RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 음성지원유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재후보

        조혈모세포이식 환자에서 침습성 진균 감염에 대한 Micafungin의 예방 효과 및 안전성

        김시현,이동건,최수미,권재철,박선희,최정현,유진홍,이성은,조병식,김유진,이석,김희제,민창기,조석구,김동욱,이종욱,민우성,박종원 대한감염학회 2010 감염과 화학요법 Vol.42 No.3

        Background: Micafungin, a potent inhibitor of 1,3-β-D-glucan synthase, is a novel antifungal agent of the echinocandin class. In vitro study showed that micafungin was effective against Aspergillus species as well as Candida species, but clinical data on the prophylactic efficacy against invasive fungal infections (IFIs) other than candidiasis are still lacking. Materials and Methods: We identified 60 consecutive adult hematopoietic stem cell transplantation (HSCT) recipients who received at least 3 doses of micafungin during neutropenic period. Micafungin was started as an alternative in patients who were intolerant or had adverse events (AEs) to primary prophylactic antifungal agents. We retrospectively reviewed the medical records and analyzed the efficacy and safety of micafungin for prophylaxis against IFIs. Results: The patients either had autologous (n=9) or allogeneic (n=51: 1 syngeneic, 24 sibling, 26 unrelated donor) HSCT. Itraconazole oral solution (n=58) was the most frequently used first line antifungal agent for prophylaxis and was administered for median 11 days. The most frequent cause of switch to micafungin was vomiting (n=42). The duration of neutropenia and micafungin administration was median 13 and 12 days, respectively. A successful outcome was achieved in 45 (75%) patients. Empirical antifungal therapy was initiated in 13 (22%) patients. There were 2 cases (3.3%) of breakthrough fungal infections which comprised a probable invasive pulmonary aspergillosis and a possible invasive fungal sinusitis. There was no case of invasive candidiasis. A total of 53 (88%) patients experienced at least one AE regardless of causality during micafungin administration. The most frequent AEs were hypokalemia, vomiting, diarrhea, and elevated serum aspartate aminotransferase or alanine aminotransferase. Among the aforementioned AEs, only 1 case of diarrhea could be classified as a probable relation with micafungin when causality was assessed. There was no AEs that caused discontinuation of micafungin. Conclusions: Micafungin seems to be a safe and effective agent for prophylaxis of IFIs including aspergillosis as well as candidiasis in HSCT recipients. However, further large, prospective, and randomized comparative studies are warranted for aspergillosis.

      • KCI등재후보

        신장이식 환자에서 HCMV 항원혈증 검사의 임상적 유용성

        김탁,성흥섭,박관태,김송철,김성한,최상호,김양수,우준희,박수길,한덕종,이상오 대한감염학회 2009 감염과 화학요법 Vol.41 No.2

        Background : This study was performed to determine the cut-off value and the predictability of symptomatic human cytomegalovirus (HCMV) infection according to the peak value of HCMV antigenemia assay in kidney transplant recipients. Materials and Methods : We reviewed the results of HCMV antigenemia assay (Chemicon, CA, USA) in patients who received kidney transplantation at our institution from May 2003 through May 2008, and investigated the existence and the type of HCMV infection by the medical record review. Patients who underwent the test only once during the episode or those who received ganciclovir for more than 48hrs before the test were excluded. The receiver-operator characteristic curve was drawn and the point showing maximum likelihood ratio (LR) was chosen as the cut-off value of symptomatic HCMV infection. Results : A total of 689 episodes were screened and 134 episodes were enrolled. Thirty-three (24.6%) episodes were symptomatic HCMV infection, 23 (17.2%) episodes were associated with HCMV syndrome, and 10 (7.5%) episodes were tissue-invasive diseases. The maximum LR was 7.5 (95% confidence interval, 4.014.2) and the cut-off value was 29.5 cells/200,000 WBC. The sensitivity, specificity, Positive predictive value, and negative predictive value were 66.7%, 91.1%, 71.0%, and 89.3%, respectively. Conclusions : The cut-off value of symptomatic HCMV infection by the peak value of HCMV antigenemia assay in our study was similar with previous results, although the sensitivity was relatively low.

