http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
강희복 ( Kang Hee-bog ),김종렬 ( Kim Jong-ryeol ),강권수 ( Kang Kwon-soo ),김태훈 ( Kim Tae-hoon ),황성원 ( Hwang Soung-won ) 한국구조물진단유지관리공학회 2004 한국구조물진단유지관리공학회 논문집 Vol.8 No.2
본 연구에서는 약액주입 사질고결토에 대해 일정재하크리프시험과 반복재하크리프시험을 실시하여 점.탄소성 거동 규명과 크리프예측을 수행하였다. 일정재하크리프 시험결과 총 변형률은 탄성, 소성 그리고 점탄성변형률로 구분되었으며 이러한 변형률은 응력의 증가에 비례하여 증가하였고 회복된 변형률은 제하시간에 무관함을 알았다. 일정재하크리프시험 예측결과 일반화된 모델과 지수함수모델은 시험결과와 잘 일치하였다. 반복재하크리프시험에서 순간회복변형률은 반복횟수에 무관하였고 누적소성 변형률은 반복횟수에 따라 증가하였으며 응력레벨에 비례함을 알 수 있었다. 반복재하크리프시험의 예측결과 첫 사이클에서는 잘 일치하였으나 반복횟수가 증가함에 따라 약간의 오차가 발생되었다. A series of constant creep and repeated creep tests are performed to investigate the behavior of visco-elasto-plastic materials of chemical grouted sands. In the result of constant creep test, the material exhibits three types of shear strain : elastic, plastic, viscoelastic. The elastic, plastic and viscoelastic strains are linear, i.e., the strains are proportional to the stresses for loading. Good agreement is found between the predicted viscoelastic and test results by the power law and the generalized model. In the repeated creep test, the instantaneous recoverable strain is time-independent and the magnitude of accumulated plastic strain increases with number of cycles. Also it is seen that the accumulated plastic strains are approximately proportional to stress. There are no significant differences between test results predicted values for first cycle, and the differences increase relatively insignificantly with number of cycles.
강희복(Hee-Bog Kang),장창수(Chang-Soo Jang) 한국정보기술학회 2014 한국정보기술학회논문지 Vol.12 No.10
It becomes difficult to recognize text if the data encoding methods of the client and the server are different each other. This phenomenon often happens in the web browser, documents and text in the file name. We should consider all kinds of languages and encoding methods used in servers to recognize the encoding method applied to a web page using a web browser engine. Text cracking can happen in Hangul and Japanese using multi-byte since they assign their own language to the same character address. The FEAD (Fast Encoding Auto Detector) presented in this paper is for controlling the encoding at the side of server. We can prevent the text cracking on the web page when the information of language and encoding method is provided to the request page of clients.
문자 깨짐 방지를 위한 서버 상에서의 인코딩 자동인식 적용 방법
강희복(Hee-Bog Kang),장행천(Haeng-Cheon Jang),장창수(Chang-Soo Jang) 한국정보기술학회 2015 한국정보기술학회논문지 Vol.13 No.6
Web browsers are user selected servers that display information based responses relating to questions asked by the users. However on rare occasions, multi-byte characters which are on encoding auto detect features, can result in a malfunction of the response data, resulting in characters breakage. In this paper, we will reveal the cause of these malfunctions that occur on the client character workarounds. To further understand what causes these cracks, one must understand the purpose of FEAD(Fast Encoding Auto Detector). FEAD has the function to automatically change operations from a server to script to automatically recognize the type of data, and encoding this data to be transmitted, and resolved. This method is available on web page, strings, file name and documents.
