• Title/Summary/Keyword: Wang

Search Result 13,764, Processing Time 0.035 seconds

A Study of Wang Lun (王綸)'s Assertion on Ginseng and Astragali Radix and Its Related Arguments (왕륜(王綸)의 삼기론 및 그 관련 논의들에 대한 고찰)

  • Eun, Seok-Min
    • The Journal of Korean Medical History
    • /
    • v.28 no.2
    • /
    • pp.47-58
    • /
    • 2015
  • Objectives : The purpose of this study was to investigate Wang Lun (王綸)'s assertion on Ginseng and Astragali Radix and its related arguments that had shown critical or advocative point of views about Wang lun's theory. It was expected that this study would help understand the history of arguments on the usage of Ginseng and Astragali Radix that had been triggered by Wang lun's assertion. Methods : In the process of investigation, this study first looked into the assertions of Wang Lun and the representative arguments about it, which includes Yu Tuan, Wang Ji (汪機), Sun Yikui (孫一奎). And secondly, this study also examined the other following additional arguments that had shown the conclusional aspects of this disputes. Results & Conclusions : Wang Lun (王綸)'s assertion on Ginseng and Astragali Radix proclaimed that in the symptoms of fevers in lung or lack of blood (血) the use of Ginseng and Astragali Radix must be prohibited. This assertion later faced severe criticism by opposers like Yu Tuan, Wang Ji. These opposers asserted that Yang (陽) has the ability of creating Yin (陰), and Ginseng and Astragali Radix could be the right drugs to the symptoms by lack of Yin. But a few approvers like Sun Yikui (孫一奎) had tried to advocate Wang Lun's assertion and casted the question of true meaning of Wang Lun. And In the other following arguments, it could be said that the influence of Wang Lun's assertion had gradually waned but could have been reciprocally accepted in the opposite point of view.

Korean Wang-ta: Characteristics and Prevention Program (한국의 왕따와 예방프로그램)

  • Keumjoo Kwak
    • Korean Journal of Culture and Social Issue
    • /
    • v.14 no.1_spc
    • /
    • pp.255-272
    • /
    • 2008
  • When observing the subjects and seriousness of Korea's Wang-ta, it is urgent that we know the characteristics of Wang-ta and its conditions. In this study, we investigated the definition of Wang-ta, which partly differs from bullying. Also, the phenomenal characteristics of collectivism, the victimization of an individual once stigmatized in the Wang-ta process, the generalization of the Wang-ta process where bullies extend their territory into general students were examined. Moreover, external environment such as Korea's school environment, negative house environment, and collective culture were examined. The three general structures in researching Korea's Wang-ta were presented. The first structure consists of a bully, victim, and a bully-victim. The second structure focuses on the certain groups, which consists of followers, outsider, and the defender. The last structure deals with the psychological characteristics of the participant roles, which are the bully, reinforcer, assistant, defender, victim, and outsider. Wang-ta prevention programs, which reflects the characteristics of Wang-ta, are presented. Implications on future Wang-ta prevention programs are discussed.

  • PDF

A Study on the Architectural Characteristic of Nam-kwan-wang-myo and it's Reconstruction (고종 36년(1899) 남관왕묘의 중건과 건축 특성 연구)

  • Kwon, Joon-Hyung
    • Journal of architectural history
    • /
    • v.22 no.4
    • /
    • pp.73-82
    • /
    • 2013
  • This study aims to find architectural characteristic of Nam-kwan-wang-myo as known as Nam-myo, Especially focusing on difference between before and after it's reconstruction in 1899. Nam-kwan-wang-myo is a shrine for Kwan-woo who was warlord in ancient china. Belief of Kwan-Woo was introduced to Korea in Japanese invasion of 1592 and the shrine was built in 1598. Belief of Kwan-Woo diffused for the late Joseon, during the reign of Gojong, many people have faith in Kwan-Woo including the king. There was four Kwan-wang-myo around the Hanyang at that time. In 1899 a fire of unknown cause broke out at Nam-kwan-wang-myo, so the main buildings burned down. The king instructed reconstruction of the shrine even though there was in financial difficulties, it had done in the midst of a national crisis. The buildings almost restored as before. The buildings in the shrine has strong characteristics of Chinese architecture because it made by people of the Ming dynasty. Two side-by-side roofs, accumulated brick exterior are important architectural feature, but also all the buildings in the mail hall area Surrounded by the closed-connected fence is hard to find examples in Korea traditional architecture. And Nam-kwan-wang-myo just had maintained architectural characteristics including layout of buildings, shape of the each building until it's reconstruction(1899).

