RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 음성지원유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • 브로드캐스트 암호화를 이용한 콘텐츠 제공에 관한 연구

        이덕규,이임영 순천향대학교 부설 산업기술연구소 2004 순천향 산업기술연구소논문집 Vol.10 No.2

        The method of broadcast encryption has been applied to the transmission of digital information such as multimedia, software, and paid TV on the open network. In this broadcast encryption method, only previously authorized users can gain access to digital information. When broadcast message is transmitted, authorized users can first decode the session key using the previously given private key and get digital information using this session key. This way, users retrieve a message or a session key using the key transmitted by broadcasters. For their part, broadcasters need to generate and distribute keys. Broadcasters should also carry out efficient key renewal when users subscribe or un-subscriver. In this paper use a broadcast, and present the DRM model, using that look into the requirement about the contents and apply also the concept of a broadcast encryption. We offer the authority to copy as the number of reproduction to want to the user, and the low so that we were convenient because we used.

      • KCI등재

        임피던스 방법을 이용한 뇌혈류량 측정기기의 개발(Ⅰ)

        김덕원,김정래,송철규,김정열,남문현 대한의용생체공학회 1989 의공학회지 Vol.10 No.1

        In this study, Rheoencephalography(REG) was designed and constructed. Using the constructed instrument cerebral blood flow(CBF) of left and right brain, CBF change by posture, and reproducibility were studied. Followings are important results. Relative CBF could be measured noninvasively and continuously. Since reproducibility of the constructed REG was found to be quite high (4 %), the accuracy of the instrument itself was proved. REG can be easily applied for testing the effect of drugs for the patients with cerebral vessel diseases since it is quite sensitive to the relative changes of CBF. Various cerebral diseases can be diagnosed by analyzing the REG waveforms. The area of restricted cerebral blood vessels can be located by arranging the electrode configuration. Comparative studies with the standard techniques of measuring CBF are needed to verify the accuracy of REG. Further studies on optimal electrode configuration and various artifacts are also necessary.

      • 국균세포벽을 모델로 한 새로운 고정화담체의 개발

        유은정,김종덕,송상호,임현수,최명락,정규화 여수대학교 1997 論文集 Vol.11 No.2

        The purpose of this investigation was to develop a new carrier using chitin and glucan as the model for Aspergillus oryzae cell wall. In case of the ratio of chitin and glucan(3/1), the activity of the immobilized protease had higher than that of model(chitin/glucan=1/3) and carriers were formed gel. In case of soluble chitin and glucan treated with calcium carbonate, there were a 1.8-fold increase in activity of immobilized protease compared with untreated chitin. The scanning electron microscope image showed that a pore size of this carrier had a homogenized pore size and a smooth surface.

      • 고등학교 각 교과서에 수록된 專門用語(漢字語)의 語源解讀을 통한 학습능력 신장 방안 연구 : 고등학교 국어(상) 교과서를 중심으로

        오종일,정인덕,심규정 전주대학교 교육문제연구소 2000 敎育論叢 Vol.15 No.-

        학생들이 교과서를 학습하는 주된 목표는 그 문장의 문맥과 의미를 파악하는 것이기 때문에 우리는 漢字의 숙지실태 측정위주가 아닌 용어의 뜻의 정확한 이해여부를 측정하는데 주안점을 두었다.

      • 연약한 점성토 지반의 지지력 결정에 관한 연구

        안종필,박상범,김규덕 朝鮮大學校 建設技術硏究所 2004 建設技術硏究 Vol.24 No.2

        To find out the variation of bearing capacity due to the plasticity of soils in case of working the unsymmetrical surcharge of ML, CL, and CH, the existing theoretic expression were investigated and were compared with a series of test results The critical surcharge of soft soils was found as q_(cr)=4.22C_(u) in ML, which is slightly larger than the existing expression, but similar to Darragh's expression. The critical surcharge in CL was found as q_(cr)=3.21C_(u), which is the value between JHI and Jaky and in CH was found as qcr=2.60C_(u), which is a the value between Tachebotarioff and Meyerhof. The ultimate bearing capacity of soft soils was found as q_(uIt) = 11.19C_(u) in ML, which was significantly larger than the existing expression. The ultimate bearing capacity of CL was found as q_(ult)=8.41C_(u), which was slightly bigger than the existing expression, but is close to Meyerhof's expression. The ultimate bearing capacity in CH was found as q_(uIt) =4.73C_(u), which is similar to Parndtl's expression.

