RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        강릉 남대천에서 소상하는 연어(Chum salmon, Oncorhynchus keta) 분포와 행동 특성

        김범식,정용우,김우보,홍성익,이충일,Kim, Beom-Sik,Jung, Yong-Woo,Kim, Woobo,Hong, Sung-Eic,Lee, Chung Il 한국환경과학회 2022 한국환경과학회지 Vol.31 No.10

        The Namdae stream in Gangneung-si is one of the rivers where salmon stock is mainly maintained by natural spawning rather than artificial seedlings. There are structures including weir, and fish distribution and movement characteristics can be different by these structures. In this study, we investigated the distribution and behavioral characteristics of salmon by sighting survey within 12 km immediately upstream of the river mouth between October 2021 and February 2022. As a result, salmon distributed within 9 km from rivermouth. There were more salmon in the lower reaches of Doosan weir than in the upper reaches of that. The main spawning ground for salmon was between 7-9 km from rivermouth and around the lower part of Doosan weir. Salmon behaved for spawning in the gravel-bed area and undercut slope of the mainstream, such as mating, digging the riverbed, and competition among males. Salmon moved more slowly in the gravel-bed area than sand-bed area. Doosan weir hinders the spawning migration of salmon by frequent flow changes and terraced fishway. This study provides primary information to understand the ecological changes of salmon by environmental changes in the Namdae stream.

      • KCI등재

        Microarray analysis of hypoxia-induced changes in gene expression in BV-2 microglial cells

        김범식,서정철,Kim, Bum-Shik,Seo, Jung-chul The Korean Acupuncture Moxibustion Medicine Societ 2003 대한침구의학회지 Vol.20 No.4

        목적 : 허혈시 발생되는 저산소중 상태에서는 세포독성을 유발한다고 알려져 있으나 정확한 기전은 아직 규명되지 않았다. 본 연구에서는 뇌허혈로 인한 세포독성의 기전을 유전자 발현을 통하여 살펴보고자 하였다. 방법 : 본 실험에서는 BV-2 microglia 세포주에 12시간 동안의 저산소 상태에서의 유전자 발현을 분석하기 위하여 마이크로에레이를 시행하였다. 결과 : 저산소 상태에서는 정상에 비하여 cathepsin F, growth factor independent 1, calcitonin/calcitonin-related poly, leucine-rich repeat LGI family membrane, dublecortin, cyclohydrolase 1, Ia-associated invariant chain, carbohydrate kinase-like과 erythrocyte protein band 4.1-like 3 등의 유전자 발현이 3배 이상 증가하였다. 한편 neuronal guanine nucleotide exchange factor, Bcl-2-related ovarian killer protein, chemokine (C-X-C motif) ligand 5, RNA binding motif protein 3, interleukin 2 receptor, alpha chain, crystallin zeta, cytochrome P450 subfamily IV B, asparagine synthetase과 moesin 등의 유전자 발현은 0.2배 이하로 감소하였다. 결론 : 이상의 결과는 저산소중에 관여하는 유전자 및 저산소중과 관련된 뇌경색 등의 질환의 기전을 밝히는데 기초적 자료로 이용될 수 있을 것이다.

      • 해쉬함수와 스트림 암호기의 개발 및 GSM 보안 시스템에의 적용

        김범식,신인철,Kim, Bun-Sik,Shin, In-Chul 한국정보처리학회 2000 정보처리논문지 Vol.7 No.8

        With the advance of wireless communications technology, mobile communications have become more convenient than ever. Nowadays, people can communicate with each other on any place at any time. However, because of the openness of wireless communications, the way to protect the privacy between communicating parties is becoming a very important issue. In this paper, we present a study on the authentication and message encryption algorithm to support roaming service to the GSM network. To propose an authentication and message encryption algorithm applicable to the GSM system, the security architecture of the GSM outlined in the GSM standard is briefly introduced. In the proposed cryptosystems we use a new hash function for user authentication and a stream cipher based on Linear Feedback Shift Register(LFSR) for message encryption and decryption. Moreover, each algorithm is programmed with C language and simulated on IBM-PC system and we analyze the randomness properties of the proposed algorithms by using statistical tests. 무선 통신 기술의 발달로 인해 이동통신의 사용이 전보다 훨씬 편리해 졌으며 최근 이동 통신 사용자들은 언제, 어디서나 누구와도 통신이 가능하게 되었다. 하지만 이동 통신은 무선채널을 사용함으로서 통신 당사자는 심각한 보안 위협에 노출된다. 안전한 통신채널을 제공하기 위한 방법은 이동통신망의 발전에 필수적이라 하겠다. 본 논문에서는 GSM망으로의 로밍 서비스를 제공하기 위한 인증 및 메시지 암호 알고리즘에 대하여 논한다. GSM 암호 시스템에 적용 가능한 인증 및 암호 알고리즘을 제안하기 위해 GSM망의 보안구조에 관하여 간략히 소개한다. 사용자 인증 알고리즘은 새로운 해쉬함수를 그리고 메시지 암호화를 위한 스트림 암호기는 LFSR(Linear Feedback Shift Resgister)을 사용한다. 각 알고리즘은 C언어로 구현하였으며 IBM PC 상에서 시뮬레이션 하였다. 또한 통계적 분석 기법을 사용하여 개발된 알고리즘의 출력 특성을 분석한다.

