• Title/Summary/Keyword: 순자

Search Result 674, Processing Time 0.031 seconds

Color Change in Pressed Rose Petals as Affected by Pressing Method (압화 방법에 따른 장미 꽃잎의 변색)

  • Byun, Mi Soon;Kim, Soon Ja;Kim, Kiu Weon
    • FLOWER RESEARCH JOURNAL
    • /
    • v.16 no.1
    • /
    • pp.49-56
    • /
    • 2008
  • Typical rose flowers, 'Red Corvette (red)', 'Nobless (pink)', 'Golden Metal (yellow)', and 'Rose Yumi (white)', were used as experimental materials to examine flower color changes as affected by pressing method and light treatment for four weeks and eight weeks by 2,000 lux fluorescent light at a 16 hours daylength. Pressing materials in silicagel mat resulted in the least change after pressing and light treatment for all kinds. On the contrary, an electric pressing device caused color to change to brown. Flower colors deteriorated the most by an electric pressing device made in Korea for pink rose; an electric pressing device made in Japan for white rose; and paper sheet made in Korea for red rose. The sequence of degree in severity of color change after pressing was pink, yellow, and white roses. Light treatment brought about the most extreme color change in yellow 'Nobless' rose, while other three cultivars were rather stable in change of color.

유사배(劉師培)의 『중국민약정의』 연구 - 「상고(上古)」를 중심으로 -

  • Cheon, Byeong-Don
    • Journal of Korean Philosophical Society
    • /
    • v.126
    • /
    • pp.403-422
    • /
    • 2013
  • 유사배(劉師培)는 '반청(反淸)'에서 반전통의 '무정부주의'로, 그리고 '친청(親淸)'으로 변절하는 파란만장한 삶을 살았다. "중국민약정의(中國民約精義)"는 유사배(劉師培)가 무정부운동을 하기 전, 즉 1903년에 완성한 저서다. 1903년은 유사배(劉師培)가 고향을 떠나 상해(上海)에서 반만(反滿) 운동을 시작했던 시기이고, 1907년 일본으로 유학가기 전 4년 여 동안 유사배(劉師培)는 반청(反淸) 운동에 적극적이었다. 따라서 "중국민약정의(中國民約精義)"는 무정부주의자들의 이념인 '반전통(反傳統)'의 관점에서 저술된 것이 아님을 알 수 있다. "중국민약정의(中國民約精義)" 서문은 다음과 같은 중요한 의미를 내포하고 있다. 첫째, 유사배(劉師培)가 참조한 루소의 "민약론"은 양정동(楊廷棟)이 일본어판을 보고 중국어로 번역한 "민약론"이다. 둘째, "민약론"의 내용은 널리 알려지지 않았다. 셋째, 원고는 1903년 이전에 완성되었고, 책은 1904년에 출판되었다. 유사배(劉師培)는 "주역"을 통해서는 '군민(君民)의 일체(一體)'를, "상서"를 통해서는 '군민(君民)이 국가의 공동주인'임을 밝혔다. "시"는 '민의(民意)의 표현'이라고 했으며, "춘추"를 통해 군주세습제와 민권(民權) 그리고 민의(民意)에 의해 관료 등용 등을 주장했다. "논어"를 통해서는 군신(君臣)의 대등 관계와 군민의 일체를 다시 강조하고, "맹자"와 "순자"를 통해 군주가 신성불가침의 영역이 아니기 때문에 민의(民意)를 근거로 군주도 바꿀 수 있다고 했다. 유사배(劉師培)의 이러한 주장만 놓고 보면, 중국은 비록 전제군주체제에 있었지만, 사람들은(人民) 민주제도를 향유한 것 같다. 그러나 실제로는 이와는 정반대의 길을 걸었던 것이 중국이다. 문제는 유사배(劉師培)의 주장처럼 루소의 "민약론"에 버금가는 사상과 역사적 사실이 있었음에도 불구하고, 그것을 제도화된 적이 없다는 점이다. 유사배(劉師培)가 "중국민약정의(中國民約精義)"에서 서술한 '민약(民約)'은 치도(治道) 방면과 비슷하다. 그러나 정도(政道) 방면에 대해서는 거의 언급이 없다. 게다가 서술된 '민약'의 내용이 한 번도 제도화된 적이 없다는 점에 대해 아무런 언급이 없다. 결국 비록 "중국민약정의(中國民約精義)"가 중국 전통사상에서 서구의 '민주' 개념을 모색했다는 점에서 높이 평가할 수 있으나, 그것을 제도화하지 못하고 또 치도(治道)에만 치중해 서술한 점이 "중국민약정의(中國民約精義)"의 약점이다.

