RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 실시간 제어를 통한 컴퓨터 음악과 영상 창작 연구 : 멀티미디어음악작품 "불완전(Incompleteness)"을 중심으로

        박경화 동국대학교 영상정보통신대학원 2005 국내석사

        RANK : 251679

        It is the object of this research to express my work "Incompleteness" through the study about a creation of the computer music and an image by the real-time control. To complete a multimedia work in the true sense of the word, it's a good solution not to play music and an image simply together but to harmonize them and bring to perfection individually under the control of the MIDI signal. The present state of feeling is reflected in my work and I would try to represent a frame of mind about self-examination, doubt and anxiety. I think that life is a repetition of the process to finish a lot of goals and we usually face with a new beginning through a success and a failure. I set up this process as a unit. The first part means a preparatory period, a desire and a passion and the second part means a process, a maturity and an outcome. Among the construction of music, effects of the static portion are 「delay」, 「ring modulation」, 「time stretch」 and 「reverberation」. Sound sources whose attack time Is long are used harmonically. So its structure is vertical and I focus on a soft slur and a fullness of sound. The main symbolic feeling is static and dark feeling about uneasiness, irritation, and anxiety Effects of the dynamic portion are 「flange」, 「pan」. I composed of an algorithmlc music by using 「Stella」. A tempo is a little fast, a sound is changed deeply, and a velocity of change is fast. I intended to express a state of feeling busy, active and dynamic. The last portion means a result and beginning. It expresses to keep aloof from the result. As a result of this research, through the most important software "Max/MSP" & "Jitter", I can operate data of music and an image intendedly. So we can apply an abnormal data to my work. It is the reason that we also make a work only if we know an acknowledge about music and an image exactly. Otherwise, we can't control data of them and they can be meaningless. To accomplish more perfect work, I must study an technology about an image. Outside of that, there are a series of bottlenecks in the way of this study. The software "Max/MSP" & "Jitter" deals with data using matrices and an image consists of four planes (alpha channel, RGB). So It take much time to process data. A frame rate, moreover, is not fixed while recording an image by using "Jitter". Because music should be synchronized with an image, that gave me lots of trouble. For that reason, I can't satisfy myself with a quality of an image as well as a synchronization. So I have to put up with inconvenience.

      • QoS 향상을 위한 영상대역 필터링 기술연구

        노준섭 동국대학교 영상정보통신대학원 2004 국내석사

        RANK : 251679

        These days, many image processing techniques have been studied for effective image compression and filtering. Among those, The 2D-filtering is widely used for 2D image processing. The 2D filtering can be implemented by performing the 1D linear filter separately in the direction of horizontal and vertical. Efficiency of image compression depends on what filtering method is used. Generally, circular convolution is widely used in 2D filtering for reducing images. However it doesn't consider correlations at the boundary region, therefore effective filtering can not be performed. To solve this problem. I propose new convolution technique using loop convolution which satisfies the 'alias-free' and 'error-free' requirement in the reconstructed image. This method can provide more effective compression performance than former methods because it uses very high correlative data when performed at the boundary region. Sub-band Coding(SBC) was adopted to analyze efficiency of proposed filtering, and the simulator developed by Java-based language is used to examine the performance of proposed method.

      • (A) Mouse : 3D Character Animation 제작

        임미정 東國大學校 映像情報通信大學院 2003 국내석사

        RANK : 251663

        This paper expresses a human being's homing instinct that willing to go back to his environment when he knew outsider's life even if he'd like to merge from daily life even just one time. So using a tail 'The country mouse and the city mouse' with similar story structure with this and it is dramatized. There is a rat what is expressed closer to human figure for application of human activities and added some elements like a fairy tale in motion and form. This paper describes movie producing course when we produce 3D Computer character animation from the first planning stage to the last editing with sounds. The modeling is Low Polygon thinking operation efficiency and ability of computer, the Shading is without using texture for feeling of cartoons. From now on, I will make more elaborate animation pointing Texture Mapping, Facial Animation, and action study for more natural feeling.

