• Title/Summary/Keyword: hack

Search Result 921, Processing Time 0.029 seconds

Hack's Law and the Geometric Properties of Catchment Plan-form (Hack의 법칙과 집수평면의 기하학적 특성)

  • Kim, Joo-Cheol;Lee, Sang-Jin
    • Journal of Korea Water Resources Association
    • /
    • v.42 no.9
    • /
    • pp.691-702
    • /
    • 2009
  • This study makes a systematic approach to Hack's law considering self-affinity and self-similarity of natural basins as well as the elongation of corresponding catchment-plan forms. Catchment-plan forms extracted from DEM appear to be the population come from the interactions of 2 hypotheses on Hack's law. It is judged that the elongation measures based on inertia moments are more intuitive than the ones based on main channel lengths. The exponent of Hack's law, h, seems to be similar to the result of Gray's study (1961). However Hurst exponent, H, being 0.96 imply that catchment-plan forms considered in this study have isotropic increasing properties with scale. From this point of view it is inferred that the shapes of the basins in this study would be more affected from self-similarity of main channel lengths than self-affinity of catchment-plan forms.

Disaster and Artistic Measures: Hermann Josef Hack's Project of World Climate Refugee Camp (재난과 미술적 대응: 헤르만 조셉 하크(Hermann Josef Hack)의 기후난민 프로젝트)

  • Kim, Hyang-Sook
    • The Journal of Art Theory & Practice
    • /
    • no.14
    • /
    • pp.53-83
    • /
    • 2012
  • This thesis is a study of artistic measures and climate refugees, based on Hack's World Climate Refugee Camp project. According to Hack, climate refugees appeared with the process of globalization. Hack claimed that the people who put climate refugees in danger are the industrialized nations, and therefore, their rejection of refugees is nonsense. He also stated that the fundamental solution would be the active participation of such nations. Thus, he travels around the world, encouraging participants and globalizing his project. Interestingly, the practical participation method of his climate calamity project is divided into four methods, which are all related to realizing the danger and presenting various solutions. First, the aesthetic of survival: the reason Hack focused on the warming trend and claimed that we have to accept the climate refugees as refugees comes from the thought that we are all potential refugees, and the anxiety that climate refugees may cause war in the end. The solution Hack found for surviving in such a world is to create "refugee camps" to notify people about the seriousness of climate change, and to put the "aesthetic for survival" in action. Second, a relation-oriented relationship: communication between Hack and the participants was done in various ways. They are experiencing a bond and emotions of an interrelationship through their actions in the experimental field, experiencing a new form of art, which they were not able to experience in a museum. Third, a utopian measure: Hack's utopian measure started from the fear of dystopia but Hack still believes that it is not only a dream, but that it can be realized. He claims that even though the start may be feeble, it is possible to rescue children from starvation and to treat climate refugees as proper human in the end, when communication and cooperation is done the right way and properly. Fourth, the aesthetic of global relation, the internet: the new solution Hack is trying on the internet is to make more people participate in his project. It is fate that "human are the wrongdoer and the victim at the same time", but according to Hack's opinion, social disaster can be avoided through effort and it is optimistic that we can give form to the culture revolution we are experiencing now. Hack's project illustrated the importance of daily life, compared to art inside a museum, through active participation of the people and opened up a new method of art through realistic responses to disasters. This is distinctive from the past exhibitions, where artists gave shape and form to ideals and an imaginary world, in that it shows that the artist and audience aim for creating a community-like structure, just like Bourriaud's art method. Hack's project of climate calamity illustrates that installation and action art is not only an art genre which shows installation and activities, but that it can include social and political issues and that it can be completed with the help of participants, consequently becoming a genre of modern art. Hack raises a question about art's identity through various descriptions. Artists as planners, who base their artworks on their subjectivity or the characteristics of a specific period, the people as participants, the duet of art work and play, human and human, and further, human and nature. The practical participation method, as a measure for "disaster", reveals the new art of the 21st century within Hack's artworks. Even though there are several problems with Hack's usage of art as a measure for disaster, it will actively open up a new page for the 21st century's art with the theme of disaster.

