http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Physical Threat Description of Smart Card Protection Profile in Security Level 1st
Sang-Soo Yeo,Sang-Jo Youk,Gil-cheol Park,Seok-soo Kim,Tai-hoon Kim 보안공학연구지원센터 2007 International Journal of Security and Its Applicat Vol.1 No.2
Security is concerned with the protection of assets from threats, where threats are categorised as the potential for abuse of protected assets. All categories of threats should be considered, but in the domain of security greater attention is given to those threats that are related to malicious or other human activities. ISO/IEC 15408 requires the TOE(Target of Evaluation) Security Environment section of a Protection Profile(PP) or Security Target(ST) to contain a list of threats about the TOE security environment or the intended usage of the TOE. This paper presents a specific physical threats should be considered in the smart card PP which developers of smart card PP must consider in Security Level 1st.
Design of Internet Phone (VoIP) for Voice Security using the VPN
Sang-Jo Youk,Seung-Sun Yoo,Gil-cheol Park,Tai-hoon Kim 보안공학연구지원센터 2007 International Journal of Multimedia and Ubiquitous Vol.2 No.3
The VoIP(Voice over IP) has been worldwide used and already put to practical use in many fields. However, it is needed to ensure secret of VoIP call in a special situation. It is relatively difficult to eaves-drop the commonly used PSTN in that it is connected with 1:1 circuit. However, it is difficult to ensure the secret of call on Internet because many users can connect to the Internet at the same time. Therefore, this paper suggests a new model of Internet telephone for eavesdrop prevention enabling VoIP(using SIP protocol) to use the VPN protocol and establish the probability of practical use comparing it with Internet telephone.
Kang, Sung Il,Oh, Heung-Kwon,Yoo, Jae Suk,Ahn, Soyeon,Kim, Min Hyun,Kim, Myung Jo,Son, Il Tae,Kim, Duck-Woo,Kang, Sung-Bum,Park, Young Soo,Yoon, Chang Jin,Shin, Rumi,Heo, Seung Chul,Lee, In Taek,Youk, Elsevier 2018 Surgical oncology Vol.27 No.2
<P><B>Abstract</B></P> <P><B>Background</B></P> <P>Colonic self-expanding metallic stenting (SEMS) is widely used for the treatment of malignant colonic obstruction as a bridge to elective surgery. However, the effects of colonic stenting on long-term oncologic outcomes are debatable. This study aimed to compare the long-term oncologic outcomes of preoperative SEMS insertion with those of immediate surgery in patients with obstructing left-sided colorectal cancer.</P> <P><B>Methods</B></P> <P>A cohort of consecutive patients who underwent radical surgery for obstructing left-sided colorectal cancer between 2004 and 2011 in five tertiary referral hospitals were analyzed. Long-term survivals were analyzed and adjusted using the inverse probability of treatment weighting method, based on propensity scores, to reduce selection bias.</P> <P><B>Results</B></P> <P>One hundred and nine patients underwent immediate surgery, and 226 underwent stent insertion before surgery. Disease-free survival did not differ significantly in both the unadjusted population (hazard ratio [HR] 1.063, 95% confidence interval [CI] 0.730–1.548; Log-rank, p = 0.746) and the adjusted population (HR 0.122, 95% CI 0.920–1.987; Log-rank, p = 0.122). Overall survival also did not differ significantly in both the unadjusted population (HR 0.871, 95% CI 0.568–1.334; Log-rank, p = 0.526) and the adjusted population (HR 1.023, 95% CI 0.665–1.572; Log-rank, p = 0.916). Defunctioning stoma formation was less in the SEMS insertion group than immediate surgery group (adjusted, 14.6% vs. 41.3%, p < 0.001).</P> <P><B>Conclusion</B></P> <P>The ‘bridge to surgery’ strategy using metallic stents was oncologically comparable to immediate surgery in patients with malignant left-sided colorectal obstruction.</P> <P><B>Highlights</B></P> <P> <UL> <LI> Disease-free survival rate was comparable, SEMS insertion vs. immediate surgery. </LI> <LI> Overall survival rate was comparable between the two groups. </LI> <LI> Defunctioning stoma formation was less in the SEMS insertion group. </LI> <LI> The ‘bridge to surgery’ strategy using stent insertion was oncologically acceptable. </LI> </UL> </P>
육상조,박명호,이극,Youk Sang-Jo,Park Myung-Ho,Lee Geuk 한국디지털콘텐츠학회 2003 한국디지털콘텐츠학회논문지 Vol.4 No.1
IDS(Intrusion Detection System) evasion is a technology which uses vulnerability of IDS in order not to be detected by IDS. In this paper, at first, we classify IDS evasion technology. Second, we propose detection model of IDS evasion technology. Finally, we design and implement IDS evasion detection system with packet reassemble function.
