumping on Tc-99m MAA perfusion lung scan.

  • PDF

The unification of the Later Three Kingdoms by King Taejo of Koryo dynasty, Wang Gun and his Leadership (고려 태조 왕건의 후삼국통일과 리더십)

  • Kim, Gap-Dong
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.211-240
    • /
    • 2006
  • King Taejo, Wang Gun had succeeded in bringing order out of chaos of the Later Three Kingdoms and establishing a new unified dynasty, Koryo. Why can he gain the victory against the king of Later Baekje, GyunHwon? What is the his leadership? These are his leadership. (1) He had the peserverance. in 927 Wang Gun had broken by Gyun Hwon's army at Gong San. Nevertheless He didn't dissapoint and trained troops for battle steadily. Therefore in 930 he gained a great victory against Gyun Hwon at An Dong. (2) He use the command rights justically. (3)His soldiers are obedient to his orders involuntarily. (4) He always cooperateed with other’s commanders. (5)He efforted to gain victory without battle. (6)He had a high and great plan. (7) He took advantage of land configuration. (8) He made the enemy to fall into internal disarray. With these leadership, Wang Gun unified Later Three Kingdoms. Regarding himself as the success or to Goguryo, he pursued a policy of expansion to the north. Therefore he extended his borders to Chongchon River. At the same time he broke the chains of the bone-rank system which had shackled Shil1a's society.

  • PDF

The Southern World as a Destination of International Students: an Analysis of 50 Tertiary Education Institutions in Vietnam

  • Pham, Hiep-Hung;Vuong, Quan-Hoang;Dong, Thi-Kieu-Trang;Nguyen, Tien-Trung;Ho, Manh-Toan;Vuong, Thu-Trang;Hoang, Anh-Duc;Nguyen, Mai-Huong
    • Journal of Contemporary Eastern Asia
    • /
    • v.20 no.1
    • /
    • pp.24-43
    • /
    • 2021
  • Traditionally, students from the Southern world tend to cross their national borders to study abroad. However, in recent times, we have observed a trend in which more and more students, both full-time and short-term, select Southern countries as destinations for overseas education. This paper contributes to the sparse literature on the above phenomenon, examining the case of Vietnam. We surveyed 50 universities and colleges about their international student profiles (including statistics and nationalities) and their strategies for attracting international students. The findings of this study provide implications for Vietnam's policymakers and university/college leaders and other Southern countries when implementing the internationalization of tertiary education.

Image-based Extraction of Histogram Index for Concrete Crack Analysis

  • Kim, Bubryur;Lee, Dong-Eun
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.912-919
    • /
    • 2022
  • The study is an image-based assessment that uses image processing techniques to determine the condition of concrete with surface cracks. The preparations of the dataset include resizing and image filtering to ensure statistical homogeneity and noise reduction. The image dataset is then segmented, making it more suited for extracting important features and easier to evaluate. The image is transformed into grayscale which removes the hue and saturation but retains the luminance. To create a clean edge map, the edge detection process is utilized to extract the major edge features of the image. The Otsu method is used to minimize intraclass variation between black and white pixels. Additionally, the median filter was employed to reduce noise while keeping the borders of the image. Image processing techniques are used to enhance the significant features of the concrete image, especially the defects. In this study, the tonal zones of the histogram and its properties are used to analyze the condition of the concrete. By examining the histogram, the viewer will be able to determine the information on the image through the number of pixels associated and each tonal characteristic on a graph. The features of the five tonal zones of the histogram which implies the qualities of the concrete image may be evaluated based on the quality of the contrast, brightness, highlights, shadow spikes, or the condition of the shadow region that corresponds to the foreground.

  • PDF

Leaf Rot and Leaf Ring Spot Caused by Rhizoctonia solani in Chinese Cabbage

  • Shim, Chang-Ki;Kim, Min-Jeong;Kim, Yong-Ki;Jee, Hyeong-Jin;Hong, Sung-Jun;Park, Jong-Ho;Han, Eun-Jung;Yun, Jong-Chul
    • Research in Plant Disease
    • /
    • v.19 no.4
    • /
    • pp.300-307
    • /
    • 2013
  • This study was conducted to determine the occurrence of leaf rot and leaf ring spot, caused by Rhizoctonia solani in Chinese cabbage under seedling nursery and cultivation greenhouses. Symptoms of leaf rot and leaf ring spot were found in three Chinese cabbage cultivars, Brassica campestris subsp. pekinensis, 'Ryeokgwang', 'Daetong', and 'CR mat'. In Hwacheon, the disease incidence was 73.8% in the seedling stage of the Chinese cabbage. In Icheon, the symptoms were observed on the upper leaves of the Chinese cabbage cultivar, 'Norangmini' with 20.5% of disease incidence. The symptoms appeared as primary lesions consisting of small, circular necrotic ring spots with gray color, 1.4-3.0 mm in diameter, accompanied by secondary rot lesions with large irregular borders of leaves. The color of mycelial mat of 20 isolates was dark brown and light brown. The average hyphal diameter of all the isolates was within 5.01-11.12 ${\mu}m$. Among the 20 strains isolated from Chinese cabbage, 16 isolates and four isolates anastomosed with the AG-1 (IB) and AG-1 (IC), respectively. Twenty isolates tested were only virulent on foliage parts of Chinese cabbage leaves but were avirulent on stem parts of the plants. Based on the mycological characteristics and pathogenicity test on host plants, the fungus was identified as Rhizoctonia solani.

