• Title/Summary/Keyword: Message Form

Search Result 224, Processing Time 0.03 seconds

A Conceptual Study 'Ming(明)' in Shanghanlun : Based on 2 Cases Treated by Shanghanlun Provisions (『상한론(傷寒論)』 '명(明)'에 대한 고찰 : 변병진단체계(辨病診斷體系)에 입각해 치료한 양명병(陽明病) 증례 2례에 근거하여)

  • Kim, Hyeong-Seop;Cho, Seong-Hwan;Lee, Sung-Jun
    • 대한상한금궤의학회지
    • /
    • v.10 no.1
    • /
    • pp.15-35
    • /
    • 2018
  • Objectives : This study is to propose a new hypothesis about the interpretation of 'Ming (明)' in Shanghanlun and the direction of future research about Yangmingbing(陽明病). Methods : We analyzed the original form of the chinese characters 'Ming(明)' and tried to understand their contexts in Shanghanlun. At the same time, we analyzed 2 clinical cases diagnosed and treated as Yangmingbing according to newly hypothesized definition. Results : From etymology, 'Ming(明)' means becoming distinct. Patients in 2 cases suffered from cold hypersensitivity of hands and feet, overactive bladder syndrome and dizziness, all of which became distinct and problematic. For this reason, we diagnosed patients with Yangmingbing(陽明病) and administered herbal medicine then they improved. Conclusions : The disease names in Shanghanlun have clinical message by the name itself. From etymology, at least in 15 characters provision of Shanghanlun, Yanmingbing means the disease made by becoming conscious about symptoms. Future research about Yangmingbing (陽明病) should start from here.

A Virtual Address Mapping Method for Interconnection between Terrestrial Communication Network and Underwater Acoustic Communication Network (지상 통신 네트워크와 수중음파 통신 네트워크의 상호연결을 위한 가상 주소 매핑 방법)

  • Kim, Changhwa
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.4
    • /
    • pp.27-45
    • /
    • 2018
  • The terrestrial communication network and the underwater acoustic communication network have very different communication characteristics each other in operational environments, communication media, propagation delay, frequency bandwidth, transmission speed, bit error rate, and so on. These different characteristics cause some different address schemes and different maximum transmission units and, as a result, these differences must form certainly obstacles to the intercommunication between a terrestrial communication network and an underwater acoustic communication network. In this paper, we presents a method to use the virtual addresses to resolve the interconnection problem caused by different address schemes between a terrestrial communication network and an underwater acoustic communication network, and, through a mathematical modeling, we analyze the performance on the message transceiving delay time in the underwater environment.

Node Incentive Mechanism in Selfish Opportunistic Network

  • WANG, Hao-tian;Chen, Zhi-gang;WU, Jia;WANG, Lei-lei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1481-1501
    • /
    • 2019
  • In opportunistic network, the behavior of a node is autonomous and has social attributes such as selfishness.If a node wants to forward information to another node, it is bound to be limited by the node's own resources such as cache, power, and energy.Therefore, in the process of communication, some nodes do not help to forward information of other nodes because of their selfish behavior. This will lead to the inability to complete cooperation, greatly reduce the success rate of message transmission, increase network delay, and affect the overall network performance. This article proposes a hybrid incentive mechanism (Mim) based on the Reputation mechanism and the Credit mechanism.The selfishness model, energy model (The energy in the article exists in the form of electricity) and transaction model constitute our Mim mechanism. The Mim classifies the selfishness of nodes and constantly pay attention to changes in node energy, and manage the wealth of both sides of the node by introducing the Central Money Management Center. By calculating the selfishness of the node, the currency trading model is used to differentiate pricing of the node's services. Simulation results show that by using the Mim, the information delivery rate in the network and the fairness of node transactions are improved. At the same time, it also greatly increases the average life of the network.

