http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
G-induced Loss of Consciousness(G-LOC) 예측을 위한 신체 부위별 Electromyogram(EMG) 신호 분석
김성호,김동수,조태환,이용균,최부용,Kim, Sungho,Kim, Dongsoo,Cho, Taehwan,Lee, Yongkyun,Choi, Booyong 한국군사과학기술학회 2017 한국군사과학기술학회지 Vol.20 No.1
G-induced Loss of Consciousness(G-LOC) can be predicted by measuring Electromyogram(EMG) signals. Existing studies have mainly focused on specific body parts and lacked of consideration with quantitative EMG indices. The purpose of this study is to analyze the indices of EMG signals by human body parts for monitoring G-LOC condition. The data of seven EMG features such as Root Mean Square(RMS), Integrated Absolute Value(IAV), and Mean Absolute Value(MAV) for reflecting muscle contraction and Slope Sign Changes(SSC), Waveform Length (WL), Zero Crossing(ZC), and Median Frequency(MF) for representing muscle contraction and fatigue was retrieved from high G-training on a human centrifuge simulator. A total of 19 trainees out of 47 trainees of the Korean Air Force fell into G-LOC condition during the training in attaching EMG sensor to three body parts(neck, abdomen, calf). IAV, MAV, WL, and ZC under condition after G-LOC were decreased by 17 %, 17 %, 18 %, and 4 % comparing to those under condition before G-LOC respectively. Also, RMS, IAV, MAV, and WL in neck part under condition after G-LOC were higher than those under condition before G-LOC; while, those in abdomen and calf part lower. This study suggest that measurement of IAV and WL by attaching EMG sensor to calf part may be optimal for predicting G-LOC.
관성항법장치를 이용한 K2전차 전차포 자세측정 방법 및 명중률에 미치는 영향에 대한 연구
김성호,김건국,권혁민,유석진,박병훈,이병길,김의환,Kim, Sungho,Kim, GunKook,Kwon, Hyukmin,Yu, Sukjin,Park, Byunghoon,Lee, Byunggil,Kim, Euiwhan 한국군사과학기술학회 2016 한국군사과학기술학회지 Vol.19 No.2
In the original design of K2 tank the Vertical Sensor Unit(VSU) was mounted to measure the attitude of the main gun to enhance the hit probability. In this research, as a part of efforts to reduce the cost of K2, it was theoretically simulated and evaluated to use the data from Inertial Navigation System(INS) for the calculation of the gun attitude instead of the direct measurement using VSU. It was found that the negative effect of INS approach is negligible and the elimination of VSU is technically possible and beneficial to the system.
가비지 컬렉션과 마모도 평준화 대상 블록의 구분을 위한 블록 소거 횟수 기반 모니터링 기법
김성호,황상호,이명섭,곽종욱,박창현,Kim, Sungho,Hwang, Sang-Ho,Lee, Myungsub,Kwak, Jong Wook,Park, Chang-Hyeon 대한임베디드공학회 2017 대한임베디드공학회논문지 Vol.12 No.3
In this paper, we propose BCMR (Block Classification with Monitor and Restriction) to ensure the isolation and to reduce the interference of blocks between a garbage collection and a wear leveling. The proposed BCMR monitors an endurance variation of blocks during the garbage collection and detects hot blocks by making a restriction condition based on this information. The proposal induces a block classification by its update frequency for the garbage collection and the wear leveling, so we will get a prolonged lifetime of NAND flash memory systems. In a performance evaluation, BCMR prolonged the lifetime of NAND flash memory systems by 3.95%, on average and reduced a standard deviation per block by 7.4%, on average.
김성호 ( Kim Sungho ) 영미문학연구회 2020 안과 밖 Vol.0 No.48
The proliferation of general theories of affect in recent years has emphasized the relative poverty of specifically affective literary theory and criticism. This essay addresses the circulation of affects as mediated by literary works, especially novels. Affects, in the sense of both the intensity of the body in transition and emotion as its “capture and closure” (Massumi), are contagious, but neither “imitation” (Spinoza) nor “transmission” (Brennan) nor the very concept of “contagion” does justice to the complexity of the ways in which the spread and circulation of affect occur in society. Affect is an event, an occurrence, contingent as much upon one’s biology and persisting dispositions as upon the dominant social system of affect production. In spreading and circulation, affect tends toward its other, i.e., sensory and linguistic representations, which may however trigger further affective events. This contradictory dynamism also defines literary creation as well as reading. The mimesis, distinct again from imitation, happening in the two kinds of activity takes on the character of an affective event in which the two entities in mimetic relation undergo mutual affection. Reading is further distinguished from writing by its movement from a singular experience toward the formation of an interpretive community in which affective events that threaten consensus may or may not continue to happen.