  • PDF

An Extension to TCP HACK for Improving the Performance of TCP in Lossy Environments

  • Niu, Ying-Xia;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.217-219
    • /
    • 2002
  • TCP has been designed and tuned as a reliable transfer protocol far wired links. However, it incurs end-to-end performance degradation in wireless environments where packet loss is very high. TCP HACK(Header Checksum Option) is a novel mechanism proposed to improve original TCP in lossy link. It presents an extension to TCP that enables TCP to distinguish packet corruption from congestion in losssy environments. TCP HACK performs well when the sender receives the special ACKs correctly, hut if the ACKs are also lost much, the efficient of TCP HACK will net be prominent. In this paper we present an extension to TCP HACK, which can perform well even when the ACKs are much corrupted.

  • PDF

Automatic malware generation system design using EA (진화알고리즘을 이용한 악성코드 자동생성 시스템 설계)

  • Kwon, Se-Hoon;Kown, Jae-Yeong;Lee, Seung-Hun;Lee, Hyun-Woo;Lee, Jong-Rak;Won, Il-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.193-196
    • /
    • 2017
  • 본 연구는 기존의 변종 악성코드와는 달리 진화알고리즘을 기반으로 한 악성코드 자동 생성 프레임워크에 대한 것이다. 우리가 제안하는 시스템은 소스가 알려지지 않는 바이너리 상태의 악성코드를 역공학적 기법을 이용하여 소스 상태로 복원하고 복원된 소스를 이용하여 다양한 변종 악성코드를 생성하는 것이다. 진화 연산을 적용하기 위해 평가함수의 설계가 중요한데, 우리는 행동 기반 분석 기반의 평가 함수를 포함하는 프레임워크를 제안하였다.

Miscanthus wangpicheonensis T.I. Heo & J.S. Kim (Poaceae): A new species from Korea

  • Heo, Tae-Im;Kim, Jung-Hyun;Ku, Youn-Bong;Kim, Jin-Seok
    • Journal of Species Research
    • /
    • v.10 no.1
    • /
    • pp.57-62
    • /
    • 2021
  • A new species, Miscanthus wangpicheonensis of section Kariyasua, is described and illustrated from the morphological characteristics based on a type specimen collected from Gyeongsangbuk-do. This new species is similar to Miscanthus sacchariflorus (Maxim.) Hack., and M. longiberbis (Hack.) Nakai. The characters which distinguish the above two species are short leaves and racemes, callus hairs 1-1.5-times longer than spikelet, and well-developed awns of spikelet. The specific epithet, "wangpicheonensis", is based on the name of the locality where the new species is found. We assume this new species originated from the hybridization of Miscanthus sacchariflorus (Maxim.) Hack., and M. longiberbis (Hack.) Nakai. Miscanthus wangpicheonensis is found in only one locality in Uljin-gun, Gyeongsangbuk-do, Republic of Korea.

The Reproduction of the class in games and The direction of regulation of Game Hack - Focusing on the Online FPS game 'Overwatch' and 'Battleground' communities - (게이머 계급의 재생산과 게임 핵의 규제 방향성 - 온라인 FPS 게임 '오버워치'와 '배틀그라운드' 커뮤니티를 중심으로 -)

  • Jo, Hui-Seon
    • Journal of Korea Game Society
    • /
    • v.21 no.2
    • /
    • pp.3-16
    • /
    • 2021
  • This study examined to the aspects of capital and class structure, focusing on 'Reproduction' of Bourdieu, P, through collecting the post titles of the game community of online FPS games 'Overwatch' and 'Battleground', related to keyword, 'Game Hack'. The data used in the study was collected and refined through the statistical program R and analyzed by the analysis site 'Bigkinds'. At results, we will reveal that the class structure of the online FPS gamer group is based on cultural capital and reproduction, and suggest the right direction for the Game Hack regulation policy from the point of view of the cultural capital theory.

