• Title/Summary/Keyword: Concealing

Search Result 88, Processing Time 0.023 seconds

A Study on the Beauty of the Islamic Folk Costume, Affected by Islamism -Focusing on the Islam Culture Area in Southwest Asia- (이슬람교 영향을 받은 이슬람 민속복식 미의 연구 -서남아시아의 이슬람 문화권을 중심으로-)

  • Seo, Bong-ha;Kim, Min-Ja
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.32 no.5
    • /
    • pp.808-820
    • /
    • 2008
  • The costume of Islam cultural area has been affected by the strict social structure, formed by religion, and traditional costume of Islam has been maintained up to these days under the influence of religion. Islam Traditional Costume, which is the succession of the traditional costume of southwest Asia region, became armed with the form of closed costume due to the chastity and oppression. There are figurative features of Islam Folk Costume; first, the dimensional form due to the ampleness, covering the body, second, the reinforcement of closed form such as chador and burqa, third, the symbolism such as the adornment or incantational ornament, which has been inherited from the former times of Islam era, fourth, the color, simplified with black and white. The aesthetic values of Islam folk costume are represented with 'The beauty of abstinency', suppressing the ornamentation and color, caused by the strict social atmosphere under the influence of the form of traditional costume and religion, 'The beauty of concealment' due to the closeness, with affluent costume forms, covering the body and even concealing the face, and 'The beauty of symbol' which is demonstrated with incantational ornamentation of face and interior decoration. In some nations amongst Islam nations, the wearing of hijab is strictly regulated but black chador and burqa are regarded as negative symbols, representing the closeness and oppression of Islam. It is the product of Orientalism from the western perspective. The Islam Hijab culture is the symbol of oppression towards women, but, on the other hand, it is the device to protect women and the traditional culture, symbolizing the identity.

Changes in News-Production Labor Process Since The Introduction of Convergent Newsroom : A Case Study on The CBS Convergent Newsroom (통합 뉴스룸 도입 이후 뉴스생산 노동과정의 변화: CBS 통합뉴스룸 사례연구)

  • Yoon, Ik-Han;Kim, Kyun
    • Korean journal of communication and information
    • /
    • v.55
    • /
    • pp.164-183
    • /
    • 2011
  • Technology innovation of digital convergence in recent years of the media sector has produced a series of significant changes in journalist labor. This study analyzes how recent introduction of convergent newsroom changed the nature of journalist labor and what strategy the management used to control journalists within the technologically innovated working condition with case of CBS. As the labor process theory tells us, the analysis found that technological innovation in the newsroom has encouraged a couple of aspects regarding labor process. First, losing control over their own labor journalists have undergone the process of significant deskilling. Second, the management have made a constant effort to introduce ideological and political apparatuses with twofold purposes, effective control over workers on one hand and concealing oppressive labor conditions on the other. The effort generated journalists' acceptance of new news-making routine and their consent on labor-management culture founded upon naive familism, which at last resulted in reinforcement of corporate power and isolation of labor society by separating internal labor market.

  • PDF

OBSERVABILITY-IN-DEPTH: AN ESSENTIAL COMPLEMENT TO THE DEFENSE-IN-DEPTH SAFETY STRATEGY IN THE NUCLEAR INDUSTRY

  • Favaro, Francesca M.;Saleh, Joseph H.
    • Nuclear Engineering and Technology
    • /
    • v.46 no.6
    • /
    • pp.803-816
    • /
    • 2014
  • Defense-in-depth is a fundamental safety principle for the design and operation of nuclear power plants. Despite its general appeal, defense-in-depth is not without its drawbacks, which include its potential for concealing the occurrence of hazardous states in a system, and more generally rendering the latter more opaque for its operators and managers, thus resulting in safety blind spots. This in turn translates into a shrinking of the time window available for operators to identify an unfolding hazardous condition or situation and intervene to abate it. To prevent this drawback from materializing, we propose in this work a novel safety principle termed "observability-in-depth". We characterize it as the set of provisions technical, operational, and organizational designed to enable the monitoring and identification of emerging hazardous conditions and accident pathogens in real-time and over different time-scales. Observability-in-depth also requires the monitoring of conditions of all safety barriers that implement defense-in-depth; and in so doing it supports sensemaking of identified hazardous conditions, and the understanding of potential accident sequences that might follow (how they can propagate). Observability-in-depth is thus an information-centric principle, and its importance in accident prevention is in the value of the information it provides and actions or safety interventions it spurs. We examine several "event reports" from the U.S. Nuclear Regulatory Commission database, which illustrate specific instances of violation of the observability-in-depth safety principle and the consequences that followed (e.g., unmonitored releases and loss of containments). We also revisit the Three Mile Island accident in light of the proposed principle, and identify causes and consequences of the lack of observability-in-depth related to this accident sequence. We illustrate both the benefits of adopting the observability-in-depth safety principle and the adverse consequences when this principle is violated or not implemented. This work constitutes a first step in the development of the observability-in-depth safety principle, and we hope this effort invites other researchers and safety professionals to further explore and develop this principle and its implementation.