Security Analysis of a Secure Dynamic ID based Remote User Authentication Scheme for Multi-server Environment (멀티서버를 위한 안전한 동적 ID 기반 원격 사용자 인증 방식에 대한 안전성 분석)

  • Yang, Hyung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.273-278
    • /
    • 2013
  • Recently, user authentication schemes using smart cards for multi-server environment have been proposed for practical applications. In 2009, Liao-Wang proposed a secure dynamic ID based remote user authentication scheme for multi-server environment that can withstand the various possible attacks and provide user anonymity. In this paper, we analyze the security of Liao-Wang's scheme, and we show that Liao-Wang's scheme is still insecure against the forgery attack, the password guessing attack, the session key attack, and the insider attack. In addition, Liao-Wang's scheme does not provide user anonymity between the user and the server.

A study on the promotion for rail transport in Ui-Wang ICD (의왕ICD 철도수송 활성화 방안에 관한 연구)

  • Cho, Uk-Lae;Jang, Seong-Yong
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.2359-2373
    • /
    • 2008
  • In 1991, Korean government decided to establish the Inland Container Depot for activating transportation of rail freight container and encourage the effectiveness of intermodal transport system. Therefore, the Ui-Wang ICD has been built in Kyonggi province and began to operate in 1993. However, Despite of original purpose of the Inland Container Depot, rail freight volume at public CY(Container Yard) in Ui-Wang ICD has been recorded very low. This paper deals with the promotion strategy for rail transport in Ui-Wang ICD. The relationship of conflicts between the rail-oriented transporters and road-oriented transporters in Ui-Wang ICD have been found through the TOC thinking process and some solutions are suggested. Some undesirable effects in operation of Ui-Wang ICD are listed and current reality tree(CRT) has been established and future reality tree(FRT) which includes some injections to active the rail transport in ICD has been recommended based on CRT. In order to make good solutions the situation in Busan-jin station ICD known as similar to Ui-Wang ICD has been analyzed.

  • PDF

Vulnerability Analysis and Improvement in Man-in-the-Middle Attack for Remote User Authentication Scheme of Shieh and Wang's using Smart Card (Shieh and Wang's의 스마트카드 상호인증 스킴에 대한 중간자공격 개선)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.1-16
    • /
    • 2012
  • Shieh and Wang [10] recently proposed an efficient mutual authentication scheme that combined the cost-effectiveness of operations of Lee et al. [6]. scheme and the security and key agreement of Chen and Yeh scheme. Shieh and Wang [10] scheme, however, does not satisfy the security requirements against a third party (the man-in the middle, attacker) that have to be considered in remote user authentication scheme using password-based smart cards. Shieh and Wang weaknesses are the inappropriateness that it cannot verify the forged message in 3-way handshaking mutual authentication, and the vulnerability that the system (server) secret key can easily be exposed. This paper investigates the problems of Shieh and Wang scheme in the verification procedure of the forged messages intercepted by the eavesdrop. An enhanced two-way remote user authentication scheme is proposed that is safe and strong against multiple attacks by adding the ability to perform integrity check on the server and proposed scheme is not expose user password information and the system's confidential information.

