http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
권혁찬,문용혁,구자범,고선기,나재훈,장종수,Kwon, H.C.,Moon, Y.H.,Gu, J.B.,Kho, S.K.,Nah, J.H.,Jang, J.S. 한국전자통신연구원 2007 전자통신동향분석 Vol.22 No.1
초기에 P2P가 등장할 때만 해도 저작권, 보안 등의 문제 등으로 인해 ‘문제아’ 정도로 인식되었던 것은 사실이다, 그러나 최근 들어서는 P2P를 응용 인프라 구축을 위한 하나의 통신계층으로 보는 시각이 등장할 정도로 인터넷에서 매우 대중화된 서비스가 되어 버렸으며, 실제로 VoIP, video streaming, game 등 매우 다양한 응용의 인프라로 P2P가 사용되고 있다. 본 고에서는 이러한 P2P에 대한 표준화 및 기술 동향, 보안 취약성 및 대응 기술 등을 살펴본다.
권혁찬,이석준,최중용,정병호,이상우,나중찬,Kwon, H.C.,Lee, S.J.,Choi, J.Y.,Chung, B.H.,Lee, S.W.,Nah, J.C. 한국전자통신연구원 2018 전자통신동향분석 Vol.33 No.1
As the traffic environment gradually changes to autonomous driving and intelligent transport systems, vehicles are becoming increasingly complicated and intelligent, and their connectivity is greatly expandinged. As a result, attack vectors of such vehicles increasing, and security threats further expanding. Currently, various solutions for vehicle security are being developed and applied, but the damage caused by cyber attacks is still increasing. In recent years, vehicles such as the Tesla Model S and Mitsubishi Outlander have been hacked and remotely controlled by an attacker. Therefore, there is a need for advanced security technologies to cope with increasingly intelligent and sophisticated automotive cyber attacks. In this article, we introduce the latest trends of autonomous vehicles and their security threats, as well as the current status and issues of security technologies to cope with them.
권혁찬,정병호,문대성,김익균,Kwon, H.C.,Chung, B.H.,Moon, D.S.,Kim, I.K. 한국전자통신연구원 2021 전자통신동향분석 Vol.36 No.5
Ransomware attacks, such as Conti, Ryuk, Petya, and Sodinokibi, that target medical institutions are increasing rapidly. In 2020, in the United States., ransomware attacks affected over 600 separate clinics, hospitals, and organizations, and more than 18 million patient records. The cost of these attacks is estimated to be almost $21 billion USD. The first death associated with a ransomware attack was reported in 2020 by the University Hospital of Düesseldorf in Germany. In the case of medical institutions, as introduced in the Medjack report issued by TrapX Labs, in many cases, attackers target medical devices that are relatively insecure and then penetrate deep into more critical network infrastructure, such as EMR servers. This paper introduces security vulnerabilities of hospital medical devices, considerations for ransomware response by medical institutions, and related technology trends.
동작분석시스템을 이용한 보행보조차 보행 시 하지부의 생체역학적 영향 분석
권혁찬(H. C. Kwon),최세린(S. R. Choi),조유라(Y. R. Cho),이현주(H. J. Lee),태기식(K. S. Tae) 한국재활복지공학회 2018 재활복지공학회논문지 Vol.12 No.4
보행보조차는 노인이나 신경질환 환자의 균형 증대나 보행 근육강화의 목적으로 사용된다. 본 연구에서는 보행보조차가 보행에 미치는 생체 역학적인 영향을 알아보기 위하여 관절의 각도, 모멘트, 근 활성도를 분석하고 자 하였다. 10명의 정상인을 대상으로 일반보행과 보행보조차를 이용한 보행을 비교하기 위하여 동작분석장치 및 근전도 시스템을 이용하여 실험하였다. 보행보조차 보행 시 엉덩관절은 전두면에서 외전이 증가하였고, 시상면에서는 굴곡이 증가하였다. 발목관절과 무릎관절에서는 배측굴곡과 굴곡이 각각 감소하였고, 고관절에서는 외전 모멘트가 유의하게 감소하였으며(p<0.05) 무릎관절 또한 유의한 신전 모멘트 감소를 보였다 (p<0.001). 근육활성도에서는 보행보조차 보행 시 하지의 대퇴직근(rectus femoris), 전경골근(tibialis anterior), 넙다리 두갈래근(biceps femoris), 외측비복근(gastrocnemius) 모두에서 감소를 보였다. 본 연구를 통해 보행보조차를 이용한 보행의 생체역학적 영향에 대한 기초자료로 사용될 수 있을 것으로 사료된다. Rollator is helping walk that elderly or neurological disease patient are mainly used for balance or strength training. Therefore in this study we analyzed the angle of the joint and moment and electromyogram using motion analysis and electromyography(EMG) equipment to investigate the biomechanical effects. 10 healthy subjects were walked without and with rollator. During the rollator walking hip joints were more adducted in frontal plane and more flexed in sagittal plane. Ankle joints and knee joint were reduced dorsiflexed/flexed with rollator walking. Hip moment were significantly decreased abduction moments in frontal plan (p<0.05). Ankle moments were increased plantar flexion moment and knee moments were significantly reduced extension moments(p<0.001). During rollator walking electromyograms in rectus femoris (RF), tibialis anterior (TA), biceps femoris (BF) and gastrocnemius(GM) were smaller than normal walking. In the future the experiments will investigate other people who have neurological disease and elderly to know about the effects of rollator walking.
이용호(Y. H. Lee),권혁찬(H. C. Kwon),김진목(J. M. Kim),임청무(C. M. Lim),이상길(S. K. Lee),박용기(Y. K. Park),박종철(J. C. Park) 한국자기학회 1996 韓國磁氣學會誌 Vol.6 No.4
A magnetically shielded room has been constructed for biomagnetic applications. The room has internal dimensions of 2 m(length)×2 m(width)×2.5 m(height) and it consists of high permeability Mumetal and high conductivity aluminum, utilizing ferromagnetic shielding and eddy current shielding. The dc shielding factor around the center of the room is above 60 ㏈, and the ac shielding factors at 1 and 10 ㎐ are larger than 60 and 80 ㏈, respectively. The internal magnetic field noise at 1 ㎐ is 500 fT/√㎐ and at 10 ㎐ is 100 fT/√㎐, and the field gradient noise at 1 ㎐ is below 7 fT/㎝√㎐. Successful measurements of cardiomagnetic fields using SQUID magnetometer and neuromagnetic fields using SQUID gradiometer have been done.
심전도(Electrocardiogram) 신호를 이용한 생체암호시스템 기술 동향
정병호,권혁찬,박종근,B.H. Chung,H.C. Kwon,J.G. Park 한국전자통신연구원 2023 전자통신동향분석 Vol.38 No.5
We investigated technological trends in an electrocardiogram (ECG)-based biometric cryptosystem that uses physiological features of ECG signals to provide personally identifiable cryptographic key generation and authentication services. The following technical details of the cryptosystem were investigated and analyzed: preprocessing of ECG signals, extraction of personally identifiable features, generation of quantified encryption keys from ECG signals, reproduction of ECG encryption keys under time-varying noise, and new security applications based on ECG signals. The cryptosystem can be used as a security technology to protect users from hacking, information leakage, and malfunctioning attacks in wearable/implantable medical devices, wireless body area networks, and mobile healthcare services.