• Title/Summary/Keyword: jonathan

Search Result 233, Processing Time 0.027 seconds

Collaborative Governance, Decent Work and Innovation: An Analytical Framework for Sustainable Workplaces Based on the Case of Philippine Science and Technology Parks

  • SALE, Jonathan
    • World Technopolis Review
    • /
    • v.5 no.1
    • /
    • pp.71-82
    • /
    • 2016
  • This paper explores, explains and describes a framework for analyzing collaborative governance, decent work and innovation as fundamental elements of sustainable workplaces through case study of Philippine science and technology (S & T) parks. Rules, or the legal infrastructure, are particularly significant considerations that facilitate or hinder collaboration. Industrial relations/human resource (IR/HR) practices are essential to collaboration and decent work. Employee consultation and labor-management council or committee are examples of IR/HR practices that might contribute to collaboration and decent work in firms and workplaces in S & T parks as they are team approaches to production, too. Collaboration and decent work enhance the capacity to innovate. In the long run, collaborative governance, decent work and innovation tend to converge in the concept of sustainable development. The interdependencies and interactions among collaborative governance, decent work and capacity to innovate in firms operating in S & T parks make possible new solutions to new problems (i.e., innovation) and, thus, sustainable workplaces.

Large-volume and room-temperature gamma spectrometer for environmental radiation monitoring

  • Coulon, Romain;Dumazert, Jonathan;Tith, Tola;Rohee, Emmanuel;Boudergui, Karim
    • Nuclear Engineering and Technology
    • /
    • v.49 no.7
    • /
    • pp.1489-1494
    • /
    • 2017
  • The use of a room-temperature gamma spectrometer is an issue in environmental radiation monitoring. To monitor radionuclides released around a nuclear power plant, suitable instruments giving fast and reliable information are required. High-pressure xenon (HPXe) chambers have range of resolution and efficiency equivalent to those of other medium resolution detectors such as those using NaI(Tl), CdZnTe, and $LaBr_3:Ce$. An HPXe chamber could be a cost-effective alternative, assuming temperature stability and reliability. The CEA LIST actively studied and developed HPXe-based technology applied for environmental monitoring. Xenon purification and conditioning was performed. The design of a 4-L HPXe detector was performed to minimize the detector capacitance and the required power supply. Simulations were done with the MCNPX2.7 particle transport code to estimate the intrinsic efficiency of the HPXe detector. A behavioral study dealing with ballistic deficits and electronic noise will be utilized to provide perspective for further analysis.

Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher

  • Marpaung, Jonathan A.P.;Ndibanje, Bruce;Lee, Hoon Jae
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.237-245
    • /
    • 2014
  • In this study, software-based countermeasures against a side-channel cryptanalysis of the Rabbit stream cipher were developed using Moteiv's Tmote Sky, a popular wireless sensor mote based on the Berkeley TelosB, as the target platform. The countermeasures build upon previous work by improving mask generation, masking and hiding other components of the algorithm, and introducing a key refreshment scheme. Our contribution brings improvements to previous countermeasures making the implementation resistant to higher-order attacks. Four functional metrics, namely resiliency, robustness, resistance, and scalability, were used for the assessment. Finally, performance costs were measured using memory usage and execution time. In this work, it was demonstrated that although attacks can be feasibly carried out on unprotected systems, the proposed countermeasures can also be feasibly developed and deployed on resource-constrained devices, such as wireless sensors.

HCN AND HCO+ EMISSION IN M31 : TRACING THE DENSE MOLECULAR GAS IN A GALACTIC DISK

  • MULLER SEBASTIEN;BROUILLET NATHALIE;HERPIN FABRICE;BRAINE JONATHAN;JACQ THIERRY
    • Journal of The Korean Astronomical Society
    • /
    • v.38 no.2
    • /
    • pp.245-248
    • /
    • 2005
  • We present mm observations with the IRAM 30m radiotelescope of the HCN (J=1-0) and HCO+ (J=1-0) emission lines from Giant Moleculat Clouds (GMC) in the disk of the Andromeda Galaxy, The selected GMC targets have various morphology and environments, including locations within spiral arms or in interarm regions and with galactocentric radii ranging from 2.4 to 15.5 kpc over the disk. The radial distributions of the ratios HCN/CO and HCO+ /CO are discussed and their values are compared to other galaxies.

Widespread Occurrence of a CYP51A Pseudogene in Calonectria pseudonaviculata

  • Stravoravdis, Stefanos;LeBlanc, Nicholas R.;Marra, Robert E.;Crouch, Jo Anne;Hulvey, Jonathan P.
    • Mycobiology
    • /
    • v.48 no.1
    • /
    • pp.44-50
    • /
    • 2020
  • Calonectria pseudonaviculata and C. henricotiae are two closely related fungal species responsible for boxwood blight disease of ornamental shrubs (Buxus spp.) in the U.S. and Europe. A previous study has shown isolates of the latter species, which is restricted to Europe, to be less sensitive to tetraconazole, an azole fungicide. In this study, we have analyzed the CYP51 paralogs for polymorphism in 26 genomes, representing geographically disparate populations of C. pseudonaviculata (n = 19) and C. henricotiae (n = 7), from the U.S., Europe, Asia, and New Zealand. The presence of a CYP51A pseudogene and lack of a functional CYP51A paralog in all C. pseudonaviculata genomes examined is a novel discovery for fungi and could have implications for the evolution of resistance to antifungal chemicals.

