• Title/Summary/Keyword: Proof systems

Search Result 329, Processing Time 0.022 seconds

A Study on the Validity and Practical Application of Liquidated Damage Clause(LD Clause) in International Sales Contract (국제물품매매계약(國際物品賣買契約)에서 'Liquidated Damage Clause'(LD 조항(條項))의 유효성(有效性)과 실무적(實務的) 적용(適用)에 관한 연구)

  • Oh, Won-Suk
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.17
    • /
    • pp.71-91
    • /
    • 2002
  • The purpose of this paper is to examine the viewpoints of the different legal systems for the validity of LD Clause and the possibility of gap-filling function of UNIDROIT Principles in International Sales Contract. The results of comparative study between common law system and civil law system, and between CISG and UNCDROIT Principles is as follows: First, common law system distinguishes LD Clause and Penalty Clause, but civil law system including Korean law does not strictly distinguish the difference between them, provided that the liquidated damages are not grossly excessive. Second, CISG does not concerned with the validity of LD Clause but entrust this matter to the law applicable by virtue of the rules of private international law; conversely the Principles follow similar position of civil law system. The possibility of gap-filling of the Principles is more positive in the case of arbitration than in the case of litigation. On the basis of above study, I also checked the LD Clauses of ICC Model International Sales and the Model Contracts of Korean Commercial Arbitration Board. The LD Clauses of there two Model Contract seem very appropriate and reasonable for the reference in practical application. The appropriate, not excessive, LD Clause will contribute not only to eliminate the burden of proof for the actual damages, but also to enforce both parties to perform their obligations in their contracts. Therefore, When we make contract, we should keep in our mind to insert the reasonable and appropriate LD Clause in the sales contract. If not, so to speak, litigated damages are grossly excessive, the Clause may be invalid in some legal system.

  • PDF

A Study on Personalized Search System Based on Subject Classification (주제분류 기반의 개인화 검색시스템에 관한 연구)

  • Kim, Kwang-Young;Kwak, Seung-Jin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.45 no.4
    • /
    • pp.77-102
    • /
    • 2011
  • The purpose of this study is to design, implement and evaluate a personalized search system using gathered information on users to provide more accurate search results. For this purpose, a hybrid-based user profile is constructed by using subject classification. In order to evaluate the performance of the proposed system, experts directly measured and evaluated MRR, MAP and usability by using the Korean journal articles of science and technology DB. Its performance was better than the general search system in the area of "Computer Science" and "Library and Information Science". Especially better results were shown when tested on ambiguous keywords. Evaluation through in-depth interviews proved that the proposed personalized search system was more efficient in looking up and obtaining information. In addition, the proposed personalized search system provided a variety of recommendation systems which proved helpful in navigating for new information. High user satisfaction ratings on the proposed personalized search system were another proof of its usefulness. In this study, we were able to prove through expert evaluation that the proposed personalized search system was more efficient in information retrieval.

Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model

  • Xie, Dong;Peng, HaiPeng;Li, Lixiang;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2427-2445
    • /
    • 2016
  • In contrast to traditional "store-and-forward" routing mechanisms, network coding offers an elegant solution for achieving maximum network throughput. The core idea is that intermediate network nodes linearly combine received data packets so that the destination nodes can decode original files from some authenticated packets. Although network coding has many advantages, especially in wireless sensor network and peer-to-peer network, the encoding mechanism of intermediate nodes also results in some additional security issues. For a powerful adversary who can control arbitrary number of malicious network nodes and can eavesdrop on the entire network, cryptographic signature schemes provide undeniable authentication mechanisms for network nodes. However, with the development of quantum technologies, some existing network coding signature schemes based on some traditional number-theoretic primitives vulnerable to quantum cryptanalysis. In this paper we first present an efficient network coding signature scheme in the standard model using lattice theory, which can be viewed as the most promising tool for designing post-quantum cryptographic protocols. In the security proof, we propose a new method for generating a random lattice and the corresponding trapdoor, which may be used in other cryptographic protocols. Our scheme has many advantages, such as supporting multi-source networks, low computational complexity and low communication overhead.

