RFID system is core technology that construct ubiquitous environment for replacement of barcode technology. Use ratio of RFID system rapidly increase because the technology has many good points such as identification speed, storage space, convenience etc. But low-cost tag operates easily by query of reader, so the system happened user privacy violent problem by tag information exposure. The system studied many ways for security application, but operation capability of low-cost tag is about $5K{\sim}10K$ gates, but only $250{\sim}3K$ gates allocated security part. So it is difficult to apply security to the system. Therefore, this scheme uses dividing 64 bits and reduces arithmetic, so proposed scheme provide mutual authentication that can apply to low-cost RFID system. Existing methods divide by 4 and used 96 bits. However, that reduces 32 bits length for lightweight and reduced from communication number of times of 7 times to 5 times. Also, because offer security by random number than existing scheme that generate two random numbers, that is more efficient. However, uses hash function for integrity that was not offered by XOR arithmetic and added extension of proposed scheme. Extended scheme is not offered efficiency than methods that use XOR arithmetic, but identification distance is mode that is proposed secure so that can use in for RFID system.
A distribution study of glitter was conducted from a local university building. The potential recipient surfaces chosen were the 1,000 chairs kept in 16 separate classrooms of the building. The surface of chairs contacting with buttocks and back of users were tape lifted with commercial adhesive tapes, and the surface of adhesive tapes were examined with a stereomicroscope to locate the glitters. 12 glitter particles were found from 11 chairs kept in 16 classrooms of a building. This result indicates that the possibility of glitter finding from Korean violent crime scene is high. The 12 glitters found from the chairs were analyzed with a stereomicroscope and an FTIR spectrophotometer to find the matching glitter. The stereomicroscope was used for the observation of the shapes, dimensions, colors and holograms of each glitter, and the FTIR spectrophotometer was used for the analysis of the chemical composition of the coating material of each glitter. The examination results revealed that 8 glitters out of 12 glitters were not sharing the common origin each other. Also, two glitters found from two separate classroom chairs share common microscopic and FTIR spectroscopic characteristics which indicating two glitters share common origin. The record of the students who had used the classrooms was traced and the authors could find that the classrooms where the same glitters were found were shared by a group of students who listen to the same class. This result implies that the path of the involved people should be considered while assessing the value of trace evidence.
This study started with the need to have a basic understanding of the crimes related to security guard in Korea. For this purpose, it attempted to analyze the crimes related to security guard occurring in Korea for the years, the cause for those crimes to occur, and the basic cause for those crimes such as criminals' educational level, age, occupation and so forth investigate how those crimes occurred. And ultimately it was intended to provide referential materials for perfect security guard from the stage of its planning to the stage of implementation and termination by analyzing how the machinery of law treated those criminals. This study aimed to help security guards to perform their role by investigating the cause and disposition of crimes related to security guard occurring for the years in order to cope with the emergency situation frequently occurring in the job of security guard. To attain the goal of study, this study attempted to do the following tasks: First, to analyze existing crimes and investigate the crimes related to security guard in order to investigate how the criminal act occurred in relation to the crime related to security guard, numerous kinds of crimes. Second, to investigate in what case the criminal act occurred by analyzing the criminal environment, the yearly, monthly and weekly frequency of those crimes and the like in relation to this criminal act. Third, to grope the alternative to cope effectively with all sorts of dangerous situations on the spot of security guard by analyzing the crimes related to security guard and investigating the effective scheme for coping with it.
The effects of bipolar interface formed on the surface of cation-exchange membrane on water splitting phenomena were investigated. Results showed that the formation of immobilized bipolar interface resulted in significant water splitting during electrodialysis. In particular, the immobilized bipolar interface was easily created on the cation-exchange membrane surface in the electrodialytic systems where multivalent cations served as an electrolyte. Multivalent cations with low solubility product resulted in violent water splitting because they were easily precipitated on the membrane surface in hydroxide form. Therefore, the bipolar interface consisting of H- and OH-affinity groups were formed on the membrane-solution interface. Apparently, water splitting was largely activated with the help of strong electric fields generated between the metal hydroxide layer and fixed charge groups on the membrane surface. Likewise, the accumulation of large molecular counter ions on the membrane surface led to the formation of a fixed bipolar structure that could cause significant water splitting in the over-limiting current region. Therefore, the prevention of the immobilization of bipolar interface on the membrane surface is very essential in improving the process efficiency in a high-current operation.
