• 제목/요약/키워드: byzantine

검색결과 62건 처리시간 0.023초

Heresiological Labeling in Ecumenical Networking from the Ninth to Thirteenth Centuries : The Byzantine Oikoumene Reconsidered

  • KUSABU, Hisatsugu
    • Asian review of World Histories
    • /
    • 제4권2호
    • /
    • pp.207-229
    • /
    • 2016
  • Apart from its Greco-Roman and Christian connotations, considering its continuous influence in the Byzantine world, the oikoumene should be seen as a geo-political as well as socio-religious concept of networking and unity in popular thought and local narratives. This paper argues that "ecumenical" thought survived after Late Antiquity and through the Byzantine era in the Orthodox transportation infrastructure of people and information. It also provides a review of the circulation of heresiological "labels" in the middle to late Byzantine eras. In the Mediterranean, routes, transportation vehicles, and any media supported intelligent networking in the oikoumene. People in the oikoumene could access foreign teachings or stories from outsiders or "barbarians" of different faiths. Constantinopolitan intellectuals coined and issued labels for heretics, such as the Bogomils, Paulicians, and Massalians, and constructed a narrative of the heretical contamination from the center of the oikoumene. Heresiologists collected the information used in creating these heresy titles from far-flung places in all directions from Constantinople, and then exported the labels, which were spread using the transportation network of the Byzantine oikoumene.

Throughput and Interference for Cooperative Spectrum Sensing: A Malicious Perspective

  • Gan, Jipeng;Wu, Jun;Zhang, Jia;Chen, Zehao;Chen, Ze
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권11호
    • /
    • pp.4224-4243
    • /
    • 2021
  • Cognitive radio (CR) is a feasible intelligent technology and can be used as an effective solution to spectrum scarcity and underutilization. As the key function of CR, cooperative spectrum sensing (CSS) is able to effectively prevent the harmful interference with primary users (PUs) and identify the available spectrum resources by exploiting the spatial diversity of multiple secondary users (SUs). However, the open nature of the cognitive radio networks (CRNs) framework makes CSS face many security threats, such as, the malicious user (MU) launches Byzantine attack to undermine CRNs. For this aim, we make an in-depth analysis of the motive and purpose from the MU's perspective in the interweave CR system, aiming to provide the future guideline for defense strategies. First, we formulate a dynamic Byzantine attack model by analyzing Byzantine behaviors in the process of CSS. On the basis of this, we further make an investigation on the condition of making the fusion center (FC) blind when the fusion rule is unknown for the MU. Moreover, the throughput and interference to the primary network are taken into consideration to evaluate the impact of Byzantine attack on the interweave CR system, and then analyze the optimal strategy of Byzantine attack when the fusion rule is known. Finally, theoretical proofs and simulation results verify the correctness and effectiveness of analyses about the impact of Byzantine attack strategy on the throughput and interference.

페르시아 직물문양과 비잔틴 직물문양의 조형성 비교 (Comparison between the Persian textile design and the Byzantine textile design in their patterns)

  • 김영옥
    • 한국의류학회지
    • /
    • 제11권3호
    • /
    • pp.1-14
    • /
    • 1987
  • The purpose of this study was to compare with the Persian texile design having an out-standing skill in fertile designs with the Byzantine textile dosing being influenced a lot by Christinity and many Oriental factors including Hellenism. These two textile design have some similarities and differences in their patterns. The results of the study were as follows: Similarities ; 1. The Persian traditional animals, hunting scenes and cavaliers are used as the major subject in both patterns. 2. Decorative designs enclosed circular are used in both patterns. Differences ; 1. The Persian textile designs are based on Zoroasterianism, and their animal designs have the Zoroasterian religious meanings. While the Byzantine designs are affected by the Christianity. In the Byantine textile designs, the mythical subjects from ancient Rome and Greece, and the circus scenes are dominent. 3. The Persian textile designs are combative, momentary, dignifed, and realistic pattern, while the Byzantin textile designs are playful, sketchy, humouristic, and evasive pattern. 4. Vivid color effect was found in the Persian textile patterns: however, more refined and gorgeous color was used by the Byzantine textile patterns. Thus, the Persian and the Byzantine textile patterns have interrelations with each other. In general, the Persian textile patterns have affected a great deal on the Byzantine textine textile patterns. They are essentially corelated with each other, but each of them has its own characteristics.

