http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
A Study of Open Source Software Pricing Decision for Value Valuation
Sangphil Kim,Chang-Hong Kim,Jong-Bae Kim 보안공학연구지원센터 2016 International Journal of Software Engineering and Vol.10 No.7
Open Source Software, OSS, is a software that can freely use, copy, release, about source code using algorithm, function and product. People are not only expected to use OSS which will play important roles in Cloud computing, big data, Internet of the Things and mobile era because unrestricted OSS’s advantage, but increasing interest of OSS value valuation. However, OSS has a characteristic of everybody that can release and share using source codes so it can’t estimate. Now, there is no standard and/or mensuration about OSS value valuation. Therefore, in this paper will estimate OSS values and compare commercial software price assessments with values on sale. Also this adapted study methods suggest a result of software values to compare analysis including suggested standard value valuation models for estimate software values. In this paper, expect that the suggested methods would help to various Open source way value valuation.
Financial Ratio Analysis and Bankruptcy Prediction
Kim, Sangphill 연세대학교 산업경영연구소 1988 산업과경영 Vol.8 No.1
In recent years, a substantial number of business failures has renewed interest in bankruptcy prediction models [13]. An accurate assessment of bankruptcy risk is essential to bank loan officers making decisions about whether or not a firm merits credit. Additionally, portfolio managers and individual investors need to be cognizant of undesirable financial risk ; corporate management would also be more effective if a reliable model were available for the prediction of financial distress.' Financial ratio analysis is a traditional tool used to assess credit worthiness. Yet, without an accurate evaluation model even experienced professionals perform poorly in the prediction of financial failure [7]. In Chapter 1, this paper will present the underlying conceptual basis and the empirical success rates reported by the Altman Z score model [2]. It will also briefly discuss the enhanced Zeta model later developed using similar techniques [4], as well as the work of other researchers who have attempted to improve upon the Altman models [8, 9, 12]. In Chapter 2, the empirical results of the Z score model for more recently bankrupt firms will be presented. The Z score model will be employed rather than the newer Zeta model due to the proprietary nature of the later model. Finally, an analysis and explanation of these results will be provided, along with a discussion of th methodology employed.
Crucial Role for Mst1 and Mst2 Kinases in Early Embryonic Development of the Mouse
Oh, Sangphil,Lee, Dongjun,Kim, Tackhoon,Kim, Tae-Shin,Oh, Hyun Jung,Hwang, Chae Young,Kong, Young-Yun,Kwon, Ki-Sun,Lim, Dae-Sik American Society for Microbiology 2009 Molecular and cellular biology Vol.29 No.23
<B>ABSTRACT</B><P>Mammalian sterile 20-like kinases 1 and 2 (Mst1 and Mst2, respectively) are potent serine/threonine kinases that are involved in cell proliferation and cell death. To investigate the physiological functions of Mst1 and Mst2, we generated <I>Mst1</I> and <I>Mst2</I> mutant mice. <I>Mst1</I><SUP>−/−</SUP> and <I>Mst2</I><SUP>−/−</SUP> mice were viable and fertile and developed normally, suggesting possible functional overlaps between the two genes. A characterization of heterozygous and homozygous combinations of <I>Mst1</I> and <I>Mst2</I> mutant mice showed that mice containing a single copy of either gene underwent normal organ development; however, <I>Mst1</I><SUP>−/−</SUP>; <I>Mst2</I><SUP>−/−</SUP> mice lacking both <I>Mst1</I> and <I>Mst2</I> genes started dying in utero at approximately embryonic day 8.5. <I>Mst1</I><SUP>−/−</SUP>; <I>Mst2</I><SUP>−/−</SUP> mice exhibited severe growth retardation, failed placental development, impaired yolk sac/embryo vascular patterning and primitive hematopoiesis, increased apoptosis in placentas and embryos, and disorganized proliferating cells in the embryo proper. These findings indicate that both Mst1 and Mst2 kinases play essential roles in early mouse development, regulating placental development, vascular patterning, primitive hematopoiesis, and cell proliferation and survival.</P>
Magnetic nanoparticle-embedded PCM nanocapsules based on paraffin core and polyurea shell
Park, Sangphil,Lee, Yeongmin,Kim, Yong Seok,Lee, Hyang Moo,Kim, Jung Hyun,Cheong, In Woo,Koh, Won-Gun Elsevier 2014 Colloids and surfaces. A, Physicochemical and engi Vol.450 No.-
We change material (PCM) nanocapsules (Mag-PCM) based on a paraffin core and polyurea shell (paraffin@polyurea). The Mag-PCM nanocapsules were synthesized via interfacial polycondensation between tolylene diisocyanate (TDI) and ethylene diamine (EDA) with various concentrations (0, 2.2, 3.7, and 4.6 wt%) of Fe3O4 nanoparticles. FTIR and TGA analyses confirmed the successful preparation of MagPCM nanocapsules. TEM and SEM images revealed that most of the Fe3O4 NPs were localized in the polyurea shell layer due to the Pickering effect. Laser flash (LFA) and DSC analyses demonstrated that the embedment of Fe3O4 NPs could increase the thermal conductivity of PCM nanocapsules and reduce the supercooling of the paraffin between bulk and nano-size confinement conditions. (c) 2014 Elsevier B.V. All rights reserved.
