• Title/Summary/Keyword: ORACLE

Search Result 389, Processing Time 0.025 seconds

Actual Experience of the Oracle of the I Ching-Death, God and Love: In Front of My Father's Spirit (주역 점(占)의 실제 체험-죽음, 신 그리고 사랑: 아버지의 영전(靈前)에서)

  • Ju Hyun Lee;Bou-Yong Rhi
    • Sim-seong Yeon-gu
    • /
    • v.37 no.2
    • /
    • pp.149-183
    • /
    • 2022
  • The oracle of the I Ching, divination can be understood as 'synchronicity phenomenon' in analytic psychology. In order to experience divination actually, it requires a religious attitude that asks questions with a serious mind when a person is in trouble that consciousness reaches its limit. It is not just a passive attitude, but a modest, active attitude to ask what I can do now. The experience of the oracle of the I Ching connected to supra-consciousness is similar to 'active imagination'-talking with the archetype of collective unconsciousness-and is 'the process of finding the rhythm of Self-archetype, the absolute wisdom of unconsciousness.' One month before my father's death, I took care of him who couldn't communicate verbally and I divination with a question 'What can I do for my father and me now?' The I Ching's answer was hexagram 19 Lin 臨, nine at the beginning. It's message was '咸臨貞吉 joint approach. perseverance brings good fortune.' 志行正也 we must adhere perseveringly to what is right.' Through this phrase, I learned the attitude of waiting for life after death as if 'joyful obedient' to the providence of nature that spring comes after winter. And I found that keeping the touching emotion of meeting infinity (in analytical psychological terms, 'Self') with perseveration is to do the true meaning of life beyond popular money-mindedness. And six months before my father's death, I had a dream about the afterlife. In the process of interpreting that dream, I learned not only from the shock of the direct message that 'it is a truth that there is something after death,' but also the regeneration of the mind through introversion from the similarity between the closed ward and '黃泉'-chinese underworld through amplification. And I learned the importance of an open attitude to accept new things through the 'window to eternity' symbolized by the white iron gate. In my father's catholic funeral ritual, I had hope that the catholic doctrine 'Communio Sanctorum'-A spiral cycle in which the living and the dead help each other may be real as well as a symbol of the individuation process in which consciousness and unconsciousness interact in our minds. Through the consolation received through the funeral visit of many people I met in my life, I found the answer that the path to contact with infinity begins with loving the beings in front of me. I tried to understand this continuous experience by the perspective of analytical psychology.

Study on Improvement of Weil Pairing IBE for Secret Document Distribution (기밀문서유통을 위한 Weil Pairing IBE 개선 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.59-71
    • /
    • 2012
  • PKI-based public key scheme is outstanding in terms of authenticity and privacy. Nevertheless its application brings big burden due to the certificate/key management. It is difficult to apply it to limited computing devices in WSN because of its high encryption complexity. The Bilinear Pairing emerged from the original IBE to eliminate the certificate, is a future significant cryptosystem as based on the DDH(Decisional DH) algorithm which is significant in terms of computation and secure enough for authentication, as well as secure and faster. The practical EC Weil Pairing presents that its encryption algorithm is simple and it satisfies IND/NM security constraints against CCA. The Random Oracle Model based IBE PKG is appropriate to the structure of our target system with one secret file server in the operational perspective. Our work proposes modification of the Weil Pairing as proper to the closed network for secret file distribution[2]. First we proposed the improved one computing both encryption and message/user authentication as fast as O(DES) level, in which our scheme satisfies privacy, authenticity and integrity. Secondly as using the public key ID as effective as PKI, our improved IBE variant reduces the key exposure risk.

Automation Tool Design for PL/SQL Applications Conversion (PL/SQL 응용프로그램 전환을 위한 자동화 도구 설계)

  • Jee, Jungeun;Lee, Jeongkun;Choi, Yongrak;Shin, Yongtae
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.8
    • /
    • pp.287-296
    • /
    • 2018
  • In the recent commercial DBMS market, as the users' burden and complaint which are related to high price licensing policy and late technical support service are increasingly rising, the concern for use of open source DBMS which has no problem with compatibility or stability is escalating. Due to the fact, the cases saving the cost are growing by converting Oracle Corporation's applications, which has about 60% share in the DBMS market, to an open source DBMS. However, in converting non-interchange sentences to an ANSI standard-based open source DBMS because of the use of PL/SQL in Oracle Corporation provides, a lot of manual work accompanies, so there is a lot of loss of time and money. Therefore, a tool that automatically converts PL/SQL to standard SQL is required. The proposed automation tool for the conversion of applications converts PL/SQL to Java Stored Procedure, an open source DBMS-based ANSI standard programming language. Through carrying out a test on the automation tool, it is proved that the tool will contribute to shortening time and saving cost by verifying the identity of input-output data and its reliability after correcting errors in converting to Java Stored Procedure.

