• Title/Summary/Keyword: deception

Search Result 116, Processing Time 0.026 seconds

Chartacteristics of Water-bottom Reflection Coefficients in Bransfield Strait, Antarctic Peninsula (남극 브랜스필드 해협의 해저면 반사계수 특성)

  • Jin, Yeong Geun;Hong, Jong Guk;Lee, Deok Gi
    • Journal of the Korean Geophysical Society
    • /
    • v.2 no.4
    • /
    • pp.241-250
    • /
    • 1999
  • Reflection coefficients of the seafloor have been calculated from the amplitude ratio of secondary to primary water bottom reflection in seismic data obtained from Bransfield Strait, Antarctic Peninsula. Test processing for the coefficients shows that moving average is effective to reduce severe fluctuation of the coefficient measured at each point. Relationship between the coefficients and the properties of water bottom is analyzed to illuminate geological environment. In the central Bransfield Basin, the magnitude of reflection coefficients decreases as it is distant from the sedimentary sources. Reflection coefficients range from 0.12 to 0.2 near the continental slope of the basin, and from 0.1 to 0.12 in the basin floor. In the western Bransfield basin, reflection coefficients between 0.2 to 0.3 are obtained from the area eroded by glacial movement. On the volcanic structures near Deception Island, the coefficients show relatively high values more than 0.2. Paleo-geological structures uplifted by tectonic movement and outcropped by glacial erosion have relatively high coefficients.

  • PDF

The Security Vulnerabilities of 5G-AKA and PUF-based Security Improvement (5G 인증 및 키합의 프로토콜(5G-AKA)의 보안취약점과 PUF 기반의 보안성 향상 방안)

  • Jung, Jin Woo;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.3-10
    • /
    • 2019
  • The 5G network is a next-generation converged network that combines various ICT technologies to realize the need for high speed, hyper connection and ultra low delay, and various efforts have been made to address the security vulnerabilities of the previous generation mobile networks. However, the standards released so far still have potential security vulnerabilities, such as USIM deception and replication attack, message re-transmission attack, and race-condition attack. In order to solve these security problems, this paper proposes a new 5G-AKA protocol with PUF technology, which is a physical unclonable function. The proposed PUF-based 5G-AKA improves the security vulnerabilities identified so far using the device-specific response for a specific challenge and hash function. This approach enables a strong white-list policy through the addition of inexpensive PUF circuits when utilizing 5G networks in areas where security is critical. In addition, since additional cryptographic algorithms are not applied to existing protocols, there is relatively little burden on increasing computational costs or increasing authentication parameter storage.

An Outline of Food Ethics (음식윤리 개요)

  • Kim, Suk-Shin
    • Food Science and Industry
    • /
    • v.49 no.2
    • /
    • pp.83-97
    • /
    • 2016
  • This review was performed to outline the food ethics to the professionals in the field of food science and industries. Food ethics is the ethics or ethical consideration concerning food; while, the keywords of food ethics are a life, happiness and the wisdom. The ultimate goal as well as the first principle of food ethics is a sustainable living of human race. In order to reach the goal a coexistence of humans and nature, coexistence of humans and humans, and the fulfillment of essential requirements of a food are needed. The needs yield six categorical imperatives such as a respect for life, preservation of nature, distributive justice without deception or fakes, prior consideration of consumer, moderation and balance neither overs nor shorts, and the assurance of safety. The core principles corresponding to the categorical imperatives include a respect for life, environmental preservation, justice, priority of consumer, dynamic equilibrium, and the priority of safety. The core principles approach is a simple, clear, and practical method in solving ethical issues. The code of food ethics is also based on the core principles.

