• Title/Summary/Keyword: Plain Text

Search Result 95, Processing Time 0.024 seconds

The Metaphorical Structure of the Text (텍스트의 은유적 구조)

  • Park, Chan-Bu
    • Journal of English Language & Literature
    • /
    • v.57 no.5
    • /
    • pp.871-887
    • /
    • 2011
  • In Lacanian terms, the real, which is a non-representative Ding an sich, is indirectly approachable only in and through language. This 'speaking of the real' is made possible through a restoration of the missing link between one signifier, S1 and another signifier, S2, as is manifested in the Lacanian formula of metaphor. In Freudian terms of textual metaphor, the missing link is restored by substituting a new edition for an old edition of one's historical text of life. This is what this essay means by the metaphorical/dualistic structure of the analytic/literary text. And this is a way of talking about an intertextuality between literature and psychoanalysis in the sense of the 'text as psyche' and the 'psyche as text.' Applying the 'signifying substitution' to the Oedipus complex, the Oedipal child can find a meaning(s), "my erotic indulgement with my Mom is wrong" by metaphorically substituting S2: the Name of the Father for S1: the Desire of the Mother. This meaning leads to the constitution of the human subject and the formation of the incest taboo, one of the most significant distinctive features of the human being as distinguished from the animals. We can see a similar metaphorical structure of S1-S2 taking place in the literary texts such as Macbeth and "Dover Beach": in the course of the stage of life being substituted for the primal scene in the former, and the plain of Tucydides for a bed scene in the latter, respectively.

Study of Relationship on TaiYin-disease between the Chapter of Channels in Miraculous Pivot of Emperor's Classic of Internal Medicine and in ShangHanRun (『영추ㆍ경맥편』과 『상한론』의 태음병의 상관성 연구)

  • Lee Seung Yeul;Kim Yon Tae;Shin Heung Mook
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.18 no.2
    • /
    • pp.396-400
    • /
    • 2004
  • The oriental medical doctors who had studied Shang Han Run thought highly of meridians and until now it was generally known that the chapter of heat in the Plain Questions of Emperor's Classic Internal Medicine(ECIM: 皇帝內經, 素門, 熱論) was the basis of Shang Han Run. The chapter of heat in the Plain Questions of ECIM was the first text in which the basic theory on six-channels according to the types of illness was introduced. In my point of view, the theory of treating six-channels had close relation to the Chapter of Channels in Miraculous Pivot of ECIM(皇帝內經, 靈樞ㆍ經脈篇) as well as the chapter of heat in the Plain Questions of ECIM. Therefore I took a look at the origin of treating six-channels in Shang Han Lun and illuminated again the meaning to compare the parts of in Shang Han Lun with the Chapter of Channels in Miraculous Pivot of ECIM. Conclusion : The symptoms of TaiYin-channel(太陰經) in the Chapter of Channels in Miraculous Pivot of ECIM were, for the most part, accord with those of TaiYin-disease in Shang Han Lun. Furthermore, the symptoms in Shang Han Lun were explained definitely and in detail. Therefore the theory of Shang Han Lun has been developed on the basis of ECIM with the changes of the times. TaiYin-disease implied symptoms of pi-spleen meridian(脾經) and fei-lung meridian(肺經). Therefore Shang Han Lun was the foundation of treatment based on overall analysis of signs and symptoms(辨證論治) in respect of meridian as well as the text in which the steps of infectious diseases(外感病) of human bodies were explained.