Mapping and analyzing the distribution of the species in the genus Tulipa (Liliaceae) in the Ferghana Valley of Central Asia

  • DEKHKONOV, Davron;TOJIBAEV, Komiljon Sh.;MAKHMUDJANOV, Dilmurod;NA, Nu-ree;BAASANMUNKH, Shukherdorj;YUSUPOV, Ziyoviddin;CHOI, Hyeok Jae;JANG, Chang-Gee
    • Korean Journal of Plant Taxonomy
    • /
    • v.51 no.3
    • /
    • pp.181-191
    • /
    • 2021
  • Tulips are bulbous geophytes that have considerable commercial value worldwide. This genus primarily originated in the Tien Shan and Pamir-Alai mountain ranges, which surround the Ferghana Valley. The Ferghana Valley is home to five sections of the genus Tulipa L, represented by 23 taxa (22 species). However, there is a lack of detailed information about the distribution of Tulipa species in the natural geographic area of the Ferghana Valley. Therefore, to address this knowledge gap, we comprehensively investigated the spatial distribution of all Tulipa species in the valley. To assess the spatial distribution, the entire area was divided into 32 squares consisting of four latitudinal and eight longitudinal zones. The results showed that latitudinal zones B and C with 15 and 13 taxa, respectively, along with five longitudinal zones (A5, B3, B4, C2, and C3) with 5 to 10 taxa were hotspots for this genus. Additionally, the spatial distributions of the species in terms of the corresponding state borders, mountain ranges, endemism, and conservation issues were assessed. The findings of this study provide comprehensive information about the distribution of Tulipa species to assist with conservation initiatives ultimately to ensure the survival of various species.

Corruption as a Threat to Economic Security of the Country

  • Samiilenko, Halyna;Ivanova, Nataliia;Shaposhnykova, Iryna;Vasylchenko, Lidiia;Solomakha, Iryna;Povna, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.316-322
    • /
    • 2021
  • The problem of corruption and the spread of corruption crime today is not only one of the main social problems, but also an obstacle to the implementation of reforms in Ukraine. Given the complexity, scale and diversity of the impact of corruption, it is an undisputed threat to national security. At the state level, corruption threatens, firstly, state security as a result of its spread in public authorities and the combination of political and business spheres; secondly, in the domestic political sphere as a result of non-compliance and violation by officials of public authorities and local governments of the laws of Ukraine; thirdly, in the economic sphere as a result of the dominance of personal interests of civil servants over national ones; fourthly, in other spheres, namely, military, social, ecological, informational, foreign policy, etc. The origins of corruption are diverse and are formed not only in the country but also abroad. The current corruption threat is the result of the country's ineffective domestic and foreign anticorruption policies. Acceleration of the spread and manifestation of external corruption threats is associated with a number of unresolved foreign policy issues against the background of the development of globalization and integration processes, in particular: economic and financial dependence of the country on international financial institutions and organizations; as well as from foreign countries that pose a potential threat due to their ambitious plans to expand our country; unresolved issues regarding the international legal consolidation of borders, etc. It is noted that the current conditions for the development of state security, due to new challenges and threats, need to improve and implement new measures to prevent corruption as a negative impact of the main threats to national economic security. As a result of the study, the main measures to counter the main threats to the economic security of the state were identified.

Study on Policies for National Cybersecurity (국가 사이버안보를 위한 정책 연구)

  • Ham, Seung-hyeon;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1666-1673
    • /
    • 2017
  • Republic of Korea is divided into South Korea and North Korea, creating military conflicts and social conflicts. North Korea is conducting cyberattacks against South Korea and has hacked South Korea's defense network. In the world of cyberspace, the boundaries of the borders are becoming obscured, and cyberattacks and cyberterrorism for cyberwarfare operate with digital computing connected to points, time and space. Agenda and manual are needed for national cybersecurity. Also, it is necessary to study national cybersecurity laws and policies that can create and implement nationalcyber security policy. This paper investigates cyberterrorism situation in North and South Korean confrontation situation and damage to cyberwarfare in the world. We also study cybersecurity activities and cyberwarfare response agendas, manuals and new technologies at home and abroad. And propose national cybersecurity policy and propose policies so that '(tentative) The National Cybersecurity Law' is established. This study will be used as basic data of national cybersecurity law and policy.