KIM, Byung-Yeob;KIM, Kwang-il;KIM, Min-son;NOBUO, Kimura;LEE, Chang-Heon
Journal of the Korean Society of Fisheries and Ocean Technology
/
v.58
no.3
/
pp.230-240
/
2022
In general, a high tension on the anchor and chain is placed when a ship at anchor is subjected to heavy weather. Mariners have to pay attention to whether dragging anchor occurs to keep the safety of the ship at anchorage since it is difficult to maintain the stable motion of ship and it causes collisions with other ships nearby. In this paper, the ship motion against the external forces was shown to obtain the fundamental data about characteristic of holding power due to nature of seabed at anchor, so practical trials were carried out in rocky area and muddy area using a trial ship around coastal area of South Korea. In muddy seabed, holding power showed reasonable tension values depending on the distance from anchor position of continuing swing motions of a ship corresponding to wind force. Meanwhile in rocky seabed, tension values on the chain appeared very high occasionally regardless of the distance from the anchor position and seemed to exceed its holding power to be the breaking strain of the chain although weather was not in a severe condition. Therefore, some of the cables laid on the seabed were presumed to be caught in a crack on the rock. It is assumed that even a small amount of external force may cause the chain to break in a moment in rocky seabed. Additionally, wind and current forces had a somewhat contradictory effect on holding power of the ship between them.
In the 4th industrial revolution, the blockchain that distributes and manages data through a P2P network is used as a new decentralized networking paradigm in various fields such as manufacturing, culture, and public service. However, with the advent of quantum computers, quantum algorithms that are able to break existing cryptosystems such as hash function, symmetric key, and public key cryptography have been introduced. Currently, because most major blockchain systems use an elliptic curve cryptography to generate signatures for transactions, they are insecure against the quantum adversary. For this reason, the research on the quantum-resistant blockchain that utilizes lattice-based cryptography for transaction signatures is needed. Therefore, in this paper, we propose a blind signature scheme for the blockchain in which the contents of the signature can be verified later, as well as signing by hiding the contents to be signed using lattice-based cryptography with the property of quantum resistance. In addition, we prove the security of the proposed scheme using a random oracle model.
Min-ho Song;Kyung-bae Jang;Gyeong-ju Song;Won-woong Kim;Hwa-Jeong Seo
Journal of the Korea Institute of Information Security & Cryptology
/
v.33
no.3
/
pp.383-389
/
2023
The development of quantum computers and the emergence of quantum algorithms such as Shor's algorithm and Grover's algorithm pose a significant threat to the security of existing cipher systems. Quantum algorithms can efficiently perform mathematical operations that take a long time on traditional computers. This characteristic can significantly reduce the time it takes to break modern cipher systems that rely on mathematical problems. To prepare for quantum attacks based on these algorithms, existing ciphers must be implemented as quantum circuits. Many ciphers have already been implemented as quantum circuits, analyzing quantum resources required for attacks and verifying the quantum strength of the cipher. In this paper, we present quantum circuits for LED lightweight block ciphers and explain each function of quantum circuits. Thereafter, the resources for the LED quantum circuit are estimated and evaluated by comparing them with other lightweight block ciphers.
This paper aims at reconsidering 'suture,' a key concept in early Lacanian film criticism, with a view to narrowing a supposed gap between early Lacanian and later Lacanian film criticism. Early Lacanian film theorists, among whom Jean-Pierre Oudart, Jean-Louis Baudry, Laura Mulvey and Daniel Dayan, to name a few, are prominent, focus on cinematic signifying system as well as its ideological effects on shaping subjectivity of the audience. Initiated by Jacques-Alain Miller's article on suture as the logic of signifier and grafted into film as the logic of the cinematic by Oudart's writing, the concept of suture was established as a key word in early Lacanian film criticism. In their taxonomy, suture refers to the processes by which the audience are stitched into the story-world of a film. The audience are drawn into the film and take up positions as subjects-within-the-film such that they make sense of and respond to what the film represents as they are encouraged to do so by the film itself. On the other hand, later Lacanian film critics, who are much influenced by Lacan's later emphasis on the Real, focus on concepts such as gaze, petit objet a, fantasy, rather than suture. They are more concerned with the failure of suture and the disruption of the Symbolic than the ideological effects of suture and the consolidation of the Symbolic. They require a break from the previous approach of Lacanian film theory which centers around the Imaginary and the Symbolic. However, early Lacanian and later Lacanian film theory do not manifest as much disparity as they are supposed to do, for both are against the ideological manipulation of suture. Slavoj Žižek, a leading scholar of later Lacanian psychoanalysis, revives the concept of suture as a patch of the Symbolic which covers the gap, if not always successful.