Quantized DCT Coefficient Category Address Encryption for JPEG Image

  • Li, Shanshan;Zhang, Yuanyuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1790-1806
    • /
    • 2016
  • Digital image encryption is widely used for image data security. JPEG standard compresses image with great performance on reducing file size. Thus, to encrypt an image in JPEG format we should keep the quality of original image and reduced size. This paper proposes a JPEG image encryption scheme based on quantized DC and non-zero AC coefficients inner category scrambling. Instead of coefficient value encryption, the address of coefficient is encrypted to get the address of cipher text. Then 8*8 blocks are shuffled. Chaotic iteration is employed to generate chaotic sequences for address scrambling and block shuffling. Analysis of simulation shows the proposed scheme is resistant to common attacks. Moreover, the proposed method keeps the file size of the encrypted image in an acceptable range compared with the plain text. To enlarge the cipher text possible space and improve the resistance to sophisticated attacks, several additional procedures are further developed. Contrast experiments verify these procedures can refine the proposed scheme and achieve significant improvements.

Development of Encryption System for Facsimile (팩시밀리용 암호 시스템 개발)

  • Yoo Byong-wook;Han Sang-soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.2
    • /
    • pp.344-352
    • /
    • 2006
  • We developed the facsimile encryption system that could send/receive the cipher text and plain text automatically. This facsimile encryption system is adopting the 128bits SEED encryption algorithm, 1024bits modular and 256bits exponential Diffie-Hellman key exchange method. We can reduce the cipher text transmitting time by developing the Dual Facsimile Server, it can make the real time encryption communication. Key is safely exchanged by the exchanging the listed serial numbers when the Diffie-Hellman key exchanging.

A Study on the Tinnitus of Huangdi's Internal Classic $\ll$황제내경(黃帝內經)$\gg$ ($\ll$소문(素問).영추(靈樞)$\gg$에 나타난 이명(耳鳴)에 대한 연구(硏究))

  • Byun, Seok-Mi;Tark, Myoung-Rim;Kang, Na-Ru;Ko, Woo-Shin;Yoon, Hwa-Jung
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.23 no.1
    • /
    • pp.224-252
    • /
    • 2010
  • Objective : The purpose of this study is to investigate tinnitus of Plain Questions $\ll$素問$\gg$ and Miraculous Pivot $\ll$靈樞$\gg$. Methods : We conducted a study on the original text paragraphs of Internal Classic $\ll$內經$\gg$ containing the tinnitus and analysis of Yang, Ma, Zhang, Wang etc. We drew a parallel between tinnitus from Internal Classic $\ll$內經$\gg$ and matching diagnoses from western medicine. Results : The results were as follows. 1. Tinnitus in Plain Questions $\ll$素問$\gg$Tong Pyeong Heo Sil Ron <通評虛實論> was similar to the symptoms of diabetes mellitus complication and schizophreniform disorder in western medicine. 2. Liver fire tinnitus in Plain Questions $\ll$素問$\gg$ Yuk Won Jeong Gi Dae Ron <六元正紀大論> was similar to the symptoms of psychological distress in western medicine. 3. Phlegm fire tinnitus in Plain Questions $\ll$素問$\gg$ Ji Jin Yo Dae Ron <至眞要大論> was similar to the symptoms of meniere's disease and malfunction of autonomic nervous system in western medicine. 4. Blood deficiency tinnitus in Miraculous Pivot $\ll$靈樞$\gg$ Sa Gi Jang Bu Byeong Hyeong <邪氣藏府病形> was similar to the symptoms of anemia in western medicine. 5. Tinnitus in Miraculous Pivot $\ll$靈樞$\gg$ Gyeong Geun <經筋> was similar to the myofacial pain syndrome of the sternocleidomastoid muscle and the masseter muscle in western medicine. 6. Gallbladder deficiency tinnitus in Miraculous Pivot $\ll$靈樞$\gg$ Gwol Hyeong <厥病> was similar to the symptoms of otitis media and labyrinthitis in western medicine. 7. Kidney deficiency tinnitus in Miraculous Pivot $\ll$靈樞$\gg$ Gyeol Gi <決氣> and Hai Ron <海論> was similar to the symptoms of degenerative auditory organ in western medicine. 8. Tinnitus in Internal Classic $\ll$內經$\gg$ showed close relations with the symptoms of the wind character. Conclusion : We analyzed the original text paragraphs of Internal Classic $\ll$內經$\gg$ and explanations about tinnitus. Further studies are needed to compare oriental medicine and western medicine diagnoses to develop better treatments for tinnitus.