The Method for Transforming the Shape File in ESRI into the Oracle Spatial DB for the Spatial DB Construction of the Drainage System (하수관거 공간DB 구축을 위한 ESRI 공간 파일의 오라클 공간DB 자동 변환 기법)

  • Kim, Ki-Uk;Hwang, Hyun-Suk;Kim, Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.7
    • /
    • pp.989-996
    • /
    • 2009
  • Recently, use of the GIS (Geographic Information System) for the disaster of the urban inundation is increasing. The digital disaster map is the system which analyzes the occurrence area of inundation in the past and forecasts the flood areas by the hydrology method. The development of the system which simulates the flood forecast area by the SWMM(Storm Water Management System) and hydrology method and displays the danger areas is required for the construction of the inundation forecast system. And the spatial database which contains information of the urban facilities such as the street and building and the sewer system such as the manhole and drainage and the result of the hydrology analysis is constructed. In this paper, we propose the method for transforming the Shape File in ESRI into the Oracle spatial database to construct the spatial data for the drainage systems and urban facilities using the Shape File format in the ESRI. We suggest the algorithm for the transformation of the data format, and develop the prototype system to display the inundation area using the spatial database.

  • PDF

ID-Based Proxy Re-encryption Scheme with Chosen-Ciphertext Security (CCA 안전성을 제공하는 ID기반 프락시 재암호화 기법)

  • Koo, Woo-Kwon;Hwang, Jung-Yeon;Kim, Hyoung-Joong;Lee, Dong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.64-77
    • /
    • 2009
  • A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a ciphertext for Alice into the ciphertext for Bob. Recently, ID-based proxy re-encryption schemes are receiving considerable attention for a variety of applications such as distributed storage, DRM, and email-forwarding system. And a non-interactive identity-based proxy re-encryption scheme was proposed for achieving CCA-security by Green and Ateniese. In the paper, we show that the identity-based proxy re-encryption scheme is unfortunately vulnerable to a collusion attack. The collusion of a proxy and a malicious user enables two parties to derive other honest users' private keys and thereby decrypt ciphertexts intended for only the honest user. To solve this problem, we propose two ID-based proxy re-encryption scheme schemes, which are proved secure under CPA and CCA in the random oracle model. For achieving CCA-security, we present self-authentication tag based on short signature. Important features of proposed scheme is that ciphertext structure is preserved after the ciphertext is re-encrypted. Therefore it does not lead to ciphertext expansion. And there is no limitation on the number of re-encryption.

Developing Forest Fire Status Information Management System using Web GIS Technology (웹 지리정보시스템 기술을 이용한 산불 현황정보 관리시스템 개발)

  • Jo, Myung-Hee;Kim, Joon-Bum;Kim, Hyun-Sik;Jo, Yun-Won
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.5 no.4
    • /
    • pp.93-105
    • /
    • 2002
  • In this paper forest fire status information management system was developed under web environment using web GIS(geographic information system) technology. Though this system, general users can easily retrieval domestic forest fire status information and obtain that in visual way such as maps, graphs, and texts if they have only certain web browsers. Moreover, officials, who have system access authority, can easily control and manage all domestic forest fire status information through input interface, retrieval interface, and out interface of the system. This system can be considered as the first domestic system to manage forest fire status data and service them in visual through user friendly interfaces on web. In order to implement this system, IIS 5.0 of Microsoft is used as web server and Oracle 8i and ASP(active server page) are used for database construction and dynamic web page operation, respectively. Also, ArcGIS IMS(internet map server) of ESRI is used to serve maps by using Java and HTML as system development languages. Not only the domestic tendency of forest fire but also the forest fire status information of certain area and time such as the frequency and the loss can be presented through distribution maps, graphs and tables. Therefore, this system is supposed to play as a important role when the policy relate to domestic forest fire is established. In addition, the self consciousness of people against forest fire can be inspired and the foundation of scientific and systemic forest fire services can be obtained through this system in the future.

  • PDF

A Study on u-Learning based IT Vocational Education Contents Development of the Deaf Using HTML5 (HTML5를 이용한 청각장애인의 u-Learning 기반 IT 직업 교육 콘텐츠 개발에 관한 연구)

  • Rhee, K.M.;Kim, D.O.
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.9 no.3
    • /
    • pp.195-201
    • /
    • 2015
  • In this study, IT education contents have been developed based on the u-Learning approach for people with hearing impairment, focusing on allowing the user to learn from anywhere and anytime. Specifically, this study applies HTML5 to implementing IT education contents(JSP, Oracle) for the deaf because HTML5 enables the learner to access the contents through both web and mobile device on various platforms including android, Mac OS, and PC etc. The results of this study are as follows: First, the online computer courses are mostly supposed to be compatible with diverse types of mobile devices. However, some of the contents could not be run on applications residing in web and mobile devices because the contents tend to be developed using FLASH. HTML5 is the effective way to overcome the compatibility problem. Second, FLASH and HTML5 contents authoring tools have been compared in terms of their strong and weak points by applying the developed contents to those tools. The study also suggests that the future work would be needed in order to implement wide variety of event functions with HTML5. Lastly, design strategies enabling access through web and mobile devices have been analyzed in accordance with u-Learning design guidelines for the deaf and mobile application accessibility guidelines. However, in the latter case, the future work regarding design guidelines needs to be conducted to improve the educational accessibility depending on the level of impairment.