Production of Farm-level Agro-information for Adaptation to Climate Change (기후변화 대응을 위한 농장수준 농업정보 생산)

  • Moon, Kyung Hwan;Seo, Hyeong Ho;Shin, Min Ji;Song, Eung Young;Oh, Soonja
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.21 no.3
    • /
    • pp.158-166
    • /
    • 2019
  • Implementing proper land management techniques, such as selecting the best crops and applying the best cultivation techniques at the farm level, is an effective way for farmers to adapt to climate change. Also it will be helpful if the farmer can get the information of agro-weather and the growth status of cultivating crops in real time and the simulated results of applying optional technologies. To test this, a system (web site) was developed to produce agro-weather data and crop growth information of farms by combining agricultural climate maps and crop growth modeling techniques to highland area for summer-season Chinese cabbage production. The system has been shown to be a viable tool for producing farm-level information and providing it directly to farmers. Further improvements will be required in the speed of information access, the microclimate models for some meteorological factors, and the crop growth models to test different options.

Development of Safety Clothing for Sports and Entertainment for Adolescent (청소년을 위한 스포츠 및 엔터테인먼트 안전의복의 개발)

  • Park, Soon Ja;Ko, Soo Kyung
    • Human Ecology Research
    • /
    • v.59 no.1
    • /
    • pp.83-97
    • /
    • 2021
  • This study developed safety clothing that is essential for adolescent to protect their bodies from accidents, pursue activities and individuality. Therefore, the developed safety clothing was first based on international standards, while changing design to emphasize creativity, activity, and functionality. Two suits of boy's clothes and a girl's suit were developed as safety clothing for sportswear, along with two pairs of girl's clothes and a pair of boy's clothes for entertainment. It was confirmed that the difference in visibility was revealed by testing under different lighting conditions. Second, the survey on adolescents indicated no significant gender difference in sportswear. Round shirt+shorts for both boys and girls were the most preferred for ball game sportswear. However, there was a significant difference by gender in the design of safety clothing for entertainment. Male students preferred jump suit=cape+pants the most, and female students preferred jump suit>cape+pants in the order (p<0.05). In the safety clothes with the highest preference for entertainment, there was no gender difference. All students preferred the jump suit at the most. Checking at each school level, it was found that both middle and high school students preferred jump suit designs, and in safety clothing, middle school students preferred high-neck shirt blouse+tight skirt, and high school students preferred jump suits. Third, 35.5% responded that they would wear it more if current safety clothing is improved. This indicated the necessity of developing various safety clothing for adolescence.

Evaluation on Wear Sensation of Safety Clothing for Current Street Cleaners -Focusing on Publicly Supplied Safety Clothing for Street Cleaners- (현 환경미화원용 안전작업복의 착용감 평가 -공적으로 공급된 환경미화원복을 중심으로-)

  • Park, Soonja;Dempoya, Ayano;Koshiba, Tomoko
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.44 no.6
    • /
    • pp.1037-1052
    • /
    • 2020
  • This study evaluates the comfort and suitability of safety clothing. We made three safety clothes 'y', 'lg', 'lgH'. Only 'y' made with fluorescence fabric has passed International Standards (ISO 20471). A wearing test investigated the physiological response and subjective sensations at 30℃ and 50% RH, six men participated. Mean skin temperature and tympanic temperature showed significant difference with experimental course (p<.05). The micro-temperature (Tm) showed significant differences between three garments on the thigh (p<.01). When wearing 'lg', Tm was the highest. Micro-humidity indicated the interaction between clothing and the experimental course on the chest with no significant difference; however, there was a low tendency when wearing 'lgH' after the second half of exercise. The sweat rate indicated a significant difference between 'lg' and 'lgH' at 20 minutes of exercise (p<.05). Three sensations showed significant differences with the time (p<.01), there was also a tendency to feel hotter and more humid when wearing 'lg'. Skin sensation showed significant differences between pre-experiment and post-experiment (p<.05), 'y' was the most preferred. The 'lg' with long-sleeved currently worn in Korea tended to feel hotter, more humid and more uncomfortable than 'y'. It indicates that there is room for improvement in Korean safety clothing.