  • PDF

An Analysis on Structures of Man's Costume in Byzantine Empire

  • Yoon, Jeom-Soon
    • 패션비즈니스
    • /
    • 제8권6호
    • /
    • pp.57-67
    • /
    • 2004
  • The forms of man's costumes in Byzantine Empire were changed according to each composition of costumes. Those forms of costumes had common features of each period when costumes were included. At the same time, however, the fact that differences existed in accordance with a social position including gender, class, occupation, etc. even though in same period were showed. Analytic elements of man's costumes in Byzantine Empire were selected by important factors. This showed the meanings of position and class in that time. The kinds of analytic elements in man's outwear were various but the forms of costumes were not developed because christianity influenced the forms of clothing in the Middle Ages. As the result of synthesis, the main factor of man's costumes was a tunic in Byzantine Empire of the Middle Ages The phases of the times were reflected on the structure of man's costumes in Byzantine Empire. In particular, religious feature was emphasized, and analytic elements of costumes having meanings showed the features of the society at the Middle Ages. For example, a central analytic element of man's costume, an outer garment was a tunic style of H-silhouette that hid the body line. This was influenced by the phases of the times. Namely, the costume stands as a symbol of the times, and also is a cultural sign that reflects phases like politics, economy, religion.

Algorithm based on Byzantine agreement among decentralized agents (BADA)

  • Oh, Jintae;Park, Joonyoung;Kim, Youngchang;Kim, Kiyoung
    • ETRI Journal
    • /
    • 제42권6호
    • /
    • pp.872-885
    • /
    • 2020
  • Distributed consensus requires the consent of more than half of the congress to produce irreversible results, and the performance of the consensus algorithm deteriorates with the increase in the number of nodes. This problem can be addressed by delegating the agreement to a few selected nodes. Since the selected nodes must comply with the Byzantine node ratio criteria required by the algorithm, the result selected by any decentralized node cannot be trusted. However, some trusted nodes monopolize the consensus node selection process, thereby breaking decentralization and causing a trilemma. Therefore, a consensus node selection algorithm is required that can construct a congress that can withstand Byzantine faults with the decentralized method. In this paper, an algorithm based on the Byzantine agreement among decentralized agents to facilitate agreement between decentralization nodes is proposed. It selects a group of random consensus nodes per block by applying the proposed proof of nonce algorithm. By controlling the percentage of Byzantine included in the selected nodes, it solves the trilemma when an arbitrary node selects the consensus nodes.

동.서양의 복식에 표현된 동물문양의 상징성에 관한 비교 연구 - 유교적 불교문화권과 그리스도교 문화권과의 비교를 중심으로 - (An analysis of symbols of animal patterns in oriental and occidental clothing - focusing on comparison of Buddhism- Confucianism and Christian cultural area -)

  • 이윤정
    • 한국생활과학회지
    • /
    • 제15권3호
    • /
    • pp.469-480
    • /
    • 2006
  • Patterns in clothing symbolize some specific meaning that differs across cultures and religions, although patterns have been mostly used to realize human desires to overcome natural hazards in every culture or religion. This research aims to compare animal patterns of Korea (Confucian/Buddhism culture) with those of Byzantine (Christian culture), based upon a research method of literature survey. It is found through the research that both cultures used common patterns, such as dragon, butterfly, bat, honeybee, peacock, fish, and chicken. In the case of dragon patterns, Korea used it to symbolize emperor, dignity, or authority, while Byzantine used it for devil. Bat patterns had different symbolic meanings in both cultures: they mean happiness, longevity, prosperity or many off-springs in Korea while they mean misfortune or unhappiness in Byzantine. On the other hand, the rest of animal patterns, including butterfly, honeybee, peacock, chicken, had quite a similar symbolic meaning. Butterfly means change of life or beginning of new life in Korea, whereas it means resurrection in Byzantine. Honeybee symbolizes diligence, order, and cooperation. Many animal patterns were used in both cultures at the same time. Another difference can be found in terms of the kind of animals; for example, Korea used wild goose, pheasant, giraffe, deer, mandarin duck & turtle, while Byzantine used eagle, snake, pigeon. Of course, each and every animal has its own meaning, mostly positive. Except dragons and bats, both cultures have a similar meaning in most of animal patterns. Generally speaking, Korea used imaginary animals to pray for human happiness, but Byzantine used real animals to pray for resurrections.

  • PDF

무선 센서 네트워크를 위한 비잔틴 공격에 강인한 새로운 다중 패스 키 설정 방법 (New Byzantine Resilient Multi-Path Key Establishment Scheme for Wireless Sensor Networks)

  • 김영식;장지웅;임대운
    • 한국통신학회논문지
    • /
    • 제34권9C호
    • /
    • pp.855-862
    • /
    • 2009
  • 무선 센서 네트워크(wireless sensor network)에서 센서간 비밀키를 설정하는 단계 중 패스키를 구축하는 단계는 비잔틴 공격(Byzantine attack)에 매우 취약하다. Huang과 Hedhi는 RS 부호를 사용해서 비잔틴 공격에 대한 대응법을 제시하였지만, 전송되는 메시지가 공격자(adversary)에게 노출될 뿐만 아니라 전송 효율이 크게 떨어지는 단점을 갖고 있다. 본 논문에서는 Huang과 Hedhi의 방법의 단점을 극복하여, 공격자에게 직접적으로 전송되는 메시지의 정보를 노출하지 알고서도 효율적으로 비잔틴 공격을 막고 변조된 패스의 위치를 알아내는 방법을 제시한다. 이 방법에서는 non-systematic RS 부호를 사용하며 가용한 패스 상으로 서로 다른 RS부호의 부호어(codeword)의 심볼을 전송하게 된다. 이 방법을 사용하면 Huang과 Hedhi의 방법에 비해서 엔트로피 측면에서 보안성이 더 높고 전송 효율이 더 우수해 진다.

