RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        남북한 ‘문법’ 전문용어의 개념 조화

        엄태경 ( Eom¸ Tae Kyoung ) 한국언어문화학회 2021 한국언어문화 Vol.- No.75

        이 글에서는 남한과 북한의 국어 교과 ‘문법’ 전문용어를 비교ㆍ분석한 후, 그 결과를 바탕으로 전문용어의 통합 방법을 모색하였다. 이 과정에서 기존의 남북 언어 통합 과정에 사용되었던 형식 중심의 통합 방법을 지양하고 ‘개념 조화’를 바탕으로 한 ‘개념 우선’ 중심의 실질적 통합 방안을 실제적으로 검토하였다. 이 글은 전문용어의 조화를 ‘개념 조화’, ‘개념 체계 조화’, ‘개념 정의 조화’로 나누어 살폈다. ‘개념 조화’는 남북의 개별 용어가 가지는 개념을 비교하는 방식으로, ‘① 동일 개념, ② 부분 중복 및 포함 관계 개념, ③ 불일치 개념’의 사례로 나누어 제시하였다. ‘개념 체계 조화’는 여러 개념 체계를 정리하여 단일한 개념 체계를 정립하는 조화 활동이다. 이 연구에서는 ‘① 중복 및 포함 관계를 보이는 개념 체계, ② 다른 개념 체계에는 없는 개념 체계를 조화하는 사례, ③ 개념 체계의 구조가 다른 사례’를 각각 살펴보았다. ‘개념 정의의 조화’는 개념 조화 및 개념 체계 조화의 결과를 정의에 반영하는 활동이다. 본문에서 살펴본 ‘홑받침’의 예를 바탕으로 개념 정의 조화를 시도하였다. 그 결과 개별 용어들의 개념 양상에 따라 조화가 가능한 예와 불가능한 예를 확인하였다. This study compares and analyzes ‘grammar’ terminology of Korean for school subjects in North and South Korea, and explores the integration method of terminology based on the results. The form-centered method used in the existing terminology integration process was avoided; a practical integration plan centered on ‘concept for a first priority’ which is based on ‘concept harmonization’ was reviewed. The terminology harmonization is divided into three parts: concept harmonization, concept system harmonization, and definition harmonization. ‘Concept harmonization’ is to compare the concepts of individual terms in North and South Korea. It is presented in the following three cases: same concept, concept of partial overlapping and relationship, concept of discordance. ‘Concept system harmonization’ is to establish a single conceptual system by organizing several conceptual systems. This study explores the following cases: 1. Concept systems including overlapping and relationships. 2. Cases of harmonizing concept systems that are not found in other concept systems. 3. Cases in which the structure of concept systems is different. ‘Definition harmonization’ reflects the results of concept harmonization and concept system harmonization in the definition, and it was attempted based on ‘Hotbatchim’. The results show cases that can be harmonized and ones that cannot according to the conceptual aspect of individual terms.

      • SCOPUSKCI등재
      • 무인점포 사용자를 위한 앱과 IoT제품 개발

        TaeKyoung Kim,GyuRi Heo,TaeKyun Kim 한국서비스디자인학회 2019 서비스디자인융합연구 Vol.3 No.2

        본 연구는 UX 서비스 디자인 방법론을 통해 현재 늘어나고 있는 무인점포 매장의 문제점을 인지하고 해결하고자 하는 전반적 프로세스다. 임금상승으로 인해 무인으로 대체하는 산업이 활성화 되고 있다. 여기에 IT기술의 발달과 언택트를 선호하는 사회적 분위기가 맞물려 전국적으로 무인점포 매장이 빠르게 확산되고 있다. 무인점포의 대표적인 제품 중 키오스크를 선정하여 문제점을 분석했다. 발견된 문제점으로는 매장마다 다른 인터페이스로 인한 혼란과 익숙하지 않은 사용자층의 존재다. 리서치 방법론을 이용한 자료조사 과정에서 발견된 단서를 통해 사용자의 요구를 파악하고 분석하여 UX 디자인 방향과 Insight를 도출하였다. 이를 토대로 개선된 서비스디자인을 위하여 비콘기술을 사용한 IoT 제품과 어플리케이션을 개발했다. 첫 번째로, 비콘기술을 이용하여 신속한 에플리케이션 접근을 가능하게 했다. 두 번째로, 음성인식 인터페이스 사용으로 기존 키오스크가 부재했던 즉각적인 피드백 제공한다. 마지막으로 사용자의 구매 데이터베이스를 축적하여 다음 사용 시 빠르게 접근한다. This paper is an overall process that recognizes and tries to solve problems of unmanned stores that are currently increasing through UX service design the methodologies. Wage increases are boosting industries that are replacing people. the development of technology and who prefer ‘untact’ social atmosphere, shows fast spreading unmanned stores across the country. We selected kiosks from representative products in unmanned stores and analyzed problems. Discovered problems are confusion caused by different interfaces at each store and the presence of unfamiliar users. The UX design direction and insight has been extracted by understanding and analyzing the needs of the user in the research process through methodology. Based on this, IoT products and applications using beacons were developed for improved service design. First, we enabled rapid application access using beacon technology. Second, the use of conversation UI provides immediate feedback that the existing kiosks were absent. Finally, it accumulates the user s purchasing database and provides quick access for the next use.

