http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
박기웅,박규호 한국차세대컴퓨팅학회 2008 한국차세대컴퓨팅학회 논문지 Vol.4 No.2
In an attempt to achieve an efficient and secure communication in ubiquitous computing environment, we found that a proper selection of compression and encryption algorithms is a challenging issue. Compression can be beneficial to reduce the number of bits transmitted. If the energy required to compress data is less than the energy required to send it, there is a net energy savings and an increase in battery life for portable computers. On the other hand, encryption is essential operations to provide a secure communication. However, the mobile devices, usually with very limited resources and battery power, are subject to the problem of energy consumption due to compression and encryption algorithms. They consume a significant amount of computing resources such as CPU time, memory, and battery power. In this paper, we present the results of DEVS-based evaluation with symmetric key algorithms (AES, RC4) and compression algorithms (Zlib, LZO, Bzip) that are commonly suggested in terms of processing time and consumed energy.
박기웅,박규호 한국차세대컴퓨팅학회 2008 한국차세대컴퓨팅학회 논문지 Vol.4 No.2
In an attempt to achieve an efficient and secure communication in ubiquitous computing environment, we found that a proper selection of compression and encryption algorithms is a challenging issue. Compression can be beneficial to reduce the number of bits transmitted. If the energy required to compress data is less than the energy required to send it, there is a net energy savings and an increase in battery life for portable computers. On the other hand, encryption is essential operations to provide a secure communication. However, the mobile devices, usually with very limited resources and battery power, are subject to the problem of energy consumption due to compression and encryption algorithms. They consume a significant amount of computing resources such as CPU time, memory, and battery power. In this paper, we present the results of DEVS-based evaluation with symmetric key algorithms (AES, RC4) and compression algorithms (Zlib, LZO, Bzip) that are commonly suggested in terms of processing time and consumed energy.
박기웅,Park, Gi-Ung 한국작물보호협회 2010 자연과 농업 Vol.262 No.-
저항성 잡초의 발생 및 조기 확산을 방지하기 위한 재배방법이나 제초제 사용요령 등의 지속적으로 교육 홍보가 필요하며, 모니터링과 저항성 발현기작 연구 등을 통해 올바른 진단이 이루어질 수 있도록 정부는 조속히 대책을 수립해야 한다.
박기웅,Kyu Ho Park 에스케이텔레콤 (주) 2011 Telecommunications Review Vol.21 No.3
Recording and keeping account of the usage of cloud resources in a trustworthy way are vital requirement for widespread cloud deployment and availability. To provide a trustworthiness of cloud service contracts, we identified that the frequent cryptographic operations for the trustworthy contracts lead to excessive computations and a bottleneck of contract transactions. As a remedy for these limitations, we propose a trustworthy contract system for cloud computing environment. The system, which introduces the concept of a Cloud Notary Authority (CNA) for the supervision of contract, makes contract more objective and acceptable to users and cloud service providers. CNA generates trustworthy binding information that can be used to resolve future disputes between a user and a cloud service provider. Because our contract system drastically minimizes the asymmetric key operations of cloud users and service providers, it provides a level of security that is identical to that of a Public Key Infrastructure (PKI) and it minimizes the latency of contract transactions. This work was undertaken on a real cloud computing service called iCubeCloud.
Occurrence and distribution of weed species on horticulture fields in Chungnam province of Korea
박기웅,Ki Seon Hwang,Min Yong Eom,Su Hyuk Park,Ok Jae Won,In Yong Lee 한국생태학회 2015 Journal of Ecology and Environment Vol.38 No.3
A survey of weed occurrence was conducted to identify problematic weed species in a horticultural crop field to get basic information for effective weed control. Surveys of weed species occurring in horticultural crop fields (garlic, onion, red pepper and Chinese cabbage) were conducted in Chungnam province of Korea from April to October in 2014. A total of 516 sites of the 17 regions were identified as having 114 weed species belonging to 32 families. The most dominant weed species in the horticultural crop fields were Chenopodium album var. centrorubrum (8.83%), followed by Digitaria ciliaris (5.71%), Conyza canadensis (5.46%) and Capsella bursa-pastoris (4.67%). Specifically, as a result of this study, the occurrence of 35 species of exotic weeds, such as Chenopodium album and Taraxacum officinale, were confirmed. Almost 68% of the investigation sites was determined under dominance value 1 (range of cover < 10; numerous individuals) by Braun-Branquet cover-abundance scale, indicating a proper weed control in horticultural crop field. As a result of scientific and technological advances, an improved cultivation method is changing the weed occurrence in agricultural land. Additional research needs to be undertaken for the development of weed control methods through such periodic monitoring of occurrence of weeds.