      • Centralized Cookie Server(SSO) 분석과 보안 향상을 위한 연구

        조용수 동국대학교 영상정보통신대학원 2003 국내석사

        RANK : 251663

        As a consequence of Internet's development, the improvement of service's quality becomes a more important thing, since not only network and service environments are changed abruptly but also user's increasingly quality desire are became personalized. Especially, the development of personalization in wireless/wire internet services makes it serious problem that someone can more easily attacks the personal information and resources in internet, open network. International standards and related research results for reinforcing personal security are establishing recently. This research propose a CCS(Centralized Cookie Server) using Brownie server to supplement security weakness in Cookie authentication among Cookie-based SSO(Single Sign ON) to protect the web-based e-mail and e-commerce. Existing Cookie-based SSOs are DCCS(De-Centralized Cookie Server), CCS and LIS(Log-In Server). But all of these exposed security weakness because of simple Cookie-based authentication, and DCCS and LIS are fit for small system and have the disadvantage of management of increasing users and distributed server. While CCS has scalability and the advantage of the management of distributed server. The CCS architecture introduced Brownie authentication, is a authentication architecture using server information, used time, service fee and operation managing policy, as well as static authentication using only Cookie-based user information. Cookie and Brownie server receive user information, such as ID, password and IP address, from LDAP at the request of web application, and create a Cookie and Brownie using static information from web server URL. The Cookie has information need for simple authentication, and Brownie has dynamic information, such as session-life time, reliability information, same IP address, Cookie-destruction time and session information between servers. This report design the Cookie-based CCS system introduced the Brownie authentication.

      • 번지점프를 하다 : 3D Animation 제작

        조영아 東國大學校 映像情報通信大學院 2004 국내석사

        RANK : 251663

        The title of this study is "Bungee Jumpimg", which is a 3D animation. Setting the right colors is most important for light and interesting painting. 2D fits better than 3D. But I had to use to make pictures look more natural because 2D does not treat well 3D objects. By mixing 2D and 3D images, I was able to reconcile and reinforce effects of both in a more effective way. I simplified character designs with NURBS and mapping was done in 2D using mapping source. Giving more natural lighting effects by using SamplerInfo within general utilities of Maya and Ramp within 2D textures, I expressed an entirely different color from the existing 3D images.