DoS-Resistance Authentication Protocol for Wreless LAN (DoS 공격에 강한 무선 랜 인증 프로토콜)

  • 김민현;이재욱;최영근;김순자
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.3-10
    • /
    • 2004
  • A Wireless Lan has an importance of access control, because we can use wireless Internet via AP(Access Point). Moreover, to use wireless LAN, we will go through authentication process of EAP. DoS(Denial of Service) attack is one of the fatal attack about these AP access and authentication process. That is, if malicious attacker keeps away access of AP or consumes memory of server and calculation ability of CPU and etc. compulsorily in authentication process, legal user can't get any services. In this paper, we presents the way of protection against the each attack that is classified into access control, allocation of resource, attack on authentication protocol. The first thing, attack to access control, is improved by pre-verification and the parameter of security level. The second, attack of allocation of resource, is done by partial stateless protocol. And the weak of protocol is done by time-stamp and parameter of access limitation.

An Enhanced Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Privacy (강한 인증과 프라이버시를 보장하는 개선된 초경량 RFID 인증 프로토콜)

  • Jeon, Dong-Ho;Kim, Young-Jae;Kwon, Hye-Jin;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.81-91
    • /
    • 2009
  • Recently, Chein et al proposed the ultralightweight strong authentication and strong integrity (SASI)protocol, where the tag requrires only simple bitwise operations. Since the tag does not support random number generator to generate a challenge nonce, an attacker can replay old messages and impersonate reader. However, all of the previous ultralightweight authentication schemes are vlunerable to various attacks: de-synk, eavesdropping, impersonating, tracking, DoS, disclosure etc. we analyze the problems of previous proposed ultrlightweight protocols, to overcome these security problems by using PRNG on the tag. Therefore, in this paper we propose a new lightweight RFID mutual authentication protocol that provides random number generator and bitwise operations, a security and an efficiency of the proposed schme analyze.

Authentication and Key Agreement Protocol based on NTRU in the Mobile Communication (NTRU기반의 이동 통신에서의 인증 및 키 합의 프로토콜)

  • 박현미;강상승;최영근;김순자
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.49-59
    • /
    • 2002
  • As the electronic commerce increases rapidly in the mobile communication, security issues become more important. A suitable authentication and key agreement for the mobile communication environment is a essential condition. Some protocols based on the public key cryptosystem such as Diffie-Hellman, EIGamal etc. were adapted in the mobile communication. But these protocols that are based on the difficult mathematical problem in the algebra, are so slow and have long key-length. Therefore, these have many limitation to apply to the mobile communication. In this paper, we propose an authentication and key agreement protocol based on NTRU to overcome the restriction of the mobile communication environment such as limited sources. low computational fewer, and narrow bandwidth. The proposed protocol is faster than other protocols based on ECC, because of addition and shift operation with small numbers in the truncated polynomial ring. And it is as secure as other existent mathematical problem because it is based on finding the Shortest or Closest Vector Problem(SVP/CVP).

Proxy Signatures based on XTR Cryptosystem (XTR 암호 시스템 기반의 대리 서명)

  • 이재욱;전동호;최영근;김순자
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.111-117
    • /
    • 2003
  • The XTR public key system has advantage of short key length and fast computing speed. So, the XTR is used usefully in complicated operation. In this paper, we propose a new algorithm of double exponentiation operation and a proxy signature protocol based on the XTR. The double exponentiation operation should be executed to apply XTR for the proxy signature protocol. But this algorithm is inappropriate, because two secret key has to be blown in existent operation algorithm. New algorithm enable double exponentiation operation with proxy signer's secret key and public information. And the XTR is used to generation and verification of proxy at proxy signature protocol. Therefore proxy signature based on the XTR has basic advantage of the XTR. These advantage can be used in internet as well as mobile.

A Ternary Tree-based Authenticated Group Key Agreement For Dynamic Peer Group (동적 피어 그룹을 위한 삼진 트리방식의 인증된 그룹 키 합의 프로토콜)

  • Kim, Ho-Hee;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1253-1263
    • /
    • 2012
  • As a result of the increased popularity of group oriented applications, the design of an efficient authenticated group key agreement protocol has received a lot of attention. Lee et al. proposed a tree-based group key agreement protocol, which applies a ternary key tree structure and pairing-based cryptography to the key agreement of Dynamic Peer Group. In their protocol, only the group sponsor knows all member's session random keys computes all blinded keys. In addition, when the group sponsor leaves a group, all nodes of the tree should be changed. In this paper, we present the modified protocol that has several sponsors. Since a secret value for each member isn't given to the group sponsor, the key renewing of our protocol is more secure and efficient than that of Lee et al.'s protocol in the previous case. Therefore, our protocol is suitable to Dynamic Peer Groups.