http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
金哲洙 국민대학교 종합예술연구소 2002 예술논총 Vol.5 No.-
전라남도 여수시 돌산읍에서 전라남도 고흥군 포두면에 이르기까지 총 57.80km에 10개의 연육·연도교의 형식선정과 그 디자인을 계획함에 있어 서남해안의 아름다운 해안선과 조화를 이루는 창의적이고 조형적이며 친환경적인 교량을 건설함으로써 미개발로 낙후된 이 지역을 관광자원화 한다는 것이 본 계획의 목적이다. 구체적 내용으로 이들 10개의 연육·연도교의 형태들이 일관된 조형적 특성을 갖도록 하기 위해 총체적인 디자인개념을 도입하여 각기 갖고 있는 환경적 적응성과 기능적인 특징을 고려하여 조화로우면서도 다양한 교량의 형태를 창조하며, 그렇게 함으로써 지역주민의 사용상의 편의성 증대와 함께 공공시설물로서의 활용도를 높인다.
[특집/기술해설]고품질 인터넷전화 서비스 구축을 위한 시스템 분석
김철수 대한전자공학회 2000 텔레콤 Vol.16 No.1
www의 등장 이후 인터넷이 널리 보급됨에 따라 데이터 통신망을 이용하여 기존의 PS수 전화망에서 수행되던 음성통신을 수행할 수 있는 인터넷전화 서비스가 각광을 받고 있으며, 현재 수많은 인터넷전화 업체가 보다 나은 인터넷전화 서비스를 제공하기 위해 많은 노력을 기울이고 있다. 하지만 인터넷전화는 기존의 PS수 전화가 회선교환망(Circuit Switched Networks)을 사용하는 것과는 달리 패킷교환망(Packet Switched Networks)을 이용하여 음성을 Packet 단위로 저장-전달(Store and Forward)함으로써 음성의 실시간 연속적 전달의 특성을 만족하지 못한다. 또한 방화벽(Firewall), 사설통신망(Private Network)과 같이 보안의 개념을 적용한 통신망에서 사용이 부적절하다는 특성을 가진다. 이 논문에서는 인터넷전화의 품질을 저하시키는 원인들을 찾아내어 분석하고자 한다.<br/>
Bob Doran's Fall: From the Viewpoint of Eastern Philosophy
김철수 한국제임스조이스학회 2012 제임스조이스저널 Vol.18 No.2
This paper aims to read, from the perspective of a human nature principle in Chinese Confucian philosophy, “The Boarding House,” the seventh story of Joyce’s Dubliners, which deals with the tragedy of a young man entrapped by a clever and determined mother and a perverse daughter, and then forced to face an unwanted marriage in the long run and ultimately to reconsider his naturalistic environment. In appearance, Mr Bob Doran, an industrious young man, is a victim of the three nets from which Stephen Dedalus eagerly desired to escape: nation, religion and family. That is to say, he is a helpless young man making his living as a British colonial. Also, the predicament into which he falls by his own mistake is reinforced by the implicit conspiracy between a Catholic priest and a cunning mother who wishes to help her daughter have a proper family, which she herself fails to preserve. In such an adverse environment, Bob Doran appears as a paralyzed victim, who is agonizing between fear of losing his good reputation and the prick of conscience, and finally cannot help capitulating to his own fate. Furthermore, his reappearance in Ulysses as a degraded drunkard convinces the reader of the fact that this moment is nothing but a starting point of his “fall.”It is at this moment that the concept of “fall” from the viewpoint of eastern philosophy breaks into the predicament that Bob Doran is compelled to face. According to Mencius, one of the ancient Chinese philosophers, who persists in the good human nature principle, there are four elements that cause the deterioration of the good human nature: ensnarement of heart by material desire, subservience to environment, disappearance of night influence and consequent loss of heart. Mencius maintains that the four negative elements will prevent one from cultivating the good nature endowed by the Heaven, making a person helplessly deteriorated to the level of a beast. Such an interpretation may have a possibility to distort a creative work with “scrupulous meanness” into a mere moral allegory. However, it may also be able to offer an opportunity to reterritorialize a work of a genius writer into a new world of “hybridity.”
XOR 및 스크램블 연산 기반 2단계 위상 천이 디지털 홀로그래피 기술을 이용한 계층적 암호화 시
김철수 한국멀티미디어학회 2022 멀티미디어학회논문지 Vol.25 No.8
In this paper, we implemented a hierarchical encryption system using two-step phase-shifting digital holography(PSDH) technology based on XOR and scramble operations. The proposed encryption system is a system that authenticates access through the issuance of an encryption key for access to individual laboratories, department offices, and universities. In the encryption process, we proposed a double encryption method using XOR and scramble operation with digital technology and two-step phase-shifting digital holography with optical technology. In the two-step PSDH process, an new method of determining the reference wave intensity without measuring it by using random common object image gererated from digital encryption process was also proposed. In the decryption process, the process is performed in the reverse order of encryption process. And only when the various key information used in the encryption process is correct, the encrypted information can be decrypted, so that the user can access the desired place. That is, there is a feature that can hierarchically control the space that can be accessed according to the type of key issued in the proposed encryption system. Through the computer simulation, the feasibility of the proposed hierarchical encryption system was confirmed.