http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
함정전투 시뮬레이션을 위한 HEAP 기반 지능 에이전트에 관한 연구
유용준,지승도,김재익,You, Yong-Jun,Chi, Sung-Do,Kim, Jae-Ick 한국시뮬레이션학회 2010 한국시뮬레이션학회 논문지 Vol.19 No.4
Recently the intelligent agent systems have been emerged as one of key issues for developing the defense M&S systems. However, most conventional agent architecture of M&S systems utilize the script-based models and can only deal with the individual behaviors so that they cannot suitably describe the precise tactical/strategic behavior and/or complex warfare environment. To overcome these problems, we have proposed the HEAP(Hierarchical Encapsulation and Abstraction Principle)-based hierarchical multi-agent system architecture that is able to intelligently cope with the complex missions based on the functional role of each agent on the hierarchy such as an intelligence officer, captain, commander.
인공생명 기반의 웜바이러스 모델링 및 시뮬레이선 방법론
유용준,채수환,지승도,오지연,You, Yong-Jun,Chae, Soo-Hoan,Chi, Sung-Do,Oh, Ji-Yeon 한국시뮬레이션학회 2006 한국시뮬레이션학회 논문지 Vol.15 No.4
컴퓨터 바이러스의 모델링 및 시뮬레이션에 관한 연구는 주로 네트워크 취약성 분석에 초점이 맞추어져 있었다. 그러나 컴퓨터 바이러스는 생물학적인 관점에서 분석되어 질 수 있다고 생각하여, 인공생명 기술을 이용하여 컴퓨터 바이러스를 분석하였다. 이 연구를 통해 컴퓨터 바이러스로 인해 네트워크에 미칠 영향과 행동 메커니즘을 이해할 수 있을 것이다. 본 논문에서는 인공생명을 이용한 컴퓨터 바이러스의 모델링 및 시뮬레이션 방법론을 제안한다. 이를 통해 컴퓨터 바이러스 백신의 연구에도 영향을 줄 수 있다. Computer virus modeling and simulation research has conducted with focus on the network vulnerability analysis. But computer virus shows the biological virus characters such as proliferation, reproduction and evolution. Therefore it is necessary to research the computer virus modeling and simulation using the Artificial life technique. The approach of computer modeling and simulation using Artificial life provides the analysis method about the effects on the network by computer virus and the behavior mechanism of computer virus. Hence this paper proposes the methodology of computer virus modeling and simulation using Artificial life, which is effected to contribute the research on the computer virus vaccine.
유용준,박혜진,한명월,김지원 대한후두음성언어의학회 2022 대한후두음성언어의학회지 Vol.33 No.1
Background and Objectives Cough suppression therapy (CST) is a physiotherapy that can be used for patients with chronic refractory cough (CRC). We aimed to investigate the efficacy of CST for CRC.Materials and Method A prospective randomized controlled trial was conducted in 27 patients with CRC. Participants were randomized to receive either standard mucolytic medications for CRC combined with supplemental CST (CST group) or standard medications alone (control group). CST consists of laryngeal hygiene management, humidification, cough suppression technique, breathing method, and counseling. We assessed the symptoms change at baseline and week 4 with the Leicester Cough Questionnaire (LCQ). Secondary efficacy outcomes included the degree of cough Visual Analog Scale (VAS) score (0 to 100 scale).Results From 2019 to 2021, 14 CST group patients and 13 control group patients were included. The improvement was significantly greater in the CST group than in the control group for cough VAS score (36.67 to 13.33 vs. 74.29 to 16.43, p<0.001). Patients in the CST group had a significant improvement in total (70.14 to 107.71, p=0.005), physical (31.42 to 43.86, p= 0.015), psychological (23.57 to 40.14, p=0.003), and social (15.14 to 23.71, p=0.005) LCQ scores. However, there was not a significant pre- to post-treatment LCQ score improvement in control group.Conclusion CST might be an effective supplemental intervention for CRC.
SIMVA를 이용한 시뮬레이션 기반의 네트워크 취약성 분석
유용준,이장세,지승도,You Yong-Jun,Lee Jang-Se,Chi Sung-Do 한국시뮬레이션학회 2004 한국시뮬레이션학회 논문지 Vol.13 No.3
The major objective of this paper is to analyze network vulnerabilities using the SIMVA (SIMualtion-based Vulnerability Analyzer). SIMVA is capable of monitor network status and analyze vulnerabilities automatically. To do this, we have employed the advanced modeling and simulation concepts such as SES/MB (System Entity Structure / Model Base) framework, DEVS (Discrete Event System Specification) formalism, and experimental frame for developing network security models and simulation-based analysis of vulnerability. SIMVA can analyze static vulnerability as well as dynamic vulnerability consistently and quantitatively. In this paper, we verified and tested the capability of application of SIMVA by slammer worm attack scenario.