Evaluation of Parameter Characteristics of the Storage Function Model Using the Kinematic Wave Model (운동파모형을 이용한 저류함수법 매개변수의 특성 평가)

  • Choi, Jong-Nam;Ahn, Won-Shik;Kim, Hung-Soo;Park, Min-Kyu
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.10 no.4
    • /
    • pp.95-104
    • /
    • 2010
  • The storage function model is one of the most commonly used models for flood forecasting and warning system in Korea. This paper studies the physical significance of the storage function model by comparing it with kinematic wave model. The results showed universal applicability of the storage function model to Korean basins. Through a comparison of the basic equations for the models, the storage function model parameters, K, P and $T_l$, are shown to be related with the kinematic wave model parameters, k and p. The analysis showed that P and p are identical and K and $T_l$ can be related to k, basin area, and coefficients of Hack's law. To apply the storage function model throughout the southern part of Korean peninsular, regional parameter relationships for K and $T_l$ were developed for watershed area using data from 17 watersheds and 101 flood events. These relationships combine the kinematic wave parameters with topographic information using Hack's Law.

A Robust Multiple Set-Top Box Authentication Scheme for IPTV Against Smart Card Cloning Attack (IPTV 환경에서 스마트카드 복제에 강건한 다중 셋톱박스 인증기법)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.37-46
    • /
    • 2010
  • In an IPTV system, the rights of the content and service provider can be protected by using Conditional Access System (CAS) and Digital Right Management (DRM). In case of the CAS, only the authorized user who has structured authentication keys can decrypt the encrypted content. However, since the CAS establishes a secure channel only between content provider and Smart Card (SC), it cannot protect the system against McCormac Hack attack which eavesdrops on unsecure channel between SC and Set-Top Box (STB) and SC cloning attack. In this paper, we propose a robust multi-STB assisted SC / STB authentication protocol which can protect the IPTV system against not only McCormac Hack attack, but also SC cloning attack. The previous works which bind a STB and a SC during the SC registration phase against the SC cloning attack does not support multi-STB environments. The proposed system which dynamically updates the STB information in subscriber management system using the bi-directional channel characteristic of IPTV system can support the user's multi-STB device effectively.

Vulnerability Analysis of Bluetooth Communication based on GNU Radio (GNU Radio 기반 블루투스 통신 취약점 분석)

  • Kim, Tae-Yong;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2014-2020
    • /
    • 2016
  • In general, automatic access control management system using smart door-lock must be always exposed to security vulnerability during wireless communication based on Bluetooth. In particular, important information such as a secrete key can be exposed to the attacker when the authentication protocol has been operating in the wireless section. Therefore important information exchanged in the radio section needs to be properly encrypted. In order to analyze security vulnerability for automatic access control management system of public facilities such as subway vent, GNU Radio platform and HackRF device will be considered and experimented. Proposed experimental system to perform software based power analysis attack could be very effectively applied. As a result, important information such as packet type, CRC, length of data, and data value can be easily decoded from wireless packet obtained from HackRF device on GNU Radio platform. Constructed experimental system will be applied to avoid some security problems.

An unrecorded species from Korea: Poa tuberifera Faurie ex Hack. (Poaceae) (한국 미기록 벼과식물: 성긴포아풀)

  • Jung, Su-Young;Ji, Seong-Jin;Yang, Jong-Cheol;Park, Soo-Hyun;Lee, You-Mi
    • Korean Journal of Plant Taxonomy
    • /
    • v.42 no.1
    • /
    • pp.76-79
    • /
    • 2012
  • An unrecorded species, Poa tuberifera Faurie ex Hack., was found in Saryeoni forest, Jocheon-eup, Jeju-si, Jeju-do. It can be distinguished from P. acroleuca Steud. and P. acroleuca var. submoniliformis Makino by its morphological characteristics, with panicle branches bearing sparse spikelets and lemmas not wavy-haired at the base. P. tuberifera is known to be an endemic plant of Japan, but its distribution in South Korea is confirmed through the present study.