Playing God: Self-Reflection, Religion, and Morality in Muriel Spark's Fiction (신을 연기하기: 뮤리엘 스파크 소설의 자아반영성, 종교, 윤리)

  • Kim, Heesun
    • English & American cultural studies
    • /
    • v.18 no.4
    • /
    • pp.33-64
    • /
    • 2018
  • Through the experimental narrative construction by authorial divinity, Muriel Spark's novels and films based on her fiction show the difficulty of living like a human being under various inhumane and manipulative circumstances of the modern capitalistic society. By adopting flash-forward, self-reflection, and deceptive omnipotent viewpoints, her work has surprisingly predicted the post-modern trend in which humans are increasingly attracted and interpellated to the digitalized media. Muriel Spark called the recent anesthetic situation by stimulation "a driver's seat" because it is a symbol of how humans should act to maintain the critical subject. Emphasizing the value of self-reflection, religion and morality in the mechanized society, Muriel Spark stressed literature should play the role of helmsman who sails safely in the rough sea. In Muriel Spark's works, God is often synonymous with writers. As a Jewish immigrant she experienced alienation in Scotland, marital violence, prejudices of the London-based publishing world, Nazism, and Watergate. For her, the harsh reality of the modern society needs to be guided and complemented by something beyond human control. But rather than relying entirely on traditional Catholic doctrines such as Graham Greene and Evelyn Waugh, Muriel Spark has taken a personal, religious view of literature and insists that the genuine writer must play God's play. Seeking for the speculative vision for the future of human life in God's plan, she tries to understand the complex twisted motives of human beings which are often far from the ideal form. Simply put, her search of self-reflection, religion and ethics is modeled on the God's plan for the ideal human being who is supposed as the writer with the transfigurative imagination of the trinity.

A Study on portable voice recording prevention device (휴대용 음성 녹음 방지 장치 연구)

  • Kim, Hee-Chul
    • Journal of Digital Convergence
    • /
    • v.19 no.7
    • /
    • pp.209-215
    • /
    • 2021
  • This study is a system development for voice information protection equipment in major meetings and places requiring security. Security performance and stability were secured with information leakage prevention technology through generation of false noise and ultrasonic waves. The cutoff frequency band for blocking the leakage of voice information, which has strong straightness due to the nature of the radio wave to the recording prevention module, blocks the wideband frequency of 20~20,000Hz, and the deception jamming technology is applied to block the leakage of voice information, greatly improving the security. To solve this problem, we developed a system that blocks the recording of a portable smartphone using a battery, and made the installation of a separate device smaller and lighter so that customers do not recognize it. In addition, it is necessary to continuously study measures and countermeasures for efficiently using the output of the anti-recording speaker for long-distance recording prevention.

Development of Air to Air Mission Tactics for Manned-Unmanned Aerial Vehicles Teaming (공대공 교전을 위한 유무인항공기 협업 전술 개발)

  • Hwang, Seong-In;Yang, Kwang-Jin;Oh, Jihyun;Seol, Hyeonju
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.50 no.1
    • /
    • pp.47-57
    • /
    • 2022
  • UAVs have been deployed various missions such as deception, reconnaissance and attack since they have been applied in battlefield and achieved missions successfully instead of man. In the past, it is impossible for UAVs to conduct autonomous missions or cooperative mission between manned aircraft due to the limitation of the technology. However, theses missions are possible owing to the advance in communication and AI Technology. In this research, we identified the possible cooperative missions between manned and unmanned team based on air-to-air mission. We studied cooperative manned and unmanned tactics about fighter sweep mission which is the core and basic operation among various air-to-air missions. We also developed cooperative tactics of manned and unmanned team by classifying nonstealth and stealth confrontational tactics. Hereafter, we verified the validity of the suggested tactics using computer simulations.

The Interpretation of "The Great Learning" within the Korean New Religion Daesoon Jinrihoe (韓國大巡真理會對 《大學》 思想的解釋與轉化)