RENEWAL AND RENEWAL REWARD THEORIES FOR T-INDEPENDENT FUZZY RANDOM VARIABLES

  • KIM, JAE DUCK;HONG, DUG HUN
    • Journal of applied mathematics & informatics
    • /
    • v.33 no.5_6
    • /
    • pp.607-625
    • /
    • 2015
  • Recently, Wang et al. [Computers and Mathematics with Ap-plications 57 (2009) 1232-1248.] and Wang and Watada [Information Sci-ences 179 (2009) 4057-4069.] studied the renewal process and renewal reward process with fuzzy random inter-arrival times and rewards under the T-independence associated with any continuous Archimedean t-norm. But, their main results do not cover the classical theory of the random elementary renewal theorem and random renewal reward theorem when fuzzy random variables degenerate to random variables, and some given assumptions relate to the membership function of the fuzzy variable and the Archimedean t-norm of the results are restrictive. This paper improves the results of Wang and Watada and Wang et al. from a mathematical per-spective. We release some assumptions of the results of Wang and Watada and Wang et al. and completely generalize the classical stochastic renewal theorem and renewal rewards theorem.

A Study on Indication and Application of Radix Euphorbiae Kansui (감수(甘遂)의 적응증(適應症) 및 활용(活用)에 대한 고찰(考察))

  • Ban, Duk-Jin;Hong, Sol-Yi;Park, Seong-Sik
    • Journal of Sasang Constitutional Medicine
    • /
    • v.21 no.3
    • /
    • pp.17-29
    • /
    • 2009
  • 1. Objectives: We study on indications and directions of Euphorbiae Kansui Liou ex Wang in Sasang Constitutional Medicine by applications of Euphorbiae Kansui Liou ex Wang. 2. Methods: We analyzed indications and directions by bibliographical applications of Radix Euphorbiae Kansui Liou ex Wang in Traditional Oriental Medicine and Sasang Constitutional Medicine. 3. Results and Conclusions: 1) Euphorbiae Kansui Liou ex Wang is used for various indications which are congested fluids, accumulation, edema, and etc in Traditional Oriental Medicine and Sasang Constitutional Medicine. 2) In Sasang Constitutional Medicine, Euphorbiae Kansui Liou ex Wang is taken by powder in a single-medicine prescriptions and taken with calomelas by powder and tablet in prescriptions, and we have need of clinical study of Radix Euphorbiae Kansui in the future.

  • PDF

Improvements of a Dynamic ID-Based Remote User Authentication Scheme (동적 ID 기반 원격 사용자 인증 스킴의 보안성 개선)

  • Young-Do, Joo;An, Young-Hwa
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.303-310
    • /
    • 2011
  • Recently, many user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication process. In 2009, Wang et al. proposed a more effective and secure dynamic ID-based remote user authentication scheme to improve the security weakness of Das et al.'s scheme, and asserted that the improved scheme is secure against independent of password in authentication phase and provides mutual authentication between the user and the remote server. However, in this paper, we analyze the security of Wang et al. scheme and demonstrate that Wang et al.'s scheme is vulnerable to the man-in-the-middle attack and the off-line password guessing attack. In addition, we show that Wang et al. scheme also fails to provide mutual authentication. Accordingly, we propose an improved scheme to overcome these security weakness even if the secrete information stored in the smart card is revealed. Our proposed scheme can withstand the user impersonation attack, the server masquerading attack and off-line password guessing attack. Furthermore, this improved scheme provides the mutual authentication and is more effective than Wang et al.'s scheme in term of the computational complexities.

A Study on the User Authentication Scheme with Forward Secrecy (순방향 비밀성을 제공하는 사용자 인증 스킴에 관한 연구)

  • An, Young-Hwa
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.183-191
    • /
    • 2011
  • Recently Wang-Li proposed the remote user authentication scheme using smart cards. But the proposed scheme has not been satisfied security requirements considering in the user authentication scheme using the password based smart card. In this paper, we described the Wang-Li and Yoon et al.'s authentication scheme simply, and we prove that the Wang-Li's scheme is vulnerable to a password guessing attack and impersonation attack in case that the attacker steals the user's smart card and extracts the information in the smart card. Accordingly, we propose the improved user authentication scheme based on the hash function and generalized ElGamal signature scheme that can withstand many possible attacks including a password guessing attack, impersonation attack and replay attack, and that can offer the function of forward secrecy. The result of comparative analysis, the our proposed scheme is much more secure and efficient than the Wang-Li and Yoon et al.'s scheme.