oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 34 )

2018 ( 61 )

2017 ( 65 )

2016 ( 70 )

Custom range...

Search Results: 1 - 10 of 20987 matches for " Kwang Kim "
All listed articles are free for downloading (OA Articles)
Page 1 /20987
Display every page Item
The Aesthetic Turn in Everyday Life in Korea  [PDF]
Kwang Myung Kim
Open Journal of Philosophy (OJPP) , 2013, DOI: 10.4236/ojpp.2013.33054
Abstract: We are living in the transitional age from the rational, analytical, and scientific to the cultural, sensitive, and aesthetic. The aesthetics of everyday life lies at the center of this age. There is no boundary between art and life in contemporary art. Almost all the contents and objects of everyday life became a work of art in the condition of searching for the aesthetic. Since aesthetic theory was shifted from the artist-centered or a work of art-centered to the audience, spectator or beholder-centered, art and everyday life were more closely related to each other. So aesthetic attention or attitude is not specific to art, but pervasive broadly in everyday life. We can embrace the aesthetic concerns in everything we make and use every day. In the long tradition of Korean art, it can be seen that aesthetic consciousness is steeped in day-to-day life as well as the arts. I want to consider the problems of everydayness, Korean aesthetic consciousness in daily life, and contemplation in the aesthetic consciousness. Korean art was characterized by its “lack of refinement” and “nonchalance”. The characteristics of Korean art as the qualities of “technique without technique”, “Planning without plan”, “asymmetrical symmetry” have dominated the everyday consciousness of Korean people as well as Korean art. The extension of aesthetic emotion through experimentation shows us the change of aesthetic consciousness as a new possibility of interpretation. We stand in an urgent situation of the need for a new theory of art. It will be related to the future of aesthetics. For this reason, I think we have to consider the meaning of the aesthetic turn in everyday life.
Problems of Expressiveness in Geoaesthetics  [PDF]
Kwang Myun Kim
Open Journal of Philosophy (OJPP) , 2014, DOI: 10.4236/ojpp.2014.44061
Abstract: Facing in the prospect of geo-environmental activities like volcanic explosions, earthquakes, floods, landslides, subsidence issues, tsunamis, etc., we have to reconsider a sustainable harmony between human beings and nature. Approaching the reality of the changing patterns of the earth’s surface and geological processes geoaesthetically will be helpful in establishing a more desirable relationship between human beings and nature. In this paper the author attempts to consider the meaning of expressiveness in relation to geoaesthetics, and further the author intends to reveal expressiveness through various phenomena of the earth. Expressiveness can evoke emotion as one experiences the aesthetic object. Empathy plays a role in drawing expression from expressiveness. One can find geoaesthetic expression through looking deeply into the expressiveness the earth presents. Earth itself is inanimate, but owing to its plentiful expressiveness it can restore the organic, animate world.
Problems and Prospects of Geoaesthetics  [PDF]
Kwang Myung Kim
Open Journal of Philosophy (OJPP) , 2015, DOI: 10.4236/ojpp.2015.51001
Abstract: Geoaesthetics is the project of making aesthetic sense of nature through geological phenomena. The aesthetic appreciation of nature has recently become urgent because of the serious influence of the natural environment on human beings. The author’s geoaesthetical research is categorized into three problems: art in geology or geology in the arts as the close relationship between art and geology, geological cognition of nature and natural cognition in environmental aesthetics, and the geoaesthetical approach through works of art. Geologic forces and processes have become significant materials for aesthetic sensations. Based on the geoaesthetic perspective, the author explores the ultimate purpose of art as a return to natural order. It seems partly to be related to the ontological problem of art. Here we can feel earthly dynamics, universal calmness, and the contemplative atmosphere simultaneously.
Finite sample properties of multiple imputation estimators
Jae Kwang Kim
Mathematics , 2004, DOI: 10.1214/009053604000000175
Abstract: Finite sample properties of multiple imputation estimators under the linear regression model are studied. The exact bias of the multiple imputation variance estimator is presented. A method of reducing the bias is presented and simulation is used to make comparisons. We also show that the suggested method can be used for a general class of linear estimators.
On the Security of Lee, Kim, Kim, & Oh Key Agreement Protocol
Kim-Kwang Raymond Choo
International Journal of Network Security , 2006,