  • Chung, Yunying
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.34
    • /
    • pp.141-169
    • /
    • 2020
  • This study focuses on the interpretation and transformation of "The Great Learning" within the Korean new religion, Daesoon Jinrihoe. Joseon Dynasty Korea was a member of the Chinese Character Cultural Sphere in East Asia. The examination and recruitment system of the Yuan Dynasty influenced the Joseon Dynasty for a long historical period. Zhu Xi's (朱熹) version of The Four Books were accepted and applied in imperial examinations during the Joseon Dynasty. The 18th century Confucian thinker, Jeong Yak-Yong (丁若鏞), overturned and rebuilt his own system for studying and interpreting The Four Books (四書學). Zhu Xi and Jeong Yak-Yong's systems of thought influenced Confucianism knowledge in that era. The historical figure deified as the Supreme God by Daesoon Jinrihoe, Kang Jeungsan (姜甑山), was trained in the study of The Four Books within that cultural and philosophical context, and this is especially evident in his interpretation and transmission of "The Great Learning." Kang Jeungsan regarding The Great Learning as deeply important. That text combined Confucian discourse on Principle, Mind, and Practice. In his interpretation, The Great Learning was also a medical and religious book that had holy and mysterious powers. In Mugeuk-do and Taegeuk-do (direct predecessors to Daesoon Jinrihoe), Jo Jeongsan interpreted the concept of Sincerity and Regularizing the Mind and incorporated them into doctrine as 'Sincerity, Respectfulness, and Faithfulness' and 'Guarding against Self-deception.' Park Wudang practiced and spread those doctrines to Korea, and Daesoon Jinrihoe devotees continue to follow those doctrines in present times.

A Legal Study on The Act Bill for Establishing The Game User Committee

  • Kyen, Seung-Yup
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.3
    • /
    • pp.165-171
    • /
    • 2022
  • In this paper, we suggest the Measures to improve the Act Bill for establishing the Game User Committee. The Act Bill has a lot of problems which are violations of criminal legalism due to unclear terms in administrative punishment and violations of The Human Right enjoying freedom of occupation and guaranting property due to not defining provisisons about The Duty of Confidentiality or The Legal Fiction as Public Officials for Purposes of Applying Penalty Provisions. also the duplicate regulations in the Act Bill disrupt game industry development. we have three results that were derived through analysis of Prior studies and precedents. The First is to define details of special reasons in enforcement ordinance and enforcement regulations. The Second is to define The Duty of Confidentiality or The Legal Fiction as Public Officials for Purposes of Applying Penalty Provisions in the act bill. The Third is to address managing the random reward items in the Game Rating and Administration Committee or is to give game user advance notice about the Comntent Dispute Mediation system.

How to Protect Critical Nodes of Megacities in Preparation for the Digitization of Spatial Information (공간정보 디지털화에 대비한 메가시티 핵심노드 방호 대책)

  • Sim, Jun Hak;Cho, Sang Keun;Park, Sung Jun;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.121-125
    • /
    • 2022
  • As the technologies of the 4th industrial revolution develops, spatial information is becoming digitized. Now, even with a smartphone, we can easily identify the location of national & military critical facilities located in the mega cities. As a result, mega cities' national & military critical facilities were exposed to not only traditional threats, but also non-traditional threats such as terrorism, cyber hacking, and criminal activities. This study suggests a way to protect national & military critical facilities of mega cities from such threats. Considering limitation of time & resources, protecting perfectly all national & military critical facilities is impossible, so we should focus on their critical nodes. Specifically, We suggest ways to protect the critical nodes by converging some measures such as design & arrangement in harmony with the surrounding environment, underground construction & covering, and visual deception. Transparency of digital spatial information will further increase with the advent of urban air mobility and autonomous vehicles in the future. Therefore, in order to prepare for future threats, we should take measures to minimize the exposure of critical nodes.

An Exploratory Study on the Advertising Display and Regulation Method of Native Advertising - Focus on Expert research by production practitioners - (네이티브 광고의 광고 표시 및 규제 방법에 대한 탐색적 연구 - 제작 실무자들의 전문가 조사를 중심으로 -)

  • Yu, Hyun Joong;Chung, Hae Won
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.455-462
    • /
    • 2022
  • This study attempted to examine the problems of the expression and format of native advertisements appearing on various platforms and to prepare a plan to regulate them. To this end, in-depth interviews were conducted to those in charge of advertising practice and examined. First, as a problem with the expression and format of native advertisements, it was considered that the congestion and deception of indiscriminate native advertisements appearing on various platforms could bring negative perceptions to consumers. For the second user's interaction, it was considered that customized advertising expressions through targeting by platform should be produced. Third, regarding the regulation of native advertisements, it was suggested that regulatory measures for consumer protection should be prepared and that market autonomy should be left to it. A strategic operation plan for native advertising according to various platforms should be prepared.