http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
장윤식(Jang Yun Sik),김기범(Kim Gi Bum),이관희(Lee Kwan Hee) 경찰대학 경찰학연구편집위원회 2014 경찰학연구 Vol.14 No.4
This paper proposes legislative adjustment to the current Act on Promotion of Information and Communications Network Utilization and Information Protection, ect(hereafter Act on ICN) after discussing several interpretative problems regarding so called ‘hacking’, that is, intrusive acts on information and communications network prescribed on article 48 - (1) of Act on ICN. The necessity of criminal punishment against intrusive acts on information and communications network has arisen more severely as cyber security matters to a great extent in our daily lives. Criminal punishment against hacking has been more extensive since 1987 when the name of the offence was ‘intrusive and destructive acts on computer networks’ - the origin of the offense. Throughout this process, a number of problems occurred in relation to legal interest protected by the code and corpus delicti as follows;First, legal interest is not properly described in the article. Initially the article seems to protect information and communications networks owned by provider of information and communications services. However, interpretation of legal interest has gradually become blurred due to the rise of personal PC and especially smart phones. Although the extent of protection can expand by interpretational flexibility of the article considering the purpose of enactment, this interpretational measure cannot completely cover substantial difference between the extent of damage caused by infringement on computer systems of service providers and those of individuals. Second, the definition of information and communications network is not clear enough. When originally enacted, the act seemed to describe individual computer or communication network limited to specific orientations. These days, however, ‘Internet’ connects all the computers all at once, therefore, the information and communications network can easily stretches out indefinitely. Under these circumstances, the term ‘network’ in the code goes against the rule of clarity; the code cannot simply specify which network was compromised from a perpetrator’s end of the rink all the way to a victim’s. The legal statutes of the U.S., Germany and the Council of Europe(Convention on Cybercrime) use the term ‘computer’ or ‘system’ instead of ‘network’, which provides many legislative implications. Third, the concepts of access and intrusion are ambiguous. While the subject of intrusion is clearly stipulated as information and communications network, the subject of access does not exist. It could mean both: the network, the same as intrusion, and a specific piece of information within the network. Legal appraisal varies according to which approach is taken; if the subject of access is the network itself, access is the prior step to intrusion, so it can be treated as ‘attempted crime’. If it is the letter, access failure to targeted information within the network can still constitute an intrusion to network. In particular, the concept of access should be more clearly defined since it is essential to interpretation of a normative term, ’authority for access’. In order to solve aforementioned interpretative problems, several legislative amendments should be put in place. First of all, legal interest and corpus delicti ought to be set down in a more detailed matter; the article should clarify whether to protect individual PCs and smart phones. It is possible that the Act on ICN only prescribes the protection of networks owned by service providers and the others - personal gadgets - shall be covered by penal code. Or a new legislation can be enacted so as to include both subjects. Secondly, the extent of network in the article should be narrowly interpreted, and eventually the code should incorporate the terms like ‘computer’ and ‘system’ in the light of overseas cases. Finally, by clarifying the concept of access and intrusion, the same act should be treated equally in any circumstances no matter who interprets it legally.
Acetic acid수용액을 포함한 4성분계의 액-액평형
장윤식(Jang Yoon Sik),박동원(Park Dong Won) 동아대학교 해양자원연구소 1999 동아대학교 해양자원연구소 연구논문집 Vol.12 No.-
25℃에서 Acetic acid-water-binary solvent를 포함한 4성분 액-액추출계의 상평형에 대하여 연구하였다. methyl iso-butyl ketone(MIBK)-ethyl acetate을 혼합용매로 사용하였으며, 수용액으로부터 Acetic acid을 추출함에 있어서 혼합용매 사용의 효과를 고찰하기 위하여 각 4성분계에 대한 용해도곡선, tie-line, 분배도와 선택도를 측정하였다. 또한 실험에 의한 상평형 데이터를 UNIFAC 모델식으로 부터 계산된 값들과 비교하였으며, 4성분계 액-액평형에 대한 UNIFAC 모델의 적용 가능성을 확인하였다. We studied on the phase equilibria of quaternary liquid-liquid extraction system containing Acetic acid-water-binary solvent at 25℃. MIBK- ethyl acetate were used as binary solvents. Binodal curve, tie-line, distribution and selectivity for each quaternary system have been determined in order to investigate the effect of using binary solvent in extracting Acetic acid from aqueous solution.<BR> And these experimental equilibrium data were also compared with the values predicted by UNIFAC model. UNIFAC model was successfully used to predict quaternary liquid-liquid equilibria.
무선 센서 네트워크의 에너지 효율성을 고려한 MP-DD 라우팅 알고리즘
장윤식(Yoon-Sik Jang),박남규(Nam-Kyu Park),오충식(Chung-Sik Oh),최승권(Seung-Kwon Choi),이창조(Chang-Jo Lee),조용환(Yong-Hwan Cho) 한국컴퓨터정보학회 2009 韓國컴퓨터情報學會論文誌 Vol.14 No.7
본 논문의 무선 센서네트워크에서 사용할 수 있는 효율적인 라우팅 방법인 MP-DD (MultiPath-Direct Diffusion) 알고리즘을 제안한다. 기존의 DD(Directed Diffusion)에서는 하나의 경로만을 강화하여 사용하는 것과 달리 제안한 알고리즘은 다중 경로를 강화하면서, 해당 경로에 높여 있는 센서 노드의 남은 에너지 등급을 고려하여 에너지 레벨이 높은 경로에 따라 가중치를 부여하고, 몇 개의 다중경로를 이용하여 사용함으로써 에너지 소모를 감소시키고 동시에 네트워크에 전체적으로 에너지를 골고루 사용하게 할 수 있다. 시뮬레이션 결과에서는 이러한 센서 네트워크를 위한 단순한 라우팅 방법의 가능성을 증명하였다. This paper proposes efficient routing scheme named MP-DD(MultiPath-Direct Diffusion) which is simple enough to be applicable to the wireless sensor networks. Conventional DD uses only one optimal path, therefore it consumes more energy of specific nodes. MP-DD uses multiple path and has a information of hop upstream node in the direction of the base-station is determined which are obtainable via the process of self-organization of the network. Simulation results show the feasibility of the simple routing schemes for the sensor networks.