블록체인에서 개인정보보호를 위한 멀티유저 암호 키 적용 방법 연구
강희복(Hee-Bog Kang),장행천(Haeng-Cheon Jang),장창수(Chang-Soo Jang) 한국정보기술학회 2020 한국정보기술학회논문지 Vol.18 No.1
In the blockchain, the original status of the block can be proved by digital signature, but the contents of the transactions contained in the block are visible to anyone. This paper proposes a multi-user encryption key method that, when the blockchain is applied to a shopping mall, even if the personal information is included in an open transaction, the private information cannot be decrypted except by the trading party. The symmetric key used in the AES encryption algorithm uses a multi-user encryption key consisting of a buyer ID, a seller ID, and a server ID. When this key method is used, since different symmetric keys are used for each transaction, the encrypted personal information cannot be decrypted unless it is the transaction party. In addition, unlike conventional methods that can decrypt all ciphertexts using only one symmetric key, it is necessary to use a symmetric key corresponding to the ciphertext on a case-by-case basis so that personal information can be managed more securely than before.
공개마켓 플레이스를 위한 블록체인의 RDB 구현 방법 연구
강희복(Hee-Bog Kang),장창수(Chang-Soo Jang) 한국정보기술학회 2020 한국정보기술학회논문지 Vol.18 No.4
In this paper proposes a method of constructing an RDB(Relation Database) type blockchain that has a query function and applying it to the public market. Bitcoin uses a compensation method by mining as a method for network maintenance, so the processing time is limited to 7TPS (Transaction Per Secound) rate. However, the block chain for the open market proposed in this paper is an OTPB (One Transaction Per Block) algorithm that records only one transaction per block. And without limitation on processing time the ACAB (Automatic Consensus Automatic generated Block hash value) algorithm that generates blocks without competing was applied. As a result of experimenting the file type and RDB type blockchain under the same conditions, the file type blockchain slowed down and the memory usage increased as the number of blocks increased. However, the RDB type blockchain was maintained with a constant speed and memory usage. Therefore, it was concluded that an RDB type blockchain is suitable for a complex business model.
강희복(Hee-Bog Kang),장행천(Haeng-Cheon Jang),장창수(Chang-Soo Jang) 한국정보기술학회 2019 한국정보기술학회논문지 Vol.17 No.2
In web services, persist user authentication using cookie, session and tokens. The token method is a recognizing the tampering of the signature attached to the token issued by the server on OAuth and Claim. JWT token is the standard for Claim based tokens, and IUWT token follow the JWT token form. In this paper, we propose an IUWT token authentication technology which can quickly determines whether a token is stolen by using the method of including the encrypted IP address and UUID in the token and comparing the IP address and UUID provided by the client in the server. Unlike OAuth and JWT, the forgotten token can invalidate the authentication even if the expiration period is left, and it is suitable for small-sized service that has difficulty in building security server because it does not require SSL secure communication environment.
동적최소(動的最小)제곱법(法)에 의한 정밀수준강(精密水準綱)의 조정(調整)
이계학,장지원,강희복,성수련,Lee, Kye Hak,Jang, Ji Won,Kang, Hee Bog,Sung, Soo Lyeon 대한토목학회 1988 대한토목학회논문집 Vol.8 No.2
지금까지 관측(觀測)값의 처리(處理)에 적용(適用)해 왔던 최소(最小)제곱법(法)은 정적(靜的)인 data의 처리(處理)에는 적합(適合)하나, 시간(時間)의 변화(變化)가 수반(隨伴)된 관측치(觀測値)의 처리(處理)에는 부적당(不適當)하다. 본(本) 연구(硏究)는 모든 관측(觀測)값이 시간(時間)의 함수(函數)인 것을 고려(考慮)해서 종래(從來)의 최소(最小)제곱법(法)의 일반식(一般式)에 시간(時間)의 개념(槪念)을 도입(導入)하여 동적(動的)으로 수준망(水準網)을 해석(解析)하였다. 이 경우(境遇) 관측(觀測) data를 동적최소(動的最小)제곱법(法)으로 처리(處理)한 결과(結果) 정밀(精密)한 조정(調整)값을 얻었다. The method of least squares has been applied to the static data, but it was not applications for the processing of observed values accompaning real-time variation. In this paper, having been considered all observations to be the function of time, leveling nets were analized dynamically by introducing the concept of time to conventional method of least squares. As a results, the method of dynamic least squares was well applicable to the adjustment of leveling nets.