The Importance of Military Security -Mainly focused on the Battle of Gaeseong, the early part of the Korean War- (전투사례로 본 군사보안의 중요성 연구 - 6.25 전쟁 초기, 개성일대 전투를 중심으로-)

  • Kim, Gyu-Nam;Lee, Hyun-Hee
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.51-58
    • /
    • 2016
  • "History is a mirror" means that we should be prepared for the threats of enemies through learning from repeating history. Currently South Korea is facing various provocations, including North Korea's nuclear weapons and missile s. For the protection of the life and property of its people, South Korea should regard North Korea as a main enemy and be fully prepared for the threats. The Korean War was a war between well-prepared North Korea and ill-prepa red South Korea. After Liberation, North Korean army incorporated the Chinese Communist army, placed battle equi pment with the support of the Soviet army, and finished corps-level training while South Korea at that time did not finish battalion-level training. In wartime and peacetime, an army should improve military security by concealing its own information and find its enemy's information. North Korea carefully prepared for the war, collecting information about the organization, deployment and operation of the South Korean army. South Korean army failed to cope with it and had hard times in its early battles. In this paper, I will emphasize the importance of military security, focusing on the Battle of Gaeseong, the early part of the Korean War.

Development Paradigm of Repression and Desire Embodied by Body and Clothing (몸·복식에서 억압과 욕망의 패러다임 개발)

  • Jeong, Ki-Sung;Kim, Min-Ja
    • Journal of the Korean Society of Costume
    • /
    • v.63 no.6
    • /
    • pp.97-112
    • /
    • 2013
  • In this study, physical, social and psychological repression embodied by the body and clothing are referred to instinctual, power and creative desires, respectively, from the point of biological, social and aesthetic views. Desire refers to a behavior to overcome men's imperfections with individual security, sense of belonging and the pursuit of an ideal, which are obtained by living as a social creature. Repression through the body is sub-categorized depending on whether it is temporary or permanent. Repression expressed through clothing is seen through revealing/concealing, contraction/expansion, and deconstruction/ reconstruction. What enables human beings to embrace changes in fashion without fierce resistance or backlash is the changes of formativeness demonstrated by repression through the body and clothing. The aesthetic values drawn from the exhibition of repression and on the body and clothing are categorized into narcissism, fetishism and aestheticism. While narcissism is an instinctive desire grounded on the originality and confidence of the self that results in refusing repression, fetishism is a desire for power that expedites repression in the pursuit of materialistic value or sexual fantasy. Aestheticism is a desire for creativity that symbolizes the body-and-clothing repression in the pursuit of aesthetic idealism. Repression evokes desire, and the pursuit of desire leads to another repression. The aesthetic values of desire for instinct, power and creativity can be substituted with each other for interpretation according to the attitudes of an initiator, a user and a spectator.

Data Hiding Method Utilizing Skipping Based Hybrid Histogram Shifting (도약기반의 하이브리드 히스토그램 시프팅을 이용하는 데이터 은닉 방법)

  • Choi, YongSoo;Lee, DalHo
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.371-376
    • /
    • 2018
  • In the system security technology, the information hiding field is developed as technologies for embedding information, which are generally used as contents media. The proposed technique is a technical steganography technique which uses a technique of concealing certain information through physical / statistical change of signal values of contents. Recently, there have been various studies based on histogram shifting in reversible data concealment. In multi - peak histogram shifting, the capacity of data concealment gradually increased by applying multiple peak histogram method. In this paper, we analyze the effect of concealment in terms of adopting the histogram shift method including skipping. In addition, we propose multi - branch data concealment as a general method to improve concealment capacity. The above proposal has proved to be an example using mathematical expressions, and further improvement measures could be derived.

