http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
任洪彬,金澤基,金振淳,盧泰天 충남대학교 공업교육연구소 1984 論文集 Vol.7 No.1
In order to find the effective teaching method of the natural science subjects in the university level, the project method wsa applied to the actual university classes as a experimental basis. The experimented subjects were "Teaching Method in the Industrial Education"of 3 classes, and "Manufacturing Practices"of 2 classes. The findings of this study are summarized as follows; 1. The project method gives the students much learing motivations and cooperative working habits. 2. The project method gives the students problem solving abilities through creativity and thinking power. 3. The project method is better than the course method in terms of learning content understanding and time utilization of the students. 4. The projet method is not suitable to the class which has a large number of students. 5. The problem level of project should be fitted to the time duration and the level of student' s ability. 6. The more studies are needed in order to generalize the project method to the other subjects.
정태영(Tae-Young Jeong),임강빈(Kang-Bin Yim) 한국정보보호학회 2008 정보보호학회논문지 Vol.18 No.4
본 논문은 문자열 기반 패스워드 인증에서 키보드 감시 문제를 유발하는 하드웨어 취약점에 대한 효과적인 대응방안을 제안한다. 악의적인 공격자가 해당 취약점을 이용하면 기존의 보안 소프트웨어가 실행되고 있는 상황에서도 키보드로부터 입력되는 사용자의 모든 문자열을 탈취할 수 있었으나 본 논문에서 제시하는 방안을 활용하면 공격자가 키보드 감시에 성공한다 하더라도 사용자의 입력 문자열을 온전히 탈취할 수 없다. 따라서 제안한 방안을 구현하여 적용하면 보다 안전한 인터넷 기반 금융거래가 가능해질 것으로 사료된다. This paper proposes an effective countermeasure to an intrinsic hardware vulnerability of the keyboard controller that causes sniffing problem on the password authentication system based on the keyboard input string. Through the vulnerability, some possible attacker is able to snoop whole the password string input from the keyboard even when any of the existing keyboard protection software is running. However, it will be impossible for attackers to gather the exact password strings if the proposed policy is applied to the authentication system though they can sniff the keyboard hardware protocol. It is expected that people can use secure Internet commerce after implementing and applying the proposed policy to the real environment.
영상 감시용 네트워크카메라의 서비스 품질 향상을 위한 영상분배서버 구현
정태영(Tae-Young Jeong),임강빈(Kang-Bin Yim) 대한전자공학회 2008 電子工學會論文誌-TC (Telecommunications) Vol.45 No.9
본 논문은 네트워크카메라 기반 영상감시시스템에서 발생하는 단위 네트워크 간 영상정보 공유 불가, 사용자 증가에 따른 대역폭 및 처리부하 증가, 네트워크 변경내역 지속적 모니터링 불가 등의 문제를 해결하기 위한 서버의 구조를 제안하고 이를 설계 및 구현하였다. 제안한 서버는 영상분배 기능을 제공함으로써 기존의 문제들을 해결하면서도 대용량 영상감시시스템을 위하여 다수의 네트워크카메라 및 다수의 사용자에 대한 관리와 서비스가 가능하도록 설계되었다. 구현한 영상분배서버를 실제의 영상감시시스템에 적용하여 실험한 결과 100여대의 네트워크카메라에 대한 접속을 유지하는 상황에서 수백여 사용자의 동시 접속을 처리하면서도 납득할 만한 서비스 품질을 유지함을 확인하였다. 본 논문의 영상분배서버를 활용하면 교통상황 정보 및 재난재해 감시 등의 대국민 서비스를 위한 대용량 영상감시시스템의 서비스 품질 향상에 기여할 것으로 기대된다. This paper proposes, designs and implements an architecture of a server involved with the network camera based video surveillance systems to solve common problems including lack of inter-network operability at the video information sharing, drawback of bandwidth and processing-overhead caused by increase of the number of users, and difficulty of continuous monitoring over changes of network configurations. The proposed server was designed to manage and service numerous network cameras and users as well as solving the existing problems by providing video distribution facility. Through the empirical study after applying the implemented server to a real video surveillance system we proved that the server can provide reasonable service quality while it processes several hundreds of simultaneous user connections under persisting more than one hundred connections to network cameras. We expect the developed video distribution server to enhance service quality of the large scale video surveillance systems for citizen-wide services such as traffic reporting informatics or natural calamities supporting.
Diagnostic accuracy of PET/CT in early stage ovarian cancer: comparison between PET/CT and CT or MRI
( Yu Bin Lee ),( Hyun Jong Park ),( Ga Won Yim ),( Sung Hoon Kim ),( Sang Wun Kim ),( Young Tae Kim ),( Jae Wook Kim ),( Eun Ji Nam ) 대한산부인과학회 2012 대한산부인과학회 학술대회 Vol.98 No.-
The purpose of this study was to compare the diagnostic accuracy of positron emission tomography/computed tomography (PET/CT), abdomino-pelvic computed tomography (CT), and pelvic magnetic resonance imaging (MRI) for detection of early stage ovarian cancer. Medical record of 140 women who underwent PET/CT scanning with suspected early stage ovarian cancer (stage 1-2) from July 2005 to February 2012 was retrospectively reviewed. Preoperative CT, MRI, and PET/CT findings were compared with histopathologic results obtained from the surgery. The accuracy of each modality in detection of malignancy was evaluated by computing the relevant areas under a receiver operating characteristics(ROC) curve and comparisons of the area under the curve (AUC) according to the modality (MedCalc® version 9.6.3.0, Broekstraat 52, 9030 Mariakerke, Belgium). Histopathology showed 7 cases of benign tumors, 23 cases of borderline tumors, and malignant tumors in 110 cases. In detecting malignant lesions in the ovaries and the adnexa, the sensitivity, specificity, positive predictive value (PPV), and negative predictive value (NPV) of PET/CT were higher than the corresponding values of CT or MRI. In discriminating between cases of benign/borderline and malignant, the accuracy of PET/CT (0.760) trended higher than that of CT or MRI (0.585). PET/CT is more accurate than abdomino-pelvic CT or pelvic MRI in diagnosis of early stage ovarian cancer and in differentiating between cases of benign/borderline and malignant ovarian tumors.
광 네트워크에서의 도메인 분리에 의한 효율적인 보호복구
임순빈 ( Soon Bin Yim ),안현기 ( Hyun Ki An ),이태진 ( Tae Jin Lee ) 한국정보처리학회 2005 정보처리학회논문지 C : 정보통신,정보보안 Vol.12 No.1
Protection of user service becomes increasingly important since even very short interruption of service due to link or node failure will cause huge data loss and incur tremendous restoration cost in high speed network environment. Thus fast and efficient protection and restoration is one of the most important issues to be addressed. Protection methods have been proposed to provide efficiency and stability in optical networks. In this paper, an original network is separated into several domains using Hamiltonian cycle, and link protection is performed on the cycle of the domains. We have shown that protection path length can be decreased up to 57% with marginal increase of backup capacity. Our proposed method can provide high-speed protection with marginal increase of protection capacity.