      • KCI등재

        연곡천 하류에서 소상하는 연어(Chum salmon, Oncorhynchus keta)의 이동특성

        김범식,정용우,정해근,박주면,이철호,이충일,Kim, Beom-Sik,Jung, Yong-Woo,Jung, Hae-Kun,Park, Joo-Myun,Lee, Cheul Ho,Lee, Chung Il 한국환경과학회 2020 한국환경과학회지 Vol.29 No.9

        This study described the characteristics of the upstream migration of salmon (Chum salmon, Oncorhynchus keta) along Yeon-gok Stream in the eastern coastal region of Korea from October 24 to November 9, 2018 using radio tag and data storage tag loggers for the detection of the locations of tagged salmon and measurement of water temperature. Tracking experiments were conducted and classified into four types (case 1 to case 4) depending on the release time and the number of salmon tracked. Experiments from case 1 to case 3 were classified depending on the number of salmon tracked into cases in which a single tagged salmon was tracked (case 1), a pair of tagged salmon was tracked (case 2), and salmon were tracked by different sex ratios (case 3). Experiments from cases 1 to 3 were conducted between 10 AM and 1 PM, and case 4 was conducted after 3:30 PM. Salmon moved and spawned in the downstream region of the Yeon-gok, where water temperature is higher than in other rivers and salmon return in Canada, Russia, Japan, and the U.S.A. Most of the radio-tagged salmon swam in deep and shaded areas during the day but actively moved upstream close to sunset, regardless of the release time. Females showed relatively more active movements than males during upstream migration.

      • SCOPUSKCI등재

        글루타르알데하이드 고정 소심 낭막에서의 내피세포 증식에 대한 글루탕산 및 파라벤용액의 효과

        김범식,이문환,유세영,김원곤,Kim, Beom-Sik,Lee, Mun-Hwan,Yu, Se-Yeong,Kim, Won-Gon 대한흉부심장혈관외과학회 1996 Journal of Chest Surgery (J Chest Surg) Vol.29 No.1

        The conventional glutaraldehyde (GA) fixation method of tissue valves is considered to be responsible for accelerated valve degeneration. The release of toxic GA from the valve tissue is believed to limit endothelial cell (EC) ingrowth. Removal of toxic GA by reaction with L-glutamic acid and storage in a Paraben solution may offer good EC growth. To investigate the conditions for endothelialization of tissue valves, the growth properties of ECs on the conventionally and alternatively treated pericardial tissue were compared. Conventional preparation included zero-pressure fixation for 72 hours in phosphated-buffered saline (PBS) solution containing 0.5% GA at 4$^{\circ}C$ and storage into PBS containing 0.2% GA(group I). Alternatively treated pericardial tissues were divided into three postfixation treatment groups : (1) storage in PBS solution containing Paraben(group II), (2) treatment with PBS containing 8$^{\circ}C$ L-glutamic acid(PH 7.35) and storage in PBS solution containing Paraben (g oup III), (3) treatment with L-glutamic acid dissolved in distilled water (PH 3.5) (group IV). Pericardial tissue were transferred into the 24-well plate after storage for 4 weeks. ECs were harvested enzymatically from the bovine pulmonary artery and grown to confluence on culture flask surfaces. Detached ECs by trypsin were incubated into the each well of the 24-well plate including test pericardial tissues. Cells were detached by trypsin, 1, 2, 3, 5, 7 days after incubation and counted on the hemacytometer. Cell viability test was performed by frypan-blue exclusion method. Acute cell death in the group I were found even after prolonged washing. The group II showed prolonged cell survival compared with the group I. Both group III and group IV showed better cell growth than group II. There was no statistically significant difference between group III and group IV method in terms of EC growth. This results suggest that treatment by L-glutamic ac id and storage in a Paraben solution be a promising approach for improvement of durability of GA-treated tissue valves.