Design of the Covered Address Generation using the Super Increasing Sequence in Wireless Networks (무선 네트워크에서의 초증가 수열을 통한 주소 은닉 기법 설계)

  • Choun, Jun-Ho;Kim, Sung-Chan;Jang, Kun-Won;Do, Kyung-Hwa;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.411-416
    • /
    • 2007
  • The General security method of wireless network provides a confidentiality of communication contents based on the cryptographic stability against a malicious host. However, this method exposes the logical and physical addresses of both sender and receiver, so transmission volume and identification of both may be exposed although concealing that content. Covered address scheme that this paper proposes generates an address to which knapsack problem using super increasing sequence is applied, and replaces the addresses of sender and receiver with addresses from super increasing sequence. Also, proposed method changes frequently secret addresses, so a malicious user cannot watch a target system or try to attack the specific host. Proposed method also changes continuously a host address that attacker takes aim at. Accordingly, an attacker who tries to use DDoS attack cannot decide the specific target system.

Concept Analysis of Self-stigma in Patients with Tuberculosis (결핵 환자의 자기 낙인(self-stigma)에 대한 개념 분석)

  • Yeom, Seonmi;Kang, Jeong Hee;Yang, Youngran
    • Research in Community and Public Health Nursing
    • /
    • v.32 no.3
    • /
    • pp.312-324
    • /
    • 2021
  • Purpose: Tuberculosis is an infectious condition with a high disease burden, and the stigma in patients with tuberculosis causes negative health outcomes. The purpose of this study was to define and clarify the concept of self-stigma among patients with tuberculosis. Methods: The analysis was conducted using Walker and Avant's conceptual approach. Twenty-seven studies met the selection criteria. Results: Self-stigma in patients with tuberculosis can be defined by the following attributes: 1) self-esteem decrement; 2) fear; 3) negative emotions to oneself; 4) social withdrawal; and 5) discrimination. The antecedents identified were 1) inappropriate knowledge of tuberculosis, 2) spread of improper health information through media and social communications, 3) stereotypes and prejudices, 4) visibility due to symptoms appearing, 5) recognizing the risk of infection, and 6) low financial status. The consequences were 1) concealing the disease, 2) treatment delay, 3) poor treatment adherence, 4) poor quality of life, and 5) deterioration in or lack of social activities. Conclusion: The definition and attributes of self-stigma identified by this study can be applied to enhance the understanding of stigma in tuberculosis patients and to improve communications between healthcare providers and researchers. It can also be used to develop theories and measurements related to stigma in patients with tuberculosis.

Privacy-Preserving K-means Clustering using Homomorphic Encryption in a Multiple Clients Environment (다중 클라이언트 환경에서 동형 암호를 이용한 프라이버시 보장형 K-평균 클러스터링)

  • Kwon, Hee-Yong;Im, Jong-Hyuk;Lee, Mun-Kyu
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.4
    • /
    • pp.7-17
    • /
    • 2019
  • Machine learning is one of the most accurate techniques to predict and analyze various phenomena. K-means clustering is a kind of machine learning technique that classifies given data into clusters of similar data. Because it is desirable to perform an analysis based on a lot of data for better performance, K-means clustering can be performed in a model with a server that calculates the centroids of the clusters, and a number of clients that provide data to server. However, this model has the problem that if the clients' data are associated with private information, the server can infringe clients' privacy. In this paper, to solve this problem in a model with a number of clients, we propose a privacy-preserving K-means clustering method that can perform machine learning, concealing private information using homomorphic encryption.

An Approach of Hiding Hangul Secret Message in Image using XNOR-XOR and Fibonacci Technique (XNOR-XOR과 피보나치 기법을 이용하여 이미지에서 한글 비밀 메시 지를 은닉하는 방법)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.109-114
    • /
    • 2021
  • As various users increase in a network environment, it is difficult to protect sensitive and confidential information transmitted and received from attackers. Concealing bitwise secret data in an image using the LSB technique can be very vulnerable to attack. To solve this problem, a hybrid method that combines encryption and information hiding is used. Therefore, an effective method for users to securely protect secret messages and implement secret communication is required. A new approach is needed to improve security and imperceptibility to ensure image quality. In this paper, I propose an LSB steganography technique that hides Hangul messages in a cover image based on MSB and LSB. At this time, after separating Hangul into chosung, jungsung and jongsung, the secret message is applied with Exclusive-OR or Exclusive-NOR operation depending on the selected MSB. In addition, the calculated secret data is hidden in the LSB n bits of the cover image converted by Fibonacci technique. PSNR was used to confirm the effectiveness of the applied results. It was confirmed 41.517(dB) which is suitable as an acceptable result.