• 제목/요약/키워드: multiple identities

검색결과 61건 처리시간 0.021초

Translocal and Transnational Movements of Bugis and the Construction of Multiple Identities: The Case of Bugis in North Kalimantan of Indonesia and Sabah and Johor of Malaysia

  • Maunati, Yekti
    • 수완나부미
    • /
    • 제8권2호
    • /
    • pp.15-49
    • /
    • 2016
  • It is widely known that the Bugis people, originally from South Sulawesi, have been migrating to many places, including both the Indonesian and Malaysian sides of the borders today. The translocal and transnational movements of the Bugis people, especially to North Kalimantan of Indonesia and Sabah and Johor of Malaysia, have occurred in several waves, particularly during the 17th century, around 1965 and from 1980 to the present. The fall of the kingdom of Somba Opu in South Sulawesi and the rise Dutch colonial power have been the triggers for the early movement of the Bugis to both the Indonesian and Malaysian borders. This was followed by the second push of the Islamic rebellion in South Sulawesi, around 1965, creating another big wave of Bugis movement. The most recent one has been mainly due to economic reasons. These different phases of the movements, as well as the dynamic interplay of various aspects, such as citizenship, ethnic, and sub-ethnic groupings, practicing of cultural traditions and keeping the language, to mention a few, have contributed to the process of the construction of the multiple identities of the Bugis. Indeed, the Bugis people are no longer identified or identify themselves as a single group, but rather have fluid and contesting identities. This paper will discuss three main issues: the history of the translocal and transnational movements of the Bugis to North Kalimantan, Sabah and Johor; the process of adaptation to these new places; and the construction of Bugis identities.

  • PDF

NEW TRANSFORMATIONS FOR HYPERGEOMETRIC FUNCTIONS DEDUCIBLE BY FRACTIONAL CALCULUS

  • Kim, Yong Sup
    • 대한수학회논문집
    • /
    • 제33권4호
    • /
    • pp.1239-1248
    • /
    • 2018
  • Recently, many authors have obtained several hypergeometric identities involving hypergeometric functions of one and multi-variables such as the Appell's functions and Horn's functions. In this paper, we obtain several new transformations suitably by applying the fractional calculus operator to these hypergeometric identities, which was introduced recently by Tremblay.

SNS 상의 대인관계에서 나타나는 감정적 요소와 청소년의 온라인 다중정체성 간의 영향관계 (Effect of Emotional Elements in Personal Relationships on Multiple Personas from the Perspective of Teenage SNS Users)

  • 최보미;박민정;채상미
    • 경영정보학연구
    • /
    • 제18권2호
    • /
    • pp.199-223
    • /
    • 2016
  • SNS 사용이 대중화되면서 사람들은 프로필 생성과 다양한 정보 공유를 한다. 이렇게 자발적인개인정보 공개와 자기표현을 통해 익명을 전제에서 온라인 정체성이 형성이 된다. 익명성은 현실과 달리 사용자가 원하는 모습으로 정체성을 표현하기에 쉬운 환경을 가진다. 다시 말해 SNS 사용자는 현실과 다른 모습인 멀티페르소나를 보여주기 쉽다는 것을 설명한다. 본 연구에서 멀티페르소나에 대한 연구의 필요성은 다음과 같다. 첫째, 사회적인 측면에서 멀티페르소나 성향을 보이는 사용자는 익명성을 통해 악성 댓글, 타인의 정보 도용, 온라인 왕따 등 반사회의 현상을 초래하는 경우가 많다. 둘째, 경영학적 측면에서 멀티페르소나 성향을 가진 사용자의 데이터 수집으로 인해 기업의 데이터를 정확히 예측하기 힘든 요소가 될 수 있다. 또한 멀티페르소나 성향의 사용자로부터 생성된 정보는 신뢰적인 측면에서 문제가 될 수 있다. 본 연구는 청소년의 멀티페르소나에 초점을 둔다. 청소년기에 형성된 정체성은 성인의 정체성과 큰 상관관계를 가진다는 선행연구들이 되어있다. 또한 온라인 환경을 통해 형성된 청소년의 멀티페르소나 성향은 윤리적 정체성 확립에 어려움을 가지고, 이는 사회적인 문제로 연결되는 경우가 많다. 본 연구는 청소년 664명을 대상으로 설문이 진행되었다. SNS 상의 대인관계에서 가지는 감정적 요소 4가지(타인과의 거리감, 상대적 박탈감, 타인 반응에 대한 압박감, 사회 규범의 영향)를 선별하고, 이 요소들과 멀티페르소나 성향의 동의 정도와 어떠한 상관관계를 가지는지 파악하였다. 그 결과 타인과의 거리감과 멀티페르소나가 음의 상관관계를 가지는 것을 제외하고 모두 양의 상관관계를 가지는 것으로 확인되었다. 본 연구는 기존의 경영학 연구에서 다루지 않았던 온라인 정체성의 문제를 화두로 올렸다는 면에서 의의를 가진다. 또한 기업적 측면에서는 SNS 사용자의 정확한 데이터를 수집하고 멀티페르소나를 통제하는 환경 조성에 도움을 준다.