      • A DRM Model for Copyrights Protection based on Hiding Information

        Deok Gyu Lee,Jianhua Ma 보안공학연구지원센터 2006 International Journal of Multimedia and Ubiquitous Vol.1 No.4

        There have been researches into digital watermarking technology or Fingerprinting vigorously to safeguard 'Protective rights for knowledge and poverty' for digital contents. DRM, Digital Rights Management, is not only 'Protective rights for knowledge and poverty', but also management and systems that are necessary to put out, circulate and use for contents. This technology, DRM, encrypts contents to protect digital contents and they are sold users on. Sellers transmit contents with 'Usage Right' and a license including a key of encryption. The key of encryption decodes encoded files. The right of usage restricts users' application of contents. Even if digital contents that are applied the DRM are coped illegally and circulated, contents will be protected from that because a player of DRM checks existence of licenses and allows contents to be restored. However, this method might cause users to feel inconvenient since the users can only restore contents through the licenses offered by a player or a Smartcard. If radio as well as cable is used popularly in the future, there will be a lot of limits to use those kinds of players. In the method of that, the method using players need different players in order to work successfully in wired and wireless environment. In the case of using Smartcards, there might be a dangerous situation when the Smartcards disappeared. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

      • Detection of Potato virus Y (PVY) from a Single Aphid by One-Step Rt-Pcr Using Boiling Extraction Method

        Deok Jea Cha,Ju Il Kim,Min Kwon,Yong Gyu Lee 한국응용곤충학회 2014 한국응용곤충학회 학술대회논문집 Vol.2014 No.10

        PVY (Potyviridae: potyvirus) is one of the most important potato virus affecting seed potato production and also it is transmitted non-persistently via aphids. For healthy seed potato production, a virus detection system is highly important in addition to aphid monitoring and control. To achieve this detection method, it need to fast and easy to use. About two decades ago RT-PCR based PVY detection method was developed. However that was very time consuming and has low sensitivity. Here, we developed an advanced PVY detection method which a uses the boiling extraction of the viral RNA from aphid stylet and amplification by specific primers located in the viral capsid protein gene. Therefore, it could directly synthesize cDNA of PVY viral capsid gene from extracted RNA of PVY using one-step RT-PCR method in very short time compared to previous methods due to the omission of RNA extraction step. We confirmed this PVY detection method using the two aphid species (Macrosiphum euphorbiae and Aphis gossypii) that known as PVY vectors. The efficiency of this PVY detection method was 60% to 80% from two the aphid species. Hence, this method could be potentially applied to virus free seed potato production programs.

      • Software Engineering for Security : Towards Secure Software Architecture

        Deok Gyu Lee,Rosslin John Robles,Dong-Ju Kang,Jong Wook Han 한국멀티미디어학회 2008 한국멀티미디어학회 학술발표논문집 Vol.2008 No.1

        Most software systems today are related to distributed systems. And because of it, security has been an issue of immense concern. As practiced before, security is incorporated in a software system after all functional requirements have been finished. This paper discusses the need of incorporating security concerns in the software development life cycle. We survey different research areas that are concerned in the merging of software engineering and security. The paper focuses on the use of software architecture to solve problems regarding engineering of secure systems.

      • SCIESCOPUSKCI등재

        Intestinal Nematodes from Small Mammals Captured near the Demilitarized Zone, Gyeonggi Province, Republic of Korea

        Deok-Gyu Kim,Jae-Hwan Park,Jae-Lip Kim,Bong-Kwang Jung,Sarah Jiyoun Jeon,Hyemi Lim,Mi Youn Lee,Eun-Hee Shin,Terry A. Klein,Heung-Chul Kim,Sung-Tae Chong,Jin-Won Song,Luck-Ju Baek,Jong-Yil Chai 대한기생충학열대의학회 2015 The Korean Journal of Parasitology Vol.53 No.1

        A total of 1,708 small mammals (1,617 rodents and 91 soricomorphs), including Apodemus agrarius (n = 1,400), Microtus fortis (167), Crocidura lasiura (91), Mus musculus (32), Myodes (= Eothenomys) regulus (9), Micromys minutus (6), and Tscherskia (= Cricetulus) triton (3), were live-trapped at US/Republic of Korea (ROK) military training sites near the demilitarized zone (DMZ) of Paju, Pocheon, and Yeoncheon, Gyeonggi Province from December 2004 to December 2009. Small mammals were examined for their intestinal nematodes by necropsy. A total of 1,617 rodents (100%) and 91 (100%) soricomorphs were infected with at least 1 nematode species, including Nippostrongylus brasiliensis, Heligmosomoides polygyrus, Syphacia obvelata, Heterakis spumosa, Protospirura muris, Capillaria spp., Trichuris muris, Rictularia affinis, and an unidentified species. N. brasiliensis was the most common species infecting small mammals (1,060; 62.1%) followed by H. polygyrus (617; 36.1%), S. obvelata (370; 21.7%), H. spumosa (314; 18.4%), P. muris (123; 7.2%), and Capillaria spp. (59; 3.5%). Low infection rates (0.1-0.8%) were observed for T. muris, R. affinis, and an unidentified species. The number of recovered worms was highest for N. brasiliensis (21,623 worms; mean 20.4 worms/infected specimen) followed by S. obvelata (9,235; 25.0 worms), H. polygyrus (4,122; 6.7 worms), and H. spumosa (1,160; 3.7 worms). A. agrarius demonstrated the highest prevalence for N. brasiliensis (70.9%), followed by M. minutus (50.0%), T. triton (33.3%), M. fortis (28.1%), M. musculus (15.6%), C. lasiura (13.2%), and M. regulus (0%). This is the first report of nematode infections in small mammals captured near the DMZ in ROK.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