http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
임철수,류정호,엄명도,황진우,김예은 한국대기환경학회 2004 한국대기환경학회지 Vol.20 No.2
Diesel engines which emit a lot of PM and NOx have been known as a main air polluter. Especially, diesel particulate matters (DPM) including black smoke are hazardous air pollutants to human health and environment. The nations retaining advanced engine technologies have reinforced emission regulations. To meet these regulations diesel engine manufacturers have developed low-emission diesel engines, aftertreatment equipments, alternative fuel technologies and so on. In this study, particle number concentrations characteristics according to particle size and engine driving conditions were analyzed when these low-emission technologies were applied. There was a tendency of increasing particle number concentrations from heavy-duty diesel engines with increasing engine rpm and load rate. In the cases of CDPF (Catalytic Diesel Particulate Filter), CNG (Compressed Natural Gas) engine and ULSD (Ultra Low Sulfur Diesel) more than 99% of particle number concentration were removed.
김재홍,윤기범,박평원,김영진,전경민,김영태,김중환,곽호,구상완,송민석,유옥,지혜구,김동원,문상은,박영립,정승호,성범진,성순제,엄주용,황정열,이기홍,이주협,전태진 대한화학요법학회 1994 대한화학요법학회지 Vol.12 No.1
The prevalence of PPNG among pretreated gonorrhea cases isolated at the STD clinic of Choong-Ku Public Health Center in Seoul has been studied and reported annually since 1981. In 1991, 123 strains of N.gonorrhoeae were isolated, among which 58(47.1%) were PPNG. In 1992, 98 starains of N.gonorrhoeae were isolated, among which 51(52.0%) were PPNG. In all, 109(49.3%) strains were found to be PPNG among 221 strains isolated between 1991-1992. The prevalence of PPNG in Seoul showed increased tendency till 1989, thereafter, it has been stationary or slightly decreasing.
Security Threats Recognition and Countermeasures on Smart Battlefield Environment based on IoT
Jung ho Eom 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.7
In this paper, we drew new security threats on IoT (Internet of Thing) based smart battlefield environment and proposed countermeasures against them. DoD (Department of Defense) is focusing its attention on the development of unmanned combat systems (UCS) to prepare for future war. The IoT technology provides networking service to connect each other unmanned combat system. But, IoT has the security vulnerabilities of each element of the technology itself because the technology integrates several components to configure a specific service. And new security vulnerabilities will be caused when they are interconnecting. If we fail to defend the security threat that may arise from IoT based smart battlefield environment, we can’t obtain intelligence superiority and furthermore will not be able to assure the victory of the cyber war. In smart battlefield environment applied to IoT, we can draw four main security threats; illegal remote control, information leakage, false information insert, and signal disturbance. And we propose countermeasures in response to these security threats; authentication, access control, intrusion prevention, and cryptography technology.
The Design of Robust Authentication Mechanism using User’s Biometrics Signals
Jung ho Eom 보안공학연구지원센터 2014 International Journal of Security and Its Applicat Vol.8 No.6
In this research, we proposed robust authentication mechanism using user’s biometrics signals for complementing traditional authentication’s weak points. Nowadays, authentication system are developed using biometric. Biometrics are a unique, measurable a trait of a human being for verifying his/her identity. The types of biometric used in authentication system are iris, fingerprint, vein pattern, hand geometry etc. A biometric system provides an automated method of identifying a human being based on his/her biometric characteristics. But there are some security problems. Some biometrics can be copied by a malicious user with scanners. All biometrics characteristics extracted from a user are not possible to maintain a steady normal condition. So, we tried to apply user’s biometrics signals to authentication system as 3rd authentication factor. A biometrics signal is a pattern recognition that uniquely identifies human being based on his/her physiological traits. A biometrics signals should be impossible to masquerade or manipulate. This attribute is used as 3rd authentication phase. Proposed authentication mechanism is composed of 3 layered authentications; ID&P/W, PIN number or biometrics, and biometrics signals.
Eom, Jung-Ho,Park, Seon-Ho,Kim, Tae-Kyung,Chung, Tai-Myoung Korea Information Processing Society 2005 Journal of information processing systems Vol.1 No.1
In this paper, we dealt with substantial asset analysis methodology applied to two-dimensional asset classification and qualitative evaluation method according to the business process. Most of the existent risk analysis methodology and tools presented classification by asset type and physical evaluation by a quantitative method. We focused our research on qualitative evaluation with 2-dimensional asset classification. It converts from quantitative asset value with purchase cost, recovery and exchange cost, etc. to qualitative evaluation considering specific factors related to the business process. In the first phase, we classified the IT assets into tangible and intangible assets, including human and information data asset, and evaluated their value. Then, we converted the quantitative asset value to the qualitative asset value using a conversion standard table. In the second phase, we reclassified the assets using 2-dimensional classification factors reflecting the business process, and applied weight to the first evaluation results. This method is to consider the organization characteristics, IT asset structure scheme and business process. Therefore, we can evaluate the concrete and substantial asset value corresponding to the organization business process, even if they are the same asset type.