ON HOPF ALGEBRAS IN ENTROPIC JÓNSSON-TARSKI VARIETIES

  • ROMANOWSKA, ANNA B.;SMITH, JONATHAN D.H.
    • Bulletin of the Korean Mathematical Society
    • /
    • v.52 no.5
    • /
    • pp.1587-1606
    • /
    • 2015
  • Comonoid, bi-algebra, and Hopf algebra structures are studied within the universal-algebraic context of entropic varieties. Attention focuses on the behavior of setlike and primitive elements. It is shown that entropic $J{\acute{o}}nsson$-Tarski varieties provide a natural universal-algebraic setting for primitive elements and group quantum couples (generalizations of the group quantum double). Here, the set of primitive elements of a Hopf algebra forms a Lie algebra, and the tensor algebra on any algebra is a bi-algebra. If the tensor algebra is a Hopf algebra, then the underlying $J{\acute{o}}nsson$-Tarski monoid of the generating algebra is cancellative. The problem of determining when the $J{\acute{o}}nsson$-Tarski monoid forms a group is open.

LONG PATHS IN THE DISTANCE GRAPH OVER LARGE SUBSETS OF VECTOR SPACES OVER FINITE FIELDS

  • BENNETT, MICHAEL;CHAPMAN, JEREMY;COVERT, DAVID;HART, DERRICK;IOSEVICH, ALEX;PAKIANATHAN, JONATHAN
    • Journal of the Korean Mathematical Society
    • /
    • v.53 no.1
    • /
    • pp.115-126
    • /
    • 2016
  • Let $E{\subset}{\mathbb{F}}^d_q$, the d-dimensional vector space over the finite field with q elements. Construct a graph, called the distance graph of E, by letting the vertices be the elements of E and connect a pair of vertices corresponding to vectors x, y 2 E by an edge if ${\parallel}x-y{\parallel}:=(x_1-y_1)^2+{\cdots}+(x_d-y_d)^2=1$. We shall prove that the non-overlapping chains of length k, with k in an appropriate range, are uniformly distributed in the sense that the number of these chains equals the statistically correct number, $1{\cdot}{\mid}E{\mid}^{k+1}q^{-k}$ plus a much smaller remainder.

LINEAR AND NON-LINEAR LOOP-TRANSVERSAL CODES IN ERROR-CORRECTION AND GRAPH DOMINATION

  • Dagli, Mehmet;Im, Bokhee;Smith, Jonathan D.H.
    • Bulletin of the Korean Mathematical Society
    • /
    • v.57 no.2
    • /
    • pp.295-309
    • /
    • 2020
  • Loop transversal codes take an alternative approach to the theory of error-correcting codes, placing emphasis on the set of errors that are to be corrected. Hitherto, the loop transversal code method has been restricted to linear codes. The goal of the current paper is to extend the conceptual framework of loop transversal codes to admit nonlinear codes. We present a natural example of this nonlinearity among perfect single-error correcting codes that exhibit efficient domination in a circulant graph, and contrast it with linear codes in a similar context.

A New Record of Penicillium antarcticum from Marine Environments in Korea

  • Park, Myung Soo;Lee, Eun Ji;Fong, Jonathan J.;Sohn, Jae Hak;Lim, Young Woon
    • Mycobiology
    • /
    • v.42 no.2
    • /
    • pp.109-113
    • /
    • 2014
  • During a survey of marine fungi from the waters surrounding Jeju Island, Korea, several Penicillium strains were isolated from seawater and marine sponges. Based on morphological characteristics and phylogenetic analyses of the internal transcribed spacer and RNA polymerase subunit II, four strains were identified as Penicillium antarcticum, a fungus that, to the best of our knowledge, had not been previously reported in Korea. Here, we provide detailed descriptions of the morphological characteristics and extracellular enzyme activities of the four strains.

Analysis of the 2013.3.20 South Korea APT Attack

  • Marpaung, Jonathan A.P.;Kim, Ki Hawn;Park, JeaHoon;Kim, ChangKyun;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.249-252
    • /
    • 2013
  • The recent cyber attacks paralyzed several major banking services, broadcasters, and affected the services of a telecommunications provider. Media outlets classified the attack as cyber terror and named it an Advanced Persistant Threat. Although the attack significantly disrupted these services for at least one day, various components used in the attack were not new. Previous major cyber attacks towards targets in South Korea employed more advanced techniques thus causing greater damage. This paper studies the anatomy of the recent 2013.3.20 attack, studies the technical sophistication of the malware and attack vectors used compared with previous attacks.

  • PDF