  • PDF

A PIVOT based Query Optimization Technique for Horizontal View Tables in Relational Databases (관계 데이터베이스에서 수평 뷰 테이블에 대한 PIVOT 기반의 질의 최적화 방법)

  • Shin, Sung-Hyun;Moon, Yang-Sae;Kim, Jin-Ho;Kang, Gong-Mi
    • The KIPS Transactions:PartD
    • /
    • v.14D no.2
    • /
    • pp.157-168
    • /
    • 2007
  • For effective analyses in various business applications, OLAP(On-Line Analytical Processing) systems represent the multidimensional data as the horizontal format of tables whose columns are corresponding to values of dimension attributes. Because the traditional RDBMSs have the limitation on the maximum number of attributes in table columns(MS SQLServer and Oracle permit each table to have up to 1,024 columns), horizontal tables cannot be directly stored into relational database systems. In this paper, we propose various efficient optimization strategies in transforming horizontal queries to equivalent vertical queries. To achieve this goral, we first store a horizontal table using an equivalent vertical table, and then develop various query transformation rules for horizontal table queries using the PIVOT operator. In particular, we propose various alternative query transformation rules for the basic relational operators, selection, projection, and join. Here, we note that the transformed queries can be executed in several ways, and their execution times will differ from each other. Thus, we propose various optimization strategies that transform the horizontal queries to the equivalent vertical queries when using the PIVOT operator. Finally, we evaluate these methods through extensive experiments and identify the optimal transformation strategy when using the PIVOT operator.

The Support System for Groundwater Development Design using GIS (GIS를 이용한 지하수개발 설계지원 시스템)

  • 김만규
    • Spatial Information Research
    • /
    • v.9 no.2
    • /
    • pp.207-225
    • /
    • 2001
  • This study develops a GIS-based system which examines the adequacy of the Groundwater development project before the actual designing of the project. A system environment is constructed in order to efficiently and scientifically manage and analyze data related to Groundwater through a Server/Client environment. For this programs such as GIS S/W ArcVies3.2, RDBMS ORACLE, ArcSDE (Spatial Database Engine) are used. WHPA and AQTESOLV are employed as a underground water simulation program and Scripts, a language for ArcView, is used to develop graphic user interface (GUI). Using the system developed here, we can transfer simulation results obtained by WHPA regarding Groundwater levels in new development projects into GIS. We can also judge whether a Groundwater development project should be permitted through examining overlaps of th effects of the development and comparing with o pollutants. At the same time, the system has a feature of supporting Groundwater development and based designing through judging the proper amount of Groundwater in a new project. It is also possible to easily and quickly prepare charts and reports using the outputs of the system. Since a two-tiered system which shares DB using inter-and intranets is developed, all the departments in the ministry of agriculture and forest and the agriculture base corporation can share accurate, reliable and latest information related to Groundwater.

  • PDF

Development of GIS based Marine Mineral Resource Information System for Managing Marine Exploration Data (GIS 기반의 해양탐사자료 관리를 위한 해양광물자원정보시스템 설계 및 구축)

  • Kim, Dong-Il;Kim, Kye-Hyun;Park, Yong-Hyun
    • Spatial Information Research
    • /
    • v.19 no.6
    • /
    • pp.19-28
    • /
    • 2011
  • Recently, the interests of marine mineral resources has been increasing from the depletion of land resources around the world and many countries are involving in marine exploration work. South Korea is also currently performing exploration work to estimate the marine mineral resources around the Korean Peninsula. However, massive amounts of marine exploration data accumulated from the long-term exploration work have not been systematically managed. The data have been managed by the file based system instead of commercial database. The aim of this study is to construct GIS-based Marine Mineral Resource Information System using a spatial database for the core sediments of the marine exploration data. For constructing such DB system, GIS-based data items were classified, and a database was designed using relational database model. The database was constructed using commercial DBMS(Database Management System), Oracle. Also, necessary functions of the system were defined for the effective use of database based on users' requirement analysis. The GIS-based Marine Mineral Resource Information System has enabled to support the systematic management of the marine exploration data. Furthermore, it is expected that this spatial database will be useful in estimating the reserves of the mineral resources and provide valuable information for economic evaluation. In the future, the application of advanced techniques of spatial analysis and 3-dimensional display function will be required.