How is the flow in a rotating impeller. About 35 years have passed since one experimentalist rotating with the impeller. of a huge centrifugal blower made the flow measurements using a hot-wire anemometer (Fowler 1968). Optical measurement methods have great advantages over the intrusive methods especially for the flow measurement in a rotating impeller. One is the optical flow visualization (FV) technique (Senoo, et al., 1968) and the other is the application of laser velocimetry (LV) (Hah and Krain, 1990). Particle image velocimetries (PIVs) combine major features of both FV and LV, and are very attractive due to the feasibility of simultaneous and multi-points measurements (Hayami and Aramaki, 1999). A high-pressure-ratio transonic centrifugal compressor with a low-solidity cascade diffuser was tested in a closed loop with HFC134a gas at 18,000rpm (Hayami, 2000). Two kinds of measurement techniques by image processing were applied to visualize a flow in the compressor. One is a velocity field measurement at the inducer of the impeller using a PIV and the other is a pressure field measurement on the side wall of the cascade diffuser using a pressure sensitive paint (PSP) measurement technique. The PIV was successfully applied for visualization of an unsteady behavior of a shock wave based on the instantaneous velocity field measurement (Hayami, et al., 2002b) as well as a phase-averaged velocity vector field with a shock wave over one blade pitch (Hayami, et al., 2002a. b). A violent change in pressure was successfully visualized using a PSP measurement during a surge condition even though there are still some problems to be overcome (Hayami, et al., 2002c). Both PIV and PSP results are discussed in comparison with those of laser-2-focus (L2F) velocimetry and those of semiconductor pressure sensors. Experimental fluid dynamics (EFDs) are still growing up more and more both in hardware and in software. On the other hand, computational fluid dynamics (CFDs) are very attractive to understand the details of flow. A secondary flow on the side wall of the cascade diffuser was visualized based either steady or unsteady CFD calculations (Bonaiuti, et al.,2002). EFD and CFD methods will be combined to a hybrid method being complementary to each other. Measurement techniques by image processing as well as CFD calculations give a huge amount of data. Then, data mining technique will become more important to understand the flow mechanism both for EFD and CFD.
Journal of the Korean Society for Library and Information Science
/
v.52
no.1
/
pp.341-357
/
2018
Due to the paradigm of open science and advanced digital information technology, data sharing and re-use have been actively conducted and considered data-intensive in a wide variety of disciplines. This study aims to investigate the intellectual structure portrayed by the research products re-using the data sets from ICPSR. For the purpose of this study, a total of 570 research products published in 2017 from the ICPSR site were collected and analyzed in two folds. First, the authors and publications of those research products were analyzed in order to show the trends of research using ICPSR data. Authors tend to be affiliated with university or research institute in the United States. The subject areas of journals are recognized into Social Sciences, Health, and Psychology. In addition, a network with clustering analysis was conducted with using co-word occurrence from the titles of the research products. The results show that there are 12 clusters, mental health, tabocco effect, disorder in school, childhood, and adolescence, sexual risk, child injuries, physical activity, violent behavior, survey, family role, women, problem behavior, gender differences in research areas. The structure portrayed by ICPSR data re-uses demonstrates that substantial number of studies in Medicine have been conducted with a perspective of social sciences.
Fruit growth in kiwifruit shows double sigmoid curve, but it does not certainly indicate as years. Therefore, I though the reason to be easy to the effect of water state change in kiwifruit, investigated diurnal change in water status of fruit tissues with an isoipiestic psychrometers against the fruit growth stage of kiwifruit in 1995 and 1996. Diurnal change in the fruit tissue water potential were little, but violent for fruti growth state III in 1996. The potential of two years dropped gradually approach to harvest time. On the other hand, osmotic potential of the tissues indicated to very similar to water potential, dropped rapidly -1.5MPa before dawn, recovered -1 MPa after 3 h on October 14, were -1~-1.7 MPa at the fruit commercial harvest in 1995. It had a tendency to lower in 1996 than in 1995. It was recorded to the minimum air temperature at the first for an autumn in 1995; 13$^{\circ}C$ from the middle night of October 13 to dawn of October 14. Leaves water potential, which is related to water status of xylem, nearly fell below -1 MPa at before dawn from stage II in 1996. However, it fell so low only at commercial in 1995. At the stage II, osmotic potential and ascent of the turgor pressure was high than 1995-fruit. There parameter suggested that three of kiwifruit in 1996 were status of water stress for stage III. The results from this study indicated that difference of fruit growth between 1995-fruit and 1996-fruit was affected by water status of the fruit tissues, which was influenced by weather condition.
The Journal of The Korea Institute of Intelligent Transport Systems
/
v.15
no.2
/
pp.85-94
/
2016
Lane Designation is defined as reasonable road management to ensure the road safety and enhance road efficiency. While the lane designation system was abolished in 1999, it was redefined because of the increasing number of large vehicles in the passing lane, violent on driving and traffic accidents in 2000. The needs of improvement on operating the lane designation has been increasing more in recent due to the low ratio of compliance with the system and difficulties to keep the right lane due to need of turning and demand of widening of designates lane for two-wheeled vehicles and truck. In this study, we presented the improvement plan through the question survey, simulation analysis, safety evaluation. It found a problem that the low-speed vehicle is to use the upper level roadway, difficulties of supervision, the imbalance in the lane use, imbalance traffic and does not match the international standards. This study suggested five different alternatives through the survey. micro simulation has used in order to examine each alternative by management effectiveness and feasibility. It analyzed the traffic speed, efficiency, traffic balance of alternatives. Also, safety evaluation conducted in terms of the range of field-of-view to ensure the easiness of field of view by various configurational difference between the vehicles. By the analysis results of such indicators, This study presents proposals for improvement in operating designated lane that low-speed-big-sized vehicles keep to the right lane, and high-speed-small sized vehicles keep to the left lane.