      • Location-based pairwise key predistribution for wireless sensor networks

        Taekyoung Kwon,Jonghyup Lee,Jooseok Song IEEE 2009 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS Vol.8 No.11

        <P>A practical pairwise key distribution scheme is necessary for wireless sensor networks since sensor nodes are susceptible to physical capture and constrained in their resources. In this paper, we investigate a simple and practical scheme that achieves higher connectivities and perfect resilience with less resources, even in case of deployment errors.</P>

      • Biometric Authentication for Border Control Applications

        Taekyoung Kwon,Hyeonjoon Moon IEEE 2008 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERIN Vol.20 No.8

        <P>We propose an authentication methodology that combines multimodal biometrics and cryptographic mechanisms for border control applications. We accommodate faces and fingerprints without a mandatory requirement of (tamper-resistant) smart-card-level devices on e-passports for easier deployment. It is even allowable to imprint (publicly readable) bar codes on the passports. Additionally, we present a solution based on the certification and key management method to control the validity of passports within the current Public-Key Infrastructure (PKI) technology paradigm.</P>

      • Covert Attentional Shoulder Surfing: Human Adversaries Are More Powerful Than Expected

        Taekyoung Kwon,Sooyeon Shin,Sarang Na IEEE 2014 IEEE transactions on systems, man, and cybernetics Vol.44 No.6

        <P>When a user interacts with a computing system to enter a secret password, shoulder surfing attacks are of great concern. To cope with this problem, previous methods presumed limited cognitive capabilities of a human adversary as a deterrent, but there was a pitfall with the assumption. In this paper, we show that human adversaries, even without a recording device, can be more effective at eavesdropping than expected, in particular by employing cognitive strategies and by training themselves. Our novel approach called covert attentional shoulder surfing indeed can break the well known PIN entry method previously evaluated to be secure against shoulder surfing. Another contribution in this paper is the formal modeling approach by adapting the predictive human performance modeling tool for security analysis and improvement. We also devise a defense technique in the modeling paradigm to deteriorate severely the perceptual performance of the adversaries while preserving that of the user. To the best of our knowledge, this is the first work to model and defend the new form of attack through human performance modeling. Real attack experiments and user studies are also conducted.</P>

      • KCI등재

        Simulation and experimental analysis of abrasive fluidized bed machining process

        Taekyoung Kim,이현섭 대한기계학회 2020 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.34 No.5

        Fluidized bed machining (FBM) was developed for use in polishing, deburring, edge contouring, and other areas for parts with complex geometry. Recently, FMB was studied to determine the final surface roughness of machined 3-dimensional parts. The researchers have been studying the system configuration and FBM process parameters, but most research has focused on experimental approaches and applications of FBM. In this study, experimental studies on the process parameters and computational fluid dynamics (CFD) simulations of FBM on a stainless steel 304 (SS304) substrate were performed. Alumina particles were used in FBM experiments. CFD simulations were used to examine the particle velocity in the chamber and the shear stress acting on the SS304 substrate due to changes in the main shaft rotation speed and air pressure during the FBM process. The experimental results show that the material removal rate (MRR) increases as the rotation speed of the specimen increases, and MRR is greatest when the air pressure reaches 0.04 MPa. CFD analysis may be helpful for designing FBM equipment and optimizing FBM process.

      • Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks

        Taekyoung Kwon,Jin Hong IEEE 2015 IEEE transactions on information forensics and sec Vol.10 No.2

        <P>Devising a user authentication scheme based on personal identification numbers (PINs) that is both secure and practically usable is a challenging problem. The greatest difficulty lies with the susceptibility of the PIN entry process to direct observational attacks, such as human shoulder-surfing and camera-based recording. This paper starts with an examination of a previous attempt at solving the PIN entry problem, which was based on an elegant adaptive black-and-white coloring of the 10-digit keypad in the standard layout. Even though the method required uncomfortably many user inputs, it had the merit of being easy to understand and use. Our analysis that takes both the experimental and theoretical approaches reveals multiple serious shortcomings of the previous method, including round redundancy, unbalanced key presses, highly frequent system errors, and insufficient resilience to recording attacks. The lessons learned through our analysis are then used to improve the black-and-white PIN entry scheme. The new scheme has the remarkable property of resisting camera-based recording attacks over an unlimited number of authentication sessions without leaking any of the PIN digits.</P>

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