http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
박은수,최학남,김준철,정용한,김학일 제어로봇시스템학회 2009 제어로봇시스템학회지 Vol.15 No.3
본 고에서는 병렬 영상처리를 이용한 고속 머신 비전(Machine Vision) 기술의 동향에 관해 다룬다. 머신 비전에서 사용되는 대표적인 고속 상용 영상처리 라이브러리인 MIL, HALCON, IPP에 대해 소개하고 현재 활발히 연구되고 있는 SSE, OpenMP, CUDA와 같은 병렬 처리 기술에 대하여 알아 본다. 이러한 병렬 처리 기술을 실제 영상처리 알고리즘에 적용하여 그 성능을 고속 상용 영상처리 라이브러리의 성능과 비교하여 소개된 병렬 처리 기술을 실제 PCB 기판 자동검사와 같은 머신 비전에 적용한 연구사례에 대해서 알아본다.
Elementary students' perceptions about the effects of a summer English camp
박은수 한국영미어문학회 2009 영미어문학 Vol.- No.91
The purpose of this study is to explore the perceptions of elementary students about the effects of a summer English camp. The participants in this study comprise students who attended an English camp in a university setting during the summer of 2008. The 177 students live in urban neighborhoods in Busan. The participants in this study indicated that the camp was helpful in its primary objective of developing communicative competence. Moreover, the participants experienced personal development and growth. A beneficial aspect of the language camp is that it complements in a limited but distinctly different way the formalized school experience by affording teachers and students the opportunity to focus almost exclusively on interactive use of English. The data analysis suggests that the positive effects on language proficiency and motivation may spring from a synergistic interaction of three elements: (a) the camp context; (b) the interactive nature of the teaching and learning activities; and (c) the opportunity to use spoken English for authentic purposes. Recommendations for further study are included.
암호용 디바이스에 대한 구현 공격에 강인한 이중 멱승 알고리듬
박은수,하재철 보안공학연구지원센터(JSE) 2017 보안공학연구논문지 Vol.14 No.1
정보보호용 디바이스에 RSA 시스템과 같은 암호 알고리듬을 그대로 탑재하여 사용할 경우 전력 분석이나 오류 주입 등과 같은 구현 공격에 의해 비밀 키가 노출될 수 있다. 본 논문에서는 덧셈 체인에 기반한 이중 멱승 알고리듬이 입력 메시지에 대한 오류 주입 공격에 취약하며 덧셈 체인을 구해야 하는 비효율성을 지적하고 이를 해결할 수 있는 새로운 이중 멱승 알고리듬을 제안한다. 제안하는 이중 멱승 알고리듬은 기존에 제시된 전력 분석 공격 및 오류 주입 공격을 방어할 수 있으며 안전한 RSA-CRT(RSA based on Chinese Remainder Theorem) 시스템을 구현하기 위해 효과적으로 활용할 수 있다. When some cryptographic algorithms used in cryptosystem such as RSA are naively implemented on a security device, the secret key of cryptosystem can be exposed to an attacker by the power analysis and fault injection attacks In this paper, we point out that the double addition chain exponentiation algorithm is vulnerable to the fault injection attack on input message and has inefficiency due to the computing of addition chain. We proposed a novel double exponentiation algorithm, which defeats most previous power analysis and fault injection attacks and can be adopted for secure RSA-CRT implementation.
자작나무 및 벚나무 껍질추출물이 抗알레르기 效果에 대한 實驗的 연구
朴殷秀,辛民敎,宋昊埈 대한본초학회 1998 大韓本草學會誌 Vol.13 No.2
Anti-allergic effects resulted by Cortex Betula Platyphyllae(CB) or Cortex Pruni Serrulatae(CP) extract were observed from the mast cell before or after treatment with Compound 48/80, anti-DNP IgE and Substance P, respectively. In addition, it was investigated on inhibition of IgE release from B cell line and spleen cell after treatment with two extracts. The results were as follows ; 1. CB or CP extract inhibited Anaphylaxis shock induced by intraperitoneal injection with Compound 48/80. 2. Both extracts inhibited histamine release from the mast cell after treatment with Compound 48/80, anti-DNP IgE or Substance P. 3. The IgE release stimulated from spleen cell of mouse after treatment with LPS or LPS plus IL-4 was inhibited with increasing concentrations of extracts. The level of IgE release was significantly much lower in treatment of CB extract than that of CP extract when compared to high concentrations of extracts. 4. The IgE release from U266B1 of human myeloma was inhibited dependently to the concentrations of CB and CP extract, respectively, and CB extract inhibited effectively more IgE release than that after treatment of CP extract.