      • 유비쿼터스 컴퓨팅에서의 보안요구사항에 대한 연구

        김경희 동국대학교 영상정보통신대학원 2004 국내석사

        RANK : 251663

        유비쿼터스 컴퓨팅이 현실화되면 사용자는 인식하지 않고 보이지 않는 형태의 편재된 컴퓨팅 서비스를 제공받을 수 있을 것이다. 이러한 서비스를 제공하기 위해 유비쿼터스 컴퓨팅은 기존의 컴퓨팅 환경에 비해 더욱 더 많은 사용자 정보를 수집하게 되고 사용자의 위치를 추적하면서 사용자를 인지하여 서비스를 제공하게 된다. 본 논문에서는 이러한 서비스를 안전하게 제공받기 위해서 유비쿼터스 컴퓨팅 환경에서 필수적으로 해결해야하는 보안 요구사항을 분석하였다. 먼저 유비쿼터스 컴퓨팅 환경의 보안 요구사항을 도출하기 위해서 현재 무선 네트워크 환경을 중심으로 유비쿼터스 컴퓨팅 환경에서의 보안 위협을 설명하였다. 유비쿼터스 네트워크 환경에서 발생할 수 있는 위협으로 장치의 절도 및 분실, Rouge 액세스 포인트, IP 스푸핑, DoS 공격, 트로이목마, 웜, 바이러스, 신호방해 공격, 배터리 소진 공격 등을 소개하였다. 앞서 설명한 보안 위협을 바탕으로 유비쿼터스 컴퓨팅 환경에서의 보안 요구사항을 분석하였다. 보안에 대한 기본적인 요구사항으로는 인증, 기밀성, 무결성, 가용성이 있고, 추가적인 보안 요구사항으로 권한 관리와 안전한 핸드오프가 있다. 유비쿼터스 컴퓨팅 응용 환경에서의 보안 요구사항을 분석하기 위해서 실현 가능한 U-쇼핑몰 시나리오를 도출하였고, 이러한 시나리오를 동작시키는 Smart Space를 정의하였으며 Smart Space의 안정성을 제공하기 위한 보안 개념 모델을 도출하였다. 이를 통해서 유비쿼터스 응용 보안 요구사항으로 Non-Intrusive Authentication, 프라이버시 보호, 분산 신뢰 관리, 접근 제어, 디지털 신원 관리 기술을 제시하였다. 유비쿼터스 컴퓨팅 환경은 실생활에 많은 편리함을 가져다주는 만큼 악의적인 공격자로 인해서 개인의 정보 유출과 같은 큰 희생을 강요받을 가능성이 존재하는 것이 현실이다. 따라서 유비쿼터스 컴퓨팅 환경에 대한 보안에 대한 적절한 정의가 필요하고, 기존의 보안 개념과 유비쿼터스 컴퓨팅 특성을 종합적으로 고려한 일반적인 유비쿼터스 컴퓨팅 보안에 대한 개념적인 정의가 필요하고 본 논문에서 그러한 개념에 대해 언급하였다. 유비쿼터스 컴퓨팅 환경은 제공하고자 하는 서비스의 용도에 따라서 보안 요구사항이 달라질 수 있음을 기억하고, 보다 본격적인 연구가 뒤따라서 안전하고 신뢰성 높은 유비쿼터스 시대를 맞이할 수 있도록 하여야 할 것이다.

      • IEEE 802.11 무선 LAN 보안 확장기술에 관한 연구

        이종대 동국대학교 영상정보통신대학원 2003 국내석사

        RANK : 251663

        The Legacy IEEE 802.11 Wireless LAN uses WEP which has weak Ⅳ, static key and RC4 secret key for privacy but it isn't enough to needs of Modern Wireless Network. Accordingly, there are many vendor-specific technologies to provide more secure service but these technologies can't support interoperability. And new Enhanced Technologies such as IEEE 802.11i based on IEEE 802.11 Standard are not completed yet. Dynamic Keying, Mutual Authentication, Integrity Check Message Encryption and Advanced Encryption Technologies are needed for Secure Wireless LAN. There are many ways to achieve this but it depends on current system infrastructure, cost, convenience of management. This study was intended to review Legacy Wireless LAN Security and Enhanced Technologies for Wireless LAN Security focused on confidentiality, integrity and availability by surveying technical points and trend according to current active development of Wireless LAN Security. In addition, the study compared and analyzed each technology, and advised necessary requirements for Each user group(Enterprise, Service Provider, SOHO), conclusively to represent recommendable ways to introduce Enhanced Technologies of IEEE 802.11 Wireless LAN Security.

      • 차세대망 기반 DEN을 위한 정책기반 관리 시스템 연구

        백성혁 동국대학교 영상정보통신대학원 2003 국내석사

        RANK : 251663

        In NGNs(Next Generation Networks), It is necessary for Integrated management of resources and information to satisfy high-quality user on demands, such as stable speed, guarantee of high-level security and service requirement in various fields. In relation to this, technology for efficient using limited resources is becoming interesting things more and more, therefore policy of network service is dealt essentially with. For integrated management and efficient use of limited resource that is required in the NGNs, PBNM(Policy-Based Network Management) technology applied policy fitting for given situations is on the rise, and It is necessary for research on information management for policy establishment and application and optimization of existing policy. This study is on method for applying the PBNM technology by utilizing DEN(Directory-Enabled Network), industrial initiative, supported by DMTF(Distributed Management Task Force) to process information efficiently. First, I will study the PBNM and it's related technology as a technology of network management and control, and describe general structure and classified characteristics of DEN as a data and information model for control technology. Based on this, I propose the PBNM system that is able to manage and renew information for network resources stored and managed the DEN-based directories by utilizing policy class.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