지그비 홈 네트워크에서의 다중신원(Multiple Identities)노드 탐지 (Multiple Identities Node Detection in Zigbee Home Network)

  • 이규호;임재성;김동규;전상규;양성현
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.423-426
    • /
    • 2006
  • 홈서비스를 위한 지그비 센서 네트워크는 특정 대상이나 환경으로부터 데이터를 수집하여 그 데이터를 정보 분석이나 서비스 결정 수단으로 이용하기 때문에 데이터수집 과정에서의 효과적인 보안이 요구되어 진다. 지그비 센서 네트워크에의 공격은 정상적인 홈서비스를 방해하여 사용자의 불편을 초래할 수 있다. 이 중 다중신원을 가지는 공격자 노드의 침입은 비정상적인 정보 수집을 초래하여 서비스에서의 잘못된 결정을 유발할 수 있다. 이 다중신원노드의 탐지를 위해 본 논문에서는 DMIN(Detection of Multiple ID Node)이란 기법을 제안한다. 이 기법은 일처리 능력이 제한되어 있는 하나의 센서노드가 여러 신원의 역할을 수행할 때에 생기는 지연시간을 이용하며 이 기법을 이용하여 네트워크의 다중신원노드를 탐지한다.

  • PDF

Identity-Based Ring Signature Schemes for Multiple Domains

  • Ki, JuHee;Hwang, Jung Yeon;Lee, Dong Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권10호
    • /
    • pp.2692-2707
    • /
    • 2012
  • A separable identity-based ring signature scheme has been constructed as a fundamental cryptographic primitive for protecting user privacy. Using the separability property, ring members can be selected from arbitrary domains, thereby, giving a signer a wide range of ways to control privacy. In this paper we propose a generic method to construct efficient identity-based ring signature schemes with various levels of separability. We first describe a method to efficiently construct an identity-based ring signature scheme for a single domain, in which a signer can select ring identities by choosing from identities defined only for the domain. Next, we present a generic method for linking ring signatures constructed for a single domain. Using this method, an identity-based ring signature scheme with a compact structure, supporting multiple arbitrary domains can be designed. We show that our method outperforms the best known schemes in terms of signature size and computational costs, and that the security model based on the separability of identity-based ring signatures, presented in this paper, is highly refined and effective by demonstrating the security of all of the proposed schemes, using a model with random oracles.

A Novel Multiple Access Scheme via Compressed Sensing with Random Data Traffic

  • Mao, Rukun;Li, Husheng
    • Journal of Communications and Networks
    • /
    • 제12권4호
    • /
    • pp.308-316
    • /
    • 2010
  • The problem of compressed sensing (CS) based multiple access is studied under the assumption of random data traffic. In many multiple access systems, i.e., wireless sensor networks (WSNs), data arrival is random due to the bursty data traffic for every transmitter. Following the recently developed CS methodology, the technique of compressing the transmitter identities into data transmissions is proposed, such that it is unnecessary for a transmitter to inform the base station its identity and its request to transmit. The proposed compressed multiple access scheme identifies transmitters and recovers data symbols jointly. Numerical simulations demonstrate that, compared with traditional multiple access approaches like carrier sense multiple access (CSMA), the proposed CS based scheme achieves better expectation and variance of packet delays when the traffic load is not too small.

1930-1990년대 영화 의상에 나타난 젠더 정체성(I) -남성성(Masculinity), 여성성(Feminity)를 중심으로- (A Study on Gender Identity shown in Movie Costumes from 1930′s to 1990′s -Focused on Masculinity and Feminity-)

  • 정세희;양숙희
    • 대한가정학회지
    • /
    • 제40권5호
    • /
    • pp.63-78
    • /
    • 2002
  • The movie costumes may serve to change individuals'ego identity, shift a gender identity to another one and make multiple and plural gender identities shared. The unique identities shown in movies can influence the audience to the extent that they will imitate characters's costumes or appearance in their real life, replacing their inner, unrealizable and private fantasy with real one. The purpose of this study is to review the movies produced in 1930's and thereafter by categorizing the socio-cultural gender concepts into masculinity and feminity. Masculinity and Feminity are not attributions fixed by some physical characteristics, but it tends to be changed or expended by some social factors over time. In short, it may be a flexible, plural, individual and self-introspecive attribute. Movies present diverse types of masculinity and feminity, and in particular, the movie costumes specify them. In other words, the costumes may be model means expressing the masculinity and feminity, and the gender identities shown in the movies tend to be imitated, re-created or assumed by the audience. All in all, the movie costumes serve to take on the confrontation of masculinity and feminity between inner, unrealizable and private fantasy and external reality and thereby, expand it from internal to external issue and thus, change or reform masculinity and feminity.

HYPERIDENTITIES IN (xy)x ≈x(yy) GRAPH ALGEBRAS OF TYPE (2,0)

  • Khampakdee, Jeeranunt;Poomsa-Ard, Tiang
    • 대한수학회보
    • /
    • 제44권4호
    • /
    • pp.651-661
    • /
    • 2007
  • Graph algebras establish a connection between directed graphs without multiple edges and special universal algebras of type (2,0). We say that a graph G satisfies an identity $s{\approx}t$ if the corresponding graph algebra $\underline{A(G)}$ satisfies $s{\approx}t$. A graph G=(V,E) is called an $(xy)x{\approx}x(yy)$ graph if the graph algebra $\underline{A(G)}$ satisfies the equation $(xy)x{\approx}x(yy)$. An identity $s{\approx}t$ of terms s and t of any type ${\tau}$ is called a hyperidentity of an algebra $\underline{A}$ if whenever the operation symbols occurring in s and t are replaced by any term operations of $\underline{A}$ of the appropriate arity, the resulting identities hold in $\underline{A}$. In this paper we characterize $(xy)x{\approx}x(yy)$ graph algebras, identities and hyperidentities in $(xy)x{\approx}x(yy)$ graph algebras.