Development of a Web-based Adaptive System for Learning Pumping Lemma (펌핑 정리 학습을 위한 웹기반 적응형 시스템 개발)

  • Jung, Hyosook;Min, Kyungsil;Park, Seongbin
    • The Journal of Korean Association of Computer Education
    • /
    • v.12 no.5
    • /
    • pp.87-94
    • /
    • 2009
  • This paper presents a Web-based interactive and adaptive learning system that helps students learn the pumping lemma for the family of regular languages. Our system allows the students to proceed with their learning according to their individual differences through Web-Based Instruction and gives them opportunities for the interaction so that they can practice exercise related to the learning and gain feedbacks on the results of the exercises immediately. Especially, the system provides adaptive scaffolding that helps learners understand each step for the proof of the pumping lemma. Unlike existing systems that support learning the pumping lemma, the proposed system defines possible errors in advance and provides appropriate messages for corresponding errors. In addition, the system allows the learners to decompose a string into three parts so that they can understand the pumping lemma precisely.

  • PDF

Regression Testing of Software Evolution by AOP (AOP를 이용하여 진화된 프로그램의 회귀테스트 기법)

  • Lee, Mi-Jin;Choi, Eun-Man
    • The KIPS Transactions:PartD
    • /
    • v.15D no.4
    • /
    • pp.495-504
    • /
    • 2008
  • Aspect Oriented Programming(AOP) is a relatively new programming paradigm and has properties that other programming paradigms don't have. This new programming paradigm provides new modularization of software systems by cross-cutting concerns. In this paper, we propose a regression test method for program evolution by AOP. By using JoinPoint, we can catch a pointcut-name which makes it possible to test the incorrect pointcut strength fault and the incorrect aspect precedence fault. Through extending proof rules to aspect, we can recognize failures to establish expected postconditions faults. We can also trace variables using set() and get() pointcut and test failures to preserve state invariant fault. Using control flow graph, we can test incorrect changes in control dependencies faults. In order to show the correctness of our proposed method, channel management system is implemented and tested by using proposed methods.

Effect of hanging-type sand fence on characteristics of wind-sand flow fields

  • Cheng, Jian-jun;Lei, Jia-qiang;Li, Sheng-yu;Wang, Hai-feng
    • Wind and Structures
    • /
    • v.22 no.5
    • /
    • pp.555-571
    • /
    • 2016
  • A hanging-type sand-retaining wall is a very common sand-blocking fence structure used to prevent sand movement. This type of wall is widely used along the Qinghai-Tibet and Gobi desert railways in Xinjiang, Western China. To analyze the characteristics of wind-sand flow fields under the effect of such a sand fence structure, a wind tunnel test and a field test were carried out. The wind tunnel test showed the zoning characteristics of the flow fields under the effect of the hanging-type sand-retaining wall, and the field test provided the sediment transport data for effective wind-proof interval and the sand resistance data in the front and behind the sand-retaining wall. The consistency of the wind-sand flow fields with the spatial distribution characteristic of wind-carried sand motion was verified by the correspondences of the acceleration zone in the flow field and the negative elevation points of the percentage variations of the sand collection rate. The spatial distribution characteristic of the field sand collection data further showed the spatial structural characteristic of the sandy air currents under the action of the hanging-type sand-retaining wall and the sand resistance characteristic of the sand-retaining wall. This systematic study on the wind-sand flow fields under the control of the hanging-type sand-retaining wall provides a theoretical basis for the rational layout of sand control engineering systems and the efficient utilization of a hanging-type sand-retaining wall.

Design and Analysis of Social Network Service Model Using a Ubiquitous Business Card (RFID가 내재된 비즈니스 카드를 활용한 유비쿼터스 사회 연결망 서비스 모델 설계 및 분석)

  • Oh, Jae-Suhp;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.2
    • /
    • pp.75-95
    • /
    • 2009
  • The aim of this research is to design and analyze a social network service model using mobile RFID based business card. This paper suggests how the behavior of exchanging business cards will be changed in ubiquitous environment and designs a social networking service model using a ubiquitous business card, which embeds a RFID tag. We describe the scenarios and analyze a role, value and potential benefits of participants of the u-SNS service model. For the proof of the superiority and the feasibility of our model, we compare it with its related researches and products based on the calculation of the benefits and costs of the alternatives.

