http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Park, Young Kwan,Choi, Sang Beom,Kim, Hyunuk,Kim, Kimoon,Won, Byoung-Ho,Choi, Kihang,Choi, Jung-Sik,Ahn, Wha-Seung,Won, Nayoun,Kim, Sungjee,Jung, Dong Hyun,Choi, Seung-Hoon,Kim, Ghyung-Hwa,Cha, Sun-Sh WILEY-VCH Verlag 2007 Angewandte Chemie Vol.119 No.43
<B>Graphic Abstract</B> <P>Poren zeigen Größe: Ein mesoporöses metall-organisches Netzwerk, das vorrangig aus Tb<SUP>3+</SUP>-Ionen und tripodalen Carboxylatliganden aufgebaut ist, bringt es auf Käfige mit 3.9 und 4.7 nm Durchmesser (siehe Bild). Das leere Netzwerk ist beständig und kann Gas- oder Ferrocenmoleküle aufnehmen, was durch Gassorptions- und Lumineszenzstudien bestätigt wurde. <img src='wiley_img/00448249-2007-119-43-ANGE200702324-content.gif' alt='wiley_img/00448249-2007-119-43-ANGE200702324-content'> </P>
Park, Young Kwan,Choi, Sang Beom,Kim, Hyunuk,Kim, Kimoon,Won, Byoung-Ho,Choi, Kihang,Choi, Jung-Sik,Ahn, Wha-Seung,Won, Nayoun,Kim, Sungjee,Jung, Dong Hyun,Choi, Seung-Hoon,Kim, Ghyung-Hwa,Cha, Sun-Sh WILEY-VCH Verlag 2007 Angewandte Chemie. international edition Vol.46 No.43
<B>Graphic Abstract</B> <P>Supersized pores: A new mesoporous metal–organic framework that is mainly composed of Tb<SUP>3+</SUP> ions and tripodal carboxylate ligands has cages of 3.9 and 4.7 nm in diameter (see picture). The evacuated framework is robust and can accommodate gases or ferrocene molecules, as verified by gas-sorption measurements and luminescence studies. <img src='wiley_img/14337851-2007-46-43-ANIE200702324-content.gif' alt='wiley_img/14337851-2007-46-43-ANIE200702324-content'> </P>
Cho, Seok-Goo,Kim, Nayoun,Sohn, Hyun-Jung,Lee, Suk Kyeong,Oh, Sang Taek,Lee, Hyun-Joo,Cho, Hyun-Il,Yim, Hyeon Woo,Jung, Seung Eun,Park, Gyeongsin,Oh, Joo Hyun,Choi, Byung-Ock,Kim, Sung Won,Kim, Soo Wh Nature Publishing Group 2015 MOLECULAR THERAPY Vol.23 No.8
<P>Extranodal NK/T-cell lymphoma (ENKTCL) is associated with latent Epstein-Barr virus (EBV) infection and frequent relapse even after complete response (CR) to intensive chemotherapy and radiotherapy. The expression of EBV proteins in the tumor provides targets for adoptive immunotherapy with antigen-specific cytotoxic T cells (CTL). To evaluate the efficacy and safety of EBV latent membrane protein (LMP)-1 and LMP-2a-specific CTLs (LMP1/2a CTLs) stimulated with LMP1/2a RNA-transferred dendritic cells, we treated 10 ENKTCL patients who showed complete response to induction therapy. Patients who completed and responded to chemotherapy, radiotherapy, and/or high-dose therapy followed by stem cell transplantation (HDT/SCT) were eligible to receive eight doses of 2 × 10<SUP>7</SUP> LMP1/2a CTLs/m<SUP>2</SUP>. Following infusion, there were no immediate or delayed toxicities. The 4-year overall survival (OS) and progression-free survival (PFS) were 100%, and 90% (95% CI: 71.4 to 100%) respectively with a median follow-up of 55·5 months. Circulating IFN-γ secreting LMP1 and LMP2a-specific T cells within the peripheral blood corresponded with decline in plasma EBV DNA levels in patients. Adoptive transfer of LMP1/2a CTLs in ENKTCL patients is a safe and effective postremission therapeutic approach. Further randomized studies will be needed to define the role of EBV-CTLs in preventing relapse of ENKTCL.</P>
Vulnerabilities in Control Systems, Critical Infrastructure Systems and SCADA
Rosslin John Robles,Min-kyu Choi,Maricel O. Balitanas,Feruza Sattarova Yusufovna,Farkhod Alisherov Alisherovich,Nayoun Kim,Tai-hoon Kim 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
Critical Infrastructure or CI are so crucial and play a vital role in the society. A damage or breakage of it will have a huge effect on humanity and economy. Supervisory Control and Data Acquisition Systems (SCADA) play a big role on Critical Infrastructure since most of these infrastructures are controlled by control systems like SCADA. In this paper, we discuss the vulnerabilities of a SCADA system, its effect to the society and the ways to prevent such vulnerabilities. We also researched on the background of the SCADA system and its comparability to the common computer system is discussed.
Separated SCADA Environment as a Security Approach
Feruza Sattarova Yusufovna,Rosslin John Robles,Min-kyu Choi,Maricel O. Balitanas,Farkhod Alisherov Alisherovich,Nayoun Kim,Tai-hoon Kim 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
Supervisory Control and Data Acquisition (SCADA) systems are critical to the safe, reliable and efficient operation of many essential services that affect the daily lives of millions of people. These services include power generation plants, potable water systems, wastewater treatment facilities, oil and gas production and transportation/distribution networks. In today’s uncertain world, security stands beside profitability, productivity, performance and control as a key element for maintaining business activities in industrial facilities. Prevention of malicious attacks against business infrastructure has become as vital to ongoing success as has the widespread use of the computer systems which make such attacks so easy and so painful. The vulnerabilities and condition of security of SCADA networks are considered in this paper. Also approaches on how to best secure SCADA system are discussed.