      • KCI등재

        랜덤 키 분할을 이용한 모바일 RFID 사용자의 프라이버시를 보호하는 상호 인증 프로토콜

        정윤수(Yoon-Su Jeong),김용태(Yong-Tae Kim),박길철(Gil-Cheol Park),이상호(Sang-Ho Lee) 한국통신학회 2011 韓國通信學會論文誌 Vol.34 No.9

        이동 통신망에 RFID 기술을 접목한 모바일 RFID는 사용자 자신이 휴대한 휴대전화로 제품에 부착된 RFID태그의 식별자를 읽고, 이 식별자를 이동통신망을 통해 네트워크로 전달하여 제품에 대한 정보를 얻는 기술이다. 그러나 모바일 RFID는 기존 RFID에서 요구되어지는 보안 요구사항 중 프라이버시 문제가 여전히 존재하는 문제점이 있다. 이 논문에서는 모바일 RFID 사용자가 태그 정보를 백 엔드 서버로부터 안전하게 전달받기 위해서 초기화 과정과 상호 인증과정에서 모바일 RFID 리더와 태그가 생성한 랜덤키를 임의의 크기로 분할하여 프라이버시 보호가 필요한 태그에 대해서 모바일 RFID 리더가 매 세션마다 난수생성기에 의해 항상 다른 하부키 값을 생성함으로써 태그의 어떤 정보도 제 3자에게 제공하지 않도록 하고 있다. 성능 평가 결과 제안 프로토콜은 등록 계산량과 로그인 계산량에서 모듈러 연산을 사용하는 기존 프로토콜과 달리 일방향 해쉬 함수를 사용하여 사용자의 정보를 등록하기 때문에 MARP 기법<SUP>[7]</SUP>과 Kim 등의 기법<SUP>[12]</SUP>보다 저장 공간과 계산량에서 효율성이 높았다. Mobile RFID which integrates mobile network with RFID technique is the technique to get the information of products by transmitting the identifier through mobile network after reading the identifier of RFID tag. It attached on the equipment as the mobile phone. However, mobile RFID has the privacy-related problem among requested secure problems required from the existing RFID. In this paper, the random key created by mobile RFID reader and Tag during the inter-certificating and initialization procedure for mobile RFID users to receive tag information from backend server securely is divided into random sizes and any information on the tag which requires the protection of privacy shouldn't be provided to anyone. In performance analysis, previous protocol used modulo operation in registration and login computation. But the proposed protocol has higher efficiency in saving space and computation volume than MARP scheme<SUP>[7]</SUP> and Kim. et. al<SUP>[12]</SUP> scheme because our protocol is accomplished by mutual authentication and registering user information through one-way hash function.

      • 새로운 각도 다중화 방법을 이용한 홀로그래픽 광메모리 시스템의 구현과 응용

        金喆洙 경주대학교 1998 論文集 Vol.10 No.-

        It is proposed that an holographic optical memory system for image storage in BaTiO_3 crystal using new angular multiplexing method which controls the incident angle of reference beam electrically. In the new angular multiplexing method, the incident angle of the reference beam is controlled by using BPH(binary phase hologram), which is designed and optimized with SA(simulated annealing) algorithm and represented on LCTV(liquid crystal television) for real-time processing. The reference beam can be generated anywhere in two dimensional planes by Fourier transform of the BPH on the LCTV which is controlled by a computer. So, the vertical and horizontal incident angle of the reference beam on the BaTiO_3 can be controlled simultaneously. Thus the proposed holographic optical memory system is simple and stable because there is no mechanical movement in storage and reconstruction process of the images. By using the proposed system, we demonstrated storage and reconstruction experiments for four binary images. We also demonstrated an application experiment that can acquire large number of images than that of the stored images by controlling the number of reference beams. Through this experiment, the proposed holographic optical memory system is expected to be used in the realization of the weighted optical interconnections for optical computing and communications.