Hyeonseok Shin;Minjung Jo;Hosang Yoo;Yongwon Lee;Byungchul Tak
Journal of the Korea Society of Computer and Information
/
v.29
no.6
/
pp.39-51
/
2024
This paper proposes a novel approach to enhance the security of container-based systems by analyzing system calls to dynamically detect race conditions without modifying the kernel. Container escape attacks allow attackers to break out of a container's isolation and access other systems, utilizing vulnerabilities such as race conditions that can occur in parallel computing environments. To effectively detect and defend against such attacks, this study utilizes eBPF to observe system call patterns during attack attempts and employs a AdaBoost model to detect them. For this purpose, system calls invoked during the attacks such as Dirty COW and Dirty Cred from popular applications such as MongoDB, PostgreSQL, and Redis, were used as training data. The experimental results show that this method achieved a precision of 99.55%, a recall of 99.68%, and an F1-score of 99.62%, with the system overhead of 8%.
Vincent Dupont;Victor Blanc;Thierry Beck;Marc Lainet;Pierre Sciora
Nuclear Engineering and Technology
/
v.56
no.3
/
pp.973-979
/
2024
In the framework of the Generation IV research and development project, in which the French Commission of Alternative and Atomic Energies (CEA) is involved, a main objective for the design of Sodium-cooled Fast Reactor (SFR) is to meet the safety goals for severe accidents. Among the severe ones, the Unprotected Transient OverPower (UTOP) accidents can lead very quickly to a global melting of the core. UTOP accidents can be considered either as slow during a Control Rod Withdrawal (CRW) or as fast. The paper focuses on fast UTOP accidents, which occur in a few milliseconds, and three different scenarios are considered: rupture of the core support plate, uncontrolled passage of a gas bubble inside the core and core mechanical distortion such as a core flowering/compaction during an earthquake. Several levels and rates of reactivity insertions are also considered and the thermal-mechanical behavior of an ASTRID fuel pin from the ASTRID CFV core is simulated with the GERMINAL code. Two types of fuel pins are simulated, inner and outer core pins, and three different burn-up are considered. Moreover, the feedback from the CABRI programs on these type of transients is used in order to evaluate the failure mechanism in terms of kinetics of energy injection and fuel melting. The CABRI experiments complete the analysis made with GERMINAL calculations and have shown that three dominant mechanisms can be considered as responsible for pin failure or onset of pin degradation during ULOF/UTOP accident: molten cavity pressure loading, fuel-cladding mechanical interaction (FCMI) and fuel break-up. The study is one of the first step in fast UTOP accidents modelling with GERMINAL and it has shown that the code can already succeed in modelling these type of scenarios up to the sodium boiling point. The modeling of the radial propagation of the melting front, validated by comparison with CABRI tests, is already very efficient.
The Journal of the Convergence on Culture Technology
/
v.10
no.4
/
pp.627-637
/
2024
This paper studies the Soundscape, a movement that seeks to break away from the traditional conventions of music culture. To this end, I will examine how social, cultural, and technological developments have influenced the paradigm shift in music culture by paying attention to the Soundscape. I understand the characteristics of the Soundscape as a change pattern and discuss the characteristics of hearing and listening experience that have been overlooked so far from a phenomenological perspective. For the above discussion, Murray Schafer's concept of Soundscape, and for a phenomenological understanding of hearing and listening experience, une spatialité de situation, point d'écoute, horizons au son, champ auditif, le premier plan et l'arrière-plan, temporal focus, space-time, and l'être-au-monde are discussed. I hope that understanding the characteristics of sound, hearing, and listening experience will contribute to presenting new ideas for creative expression in artistic creation.