비잔틴 화풍과 반종교개혁의 교차점으로서의 엘 그레코 - 엘 그레코의 <참회하는 막달라 마리아를 중심으로> (El Greco as an Intersection of Counter-Reformation and Byzantine picture -Focused on of El Greco)

  • 임주인
    • 비교문화연구
    • /
    • 제26권
    • /
    • pp.43-71
    • /
    • 2012
  • In this article, we recognize the cross-cultural communication between Greece and Spain through El Greco's pictures. The Greeks of Crete kept to their culture and continued to look to the declining Byzantine Empire for spiritual and political guidance. For two centuries after the conquest, the strength of the Byzantine tradition had become the moral and spiritual sustenance of the conquered in Crete. The basic contribution of Cretan intellectuals or artists such as El Greco of the fifteenth and sixteenth centuries was the forging of connecting links between the Hellenism of the old Byzantine East and the rising, youthful Hellenism of the Renaissance West. In this way, Crete served as an important halfway point between East and West. The saint Mary Magdalene was symbol of Christian penitence, which represents the penitential life personified and became widespread during the Counter Reformation, when new emphasis was put on the value of prayer and repentance in the forgiveness of sin. In Spain, the Penitent Magdalene was popular and El Greco painted many versions, which at the first time, were reflected by Tiziano, on the contrary, at the time of Toledo, were recreated by his own style. Although El Greco was converted to Catholic in Spain, his faith in Greek Orthodox Church influenced on his original painting world. El Greco had never painted a picture whose subject treat with the emphasis of identification between Mary Magdalene and Mary, younger sister of Martha.

프랙티컬 비잔틴 장애 허용 기반의 합의 알고리즘의 평가 프레임워크 (Evaluation Framework for Practical Byzantine Fault Tolerant based Consensus Algorithms)

  • 이은영;김남령;한채림;이일구
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2021년도 추계학술대회
    • /
    • pp.249-251
    • /
    • 2021
  • PBFT(Practical Byzantine Fault Tolerant)는 PoW(Proof of Work) 대비 높은 처리 속도를 보장하며 컴퓨팅 파워의 우위로 인한 기록이 번복되지 않는 절대적 최종성을 보장하는 합의 알고리즘이다. 하지만 메시지 복잡도로 인해 참여하는 노드의 수가 증가할수록 네트워크 부하가 지수적으로 증가한다는 한계가 있다. PBFT는 블록체인 네트워크의 성능을 결정짓는 중요한 요소이지만 평가지표와 평가 기술에 관한 연구는 부족한 실정이다. 본 논문에서는 PBFT를 평가할 수 있는 정량적 지표와 개선된 방안을 쉽게 평가할 수 있도록 합의 알고리즘 변경이 편리한 PBFT 평가 프레임워크를 제안한다.

  • PDF

Secure and Efficient Cooperative Spectrum Sensing Against Byzantine Attack for Interweave Cognitive Radio System

  • Wu, Jun;Chen, Ze;Bao, Jianrong;Gan, Jipeng;Chen, Zehao;Zhang, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권11호
    • /
    • pp.3738-3760
    • /
    • 2022
  • Due to increasing spectrum demand for new wireless devices applications, cooperative spectrum sensing (CSS) paradigm is the most promising solution to alleviate the spectrum shortage problem. However, in the interweave cognitive radio (CR) system, the inherent nature of CSS opens a hole to Byzantine attack, thereby resulting in a significant drop of the CSS security and efficiency. In view of this, a weighted differential sequential single symbol (WD3S) algorithm based on MATLAB platform is developed to accurately identify malicious users (MUs) and benefit useful sensing information from their malicious reports in this paper. In order to achieve this, a dynamic Byzantine attack model is proposed to describe malicious behaviors for MUs in an interweave CR system. On the basis of this, a method of data transmission consistency verification is formulated to evaluate the global decision's correctness and update the trust value (TrV) of secondary users (SUs), thereby accurately identifying MUs. Then, we innovatively reuse malicious sensing information from MUs by the weight allocation scheme. In addition, considering a high spectrum usage of primary network, a sequential and differential reporting way based on a single symbol is also proposed in the process of the sensing information submission. Finally, under various Byzantine attack types, we provide in-depth simulations to demonstrate the efficiency and security of the proposed WD3S.