Adaptive-Binning Color Histogram for Image Information Retrieval
Seung-Sun Yoo,Yong-tae Kim,Sang-Jo Youk,Jae-Hong Kim 보안공학연구지원센터 2006 International Journal of Multimedia and Ubiquitous Vol.1 No.4
From the 90's, the image information retrieval methods have been on progress. As good examples of the methods, Conventional histogram method and merged-color histogram method were introduced. They could get good result in image retrieval. However, Conventional histogram method has disadvantages if the histogram is shifted as a result of intensity change. Merged-color histogram, also, causes more process so, it needs more time to retrieve images. In this paper, we propose an improved new method using Adaptive Color Histogram (ACH) in image retrieval. The proposed method has been tested and verified through a number of simulations using hundreds of images in a database. The simulation results have quickly yielded the highly accurate candidate images in comparison to other retrieval methods. We show that ACH's can give superior results to color histograms for image retrieval.
분류형 규칙기반을 이용한 HVAC 시스템의 고장검출에 관한 연구
유승선(Seung-sun Yoo),육상조(Sang-jo Youk),조수(Soo Cho) 한국통신학회 2007 韓國通信學會論文誌 Vol.32 No.11B
건물의 공조설비(HVAC: Heating, Ventilation and Air Conditioning)를 최적으로 운영하기 위해 현재 사용되고 있는 감시 시스템은 운영 설비의 고장이나 성능저하와 같은 결함이 발생할 경우 적절하게 고장을 검출 할 수 있는 기능이 없으며, 이에 따라 고장의 신속한 처리 및 최적 운영이 불가능하다. 이 논문에서는 특정 건물이나 시스템에서만 적용할 수 있는 모델기반 방식의 고장 검출 방법과는 달리 공조기 시스템을 구성하는 저비용이 소요되는 센서 등의 설치를 통해 건물의 공조 시스템에 포괄적으로 적용될 수 있는 분류형 규칙 기반 방식의 고장 검출 시스템을 개발하였다. 또한, 이 알고리즘을 이용한 실험 수행을 위하여 인공기후 실험 동(environment chamber, EC) 내부에 설치된 시험주택(in-house)의 공조 설비 시스템에 적용하여 그 실효성을 검증하였고 향후, 관련 분야에 적용 가능성을 확인하였다. Monitoring systems used at present to operate HVAC(Heating, Ventilation and Air Conditioning) optimally do not have a function that enables to detect faults properly when there are faults of such as operating plants or performance falling, so they are unable to manage faults rapidly and operate optimally. In this paper, we have developed a classified rule-based fault detection system which can be inclusively used in HVAC system of a building by installation of sensor which is composed of HVAC system and required low costs compare to the model based fault detection system which can be used only in a special building or system. In order to experiment this algorithm, it was applied to HVAC system which is installed inside EC(Environment Chamber), verified its own practical effect, and confirmed its own applicability to the related field in the future.
RBAC정책기반의 Rule - DB를 이용한 네트워크 침입차단 시스템 설계 및 구현
박명호(Myung-Ho Park),육상조(Sang-Jo Youk),이극(Geuk Lee) 한국정보과학회 2003 한국정보과학회 학술발표논문집 Vol.30 No.2Ⅰ
RBAC(Role-Base Access Control)은 호스트상의 유저(User)들에게 Role을 적용하여 호스트를 분산 관리하는 방식이다. 본 논문에서는 RBAC방식을 응용하여 Role을 네트워크의 호스트에 적용해서 네트워크 자원 사용에 제한을 두는 침입차단 방식을 제안한다. 그리고 Rule의 적용을 메뉴화하여 선택함으로 Rule적용의 편이성에 기여하는 불법적이고 불필요한 사용을 방어할 수 있는 네트워크 침입차단 시스템을 설계 및 구현을 한다.