작업환경측정시료의 분석수탁기관과 자율정도관리 참여와의 연관성
김성호 ( Sungho Kim ),권지운 ( Jiwoon Kwon ),조현민 ( Hyunmin Cho ),박해동 ( Hae Dong Park ) 한국산업보건학회 (구 한국산업위생학회) 2021 한국산업보건학회지 Vol.31 No.2
Objectives: The necessity of samples for analysis requested by working environment monitoring institutes (WMIs) has grown recently. The collection of samples of a few chemical substances requested by WMIs is allowed under the current occupational safety and health act in Korea, leading to an expansion of samples for analysis requested by institutes (SRIs). The objective of this study was to identify the number of institutes for analyzing requested samples (IARS), SRIs, and their participation in a non-mandatory proficiency test. Methods: Questionnaires were completed by all WMIs. The collected information was quantity of analysis equipment, sorting of chemicals from SRIs, and the number of SRIs. This was compared in terms of the participation in the non-mandatory proficiency test. Results: All WMIs in Korea responded to the survey, establishing a 100% response rate. There were 52 (29%) IARS among the 179 WMIs in Korea. The total number of samples of acid for ion chromatograph (IC) analysis requested by WMIs was 21,165, which is the most. Even the number of IARS for crystalline silicon oxide was less than other top-five IARS. The total amount of samples was 13,863, which was the second most. The calculated participation score for IARS was significantly higher than other WMIs (p<0.001). According to participation in the non-mandatory proficiency test by type of substance, such as crystalline silicon oxide and formaldehyde among IARS, the number of SRIs from those IARS was significantly higher than IARS that did not participate in the proficiency test (p<0.05). Conclusions: IARS had a high frequency of participation in the non-mandatory proficiency test and the number of SRIs at IARS participating in the proficiency test was higher among IARS. With the revision of the occupational health and safety act in Korea, the number of IARS participating in the non-mandatory proficiency test might increase.
지진 위험 지대에서 건물 침하 분석을 위한 GNSS 기반 건물 침하감지의 데이터 활용 침하 경향 분석
김성호 ( Sungho Kim ),황상호 ( Sang-ho Hwang ),권오언 ( Oeon Kwon ),석수영 ( Soo-young ),천승만 ( Seung-man Chun ) 대한설비관리학회 2021 대한설비관리학회지 Vol.26 No.1
In this paper, the settlement data was collected using the settlement detector developed in the previous study, and a settlement trend analysis method was presented based on the collected data. The settlement trend analysis method was largely composed of three mathematical steps. The first formula measures an error range based on latitude and longitude, and the second formula determines whether to use the data for the error range. The last equation was analyzed through a method that can filter the distributed altitude information by intermediate values. Through these results, in this paper, it was possible to confirm the information on settlement through three equations and analysis results for the error of the building where the building settlement occurs through the settlement detector developed in the previous study.
동적오염분석과 SMT 해석기를 이용한 소프트웨어 보안 취약점 분석 연구
김성호(Sungho Kim),박용수(Yongsu Park) 한국정보과학회 2015 정보과학회 컴퓨팅의 실제 논문지 Vol.21 No.3
소프트웨어가 복잡해짐에 따라 개발자가 인지하지 못하는 버그가 증가하고 있다. 공격자들은 시스템을 공격하거나 악성코드를 유포하기 위해 이와 같은 소프트웨어 버그 중 보안에 취약한 버그를 이용한다. 대표적인 방법으로 문서, 멀티미디어 등의 파일을 조작하여 보안에 취약한 버그를 발생시키는 방법으로 최근 지능적 지속 공격 빈번하게 사용되었다. 이에, 본 논문에서는 소프트웨어의 보안 취약점을 찾기 위한 프로그램 자동 분석 방법을 제안한다. 제안 방법은 문서, 멀티미디어 등 입력 값에 의해 발생되는 소프트웨어의 보안에 취약한 버그를 찾는 것을 목표로 한다. 먼저, 동적 오염 분석을 통해 입력 데이터가 취약 코드 지점까지 전파되는 과정을 추적하고 입력데이터 전파와 관련이 있는 명령어를 추출한다. 추출된 연관 명렁어를 수식화하고 이를 SMT 해석기를 이용하여 보안 취약점이 발생할 수 있는 입력 값을 찾는다. 제안 방법을 통해 아래아 한글, 곰 플레이어에서 크래시가 발생할 수 있는 입력값과 취약 코드 6개를 찾았다. As software grows more complex, it contains more bugs that are not recognized by developers. Attackers can then use exploitable bugs to penetrate systems or spread malicious code. As a representative method, attackers manipulated documents or multimedia files in order to make the software engage in unanticipated behavior. Recently, this method has gained frequent use in A.P.T. In this paper, an automatic analysis method to find software security bugs was proposed. This approach aimed at finding security bugs in the software which can arise from input data such as documents or multimedia. Through dynamic taint analysis, how input data propagation to vulnerable code occurred was tracked, and relevant instructions in relation to input data were found. Next, the relevant instructions were translated to a formula and vulnerable input data were found via the formula using an SMT solver. Using this approach, 6 vulnerable codes were found, and data were input to crash applications such as HWP and Gomplayer.