http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
TWINSPAN 및 CCA 에 의한 지리산 아고산대 침엽수림군집과 환경의 상관관계 분석
이수원,이강영,송호경 ( Soo Won Lee,Kang Young Lee,Ho Kyung Song ) 한국산림과학회 1997 한국산림과학회지 Vol.86 No.3
This study was carried out to identify the analysis of vegetation-environment relationships of the coniferous forests in subalpine districts of Mt. Chiri by two-way indicaton species analysis(TWINSPAN) and CCA. The results are summarized as follows; The subalpine coniferous forest in Mt. Chin was classified Abies koreana community group by the TWINSPAN method. The Abies koreana community group was classified Abies koreana-Pinus densiflora, Abies koreana-Quercus mongolicd and Abies koreana-Picea jezoensis. The Abies koreana-Quercus mongolica community classified into two subcommunities, typical and Pinus koraiensis subcommunity. The Abies koreana-Picea jezoensis community classified into three subcommunities such as typical, Taxus cuspidate and Cornus controversa subcommunity. The subalpine conifers commnities in Mt. Chiri could be classified into six vegetation units, which consisted of three vegetation communities and five subcommunities.
개발 전주기 사이버보안 관점에서의 해상 사이버보안 형식 승인과 RMF 비교 연구
이수원,황세영,홍진아,김병진,Lee, Suwon,Hwang, Seyoung,Hong, Jina,Kim, Byeong-jin 한국정보보호학회 2022 정보보호학회논문지 Vol.32 No.2
With the advancement of cyber threats and the development of hacking technologies, cyber security is being emphasized in various fields such as automobiles and ships. According to this trend, various industrial fields are demanding cybersecurity, and related certifications. In this paper, cybersecurity type approval is compared with the RMF stage under the premise that there are common elements with RMF in that cybersecurity elements must be reflected in the entire system development cycle. For comparison, type approval of maritime cyber security of the Korean Register of Shipping was selected. In conclusion, although type approval of maritime cyber security acquisition procedure is not divided by development stage like the RMF, there are the commonalities in the procedure to apply the cybersecurity element to the System development lifecycle like the RMF. Accordingly, the possibility of determining that the cybersecurity element was applied to the entire development cycle was confirmed.