  • PDF

Phishing Detection Methodology Using Web Sites Heuristic (웹사이트 특징을 이용한 휴리스틱 피싱 탐지 방안 연구)

  • Lee, Jin Lee;Park, Doo Ho;Lee, Chang Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.10
    • /
    • pp.349-360
    • /
    • 2015
  • In recent year, phishing attacks are flooding with services based on the web technology. Phishing is affecting online security significantly day by day with the vulnerability of web pages. To prevent phishing attacks, a lot of anti-phishing techniques has been made with their own advantages and dis-advantages respectively, but the phishing attack has not been eradicated completely yet. In this paper, we have studied phishing in detail and categorize a process of phishing attack in two parts - Landing-phase, Attack-phase. In addition, we propose an phishing detection methodology based on web sites heuristic. To extract web sites features, we focus on URL and source codes of web sites. To evaluate performance of the suggested method, set up an experiment and analyze its results. Our methodology indicates the detection accuracy of 98.9% with random forest algorithm. The evaluation of proof-of-concept reveals that web site features can be used for phishing detection.

Changes in Physical Properties Especially, Three Phases, Bulk Density, Porosity and Correlations under No-tillage Clay Loam Soil with Ridge Cultivation of Rain Proof Plastic House

  • Yang, Seung-Koo;Seo, Youn-Won;Kim, Sun-Kook;Kim, Byeong-Ho;Kim, Hee-Kwon;Kim, Hyun-Woo;Choi, Kyung-Ju;Han, Yeon Soo;Jung, Woo-Jin
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.47 no.4
    • /
    • pp.225-234
    • /
    • 2014
  • This study was carried out to investigate the sustainable agriculture of no-tillage technique including recycling of the ridge and the furrow of a field for following crops in Korea. No-tillage systems affect soil physical properties such as three phase (solid, liquid, and air phase) and distribution of soil granular. Solid ratio of subsoil in 3-year of no-tillage (NT) treatment was remarkably lower than that in conventional (CT, 2-year of no-tillage + 1-year of tillage) treatment, while air ratio of subsoil in NT remarkably increased. Bulk density of subsoil in NT remarkably decreased. Porosity of subsoil in NT remarkably increased. Deviation of air phase, bulk density, and porosity of top soil and subsoil in NT remarkably decreased in NT compared with CT. Solid phase ratio and liquid phase ratio in NT and CT had positive (+) correlation. Solid phase ratio and air phase ratio in NT and CT had negative (-) correlation, also liquid phase ratio and air ratio had negative (-) correlation. Bulk density and liquid ratio in soil had positive (+) correlation at top soil and subsoil in NT. Bulk density and air ratio in soil had negative (-) correlation in NT and CT. Porosity and liquid phase ratio had negative (-) correlation, r =1), the significant value was lower in NT than in CT. Porosity and air phase ratio had positive (+) correlation (r =1).

A P2P-to-UPnP Proxy Gateway Architecture for Home Multimedia Content Distribution

  • Hu, Chih-Lin;Lin, Hsin-Cheng;Hsu, Yu-Feng;Hsieh, Bing-Jung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.406-425
    • /
    • 2012
  • Deploying advanced home networking technologies and modern home-networked devices in residential environments provides a playground for new home applications and services. Because home multimedia entertainment is among the most essential home applications, this paper presents an appealing home media content sharing scenario: home-networked devices can discover neighboring devices and share local media content, as well as enormous amounts of Internet media content in a convenient and networked manner. This ideal scenario differs from traditional usages that merely offer local media content and require tedious manual operations of connection setup and file transfer among various devices. To achieve this goal, this study proposes a proxy gateway architecture for home multimedia content distribution. The proposed architecture integrates several functional mechanisms, including UPnP-based device discovery, home gateway, Internet media provision, and in-home media content delivery. This design addresses several inherent limitations of device heterogeneity and network interoperability on home and public networks, and allows diverse home-networked devices to play media content in an identical and networked manner. Prototypical implementation of the proposed proxy gateway architecture develops a proof-of-concept software, integrating a BitTorrent peer-to-peer client, a UPnP protocol stack, and a UPnP AV media server, as well as media distribution and management components on the OSGi home gateway platform. Practical demonstration shows the proposed design and scenario realization, offering users an unlimited volume of media content for home multimedia entertainment.