RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        남북한 ‘문법’ 전문용어의 개념 조화

        엄태경 ( Eom¸ Tae Kyoung ) 한국언어문화학회 2021 한국언어문화 Vol.- No.75

        이 글에서는 남한과 북한의 국어 교과 ‘문법’ 전문용어를 비교ㆍ분석한 후, 그 결과를 바탕으로 전문용어의 통합 방법을 모색하였다. 이 과정에서 기존의 남북 언어 통합 과정에 사용되었던 형식 중심의 통합 방법을 지양하고 ‘개념 조화’를 바탕으로 한 ‘개념 우선’ 중심의 실질적 통합 방안을 실제적으로 검토하였다. 이 글은 전문용어의 조화를 ‘개념 조화’, ‘개념 체계 조화’, ‘개념 정의 조화’로 나누어 살폈다. ‘개념 조화’는 남북의 개별 용어가 가지는 개념을 비교하는 방식으로, ‘① 동일 개념, ② 부분 중복 및 포함 관계 개념, ③ 불일치 개념’의 사례로 나누어 제시하였다. ‘개념 체계 조화’는 여러 개념 체계를 정리하여 단일한 개념 체계를 정립하는 조화 활동이다. 이 연구에서는 ‘① 중복 및 포함 관계를 보이는 개념 체계, ② 다른 개념 체계에는 없는 개념 체계를 조화하는 사례, ③ 개념 체계의 구조가 다른 사례’를 각각 살펴보았다. ‘개념 정의의 조화’는 개념 조화 및 개념 체계 조화의 결과를 정의에 반영하는 활동이다. 본문에서 살펴본 ‘홑받침’의 예를 바탕으로 개념 정의 조화를 시도하였다. 그 결과 개별 용어들의 개념 양상에 따라 조화가 가능한 예와 불가능한 예를 확인하였다. This study compares and analyzes ‘grammar’ terminology of Korean for school subjects in North and South Korea, and explores the integration method of terminology based on the results. The form-centered method used in the existing terminology integration process was avoided; a practical integration plan centered on ‘concept for a first priority’ which is based on ‘concept harmonization’ was reviewed. The terminology harmonization is divided into three parts: concept harmonization, concept system harmonization, and definition harmonization. ‘Concept harmonization’ is to compare the concepts of individual terms in North and South Korea. It is presented in the following three cases: same concept, concept of partial overlapping and relationship, concept of discordance. ‘Concept system harmonization’ is to establish a single conceptual system by organizing several conceptual systems. This study explores the following cases: 1. Concept systems including overlapping and relationships. 2. Cases of harmonizing concept systems that are not found in other concept systems. 3. Cases in which the structure of concept systems is different. ‘Definition harmonization’ reflects the results of concept harmonization and concept system harmonization in the definition, and it was attempted based on ‘Hotbatchim’. The results show cases that can be harmonized and ones that cannot according to the conceptual aspect of individual terms.

      • SCOPUSKCI등재
      • Biometric Authentication for Border Control Applications

        Taekyoung Kwon,Hyeonjoon Moon IEEE 2008 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERIN Vol.20 No.8

        <P>We propose an authentication methodology that combines multimodal biometrics and cryptographic mechanisms for border control applications. We accommodate faces and fingerprints without a mandatory requirement of (tamper-resistant) smart-card-level devices on e-passports for easier deployment. It is even allowable to imprint (publicly readable) bar codes on the passports. Additionally, we present a solution based on the certification and key management method to control the validity of passports within the current Public-Key Infrastructure (PKI) technology paradigm.</P>

      • Impact of Financial Support by Federal Government on Achieving Energy Sustainability, Using a Propensity Score Matching

        ( Taekyoung Lim ) 한국정책학회 2016 한국정책학회 추계학술발표논문집 Vol.2016 No.-

        This paper aims to examine variation in energy efficiency policy adoption on Recovery Act energy funding at the level of local government. This article used a multi-level analysis to consider the effects of higher levels(like state) on the lower level (like local). The hypotheses are tested with 380 local governments in the 49 states which received federal money for projects related to energy efficiency from 2009 to 2013. This paper found empirical evidence to support that the S27 billion in ARRA funds expended with the state`s intent of improving energy efficiency led to actually more energy efficiency policies by cities. Also, this article estimated that state`s energy policies to promote energy efficiency was negatively associated with the variation olf energy efficiency policies adoption at the local governmetn level. The article`s finding indicate that city and state`s indigenous characteristics such as land size, population density, ICLEI membership, NGOs support, and level of education can be important factors that affect the variation of energy efficiency oplicy adoption. The paper contributes to understand certain outcomes in the ARRA implementation, as well as academic understanding of the vitvumdysnvrd in ehivh motr rnrthy rggivirnvy polivird ertr sfopyrf. ayahr styivlr otobifrd nre indihhy on brtyivsl oplivy figgudion in yhr rnrthy rggivirnvy polivird girlf yhtouh s mulyi-lrbrl snslydid.

