http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
최윤철 연세대학교 자연과학연구소 1987 學術論文集 Vol.19 No.-
본 논문은 문서작성 시스템에서 도형작성을 효율적으로 수행할 수 있는 도형기술 언어를 BNF 형태로 제시하였다. 이 언어는 "little language"로 기존의 컴파일러 개발도구를 이용하여 용이하게 구현될 수 있다. 또한 UNIX 환경하에서 다른 용도의 formatting 언어와 통합적으로 이용될 수 있다. We propose a picture-description language in BNF form which typesets the basic picture objects efficiently in the document preparation environment. This "little language" may be implemented easily using the existing compiler development tools. Also, this picture formatting language can be used as an integral part of UNIX document preparation system.
마이크로 컴퓨터 시스템에서의 다수사용자를 위한 관계 DBMS
조성배,최윤철 연세대학교 자연과학연구소 1988 學術論文集 Vol.20 No.-
SQL형식의 질의어를 제공하는 다수사용자 관계 DBMS를 PC로 구성된 근거리 네트워크 환경하에서 설계, 구현하였다. A multi-user relational DBMS with SQL-type query is designed and implemented in PC-LAN environment.
이신준,양성봉,최윤철 연세대학교 산업기술연구소 1999 논문집 Vol.31 No.2
Path finding is one of the basic functions provided in the network analysis system of a geographic information system(GIS). A GIS network analysis system analyzes and models geographic networks, and enables user to solve a variety of problems concerning geographic networks such as finding a most efficient travel route. In path finding there are two types of routing problems. One is to find a shortest route between two nodes. The other is to find an optimum route among many points, which is known as the traveling salesman problem. We have implemented our GIS network analysis system for path finding on the Gothic GIS system. The implemented system consists of the optimal path finder and the multiple path finder. And the system in this paper also solves routing problems efficiently in GIS networks.
아바타 모션 편집기를 통한 상위레벨 모션의 생성에 관한 연구
김가영,김재경,최윤철,임순범 숙명여자대학교 자연과학연구소 2003 자연과학논문집 Vol.- No.14
최근 3D 가상환경에서 아바타를 활용한 분야가 많은 관심을 받고 있다. 아바타를 이용함으로써 정보를 보다 효과적으로 전달할 수 있으며, 사용자들의 관심을 쉽게 이끌어 낼 수 있다는 장점을 가진다. 이러한 아바타 서비스를 제공하기 위해 가장 중유한 분야 중 하나가 아바타 모션 생성기법에 관한 것이다. 본 연구에서는 아바타 상위레벨 모션을 생성하기 위한 편집기 시스템을 제안하고, 상위레벨 모션간의 조합 규칙을 제정하여 모션 조합 시 발생될수 있는 모호성의 문제점을 해결하고자 하였다. Recently, avartar has taken a lot of attention in the various fields of 3D artificial circumstance. The use of avatar has advantages of more efficient communication and easy attraction of users. To provide the services using avatar, the methods for motion generation have been developed and utilized. In this paper. We develope an avatar motion editing system for high-level motion creation and suggest composition rule to solve the ambiguous problem that could by arose from the process of motion composition.
Study on Financial-sector Information Security Level Assessment and Improvement Anticipation Model
Young-Rai Park,Yoon-Chul Choy,Won-Sung Shon 보안공학연구지원센터 2014 International Journal of Security and Its Applicat Vol.8 No.6
Infringement threats to the financial sector have become more sophisticated and intelligent. In order to more effectively respond to such threats, the financial sector faces the need to perform the assessment of information security maturity level on a voluntary basis in order to better understand organizational information security situation and improve own vulnerabilities to reinforce information security. The study, in reflection of financial industrial environmental characteristics, builds a comprehensive and systematic information security assessment indices specialized in the financial sector while presenting an information security maturity level assessment model based on the indices as well as an information security improvement anticipation model through vulnerability remedy. The quantification of vulnerability levels of the control item suggested herein and the improvement anticipation model based on vulnerability correction, in particular, supports an organization under the assessment to address its vulnerabilities to effectively enhance organizational information security. In the absence of such an information security assessment model, the financial sector has poorly performed in assessing own information security activities. With the models suggested herein being in place, the sector is expected to make an active use of it to facilitate information security assessment and improve the general information security maturity level of individual financial institutions and the financial industry as a whole