• Title/Summary/Keyword: multiple identities

Search Result 61, Processing Time 0.032 seconds

Translocal and Transnational Movements of Bugis and the Construction of Multiple Identities: The Case of Bugis in North Kalimantan of Indonesia and Sabah and Johor of Malaysia

  • Maunati, Yekti
    • SUVANNABHUMI
    • /
    • v.8 no.2
    • /
    • pp.15-49
    • /
    • 2016
  • It is widely known that the Bugis people, originally from South Sulawesi, have been migrating to many places, including both the Indonesian and Malaysian sides of the borders today. The translocal and transnational movements of the Bugis people, especially to North Kalimantan of Indonesia and Sabah and Johor of Malaysia, have occurred in several waves, particularly during the 17th century, around 1965 and from 1980 to the present. The fall of the kingdom of Somba Opu in South Sulawesi and the rise Dutch colonial power have been the triggers for the early movement of the Bugis to both the Indonesian and Malaysian borders. This was followed by the second push of the Islamic rebellion in South Sulawesi, around 1965, creating another big wave of Bugis movement. The most recent one has been mainly due to economic reasons. These different phases of the movements, as well as the dynamic interplay of various aspects, such as citizenship, ethnic, and sub-ethnic groupings, practicing of cultural traditions and keeping the language, to mention a few, have contributed to the process of the construction of the multiple identities of the Bugis. Indeed, the Bugis people are no longer identified or identify themselves as a single group, but rather have fluid and contesting identities. This paper will discuss three main issues: the history of the translocal and transnational movements of the Bugis to North Kalimantan, Sabah and Johor; the process of adaptation to these new places; and the construction of Bugis identities.

  • PDF

NEW TRANSFORMATIONS FOR HYPERGEOMETRIC FUNCTIONS DEDUCIBLE BY FRACTIONAL CALCULUS

  • Kim, Yong Sup
    • Communications of the Korean Mathematical Society
    • /
    • v.33 no.4
    • /
    • pp.1239-1248
    • /
    • 2018
  • Recently, many authors have obtained several hypergeometric identities involving hypergeometric functions of one and multi-variables such as the Appell's functions and Horn's functions. In this paper, we obtain several new transformations suitably by applying the fractional calculus operator to these hypergeometric identities, which was introduced recently by Tremblay.

Effect of Emotional Elements in Personal Relationships on Multiple Personas from the Perspective of Teenage SNS Users (SNS 상의 대인관계에서 나타나는 감정적 요소와 청소년의 온라인 다중정체성 간의 영향관계)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.18 no.2
    • /
    • pp.199-223
    • /
    • 2016
  • As social networking services (SNS) become widely used tools for maintaining social relationships, people use SNS to express themselves online. Users are free to form multiple characters in SNS because of online anonymity. This phenomenon causes SNS users to easily demonstrate multiple personas that are different from their identities in the real world. Therefore, this study focuses on online multi-personas that establish multiple fake identities in the SNS environment. The main objective of this study is to investigate factors that affect online multi-personas. Fake online identities can have various negative consequences such as cyber bullying, cyber vandalism, or antisocial behavior. Since the boundary between the online and offline worlds is fading fast, these negative aspects of online behavior may influence offline behaviors as well. This study focuses on teenagers who often create multi-personas online. According to previous studies, personal identities are usually established during a person's youth. Based on data on 664 teenage users, this study identifies four emotional factors, namely, closeness with others, relative deprivation, peer pressure and social norms. According to data analysis results, three factors (except closeness with others) have positive correlations with users' multi-personas. This study contributes to the literature by identifying the factors that cause young people to form online multi-personas, an issue that has not been fully discussed in previous studies. From a practical perspective, this study provides a basis for a safe online environment by explaining the reasons for creating fake SNS identities.

Multiple Identities Node Detection in Zigbee Home Network (지그비 홈 네트워크에서의 다중신원(Multiple Identities)노드 탐지)

  • Lee Kyu-Ho;Lim Jae-Sung;Kim Dong-Kyoo;Jeon Sang-Kyoo;Yang Sung-Hyun
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.423-426
    • /
    • 2006
  • 홈서비스를 위한 지그비 센서 네트워크는 특정 대상이나 환경으로부터 데이터를 수집하여 그 데이터를 정보 분석이나 서비스 결정 수단으로 이용하기 때문에 데이터수집 과정에서의 효과적인 보안이 요구되어 진다. 지그비 센서 네트워크에의 공격은 정상적인 홈서비스를 방해하여 사용자의 불편을 초래할 수 있다. 이 중 다중신원을 가지는 공격자 노드의 침입은 비정상적인 정보 수집을 초래하여 서비스에서의 잘못된 결정을 유발할 수 있다. 이 다중신원노드의 탐지를 위해 본 논문에서는 DMIN(Detection of Multiple ID Node)이란 기법을 제안한다. 이 기법은 일처리 능력이 제한되어 있는 하나의 센서노드가 여러 신원의 역할을 수행할 때에 생기는 지연시간을 이용하며 이 기법을 이용하여 네트워크의 다중신원노드를 탐지한다.