Fantasy Ethics Disguised with Humor in American Minority Literature: John Leguizamo's Freak (미국 소수인종 문학에 유머로 위장된 환상의 윤리학: 존 레기자모의 『괴물』 중심 연구)

  • Kim, Bong Eun
    • English & American cultural studies
    • /
    • v.14 no.2
    • /
    • pp.49-75
    • /
    • 2014
  • This paper argues that John Leguizamo disguises ethical intention with humor in his one-person show, Freak. The argument proceeds in three stages. First, on the basis of Slavoj ${\check{Z}}i{\check{z}}ek^{\prime}s$ theory that fantasies teach us how to desire discussed in The Sublime Object of Ideology, I analyze how and why Leguizamo exaggerates and thus de-constructs the ideological fantasies about Latin Americans in Freak. Through this analysis the ridiculous exaggeration of the fantasies and their deconstruction emerges as the means to surface the trauma caused by the fantasies, internally and externally curing and reconciling the audience. Second, I apply ${\check{Z}}i{\check{z}}ek^{\prime}s$ theory of the quilting point introduced in Looking Awry: An Introduction to Jacques Lacan through Popular Culture to reveal how "blots" in Freak form "black holes" in the audience's consciousness to smash their established view of the reality, inducing them to encounter with "the real." The investigation into Leguizamo's use of humor as the quilting point illuminates how he invites the audience to look awry beyond the popular fantasy at "the real" America. Third, on the ground of Emmanuel Levinas's theory that theaters are the space of ethics, namely "ethotopos" to emphasize responsible actions discussed in "Ethics as First Philosophy," I assert that Leguizamo disguises his ethical message with humor so as for the audience to recognize their responsibility for others in America and take action towards change.

Incarnation and Divine Essence in Daesoon Thought: A Comparative Study between Daesoon thought and Christianity

  • Rigal-Cellard, Bernadette
    • Journal of Daesoon Thought and the Religions of East Asia
    • /
    • v.1 no.2
    • /
    • pp.61-87
    • /
    • 2022
  • This article compares the concepts of divine incarnation as expounded in Daesoon Thought and in Christianity and questions the essence of the divinity in both traditions. In Daesoon Thought, The Supreme God, Sangje, saw major disorganization leading to extreme violence and doom and decided to incarnate on earth under the human form of Kang Jeungsan (1871-1909). Then the living God taught the solution to human suffering through the revelations he sent in 1917 to Jo Cheol-Je, or Jo Jeongsan (1895-1958) and the revelations were passed on to Dojeon Park Wudang who in 1969 founded Daesoon Thought. In Christianity, God incarnated in his son, Jesus Christ, who allowed for the radical transformation of the condition of man through his physical sacrifice. Daesoon differs in that Sangje did not offer himself as sacrifice when he came on earth but reorganized the world and taught how to apply benevolence to establish the Earthly Paradise. The affirmation that Daesoon Jinrihoe is both monotheistic and polytheistic is then analyzed. If the concept of monotheism seems to differ vastly between the two traditions, it appears that biblical monotheism is itself relatively young in the history of world religions so that Christianity has ancient roots germane to those of Daesoon Jinrihoe. The article concludes on the originality of this religion: though it is built on Daoism, Buddhism and Confucianism, it has transformed their vision of the deity and of its message in a most convincing manner.

IoT notification system for marine emergencies

  • Gong, Dong-Hwan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.122-128
    • /
    • 2022
  • Minimization of human casualties in disaster situations is of paramount importance. In particular, if a marine disaster occurs, it can be directly connected to human casualties, so prompt action is needed. In the event of a marine disaster, the route and location of movement should be identified and life tubes should be used to float on the water. This paper designs and proposes an emergency IoT notification system that can quickly rescue drowning people. The maritime emergency IoT notification system consists of four main types. First, an emergency IoT device that detects the expansion of the life tube and delivers location and situation information to the emergency IoT notification server. Second, an emergency IoT web server that manages emergency information and provides notification. Third, a database server that stores and manages emergency IoT notification information. And finally, an emergency notification app that can receive and respond to emergency notification information. The emergency IoT device consists of a TPMS(Tube Pressure Monitoring System) device that checks the pressure value of the TPMS in real time and sends it to the IoT device, and an IoT device that sends the rescuer's voice information and emergency information to the emergency IoT server. Emergency information is delivered using the MQTT(Message Queuing Telemetry Transport) protocol, and voice information is delivered to the IoT server as HTTP FormData.