      • 최적의 회절 광학소자 설계를 위한 알고리듬 개발

        김철수 경주대학교 정보전자기술연구소 2004 情報電子技術論叢 Vol.3 No.-

        In this paper, we porposed an iterative hybrid algorithm for designing of optimal diffractive optical elements. To design an optimal diffractive optical element, genetic algorithm is used in the first searching process by block units, and the resulted diffractive optical element is used as an initial random pattern of simulated annealing algorithm. With the porposed algorithm, we designed binary and quaternary phase diffractive elements. and compared with the conventional iterative algorithm such as genetic algorithm and simulated annealing in terms of diffraction efficiency. Computer simulations shown that the proposed algorithm has better performance than the genetic and simulated annealing algorithm.

      • 비파괴 검사를 위한 PZT 탐촉자의 제작 및 특성에 관한 연구

        김철수,정규원,송준태 성균관대학교 1998 학술회의지원논문목록집 Vol.1998 No.-

        Ultrasonic probes of 400kHz, 1MHz, 3MHz were fabricated using P2T 5A plates Epoxy was used for backing layer materials on the plates. Nondestructive Test was carried using these probes. Pulse lobe width of impulse response was reduced 15.4% compare 1MHz with 400MHz and 96.6% compare 3MHz with 400kHz. The attenuation in aluminum was 2.05[dB/m] at 400kHz, 4.91[dB/m] at 1MHz, 7.35[dB/m] at 3MHz. Hole detection error of the first hole was 22.4% at 1MHz, 9.6% at 3MHz. The second hole 11.6% at 1MHz, 4.7% at 3MHz. In the result of experiment of the hole detection errot and resolution., 3MHz probe was the best among them.

      • 이중 트라이를 이용한 한국어 단어 검색

        金哲洙,李庸碩 全北大學校 1994 論文集 Vol.38 No.-

        It is very important to minimize the searching time of words to perform efficiently the Korean information processing. Current methods have had problems such as the followings ; the insertion and deletion of words are difficult or searching time is too long. In this paper, the search method of phoneme unit and syllable unit using double trie with double array is discussed to speed up search time. In searching time, the method of syllable unit is faster than that of phoneme unit, but the method of phoneme unit is more efficient than that of syllable unit in memory spaces. We can reduce the memory spaces up to the half in phoneme unit by spliting one trie into multiple trie. The method of phoneme unit is somewhat slower than that of syllable unit in searching time, but the method of phoneme unit is much more efficient than that of syllable unit in efficiency of memory spaces.

      • 실시간 운영 체제

        金哲秀,河蘭,金鎭午 弘益大學校 科學技術硏究所 1996 科學技術硏究論文集 Vol.7 No.2

        Process management and synchronization, memory management, interprocess communication, and I/O are main functional areas that Operating Systems should support. Real-time Operating Systems provide these features in specific ways because they have different requirements from Non Real-time Operating Systems. In particular, real-time operating systems focus on predictability and include features to support time constraints. Three general categories of real-time operating systems are: small and proprietary kernels(which are commercially available as well as homegrown kernels), realtime extensions to commercial timesharing operating systems such as UNIX, and research kernels. In this paper we survey these three main categories of real-time operating systems.

      • 편광과 위상 홀로그램을nmmmm 이용한 정보보호 시스템의 구현

        김철수 경주대학교 2001 論文集 Vol.14 No.-

        This thesis presents an interferometer-based optical information security system that can produce a stable decrypted image regardless of a change in the optical path length. Interference noise is a serious problem in an interferometer, because it can result in the vibration of the output image. In the proposed system, a polarizing beam splitter is substituted for the beam splitter in a Mach-Zehnder interferometer. As a result, two lights on each path are perpendicularly polarized to each other in the interferometer. Since the incoherence of the two perpendicularly polarized lights removes any interference noise, the decrypted image is stable. Accordingly, the decrypted image of the proposed system can be used as the input for another optical system, regardless of any external change in the optical path length. To encrypt an image, the original image is divided into two intensity images. Encrypted phase images are then obtained from these two images in various ways, including randomly diffusing pixels, randomly removing pixels, or the use of SA algorithm. The use of phase holograms prevents the copying of encrypted images with intensity detectors. The proposed process of encryption and decryption was computer simulated and optically evaluated, and it was verified that the proposed system can produce a stable decrypted image.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