http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
정수양,김지혜,양병덕,박주미,송광엽,Jeong Soo-Yang,Kim Ji-Hye,Yang Byung-Deok,Park Ju-Mi,Song Kwang-Yeob 대한치과보철학회 2005 대한치과보철학회지 Vol.43 No.1
Purpose. The intent of this study was to evaluate the effects of curing conditions on self-curing denture base resins to find out proper condition in self-curing resin polymerization. Materials and methods, In this study, 3 commercial self-curing denture base resins are used Vertex SC, Tokuso Rebase and Jet Denture Repair Acrylic. After mixing the self curing resin, it was placed in a stainless steel mold(3$\times$6$\times$60mm). The mold containing the resin was placed under the following conditions: in air at 23$^{\circ}C$; or in water at 23$^{\circ}C$; or in water at 23$^{\circ}C$ under pressure(20psi); or in water at 37$^{\circ}C$ under pressure(20psi) or in water at 50$^{\circ}C$ under pressure(20psi) , or in water at 65$^{\circ}C$ under pressure(20psi), respectively. Also heat-curing denture base resin is polymerized according to manufactures' instructions as control. Fracture toughness was measured by a single edge notched beam(SENB) method. Notch about 3mm deep was carved at the center of the long axis of the specimen using a dental diamond disk driven by a dental micro engine. The flexural test was carried out at a crosshead speed 0.5mm/min and fracture surface were observed under measuring microscope. Results and conclusion . The results obtained were summarized as follows : 1. The fracture toughness value of self-curing denture base resins were relatively lower than that of heat-curing denture base resin. 2. In Vertex SC and Jet Denture Repair Acrylic, higher fracture toughness value was observed in the curing environment with pressure but in Tokuso Rebase, low fracture toughness value was observed but there was no statistical difference. 3. Higher fracture toughness value was observed in the curing environment with water than air but there was no statistical difference. 4. Raising the temperature in water showed the increase of fracture toughness.
Bioactive Constituents from the Leaves of Zanthoxylum schinifolium
정수양,Phi Hung Nguyen,Bing Tian Zhao,민병선,마은숙,우미희 한국생약학회 2015 Natural Product Sciences Vol.21 No.1
Activity-guided separation of the methylene chloride-soluble fraction of the leaves of Zanthoxylum schinifolium, resulted in the isolation of four coumarinoids (1 - 4), two triterpenoids (5, 6) and three fatty acid derivatives (7 - 9) as active principles. Their chemical structures were identified as collinin (1), 8-methoxyani- socoumarin (2), 7-(6'R-hydroxy-3',7'-dimethylocta-2',7'-dienyloxy)-coumarin (3), (E)-4-methly-6-(coumarin-7'-yloxy) hex-4-enal (4), lupeol (5), epi-lupeol (6), phytol (7), hexadec-3-enoic acid (8) and palmitic acid (9), on the basis of spectroscopic (1D, 2D and MS) data analyses and comparing with the data published in the literatures. Compounds 1 and 7 showed potent cytotoxicity against Jurkat T cells with IC50 values of 45.58 and 47.51 mM, respectively. The others showed moderate activity with IC50 values ranging around 80.58 to 85.83 mM, while the positive control, auraptene, possessed an IC50 value of 55.36 mM.
홍정수,유종욜,양동민 大田大學校 産業技術硏究所 2015 산업기술연구소 論文集 Vol.26 No.2
Recently, an enormous amount of data is created from digital society. This data exists in various forms, such as documents, e-mail or SMS messages, which are common to us. However, many internet users and companies suffer from malicious security threats such as confidential cument leak, spam mails and malware. To prevent these problems, it is necessary to classify documents with echniques further improved. Document classification technique is achieved through two processes. The first step is to extract feature points, and the second one is to classify documents using them. As the first step, we describe the feature extraction algorithms such as TF-IDF(Term Frequency–Inverse Document Frequency Weighting), Apriori, MI(Mutual Information), FP (Frequent Pattern)-growth. As a next step, we introduce Naïve Bayesian Classifier and SVM(Support Vector Machine). Finally, we propose a novel model which extracts the feature points suitable to characteristics 최근 디지털 사회에는 엄청난 양의 데이터들이 만들어진다. 이러한 데이터는 문서, 메일, 문자메시지 등 다양한 형태로 존재한다. 문서, 메일, 문자 메시지 등은 일상생활에서 쉽게 접할 수 있다. 하지만 중요문서 유출, 스팸메일, 스팸메세지 등 악용되는 사례도 발생한다. 이러한 문제점을 예방하기 위해서는 기존보다 더 향상된 문서 분류기술이 필요하다. 문서 분류 기술은 문서의 특징점을 추출하는 기술과 추출된 특징점을 바탕으로 문서를 분류해내는 두 단계로 이루어진다. 본 논문에서는 문서 분류기에서 활용되는 특징점 추출 기법 중 TF-IDF(Term Frequency Weighting–Inverse Document Frequency Weighting), Apriori, MI(Mutual Information), FP(Frequent attern)-growth 알고리즘을 대상으로 하여 연구한다. 문서 분류기는 Naïve Bayesian Classifier와 SVM(Support Vector Machine)분류기를 연구한다. 앞선 연구를 토대로 문서 분류기의 특성에 적합한 특징점 추출기법을 적용하는 모델을 제안한다.
네트워크 정보보호시스템 우회 공격에 대한 대응훈련 시나리오
홍정수,양동민,이봉환,Hong, Jeong Soo,Yang, Dong Min,Lee, Bong Hwan 한국정보통신학회 2018 한국정보통신학회논문지 Vol.22 No.5
현재 네트워크 정보보호를 위하여 다양한 보안 시스템들이 개발되어 활용되고 있다. 보안 솔루션을 도입하는 것만으로 보안상의 위험을 상당수 방지할 수 있지만, 보안 솔루션은 그 목적과 기능에 따라 적절한 형태로 사용되어야 충분한 가치가 발휘될 수 있다. 정보보호시스템에 많이 사용되는 보안 솔루션으로는 방화벽, IDS, IPS 등이 있다. 그러나 다양한 정보보호시스템을 도입하고 있더라도 이를 우회하여 공격하는 기법은 항상 존재한다. 본 논문에서는 정보보호시스템에서 우회공격 기법에 대한 대응 방안과 우회 공격 기법을 훈련에 적용할 수 있는 효과적인 훈련 시나리오를 제안한다. 제안한 대응 훈련 시나리오의 유효성을 검증하기 위해 GNS3 네트워크 시뮬레이터를 사용하였으며, VirtualBox를 이용하여 가상 운영체제를 구축하였다. 제안하는 네트워크 정보보호시스템을 우회하는 공격에 대한 대응훈련 시나리오는 실제 공격에 대응하는데 매우 효과적으로 활용될 수 있다. Nowadays, various security systems are developed and used for protecting information on the network. Although security solutions can prevent some of the security risks, they provide high performance only if used appropriately in accordance with their purposes and functionality. Security solutions commonly used in information protection systems include firewalls, IDS, and IPS. However, despite various information protection systems are introduced, there are always techniques that can threaten the security systems through bypassing them. The purpose of this paper is to develop effective training techniques for responding to the bypass attack techniques in the information security systems and to develop effective techniques that can be applied to the training. In order to implement the test bed we have used GNS3 network simulator, and deployed it on top of virtual operating system using VirtualBox. The proposed correspondence training scenario against bypassing information protection system attacks could be very effectively used to counteract the real attacks.