Abstract: In ICCSA 2005, Lee, Kim, Kim, & Oh proposed a new (two-party) ID-based key agreement protocol, which they claimed to provide known key security resilience, forward secrecy, key compromise resilience, unknown key share resilience, and key control, however, without providing any security proofs. In this work, we demonstrate that their claims of known key security resilience and key control are flawed by revealing previously unpublished flaw in the two-party ID-based key agreement protocol. We may speculate that such (trivial) errors could have been found by protocol designers if proofs of security were to be constructed, and hope this work will encourage future protocol designers to provide proofs of security. We conclude with a countermeasure due to Choo, Boyd, & Hitchcock (2005).
Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols
Kim-Kwang Raymond Choo
International Journal of Network Security , 2008,
Abstract: Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof of security. Flaws detected long after the publication and/or implementation of protocols will erode the credibility of key establishment protocols. We examine the class of key agreement protocols (without proofs of security) due to Mathuria and Jain (2005). Using these protocols as case studies, we demonstrate previously unpublished flaws in these protocols. We may speculate that such errors could have been found by protocol designers if proofs of security were to be constructed, and hope this work will encourage future protocol designers to provide proofs of security.
Revisiting Lee, Kim, & Yoo Authenticated Key Agreement Protocol
Kim-Kwang Raymond Choo
International Journal of Network Security , 2006,
Abstract: In recent issue of Journal of Applied Mathematics and Computation (2005), Lee, Kim, & Yoo revealed an attack on Hsu, Wu, & Wu (2003) authenticated key agreement protocol, and then presented an improved protocol. However, Lee, Kim, & Yoo (2005) present only heuristic argument with no formal proof of security. In this work, we revealed previously unpublished flaw in the protocol. We may speculate that such errors could have been found by protocol designers if proofs of security were to be constructed, and hope this work will encourage future protocol designers to provide proofs of security. We conclude with a countermeasure due to Choo, Boyd, & Hitchcock (2005).
Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols
Kim-Kwang Raymond Choo
International Journal of Network Security , 2005,
Abstract: We revisit the two-party identity-based authenticated key agreement protocol (2P-IDAKA) and its variant resistant to key-compromise impersonation due to McCullagh & Barreto (2005). Protocol 2P-IDAKA carries a proof of security in the Bellare & Rogaway (1993) model. In this paper, we demonstrated why both the protocol and its variant are not secure if the adversary is allowed to send a Reveal query to reveal non-partner players who had accepted the same session key (i.e., termed key-replicating attack} in recent work of Krawczyk (2005)). We also demonstrate that both protocols do not achieve the key integrity property, first discussed by Janson & Tsudik (1995).
Nonstationary theory of magnetic field induced current for molecular spin nanojunction
M. Jouravlev,Kwang S. Kim
Physics , 2009,
Abstract: For the study of molecular spin junctions, we take into account two types of couplings between the molecule and the metal leads: (i) electron transfer that gives rise to net current in the biased junction and (ii) energy transfer between the molecule and the leads. Using a rotating wave approximation in the Heisenberg representation, we derive a set of differential equations for the expectation values of relevant variables: electron and phonon populations and molecular polarization. A magnetic field control method to enhance the charge transfer at spin nanojunctions, which characterizes the molecule feature, is discussed. An approximate analytical solution of the resulting dynamical equation is supported by numerical solution. The magnetic control by charge transfer is described by transient pseudo-fermions of electrons interacting with spins. The rapid adiabatic passage of the energy between the molecule and the leads is taken into account. The current for molecular spin nanojunctions is derived.
Cooperative Hybrid ARQ Protocols: Unified Frameworks for Protocol Analysis
Ilmu Byun,Kwang Soon Kim
Mathematics , 2008,
Abstract: Cooperative hybrid-ARQ (HARQ) protocols, which can exploit the spatial and temporal diversities, have been widely studied. The efficiency of cooperative HARQ protocols is higher than that of cooperative protocols, because retransmissions are only performed when necessary. We classify cooperative HARQ protocols as three decode-and-forward based HARQ (DF-HARQ) protocols and two amplified-and-forward based (AF-HARQ) protocols. To compare these protocols and obtain the optimum parameters, two unified frameworks are developed for protocol analysis. Using the frameworks, we can evaluate and compare the maximum throughput and outage probabilities according to the SNR, the relay location, and the delay constraint for the protocols.
Page 1 /20987
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.