http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Succinylcholine iodide 로 발생된 기관지 경련
김성열,황청자 대한마취과학회 1974 Korean Journal of Anesthesiology Vol.7 No.1
Severe bronchospasm after injection of succinylcholine iodide intravenously occured in a 28 year old female during emergency Cesarean section. This was comfirmed by repeated administration of the succinylcholine iodide and its symptoms with several referances are reviewed.
$Pb(Mg_{1/3}Nb_{2/3})O_3$계 세라믹스의 $Pb^{2+}$를 $Nd^{3+}$로 치환함에 따른 유전특성 및 PbO 휘발에 관한 연구
김성열,이응상 한국세라믹학회 1993 한국세라믹학회지 Vol.30 No.3
Influence of Nd3+ substitution for Pb2+ on the dielectric properties and the PbO evaporation according to substituting Nd3+ for Pb2+ in Pb(Mg1/3Nb2/3)O3 system ceramics have been investigated. The dielectric constant at the curie temperature and evaporation of PbO were decreased with increase of Nd3+ amounts. The percentage of PbO evaporation was 2.5wt% in the PMN system substituted Nd3+ for Pb2+, while it was 3.7wt% in the PMN system.
안전한 USN을 위한 RFID 시스템의 보안 기술 분석
김성열 청주대학교 산업과학연구소 2005 産業科學硏究 Vol.22 No.3
This paper studies to analysis of security technologies in RFID system for secure USNs. Even the RFID industry itself is aware of the threat to privacy posed by the development and installation of tags in commonplace items. Consumers Against Supermarket Privacy Invasion and Numbering(CASPIAN) recently located internal public relations documents which detail how RFID developers plan to offset public opposition to the technology. The ability of automatic identification to streamline commerce, protect those who cannot care for themselves, and markedly improve our lives is clear. Yet an individual's innate desire to be undiscovered and left alone limits the collection of information. A delicate balance exists between the benefits of identification technology and the right to privacy. Our expanding ability to record, track and authorize means that balance, however, is far from decided.
유비쿼터스 센서 네트워크 시스템의 보안 기술에 관한 연구
김성열 청주대학교 산업과학연구소 2007 産業科學硏究 Vol.24 No.2
How can we provide security for these sensor networks? Security is not easy; compared with conventional desktop computers, severe challenges exist - these seltzers will have limited processing power, storage, bandwidth, and clergy. As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and useful, and has not concentrated on security. And we have identified useful security protocols for sensor networks: authenticated and confidential communication, and authenticated broadcast.
배지의 pH와 한천농도가 S.mutans의 산생성에 미치는 영향
김성열,이광희 원광대학교 치의학연구소 1992 圓光齒醫學 Vol.2 No.2
The purpose of this study was to assess the aciduric ability of S.mutans and the effect of agar on the acid production of S.mutans. 10% sucrose phosphate buffer solutions from pH 6.6 to pH 7.2 were inoculated by S.mutans 10449 and incubated for 42 hours. The optimum pH for acid production of S.mutans was pH 6.7∼6.82 % glucose broth was acidulated by lactic acid to pH 5.0 and agar was added to the broth to the concentrations of 0, 0.5, 1.0, 1.5% (identical to the Snyder or Alban caries activity test medium except the agar concentration). Each medium was mixed with one of the S.mutans 10449, OMZ 65, OMZ 175 or Yakurt and incubated for 72 hours. Acid production was measured by the color change of bromcresol green in the media daily. Acid production of S.mutans was near to that of Lactobacillus. Acid production in solid media was less than that in liquid media after 72 hours. Acid production of S.mutans OMZ 175 was more than that of S.mutans 10449 and OMZ 65 after 48 hours, but there was no difference among them after 72 hours. Therefore, Snyder and Alban tests could be interpretated as the comprehensive test for aciduric oral bacteria including S.mutans rather than as selective tests for Lactobacillus. The aciduric nature of S.mutans could be considered in the development of a caries activity test.
김성열 청주대학교 2008 産業科學硏究 Vol.26 No.1
In this study we researched personal information protection technologies in USN environments. The ubiquitous computing supports environment to freely connect to network without restrictions of place and time. enables easy access and sharing of information, but because of easy unauthorized accesses, specified security policy is needed. And then most studied paper in privacy have been forced on encryption technology and protocols for securing the personal information data transaction. Therefore this paper will focus on analysis about personal information protection in USN environments and protection considerations on information privacy.