http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
이종섭,최영근,Lee, Jong-Seop,Choe, Yeong-Geun 한국정보처리학회 1999 정보처리학회논문지 Vol.6 No.11
Currently in the Web(World Wide Web) environment, HTML(Hyper Text Markup Language) is used for information representation and exchange. But it is thought that HTML has some constraints in information representation of various kinds because of its limited tag set. And it is considered that combining the HTML, which is used for static information representation in Web environment, with Scripting language, which is usually used for multimedia information representation in a synchronized framework, can be very useful. Consequently we show the general trend of the Scripting language in Web environment and show the possibility of HTML and Scripting language amalgamation for Web service improvement.
이종섭(Lee, Jong-Seop) 한국불교연구원 2009 불교연구 Vol.30 No.-
한국불교의 신앙체계 가운데 가장 큰 비중을 차지하는 것은 관세음신앙이다. 관세음신앙은 삼국시대부터 고려, 조선시대에 이르기까지 왕실과 민간신앙으로 확산되었고, 지금도 변함없이 신앙되고 있다. 한국불교에서 역사적 전개를 살펴보면 이 신앙은 불교를 받아들인 이래로 주체적으로 수용하고 발전되었다는 것을 알 수 있다. 신라의 관세음신앙은 현신성불(現身成佛)사상에 입각해 다소 현실적 입장에서 신라고유의 신앙으로 정립되었다. 신라 말에 유입된 밀교는 관세음신앙을 의례적인 것으로 변화시켰고, 고려의 조직적인 밀교수행에는 수행자가 붓다의 세계를 현실세계에 수용하고, 자신이 불세계에 다가가는 정교한 의식의 상승과정이 담겨 있다. 동시에 관세음신앙은 주술적이거나, 대중적 면모의 신앙으로 유행되어 대중 가까이에 있는 인간의 모습으로 보살상을 정립한다. 또한 원의 고려지배로 인한 영향은 관세음신앙에도 영향을 미쳐 티벳의 육자신앙이 고려에도 전해진 것으로 보인다. 조선조 말이 되어 한국의 관세음신앙은 천수경계와 신흥종단에 의한 육자진언의 수행으로 체계화 되었다. 한국의 관세음신앙과 관련해서 중요한 것은 이것이 밀교의 수행체계를 근간으로 형성되었다는 사실이다. Among the practice system of Korean Buddhism, the belief in Avalokitesvara is given much more weight compared to other believes or practice system of any Buddhas or Bodhisattvas. Since the Buddhism was imported to Korean peninsula the belief of Avaloki- tesvara was widely spreaded from royal families to the masses of Silla and other nations nearby, and put down its root to the emotional bases of Korean masses mind by way of Koryo and Chosun dynasty. Examine the historical development of Korean’s Avalokitesvara belief it is found the specific idea of Avalokitesvara of Silla that accepted the belief by the ideas that is on foundation of Emanating Buddhas Body(現身成佛) system. In the latter period of Silla the belief of Avalokitesvara was developed on the grounds of ritual system of Buddhist cannons which is classified by Esoteric Buddhim and it was handed down to the period of Koryo’s Buddhism which the Esoteric Buddhism was popular. The practice system of Koryo’s Esoteric Buddhism was systematic and well organized for the purpose of for the practitioners to attain Buddhahood and those system was adopted to that of Avalokitesvara practice. But at the same time the incantational aspects of Avalokitesvara practice was still prevailed all over the Korean peninsula. It is characteristic of Korean Buddhism that the belief of Ten Thousands Hands Avalokitesvara(千手觀音) and that of King of Six Letter Dharani(六字大明王眞言) has been widely believed since the latter period of Koryo dynasty, but it is still obvious that the belief of Avalokitesvara of Korea was founded mostly by the system of Esoteric Buddhism.
자기조직화 신경망을 이용한 대체공정이 있는 기계-부품 그룹 형성
이종섭(Jong-Sub Lee),윤기섭(Ki-Seop Yoon) 한국정보기술학회 2015 한국정보기술학회논문지 Vol.13 No.11
The machine-part grouping with alternative process plans means to form machine-part group by using machine-part incidence matrix with alternative process plans. We suggested an algorithm to form machine-part group by using Self-Organizing Maps(SOM). SOM has a function classifying inputs into similar groups as a competitive learning model that Kohonen suggested. The proposed algorithm forms machine cell ahead and allocates each parts to the machine cell. First above all, SOM uses all process as input nodes when learning. And then, it forms machine-part group by allocating part using machine cell utilization. The proposed algorithm was tested on well-known machine-part grouping problems with alternative process plans. The results of this computational study demonstrate the superiority of the proposed algorithm.
입체장애아민 AMP (2-amino 2-methyl 1-propanol) 수용액의 CO<sub>2</sub> 흡수평형
한근희,이종섭,민병무,Han, Keun-Hee,Lee, Jong-Seop,Min, Byoung-Moo 한국화학공학회 2007 Korean Chemical Engineering Research(HWAHAK KONGHA Vol. No.
본 연구는 그 동안 주로 석유화학의 개질공정 등에서 적용되었던 이산화탄소 흡수분리기술을 연소배가스에 적용하기 위한 기본적인 연구로서, 이산화탄소의 흡수분리공정에 일반적으로 많이 사용되는 흡수제인 MEA(mono-ethanol amine)를 연소배가스에 적용하였을 경우 예상되는 열화, 재생에너지 및 흡수능력 등의 문제점을 개선하기 위하여 거론되는 입체장애아민인 AMP(2-amino 2-methyl 1-propanol) 수용액과 이산화탄소와의 흡수평형 특성을 비교 평가하였다. 실험결과 AMP는 MEA에 비하여 이산화탄소의 흡수능력이 반응 메카니즘에 의하여 약 2배 정도 증가함을 확인하였고, 연소배가스와 같은 저농도 이산화탄소 흡수분리공정 설계에 필요한 흡수평형자료를 부분적으로 제시하였다. This research was basically carried out to extend the application of $CO_2$ absorption processes for flue-gas system, which are mainly applied to a reforming process in petro-chemical industries. In general, MEA absorbent has some problems in flue-gas treatment, such as, degradation, regeneration energy and absorption capacities. As we known, sterical hindered amine, typically AMP (2-amino 2-methyl 1-propanol), have a good potential to improve these problems. In this paper, the characteristics of $CO_2$ absorption in aqueous AMP solution were measured and compared with that of MEA. It has been found that the $CO_2$ absorption capacity in AMP is double than that of MEA in the low $CO_2$ partial pressure system such as flue-gas. Also, the equilibriums of $CO_2$-AMP system were partially suggested, which are essentially needed to design the absorption process.
박명찬,이종섭,최용락,Park, Myeong-Chan,Lee, Jong-Seop,Choe, Yong-Rak 대전대학교 군사연구원 2004 군사학연구 Vol.2 No.-
The forms of current war are diversified over the pan-national industry. Among these, one kind of threats which has permeated the cyber space based on the advanced information technology causes a new type of war. C4ISR, the military IT revolution, as a integrated technology innovation of Command, Control, Communications, Computer, Intelligence, Surveillance and Reconnaissance suggests that the aspect of the future war hereafter is changing much. In this paper, we design the virtual decoy system and intrusion trace marking mechanism which can capture various attempts and evidence of intrusion by hackers in cyber space, trace the penetration path and protect a system. By the suggested technique, we can identify and traceback the traces of intrusion in cyber space, or take a legal action with the seized evidence.