http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
개별검색 DB통합검색이 안되는 DB는 DB아이콘을 클릭하여 이용하실 수 있습니다.
통계정보 및 조사
예술 / 패션
<해외전자자료 이용권한 안내>
- 이용 대상 : RISS의 모든 해외전자자료는 교수, 강사, 대학(원)생, 연구원, 대학직원에 한하여(로그인 필수) 이용 가능
- 구독대학 소속 이용자: RISS 해외전자자료 통합검색 및 등록된 대학IP 대역 내에서 24시간 무료 이용
- 미구독대학 소속 이용자: RISS 해외전자자료 통합검색을 통한 오후 4시~익일 오전 9시 무료 이용
※ 단, EBSCO ASC/BSC(오후 5시~익일 오전 9시 무료 이용)
The circular tooth profile is superior to the involute tooth profile in reducing the contact stress between teeth and in maintaining the slip velocity constantly. The involute tooth profile is superior to the circular are tooth profile and to the cycloid toothe profile in processing accurately at the pitch point where the radius of curvature is zero. According to this results, we studied the tooth profile of rack cutter to increase load capacity and to have zero slip ratio near the pitch point. In our study, the tooth profile is made straight near the pitch point and is made following the trochoid curve at flank and face. The results are as follow: a. If the pressure angle is increased, the trochoid is decreased and the involute is increased. b. If the radius of rolling circle is increased, the trochoid is decreased and the involute is increased. c. If the constant distance b is increased, the trochoid is increased and the involute is decreased.
최근 클라우드 플랫폼을 효율적으로 사용하기 위한 컨테이너 기술들이 주목을 받고 있다. 컨테이너 가상화 기술은 기존 하이퍼바이저와 비교하였을 때 이식성이 뛰어나고 집적도가 높다는 장점을 가지고 있다. 하지만 컨테이너 가상 화 기술은 하나의 커널을 공유하여 복수개의 인스턴스를 구동하는 운영체제 레벨의 가상화 기술을 사용하기 때문에 인스턴스 간 공유 자원 요소가 많아져 취약성 또한 증가하는 보안 문제를 가지고 있다. 컨테이너는 컴퓨팅 자원의 효율적 운용을 위해 호스트 운영체제의 라이브러리를 공유하는 특성으로 인해 공격자는 커널의 취약점을 이용하여 호스트 운영체제의 루트 권한 획득 공격이 가능하다. 본 논문에서는 컨테이너가 사용하는 특정 메모리 영역의 변화 를 감지하고, 감지 시에는 해당 컨테이너의 동작을 중지시키는 메모리 트랩 기법을 사용하여 컨테이너 내부에서 발 생되는 호스트 운영체제의 루트 권한 탈취 공격을 효율적으로 탐지 및 대응하기 위한 프레임워크를 제안한다. Recently container technologies have been receiving attention for efficient use of the cloud platform. Container virtualization technology has the advantage of a highly portable, high density when compared with the existing hypervisor. Container virtualization technology, however, uses a virtualization technology at the operating system level, which is shared by a single kernel to run multiple instances. For this reason, the feature of container is that the attacker can obtain the root privilege of the host operating system internal the container. Due to the characteristics of the container, the attacker can attack the root privilege of the host operating system in the container utilizing the vulnerability of the kernel. In this paper, we propose a framework for efficiently detecting and responding to root privilege attacks of a host operating system in a container. This framework uses a memory trap technique to detect changes in a specific memory area of a container and to suspend the operation of the container when it is detected.
Due to their unique properties, tungsten borides are good candidates for the industrial applications where certain features such as high hardness, chemical inertness, resistance to high temperatures, thermal shock and corrosion. In this study, conditions were investigated for producing tungsten boride powder from tungsten oxide($WO_3$) by self-propagating high-temperature synthesis (SHS) followed by HCl leaching techniques. In the first stage of the study, the exothermicity of the $WO_3$-Mg reaction was investigated by computer simulation. Based on the simulation experimental study was conducted and the SHS products consisting of borides and other compounds were obtained starting with different initial molar ratios of $WO_3$, Mg and $B_2O_3$. It was found that $WO_3$, Mg and $B_2O_3$ reaction system produced high combustion temperature and radical reaction so that diffusion between W and B was not properly occurred. Addition of NaCl and replacement of $B_2O_3$ with B successfully solved the diffusion problem. From the optimum condition tungsten boride($W_2B$ and WB) powders which has 0.1~0.9 um particle size were synthesized.