      • Location-based pairwise key predistribution for wireless sensor networks

        Taekyoung Kwon,Jonghyup Lee,Jooseok Song IEEE 2009 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS Vol.8 No.11

        <P>A practical pairwise key distribution scheme is necessary for wireless sensor networks since sensor nodes are susceptible to physical capture and constrained in their resources. In this paper, we investigate a simple and practical scheme that achieves higher connectivities and perfect resilience with less resources, even in case of deployment errors.</P>

      • Secure and Efficient Broadcast Authentication in Wireless Sensor Networks

        Taekyoung Kwon,Jin Hong IEEE 2010 IEEE Transactions on Computers Vol.59 No.8

        <P>Authenticated broadcast, enabling a base station to send commands and requests to low-powered sensor nodes in an authentic manner, is one of the core challenges for securing wireless sensor networks. μTESLA and its multilevel variants based on delayed exposure of one-way chains are well known valuable broadcast authentication schemes, but concerns still remain for their practical application. To use these schemes on resource-limited sensor nodes, a 64-bit key chain is desirable for efficiency, but care must be taken. We will first show, by both theoretical analysis and rigorous experiments on real sensor nodes, that if μTESLA is implemented in a raw form with 64-bit key chains, some of the future keys can be discovered through time-memory-data-tradeoff techniques. We will then present an extendable broadcast authentication scheme called X-TESLA, as a new member of the TESLA family, to remedy the fact that previous schemes do not consider problems arising from sleep modes, network failures, idle sessions, as well as the time-memory-data tradeoff risk, and to reduce their high cost of countering DoS attacks. In X-TESLA, two levels of chains that have distinct intervals and cross-authenticate each other are used. This allows the short key chains to continue indefinitely and makes new interesting strategies and management methods possible, significantly reducing unnecessary computation and buffer occupation, and leads to efficient solutions to the raised problems.</P>

      • 무인점포 사용자를 위한 앱과 IoT제품 개발

        TaeKyoung Kim,GyuRi Heo,TaeKyun Kim 한국서비스디자인학회 2019 서비스디자인융합연구 Vol.3 No.2

        본 연구는 UX 서비스 디자인 방법론을 통해 현재 늘어나고 있는 무인점포 매장의 문제점을 인지하고 해결하고자 하는 전반적 프로세스다. 임금상승으로 인해 무인으로 대체하는 산업이 활성화 되고 있다. 여기에 IT기술의 발달과 언택트를 선호하는 사회적 분위기가 맞물려 전국적으로 무인점포 매장이 빠르게 확산되고 있다. 무인점포의 대표적인 제품 중 키오스크를 선정하여 문제점을 분석했다. 발견된 문제점으로는 매장마다 다른 인터페이스로 인한 혼란과 익숙하지 않은 사용자층의 존재다. 리서치 방법론을 이용한 자료조사 과정에서 발견된 단서를 통해 사용자의 요구를 파악하고 분석하여 UX 디자인 방향과 Insight를 도출하였다. 이를 토대로 개선된 서비스디자인을 위하여 비콘기술을 사용한 IoT 제품과 어플리케이션을 개발했다. 첫 번째로, 비콘기술을 이용하여 신속한 에플리케이션 접근을 가능하게 했다. 두 번째로, 음성인식 인터페이스 사용으로 기존 키오스크가 부재했던 즉각적인 피드백 제공한다. 마지막으로 사용자의 구매 데이터베이스를 축적하여 다음 사용 시 빠르게 접근한다. This paper is an overall process that recognizes and tries to solve problems of unmanned stores that are currently increasing through UX service design the methodologies. Wage increases are boosting industries that are replacing people. the development of technology and who prefer ‘untact’ social atmosphere, shows fast spreading unmanned stores across the country. We selected kiosks from representative products in unmanned stores and analyzed problems. Discovered problems are confusion caused by different interfaces at each store and the presence of unfamiliar users. The UX design direction and insight has been extracted by understanding and analyzing the needs of the user in the research process through methodology. Based on this, IoT products and applications using beacons were developed for improved service design. First, we enabled rapid application access using beacon technology. Second, the use of conversation UI provides immediate feedback that the existing kiosks were absent. Finally, it accumulates the user s purchasing database and provides quick access for the next use.

      • Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks

        Taekyoung Kwon,Jin Hong IEEE 2015 IEEE transactions on information forensics and sec Vol.10 No.2

        <P>Devising a user authentication scheme based on personal identification numbers (PINs) that is both secure and practically usable is a challenging problem. The greatest difficulty lies with the susceptibility of the PIN entry process to direct observational attacks, such as human shoulder-surfing and camera-based recording. This paper starts with an examination of a previous attempt at solving the PIN entry problem, which was based on an elegant adaptive black-and-white coloring of the 10-digit keypad in the standard layout. Even though the method required uncomfortably many user inputs, it had the merit of being easy to understand and use. Our analysis that takes both the experimental and theoretical approaches reveals multiple serious shortcomings of the previous method, including round redundancy, unbalanced key presses, highly frequent system errors, and insufficient resilience to recording attacks. The lessons learned through our analysis are then used to improve the black-and-white PIN entry scheme. The new scheme has the remarkable property of resisting camera-based recording attacks over an unlimited number of authentication sessions without leaking any of the PIN digits.</P>

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