Commercial ECU-Based Test-Bed for LIN-CAN Co-Analysis and Proof on Ultrasonic Sensors through Physical Error Injection (실차기반 LIN-CAN 연계 통합 분석 테스트베드 개발과 초음파센서 물리적 오류주입 및 분석을 통한 효용성 검증)

  • Yoon-ji Kim;Ye-ji Koh;In-su Oh;Kang-bin Yim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.325-336
    • /
    • 2023
  • With the development of autonomous driving technology, the number of external contact sensors mounted on vehicles is increasing, and the importance is also rising. The vehicular ultrasonic sensor uses the LIN protocol in the form of a bus topology and reports a status message about its surroundings through the vehicle's internal network. Since ultrasonic sensors are vulnerable to various threats due to poor security protocols, physical testing on actual vehicle is needed. Therefore, this paper developed a LIN-CAN co-analysis testbed with a jig for location-specific distance test to examine the operational relation between LIN and CAN caused by ultrasonic sensors.

Secure and Efficient Key Management Scheme for Wireless Mesh Network (무선 메쉬망에서의 안전하고 효율적인 키관리 스킴)

  • Salam, Md. Iftekhar;Singh, Madhusudan;Lee, Sang-Gon;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.844-847
    • /
    • 2011
  • Wireless mesh network (WMN) is a type of mobile ad-hoc network consists of wireless router, mobile clients and gateway which connects the network with the Internet. To provide security in the network it is required to encrypt the message sent among the communicating nodes in such way so that only legitimate user can retrieve the original data. Several security mechanisms have been proposed so far to enhance the security of WMN. However, there still exists a need for a comprehensive mechanism to prevent attacks in data communication. Considering the characteristic of mesh network, in this paper we proposed a public key cryptography based security architecture to establish a secure key agreement among communicating nodes in mesh network. The proposed security architecture consists of two major sections: client data protection and network data protection. Client data protection deals with the mutual authentication between the client and the access router and provide client to access router encryption for data confidentiality using standard IEEE 802.11i protocol. On the other hand, network data protection ensures encrypted routing and data transfer in the multi hop backbone network. For the network data protection, we used the pre-distributed public key to form a secure backbone infrastructure.

A Study on the Syntagma & Paradigm by Repetition, Variation and Contrast in Ads

  • Choi, Seong-hoon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.9
    • /
    • pp.1-12
    • /
    • 2017
  • This study is the academic work to explore the potential meanings of print advertisements. Linguistic features such as repetition, variation, contrast and phonological structure in the verbal texts of ads can give rise to shades-of-meaning or slight variations in advertising. The language of advertising is not only language in words. It is also a language in images, colors, and pictures. Pictures and words combine to form the advertisement's visual text.. While the words are very important in delivering the sales message, the visual text cannot be ignored in advertisements. Forming part of the visual text is the paralanguage of the ad. Paralanguage is the meaningful behaviour accompanying language, such as voice quality, gestures, facial expressions and touch in speech, and choice of typeface and letter sizes in writing. Foregrounding is the throwing into relief of the linguistic sign against the background of the norms of ordinary language. This paper focuses its discussion on the advertisements within the framework of the paradigmatic and the syntagmatic relationship. The sources of ads have been confined to Malboro. The ads were reselected based on purposive sampling methods.

Design and Implementation of the Document HTML System for Preserving Content Integrity

  • Hyun Cheon Hwang;Ji Su Park;Jin Gon Shon
    • Journal of Information Processing Systems
    • /
    • v.19 no.3
    • /
    • pp.334-346
    • /
    • 2023
  • An electronic document based on PDF has been widely used in customer communication between an enterprise and a customer to deliver personalized content. However, electronic documents based on PDF in the form of paper layouts are not suitable for mobile environments because of low readability and lack of interactive interaction. Even though HTML is an essential language in a mobile environment, electronic document based on PDF is still used as it has a content integrity verification feature with a digital signature. It means that a user is sacrificing user experience in a mobile environment for content integrity and using paper-layout electronic documents. In this research, we design the Document HTML specification by setting the Document HTML conformance, adding the extended meta tags, and signing the message digest with a digital signature based on public key infrastructure (PKI). Furthermore, we implemented the Document HTML system, which has REST API services to generate and verify the Document HTML, and did experimental verification of the theory. As a result, we have confirmed that the Document HTML has both content integrity and user experience on mobile. Furthermore, the Document HTML is expected to be an alternative document format to deliver personalized content from an enterprise to a customer in a mobile environment instead of the paper layout electronic document such as PDF.