Containers are attracting much attention in the IT industry because they have the advantages of lower operating overhead usage than existing virtual machines and stable operation in various computing environments. However, there are security threats in various aspects such as a problem that a container-based platform can be attacked through a side channel because of a single kernel shared with a plurality of containers, and a container image using a vulnerable package can be shared with a large number of users. In this paper, we propose an automated platform which verifies the security checklist items of Docker Benchmark documents published by CIS for building and operating a secure container environment. The proposed framework verifies 97 security checklists automatically, and provides real-time monitoring functions for analyzing the vulnerability of container image and behavior of container instance. 최근 컨테이는 기존의 가상 머신보다 낮은 구동 오버헤드와 다양한 컴퓨 환경에서도 안정으로 작동하는 장이 있어 IT 업계에서 많은 심을 받고 있다. 하지만 컨테이 기반의 랫폼은 다수의 컨테이가 커을 공유하기 때문 에 사이드 채 공격이 가능하다는 문제과 취약한 패키지를 사용하는 컨테이 이미지가 다수의 사용자와 공유 될 수 있다는 문제 등 다양한 측면에서의 보안 이 존재한다. 본 논문에서는 안한 컨테이 환경 구축 운을 해 CIS에서 발표한 Docker Benchmark 문서의 보안 체크리스트 항목을 자동화하여 검증 할 수 있는 랫폼을 제 안한다. 본 논문에서 제안한 임워크는 보안 체크리스트 97가지 항목에 한 자동화된 검증을 수행하며, 컨테이 이미지에 한 취약 검증과 컨테이 인스턴스의 행를 분석할 수 있는 실시간 모니터링 기능을 제공한다.
Although the vegetable Angelica keiskei (AK) has widely been utilized for the purpose of general health improvement among Korean population, its functionalities are not very well defined. In this study, we examined the effects of methanol extract of AK in rats on the biochemical changes induced by two hepatotoxins, D-galactosamine (GalN) and carbon tetrachloride ( CCl₄). AK was orally administered once daily for 7 days to male rats at 200and 500 mg/kg, before hepatotoxins. Effects of AK were assessed 24 hr later. AK pretreatments at 200 and 500 mg/kg significantly blunted GalN-induced elevation in liver lipid peroxidation, plasma aspartate-transaminase (AST) and alanine-transaminase (ALT) activities. AK also prevented, after 500 mg/kg but not after 200 mg/kg, the GalN-induced elevation in triglyceride, total cholesterol and LDL-cholesterol levels. Differently from against GalN-induced toxicity,AK did further elevate the CCl₄-induced rise in AST, ALT and lipid peroxidation. These results suggest that AK, when pre-administered prior to GalN, exerted protective effects against GalN-induced hepatotoxicity, in contrast however,AK exacerbated that induced by CCl₄. To explore possible mechanism for the toxicity-potentiating effects of AK on CCl₄, the activity of hepatic drug metabolism after AK treatment was assessed. It was observed that AK increased the activity of aniline hydroxaylase, a cytochrome P450 isoenzyme responsible for metabolic activation of CCl₄. This finding suggests that hepatoprotective effects of AK are not equally expected depending on hepatotoxins employed.
In this study, seven oligonucleotides primers were shown to generate the shared loci, specific loci, uniqueshared loci to each species and shared loci by the three species which could be obviously calculated. Euclidean geneticdistances within- and between-species were also calculated by complete linkage method with the sustenance of thehierarchical dendrogram program Systat version 13. The genomic DNA isolated from herring (Clupea pallasii), Koreananchovy (Coilia nasus) and large-eyed herring (Harengula zunashi), respectively, in the Yellow Sea, were amplified severaltimes by PCR reaction. The hierarchical dendrogram shows three chief branches: cluster 1 (PALLASII 01, 02, 03, 04, 06 and07), cluster 2 (NASUS 08, 09, 10, 11, 12, 13 and 14), and cluster 3 (ZUNASHI 15, 16, 17, 18, 19, 20, 21 and PALLASII 05). In three clupeid species, the shortest genetic distance displaying significant molecular difference was between individualPALLASII no. 03 and PALLASII no. 02 (0.018). Individual no. 06 of PALLASII was most distantly related to NASUS no. 11(genetic distance = 0.318). Individuals from herring (C. pallasii) species (0.920) exhibited higher bandsharing values than didindividuals from Korean anchovy (C. nasus) species (0.872) (P<0.05). As a result, this PCR analysis generated on the geneticdata displayed that the herring (C. pallasii) species was widely separated from Korean anchovy (C. nasus) species. Reversely,individuals of Korean anchovy (C. nasus) species were a little closely related to those of large-eyed herring (H. zunashi)species.
A femtosecond laser has been used to produce spatially confined micromachining on mold stainless steel STAVAX. We investigated femtosecond laser-induced line structuring on mold stainless steel STAVAX using the laser scanning mode with various scanning speeds, various fluences and two polarization configurations. The damage threshold fluence of single pulse irradiation (Fth) was measured to be about 80 mJ/cm2. The damage threshold fluence of the scanning mode was approximately identical (0.75 Fth~1.25 Fth) to that of the single pulse irradiation. However, a fluence of 2.50 Fth was necessary to induce continuous line structures for high scanning speeds and a fluence of 1.25 Fth was required to induce continuous line structures for low scanning speeds. The width of laser-machined lines increased with the irradiation fluence and decreased with the scanning speed regardless of the polarization configuration. The formation of laser-induced periodic structures (termed “ripple”) was examined using various laser parameters. It was clear that the formation of the ripple was governed by the irradiation fluence and the scanning speed of the beam. We were able to produce nano-scale structures in large areas by employing multiple line irradiations with the laser beam.