Optimal Implementation of Format Preserving Encryption Algorithm FEA in Various Environments (다양한 환경에서의 형태보존 암호 FEA에 대한 최적 구현)

  • Park, Cheolhee;Jeong, Sooyong;Hong, Dowon;Seo, Changho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.41-51
    • /
    • 2018
  • Format preserving encryption(FPE) performs encryption with preserving the size and format of plain-text. Therefore, it is possible to minimize the structural change of the database before and after the encryption. For example, when encrypting data such as credit card number or social security number, it is possible to maintain the existing database structure because FPE outputs the same form of cipher-text as plain-text. Currently, the National Institute of Standards and Technology (NIST) recommends FF1 and FF3 as standards for FPE. Recently, in Korea, FEA, which is a very efficient FPE algorithm, has been adopted as the standard of FPE. In this paper, we analyze FEA and measure the performance of FEA by optimizing it in various environments.

On the development of DES encryption based on Excel Macro (엑셀 매크로기능을 이용한 DES 암호화 교육도구 개발)

  • Kim, Daehak
    • Journal of the Korean Data and Information Science Society
    • /
    • v.25 no.6
    • /
    • pp.1419-1429
    • /
    • 2014
  • In this paper, we consider the development of encryption of DES (data encryption standard) based on Microsoft Excel Macro, which was adopted as the FIPS (federal information processing standard) 46 of USA in 1977. Concrete explanation of DES is given. Algorithms for DES encryption are adapted to Excel Macro. By repeating the 16 round which is consisted of diffusion (which hide the relation between plain text and cipher text) and the confusion (which hide the relation between cipher key and cipher text) with Excel Macro, we can easily get the desired DES cipher text.

Study of one chip SEED block cipher (SEED 블록 암호 알고리즘의 단일 칩 연구)

  • 신종호;강준우
    • Proceedings of the IEEK Conference
    • /
    • 2000.06b
    • /
    • pp.165-168
    • /
    • 2000
  • A hardware architecture to implement the SEED block cipher algorithm into one chip is described. Each functional unit is designed with VHDL hardware description language and synthesis tools. The designed hardware receives a 128-bit block of plain text input and a 128-bit key, and generates a 128-bit cipher block after 16-round operations after 8 clocks. The encryption time is within 20 nsec.

  • PDF

On discernment of plain and cipher text using the entropy test (엔트로피 방법을 이용한 평문.암호문 식별방법에 관한 연구)

  • 차경준;류제선
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.15-19
    • /
    • 2001
  • 암호 알고리즘 출력문에 대한 난수성 검정들은 평문과 암호문 식별에 중요한 역할을 하고 있다. 실제로, 난수열의 생성자는 비밀키의 생성자와 같은 많은 암호체계에서 사용되고 있으며, 이때 사용되고 있는 난수열은 모의 난수라고 한다. 따라서, 이진수열에 대한 난수성을 검정하는 통계적 검정방법이나 다른 이론적 기준이 필요하다. 본 논문에서는 모의난수열이 갖고 있는 난수성 판정에 관하여 universal 엔트로피 검정방법과 근사 엔트로피 검정방법을 이용하며, 위의 두 방법에 대한 각각의 이론적인 배경과 모의실험을 통한 판정기준을 제공한다.

  • PDF

DES Algorithm and its Implementation in School Mathematics Education (DES를 이용한 암호의 이해와 활용 및 DES에서 한글 구현)

  • 정상조;박중수
    • Journal of the Korean School Mathematics Society
    • /
    • v.6 no.2
    • /
    • pp.101-115
    • /
    • 2003
  • DES is a very simple crytosystem that uses only permutation in mathematics. Recently AES is standardized based on DES. In this paper we introduce DES and its implementation. In particular, we tried to process Hangul in DES. This paper may be used in school mathematics education.

  • PDF