      • 자바카드기반 다중 사용자 파일접근에 대한 애플릿 설계 및 구현

        김범식,Kim, Bum-Sik 한국컴퓨터산업학회 2006 컴퓨터産業敎育學會論文誌 Vol.7 No.5

        정보 통신의 발달로 인한 편리함과 동시에 정보의 유출 및 불법적인 데이터의 사용 또한 급증하고 있다. 따라서 불법적인 정보의 유출을 차단하기 위한 많은 연구가 진행 되고 있으며 개인정보의 보호를 위해 스마트카드의 사용이 급증하고 있다. 최근 자바카드는 스마트카드가 가지고 있는 기술적 문제점을 보완 할 수 있는 대안으로 빠르게 보급되고 있는 추세이다. 본 논문에서는 정보보호 및 다양한 응용분야에 이용되는 자바카드를 기반으로 다중사용자 인증과 사용자별 파일접근권한 시스템을 설계 구현하였다. 파일 접근 권한의 부여는 애플릿에 권한 테이블을 작성하여 사용자별 파일 접근 권한의 처리가 이루어진다. 따라서 하나의 자바카드 내에 있는 여러 개의 파일이 접근 권한에 따라 읽기/쓰기 등이 선별적으로 이루어진다. 이로서 다중 사용자접근시 우려되는 불법적인 정보의 수정, 노출, 파괴 등을 방지할 수 있게 되며 다수의 인증을 요구하는 시스템에서 응용이 가능하다. Whereas conveniences deriving from the development of information and telecommunication technology increase, information outflow and illegal data use are also rapidly on the rise. Consequently, many studies to prevent illegal information outflow are currently under way, and the use of Smart Card is in steep jump. Recently, Java Card is diffused fast as an alternative to complement the technical problems of the Smart Card. This paper designed and Implementation the system for multi-users authentication and file access control by user through designing a Java Card applet that is used for information protection and in various application fields. For allowing a file access competence, each user's file access competence is processed via drawing up the access condition table in the applet. Therefore, illegal correction exposure and destruction of information, which become the concerns when multi-users have an access, can be prevented. In addition its application becomes possible in the system requiring multi-users certifications.

      • KCI등재후보

        Successful Reconstruction of a Lower Chest Wall Defect with Delayed Fungal Deep Sternal Wound Infection following a Blast Injury in South Korea: A Case Report

        김범식,Dowon Kim,SooA Lim,어수락,한예식,Jung Soo Yoon 대한창상학회 2022 Journal of Wound Management and Research Vol.18 No.1

        Although blast injuries have been considered a problem unique to military practice or warfare, accidental civilian blast-related injuries due to misplaced landmines have been reported in South Korea. A 71-year-old man was admitted to the emergency room due to multiple severe blast injuries after the detonation of an unknown explosive device. After shrapnel that penetrated the pericardium was removed via median sternotomy in an emergency operation, an extensive defect remained on the lower third of the anterior chest wall. After debriding the contaminated wound several times, chest wall reconstruction with a skin-paddled vertical rectus abdominis muscle (VRAM) flap was successfully performed. However, the patient presented a delayed fungal infection of the deep sternal wound 28 days postoperatively. To salvage the previous flap, antifungal agents were administered and negative-pressure wound therapy was performed between serial radical debridement. The previous flap was successfully salvaged with infection control, and the final defect was covered by re-rotating the previous flap. This case presents the successful reconstruction of a chest wall defect using a skin-paddled VRAM flap notwithstanding a delayed sternal wound infection from a rare civilian blast injury in South Korea.

      • CDMA 디지털 이동통신 시스템의 인증 알고리즘 구현

        김범식,신인철,Kim, Bum-Sik,Shin, In-Chul 한국전기전자학회 1999 전기전자학회논문지 Vol.3 No.2

        이동통신에서의 사용자 인증 서비스는 통화도용 방지와 신뢰성 있는 과금을 위한 중요한 보호서비스이다. 최근 몇 년 동안 IS-41 북미 이동 전화 시스템에서 사용되어지는 몇몇 암호 시스템이 공격을 당하였다. 이러한 알고리즘은 ORYX, CMEA 그리고 CAVE 등이다. 이러한 알고리즘들을 대체하기 위한 작업이 이미 진행 중이다. 본 논문에서는 해쉬함수를 개발하고 이를 IS-95A 시스템의 인증 알고리즘에 적용하였다. 그리고 통계적 분석 기법을 사용하여 개발된 알고리즘의 출력 특성을 분석하였으며 C 프로그래밍 언어를 사용하여 알고리즘의 유효성을 시뮬레이션하였다. The user authentication service can be used to prevent telecommunications piracy and to demand reliable payment from subscriber. Over the last few years several of the cryptographic systems being used by the IS-41 North American Mobile telephones have been broken. These algorithms included ORYX, CMEA and CAVE. The process of replacing these algorithms is already underway. In this paper we designed a hash function and applied it to the authentication algorithm of IS-95A authentication system. We also analyzed the randomness properties of designed algorithm using statistical analysis and simulated the validity of this algorithm using C programming language.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