  • PDF

Identity-Based Ring Signature Schemes for Multiple Domains

  • Ki, JuHee;Hwang, Jung Yeon;Lee, Dong Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2692-2707
    • /
    • 2012
  • A separable identity-based ring signature scheme has been constructed as a fundamental cryptographic primitive for protecting user privacy. Using the separability property, ring members can be selected from arbitrary domains, thereby, giving a signer a wide range of ways to control privacy. In this paper we propose a generic method to construct efficient identity-based ring signature schemes with various levels of separability. We first describe a method to efficiently construct an identity-based ring signature scheme for a single domain, in which a signer can select ring identities by choosing from identities defined only for the domain. Next, we present a generic method for linking ring signatures constructed for a single domain. Using this method, an identity-based ring signature scheme with a compact structure, supporting multiple arbitrary domains can be designed. We show that our method outperforms the best known schemes in terms of signature size and computational costs, and that the security model based on the separability of identity-based ring signatures, presented in this paper, is highly refined and effective by demonstrating the security of all of the proposed schemes, using a model with random oracles.

A Novel Multiple Access Scheme via Compressed Sensing with Random Data Traffic

  • Mao, Rukun;Li, Husheng
    • Journal of Communications and Networks
    • /
    • v.12 no.4
    • /
    • pp.308-316
    • /
    • 2010
  • The problem of compressed sensing (CS) based multiple access is studied under the assumption of random data traffic. In many multiple access systems, i.e., wireless sensor networks (WSNs), data arrival is random due to the bursty data traffic for every transmitter. Following the recently developed CS methodology, the technique of compressing the transmitter identities into data transmissions is proposed, such that it is unnecessary for a transmitter to inform the base station its identity and its request to transmit. The proposed compressed multiple access scheme identifies transmitters and recovers data symbols jointly. Numerical simulations demonstrate that, compared with traditional multiple access approaches like carrier sense multiple access (CSMA), the proposed CS based scheme achieves better expectation and variance of packet delays when the traffic load is not too small.

A Study on Gender Identity shown in Movie Costumes from 1930′s to 1990′s -Focused on Masculinity and Feminity- (1930-1990년대 영화 의상에 나타난 젠더 정체성(I) -남성성(Masculinity), 여성성(Feminity)를 중심으로-)

  • 정세희;양숙희
    • Journal of the Korean Home Economics Association
    • /
    • v.40 no.5
    • /
    • pp.63-78
    • /
    • 2002
  • The movie costumes may serve to change individuals'ego identity, shift a gender identity to another one and make multiple and plural gender identities shared. The unique identities shown in movies can influence the audience to the extent that they will imitate characters's costumes or appearance in their real life, replacing their inner, unrealizable and private fantasy with real one. The purpose of this study is to review the movies produced in 1930's and thereafter by categorizing the socio-cultural gender concepts into masculinity and feminity. Masculinity and Feminity are not attributions fixed by some physical characteristics, but it tends to be changed or expended by some social factors over time. In short, it may be a flexible, plural, individual and self-introspecive attribute. Movies present diverse types of masculinity and feminity, and in particular, the movie costumes specify them. In other words, the costumes may be model means expressing the masculinity and feminity, and the gender identities shown in the movies tend to be imitated, re-created or assumed by the audience. All in all, the movie costumes serve to take on the confrontation of masculinity and feminity between inner, unrealizable and private fantasy and external reality and thereby, expand it from internal to external issue and thus, change or reform masculinity and feminity.

HYPERIDENTITIES IN (xy)x ≈x(yy) GRAPH ALGEBRAS OF TYPE (2,0)

  • Khampakdee, Jeeranunt;Poomsa-Ard, Tiang
    • Bulletin of the Korean Mathematical Society
    • /
    • v.44 no.4
    • /
    • pp.651-661
    • /
    • 2007
  • Graph algebras establish a connection between directed graphs without multiple edges and special universal algebras of type (2,0). We say that a graph G satisfies an identity $s{\approx}t$ if the corresponding graph algebra $\underline{A(G)}$ satisfies $s{\approx}t$. A graph G=(V,E) is called an $(xy)x{\approx}x(yy)$ graph if the graph algebra $\underline{A(G)}$ satisfies the equation $(xy)x{\approx}x(yy)$. An identity $s{\approx}t$ of terms s and t of any type ${\tau}$ is called a hyperidentity of an algebra $\underline{A}$ if whenever the operation symbols occurring in s and t are replaced by any term operations of $\underline{A}$ of the appropriate arity, the resulting identities hold in $\underline{A}$. In this paper we characterize $(xy)x{\approx}x(yy)$ graph algebras, identities and hyperidentities in $(xy)x{\approx}x(yy)$ graph algebras.