http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
친환경자동차의 연구동향 분석을 통한 미래 발전방향 제안 (Part 1)
고장혁,안규환 한국반도체디스플레이기술학회 2022 반도체디스플레이기술학회지 Vol.21 No.4
In this paper, we analyze the current research technology trends through the literature reviews of technical outlines of electric vehicles and hydrogen fuel cell vehicles, domestic and overseas policy trends, etc. After analyzing the literature, we found out while the re-use and recycling of waste batteries and the in-wheel motor systems are essential areas for the development of electric vehicles and hydrogen fuel cell vehicles, the related research is not quite sufficient, so the direction for further research is proposed at the conclusion.
정보 유출 탐지를 위한 머신 러닝 기반 내부자 행위 분석 연구
고장혁,이동호,Kauh, Janghyuk,Lee, Dongho 디지털산업정보학회 2017 디지털산업정보학회논문지 Vol.13 No.2
In this paper, we design and implement PADIL(Prediction And Detection of Information Leakage) system that predicts and detect information leakage behavior of insider by analyzing network traffic and applying a variety of machine learning methods. we defined the five-level information leakage model(Reconnaissance, Scanning, Access and Escalation, Exfiltration, Obfuscation) by referring to the cyber kill-chain model. In order to perform the machine learning for detecting information leakage, PADIL system extracts various features by analyzing the network traffic and extracts the behavioral features by comparing it with the personal profile information and extracts information leakage level features. We tested various machine learning methods and as a result, the DecisionTree algorithm showed excellent performance in information leakage detection and we showed that performance can be further improved by fine feature selection.
네트워크 트래픽 수집 및 복원을 통한 내부자 행위 분석 프레임워크 연구
고장혁,이동호,Kauh, Janghyuk,Lee, Dongho 디지털산업정보학회 2017 디지털산업정보학회논문지 Vol.13 No.4
In this paper, we developed a framework to detect and predict insider information leakage by collecting and restoring network traffic. For automated behavior analysis, many meta information and behavior information obtained using network traffic collection are used as machine learning features. By these features, we created and learned behavior model, network model and protocol-specific models. In addition, the ensemble model was developed by digitizing and summing the results of various models. We developed a function to present information leakage candidates and view meta information and behavior information from various perspectives using the visual analysis. This supports to rule-based threat detection and machine learning based threat detection. In the future, we plan to make an ensemble model that applies a regression model to the results of the models, and plan to develop a model with deep learning technology.
공격 그래프 기반의 공격 대상 예측 시스템 설계 및 구현에 대한 연구
고장혁,이동호 (사)디지털산업정보학회 2020 디지털산업정보학회논문지 Vol.16 No.1
As the number of systems increases and the network size increases, automated attack prediction systems are urgently needed to respond to cyber attacks. In this study, we developed four types of information gathering sensors for collecting asset and vulnerability information, and developed technology to automatically generate attack graphs and predict attack targets. To improve performance, the attack graph generation method is divided into the reachability calculation process and the vulnerability assignment process. It always keeps up to date by starting calculations whenever asset and vulnerability information changes. In order to improve the accuracy of the attack target prediction, the degree of asset risk and the degree of asset reference are reflected. We refer to CVSS(Common Vulnerability Scoring System) for asset risk, and Google's PageRank algorithm for asset reference. The results of attack target prediction is displayed on the web screen and CyCOP(Cyber Common Operation Picture) to help both analysts and decision makers.
친환경자동차의 연구동향 분석을 통한 미래 발전방향 제안 (Part 2)
고장혁,안규환 한국반도체디스플레이기술학회 2022 반도체디스플레이기술학회지 Vol.21 No.4
In this paper, we analyze the current research technology trends through the literature reviews of technical outlines of electric vehicles and hydrogen fuel cell vehicles, domestic and overseas policy trends, etc. After analyzing the literature, we found out while the re-use and recycling of waste batteries and the in-wheel motor systems are essential areas for the development of electric vehicles and hydrogen fuel cell vehicles, the related research is not quite sufficient, so the direction for further research is proposed at the conclusion.
고장혁,김원기,김병훈,최한철,고영무 大韓齒科器材學會 2009 대한치과재료학회지 Vol.36 No.2
Titanium and its alloy have been widely used in dental abutment screw. Estimation of electrochemical stability of dental abutment screw in various electrolytes have been researched by using electrochemical methods. Dental abutment screw was used for corrosion test in 0.9% NaCl, artificial saliva, and simulated body fluids. The surface morphology were observed using field emission scanning electron microscopy(FE-SEM) and energy dispersive x-ray spectroscop (EDX). The electrochemical stability of abutment screw was investigated using potentiostat(EG&G Co, 263A). The corrosion surface of abutment screw were observed using field emission scanning electron microscopy(FE-SEM). All abutments showed the mechanical defects and scratch in the screw surface and degree of surface roughness of A, B and C samples was lower than that of D and E ones. From the results of potentiodynamic test in various solution, the current density of C sample tested in SBF and AS solution was lower than that of D and E sample tested in 0.9% NaCl solution. The current density of all samples tested in SBF and AS solution showed similar values, whereas, the current density of all samples tested in 0.9% NaCl solution showed higher than that of SBF and AS solution.
고장혁 한국반도체디스플레이기술학회 2023 반도체디스플레이기술학회지 Vol.22 No.4
This study is about a service that allows people to naturally learn to bask in the sun, which is a habit to relieve depression. Modern people do not have enough time to bask in the sun due to their busy lives, and as a result, depression and fatigue are increasing day by day. Therefore, in order to relieve depression, there is a need for the development of technology to manage the schedule of sunlight basking so that users can experience sunlight more naturally. The sunlight service developed through this study can help you easily plan your sunlight schedule by recommending good dates, times, and locations for sunbathing. In addition, users can receive coins as much as they bask in the sun, and they can be motivated by the act of basking in the sun by raising their character with those coins.
국방정보시스템 성능향상을 위한 효율적인 GPU적용방안 연구
고장혁,이동호 (사)디지털산업정보학회 2015 디지털산업정보학회논문지 Vol.11 No.1
Increasing the number of GPU (Graphic Processor Unit) cores, the studies on High Performance Computing Platform using GPU have actively been made in recent. This trend has led to the development of GPGPU (General Purpose GPU) and CUDA (Compute Unified Device Architecture) Framework. In this paper, we explain the many benefits of the GPU based system, and propose the ICIDF(Identify Compute-Intensive Data set and Function) methodology to apply GPU technology to legacy military information system for performance improvement. To demonstrate the efficiency of this methodology, we applied this method to AES CPU based program obtained from the Internet web site. Simply changing the data structure made improved the performance of AES program. As a result, the performance of AES based GPU program is improved gradually up to 10 times. Depending on the developer's ability, additional performance improvement can be expected. The problem to be solved is heat issue, but this problem has been much improved by the development of the cooling technology.
고장혁(Kauh Jang Hyuk),이동호(Lee Dong Hoo) 한국정보처리학회 1999 정보처리학회논문지 Vol.6 No.3
It was already proved that ATM has stability and flexibility of service application, but because of the various cahracteristics of traffics and the QoS on user demand caused by them, there are a lot of researches for traffic management method. However, there are a few of researches for ATM routing method acting on traffic management practically. In this paper, we focus on multi-path routing method transporting cells with multimple paths and compare this method with existing single path routing method and analyze multi-path routing method into three elements with isimple formula and propose new methods improving the performance of ATM routing and simulate these methods.