http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Song, Changhoon,Yun, Junyeong,Keum, Kayeon,Jeong, Yu Ra,Park, Heun,Lee, Hanchan,Lee, Geumbee,Oh, Seung Yun,Ha, Jeong Sook Elsevier 2019 Carbon Vol.144 No.-
<P><B>Abstract</B></P> <P>We report a fabrication of a high-performance wire-type supercapacitor through surface modification of carbon fiber with ionic liquid, nanomaterials, and gel electrolyte containing ionic liquid. Coating of Au nanoparticles onto carbon fiber increases both surface area and electrical conductivity. Dip-coating of mixture of ionic liquid 1-ethyl-3-methylimidazolium bis(trifluoromethylsulfonyl)imide ([EMIM][TFSI]), carbon nanotubes, and electropolymerization of polypyrrole (Ppy) onto Au coated fiber for pseudocapacitance results in high capacitance. The use of propylene carbonate-poly(methyl methacrylate)-[EMIM][TFSI] gel electrolyte gives high operation voltage. Such wire-type supercapacitor exhibits a high voltage of 2.5 V, an areal capacitance of 38.49 mF cm<SUP>−2</SUP>, and a maximum energy and power density of 24.7 μWh cm<SUP>−2</SUP> and 3.52 mW cm<SUP>−2</SUP>, respectively. In addition, the cyclic stability of the supercapacitor is dramatically enhanced by using 2-naphthalene sulfonic acid as a dopant in electropolymerization of Ppy. Encapsulation with a thermally shrinkable tube endows the supercapacitor with mechanical stability and waterproof features when it is bent, folded, twisted, even in water. This work demonstrates high potential of such wire-type supercapacitor as a flexible energy-storage device for various applications, especially those that require high voltage.</P> <P><B>Graphical abstract</B></P> <P>[DISPLAY OMISSION]</P>
Model soot이 Pt/CeO₂ 촉매와 tight contact한 상태에서의 O₂에 의한 산화특성 연구
송창훈(Changhoon Song),이동일(Dongil Lee),김태수(Taesoo Kim),송순호(Soonho Song),전광민(Kwang Min Chun) 한국자동차공학회 2009 한국자동차공학회 부문종합 학술대회 Vol.2009 No.4
The catalytic behaviors of Pt/CeO₂ have been studied for soot oxidation by O₂. Oxidation of soot (carbon black) is studied using a flow reactor system simulating the condition of diesel exhaust. In this study, the temperature programmed oxidation (TPO) scheme is used. And soot oxidation rate is evaluated by monitoring both CO and CO₂ concentrations. Pt/CeO₂ catalyst shows promising performance to accelerate the soot-O₂ reaction. Under tight contact condition with catalyst, soot oxidation reaction occurred more actively. The maximum soot oxidation temperature is decreased by about 150℃. The main reason that causes the increase of soot oxidation activity is the active oxygen from cerium oxide.
New Security Approaches for SSL/TLS Attacks Resistance in Practice
Tran Song Dat Phuc(짠송닷푹),Changhoon Lee(이창훈) 한국전자거래학회 2017 한국전자거래학회지 Vol.22 No.2
SSL의 취약점을 이용한 공격 기법인 BEAST를 발표했던 Juliano Rizzo와 Thai Duong이 새로운 공격 기법인 CRIME(Compression Ration Info-leak Made Easy)을 발표하였다. CRIME 공격은 암호화된 데이터에 대한 비밀 정보를 찾아내기 위해 데이터가 압축 및 암호화되는 방법의 취약점을 이용한 공격이다. 공격자는 이 공격법을 반복하여 데이터를 복호화할 수 있고, HTTP 세션의 쿠기 데이터를 복원할 수 있다. 공격자는 SPDY 및 SSL/TLS의 압축 함수를 대상으로 하는 이 보안 취약점을 이용하여 다양한 길이의 입력데이터를 선택함으로써 암호화된 데이터의 길이를 확인할 수 있다. TLS 프로토콜은 두 통신자(서버 및 클라이언트) 사이에서 발생하는 데이터 통신의 무결성을 보장하고 두 대상에 대한 인증 수단을 제공하고 있으며, 최근 몇 년 동안 이들을 대상으로 TLS 메커니즘의 몇몇 특성들을 이용한 다양한 공격들이 수행되고 연구되었다. 본 논문에서는 CRIME 및 SSL/TLS에 대한 다양한 공격 기법들과 이들에 대한 대응 및 구현 방안에 대하여 논의하며, 실용적인 관점에서 SSL/TLS 공격 대응 방안의 방향을 제시한다. Juliano Rizzo and Thai Duong, the authors of the BEAST attack [11, 12] on SSL, have proposed a new attack named CRIME [13] which is Compression Ratio Info-leak Made Easy. The CRIME exploits how data compression and encryption interact to discover secret information about the underlying encrypted data. Repeating this method allows an attacker to eventually decrypt the data and recover HTTP session cookies. This security weakness targets in SPDY and SSL/TLS compression. The attack becomes effective because the attacker is enable to choose different input data and observe the length of the encrypted data that comes out. Since Transport Layer Security (TLS) ensures integrity of data transmitted between two parties (server and client) and provides strong authentication for both parties, in the last few years, it has a wide range of attacks on SSL/TLS which have exploited various features in the TLS mechanism. In this paper, we will discuss about the CRIME and other versions of SSL/TLS attacks along with countermeasures, implementations. We also present direction for SSL/TLS attacks resistance in practice.
Endobronchial suction catheter guided nasotracheal intubation with preformed nasotracheal tube
Jia Song,Taehee Pyeon,Daehoon Kim,Changhoon Lee,Joungmin Kim 조선대학교 의학연구원 2020 Medical Bilogical Science and Engineering Vol.3 No.1
Nasotracheal intubation is commonly used in surgery requiring space of the orofacial field. The endotracheal tube used for nasotracheal intubation is either a conventional tube or a preformed nasotracheal tube considering nasal passage. Conventional nasotracheal intubation starts with blind passage of an endotracheal tube via the nostril followed by laryngoscopy-assisted intubation through the vocal cord with or without the aid of Magill forceps. During intubation, anesthesiologists may experience interruption of endotracheal tube passage because of resistance in nasal cavity. It is known that any excessive force may significantly increase the risk of damage to nasal structures. One way to prevent this damage is Guided-technique. Guided technique is easier, cheaper and safer than conventional technique. Here we report a case of successful endotracheal intubation with preformed nasotracheal tube following endobronchial suction catheter guidance. Guided technique with endobronchial suction catheter is useful for nasotracheal intubation with preformed nasotracheal intubation tube.
Rekeying Approach against Side Channel Attacks
( Tran Song Dat Phuc ),( Byoungjin Seok ),( Changhoon Lee ) 한국정보처리학회 2017 한국정보처리학회 학술대회논문집 Vol.24 No.1
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. One approach to counteract such attacks is cryptographic schemes based on fresh re-keying. In settings of pre-shared secret keys, such schemes render DPA attacks infeasible by deriving session keys and by ensuring that the attacker cannot collect side-channel leakage on the session key during cryptographic operations with different inputs. This paper present a study on rekeying approach against side channel attacks with current secure schemes and their rekeying functions.