In Korea, grouting has been mostly designed and constructed by experiences without expert knowledge and theoretical study. So there are a lot of problems related to the quality and safty of grouting. Therefor, in this paper the quality management skills and method were discussed through out by using the auto-grouting method and field test of grouting for the construction. Through the limit water injection test of the soil, it make the optimum injection pressure and injection speed of grouting, and through the lugeon test of the rock, it make assess the permeability of before and after grouting. In order to prevent the hydraulic fracture of soil and break away from the grouts if it apply four kinds of mode of grouting stop criteria, injection effects can be improved. From the above characteristcs designers evalute the fitness values of injection pressure(p), injection speed(q) and grouting penetration time(t). So far, to record and manage pressure(p) and speed(q) of grouting autographic devices such as intergation flow-meter usually record data in a roll of paper. Intergration flow-meter can record grouting flow quantity exactly, but the recorded pressures differ from the any basis such as intitial, intermediate and final point. Therefore, it has been argued that is a need of reliable method to describe the connection between the pressure recorded by an intergration flow-meter and the special properties of the grouting target ground. auto-grouting method can describe the reliable connection between the grouting pressure and the special properties of the grouting target ground. So, in this paper by using auto-grouting method, it is expected that to secure basis of quality control techniques construction.
Generally today's culture and the arts industry has been focusing more on economic value than the arts. Therefore this paper will elucidate the meaning of the culture and the arts can be a break though which can only include commercial and economic values but transcend its values ultimately. First of all, this paper will suggest an advanced 3D stereoscopic images by analysis of examples and environments of realistic media arts. Looking into the changes of related technologies and market environments, the motion-recognition technology, as seem in SF film "Minority report", has become a feasible technology. In the past, 3D stereoscopic images were shown in the theme park theatre and exhibition halls for group viewing. but recent 3D TV and display devices have changed those environments to personal. Since domestic researches of realistic media art has been little, this paper will analyze them respecting to three broad classifications. The results are : Firstly, in CAVE method, more impact capabilities of spectators are expected that they can manipulate interactive interfaces freely and the physical movements of spectators can operate interactively. Secondly, inter-network communications and expansion of viewers' perceptions are predicted by way of HMD method, sensor suites and communication equipments. Thirdly, combinations of HMD and motion tracking utilization is foreseen. With the convergent usages of these three features, we can prospect the possibilities of interactive 4D that spectators wearing 3D stereoscopic display devices can experience and make their own 3D stereoscopic images actively at the point of their views.
Purpose - The objective of this paper is to suggest that a company's CRM activities have an effect on customer loyalty in the Korean retail industry. Typically, Korean customers use large local marts with convenience in the absence of any other choice. Therefore, this study aims to shed light on the fact that customers do not break away from their preferred retail stores, either owing to their stringent loyalty (the lie loyalty) or difficulty in turning to alternative choices. Research design, data, methodology - By surveying a sample of 200 hyper-markets through a questionnaire, and excluding dubious and missing responses, I obtained 181 samples to be included in the empirical analysis. The survey was conducted for two weeks during October 2011. AMOS and SPSS18 statistical packages were used for conducting statistical analysis for this study. This paper was developed using the concept of customer equity on CRM, which is known to have a positive impact on customer loyalty through the satisfaction and switching-barrier parameters. The hypothesis of this paper is that customer equity is composed of relationship equity, value equity and brand equity, and that the relationship equity variable has positive effects on the value equity and brand equity amongst other types of customer equity. Moreover, customer equity influences customer loyalty through parameters including customer satisfaction and switching costs in the Korean retail industry. Results - According to the results of the analysis, it was confirmed that relationship value had a positive effect (+) on all variables, including the perceived QoS (Quality of Service), store brand images, economic value, and store convenience. It was also confirmed that the assumption that the perceived QoS (Quality of Service), economic value, and store convenience had a positive effect on customer satisfaction was shown to be statistically significant, with a p-value below 0.05. Only the store brand value variable had an effect on the switching-cost variable with respect to the causal sequence of the variables, including the perceived QoS, store brand value, economic value, and store convenience. The remaining variables did not seem to influence the switching-cost variable. On the other hand, another effect showed that customer satisfaction had a statistically significant influence on the switching-costs variable. Moreover, the customer satisfaction and switching-cost variables also had a statistical influence on customer loyalty. Conclusions - The CRM activities had an influence on various variables (including perceived QoS, perceived economic value, store brand value, and store convenience) pertaining to customer values. Customer satisfaction and switching-cost had some effects on customer loyalty as a parameter. This confirms that stringent loyalty exists with respect to customer loyalty in the retail industry. The fact that the variable had such a statistically significant influence on the switching-cost and store brand equity variables means that consumers react to the reputation of a brand, confidence about the store, and quality confidence. The implications of this study in the retail industry should be further extended to devise strategies for customer retention.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.