Harold Pinter's One for the Road(1984) is a play about violence. Nicholas, who appears to be the manager of a place, interrogates Victor, Nicky, and Victor's wife Gila in a room for one day from morning to night. There is no direct physical violence in this play. But hints about the atrocities that took place outside the stage make the audience guess the violence and cruelty. Violence, which is not seen as such, is the central theme of the play. One for the road is worth reading as a resistance to breaking the mirror of global ideology, not as it deals with violent events confined to Turkey. The problem which Pinter had in mind, in particular, is that the United States plays a leading role in producing world-class ideologies, and that Britain is involved in collusion with the United States in cultivating such ideological fantasies, both abroad and at home. This thesis analyzes the contrasting reactions of each character in the play based on this social context. In particular, the conflicting reactions of the characters on the system are the most important conflict in the drama. Nicolas is a manager who moves on the system without seeing the truth. Victor and his family, on the other hand, do not move within the same ideology as Nicholas. This paper will take a look at what their strategies of resistance is and how they are revealed in the work. In fact, Nicholas appears split. Nicholas seemingly reacted decisively to the interpellation of the system. He expresses his belief and respect for the legitimacy of his actions. However, he has repeatedly sought the respect and love of Victor. Nicholas is now swaying. The theme that Nicholas presents consciously by grabbing at his own sway is 'Patriotism.' But this fantasy splits through Victor's silence and death demands. Therefore, the questions to be answered are: So why does Nicolas appear to be torn apart in a system that directs violence? But why is he forced to assimilate into the system? What other figures imply? To answer these questions, this thesis will take Slavoj Zizek's view of ideology. On the other hand, there are previous studies that read the system of violence in One for the road from the Althusser's perspective. Surely, this play explores the role of Ideological State Apparatus. However, from the point of view of Althusser, it is not possible to read Nicholas's division and the point of resistance seen by Victor's family. Pinter does not limit the scope of the ideological system as a closed one that regenerates ideologies, but secures the domain of main body resistance and struggle. On the other hand, there are already several domestic theses that read Pinter's work in Zizek's perspective. But these theses are mainly focused on analysis of Mountain Language. What this thesis would suggest is that there is a potential for an ethical figure of Zizek to be considered in One for the Road.
Pauline Hopkins's Of One Blood; Or, the Hidden Self was published in the Colored American Magazine during 1902-03. As a literary experimentalist and a political protester, Hopkins uses her fiction as a medium to overcome and ameliorate the violently racialized surroundings of the turn-of-the-century America. Having been faced with racist rhetorics and theories growing on biological differences between races, Hopkins must have felt an overwhelming urgency to challenge the heritage of slavery in American history. In order to speak out her political agenda in such a milieu, she needed a new setting as well as new narrative materials for the new era. She had to move the setting from America to Africa, the ancient utopian Ethiopia; her interest in the ancient African civilization reflects both a popular African-American vision of Africa and the movement of "black nationalism" of the time. She also needed materials from nineteenthcentury sciences, the newly evolving theories of psychology and mysticism (spiritualism/mesmerism), to explore the meaning of "the hidden self" which unfolds the complex nature of Hopkin's position on race, "blood," and African-American racial subjectivity. Hopkins in the novel explores not the color line but the bloodline. Tracing the horrific legacy of incest in the history of slavery, she attempts to redefine the true racial identity of African-Americans in America and to reconstruct their past, both family and race history. At the very center of her major tropes in the novel-such as "of one blood," "the hidden self," and incest-exists female body. Black female body, though it represents the violent site of sexual body (rape and incest) in slavery, ultimately becomes a vehicle to convey and preserve the truth of racial memory/past/history for African-Americans. As a conveyor of the past, black women not just connect the past and the present but also reawaken AfricanAmericans with the legacy of the African 'pure' bloodline. Hopkins's vision here necessitates the reevaluation of black women's role in family and history, heralding the 20th-century black feminine writing. With the major tropes, Hopkins clearly suggests that the blood of (African-)Americans is unrecognizably intermixed. Although the novel ends with ambivalence and without resolution on what Africa signifies, those tropes certainly offer her a vehicle for criticizing as well as for challenging the racial reality of America.
이메일무단수집거부
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.