A Theoretical Study on Improvement of Public Delivery System According to IT Service Cost Estimation
Jin-kyung Kim,Chun-Hee Park,Nam-Yong Lee,Sangphil Kim,Jong-Bae Kim 보안공학연구지원센터 2015 International Journal of Software Engineering and Vol.9 No.8
Forecasting ordering size and performance cost correctly in the ordering of IT service projects and the initial stage of performance is a very important factor not only to the ordering body but also the company who performs the project. Middle standing IT service companies receive/perform public IT service project, substituting large companies, after 2013 amendment of Software Industry Promotion Act. However, the business competence accumulated by middle standing IT service companies is relatively insufficient in project management ability compared with large companies, and the style that project companies bear all risks of the project, such as Turn-key order in the market focused on large companies in the past, has great risk to the ordering body, project company, and service beneficiaries in quality, costs, profit and delivery date. Currently, the market centered on middle standing IT service companies deteriorates the profitability of interested parties, which makes IT service ecosystem as an element of cost increase due to reduction of ordering size, low earnings yield, and increase of management expenses. Therefore, there is necessity that the cost calculation and order style structure for IT services, in which project companies should bear all the risk of project performance, should be improved. This treatise is going to analyze the IT service market ecosystem and agreement, project performance style upon current IT service project cost calculation method based on SW lifespan process and suggest improvement methods.
The Detection Model of Malignant Query and Personal Information Leakage based on Log Analysis
Gei-Young Kim,Kyung-Jin Jung,Yongtae Shin,Sangphil Kim,Jong-Bae Kim 보안공학연구지원센터 2015 International Journal of Multimedia and Ubiquitous Vol.10 No.11
Many behaviors happen in information protection control, threatening from unauthorized change, destruction, and exposure to integrity, confidentiality, and availability of database, which is the final and core object of control. Like this it approaches database through numerous paths like many applications and home pages and execute query which search, modify, and delete the data. Some of it executes normal queries, but sometimes it maliciously executes the queries for leakage of information, and gives load to database server by executing the query which uses large amount of hardware resources. Traditionally it has limits, using only to find the reason for the problems, such as malignant queries, by collecting security log. Analyzing malignant queries and personal information leakage in diversified views through multidimensional analysis of data is necessary in order to use security log in more various ways. Therefore, this treatise is going to design multidimensional analysis modeling and suggest the technology to analyze in diversified views as an application plan of existing security log so that we can detect malignant queries and personal information leakage through security log analysis. We established the standard of analysis as follows for various analyses. First, we made linkage analysis available, which we cannot know with only simple history search, through analysis of database examination history. Second, we analyze if it repeatedly approached important table for a long time through detection of abnormal pattern or long term leakage via database abnormal access analysis. Third, we understood the flow of elements and data which weigh impact on specific database assets through database impact analysis and made analysis of database assets correlation and data flow analysis available. For analysis this treatise analyzed the log collected by using OLAP tools and used experiment data and operation data in order to verify the efficiency of database security log analysis technology suggested. Also we showed that the analysis method suggested by this treatise is excellent in availability and credibility in detection of malignant queries and personal information leakage, by comparing traditional data analysis method and the analysis method suggested by this treatise.
A Study of End-Point Agent System Model for Respond to Spear-Phishing
Chang-Hong Kim,Sangphil Kim,Jong-Bae Kim 한국정보통신학회 2015 2016 INTERNATIONAL CONFERENCE Vol.7 No.1
Recently, cyber-attack like APT (Advanced Persistent Threat) has been increased as IT technology develops. The trend of spear-phishing, which takes more than 90% of APT attack, has been changed from the previous way of attack aiming unspecified mass to target specified individuals. It is impossible to defend instantly due to spear-phishing uses complex of diverse techniques of attack. Especially, it is difficult to detect and cure with current virus vaccine if it is an attack using unknown techniques. So the scale of damage may increase. It is not easy for Individuals, who are relatively weak in security management, to avoid social technological attack compare with companies and institutions where relatively have countermeasure. The suggested model synthetically uses data encoding, blocking control application, and blocking network access to protect system, and based on the white list, works on the application control, checking validity of digital signature, protecting registry, and detecting & controlling reverse-access functions.