http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Woongchul Choi 한국정밀공학회 2020 International Journal of Precision Engineering and Vol.7 No.4
Global climate change is affecting human life more seriously than ever before. Countries around the world have identified cars as a significant source of pollution, leading to an increased interest in eco-friendly automobiles. Electric vehicles (EVs), which are characteristically eco-friendly, have become a choice for future transportation system. In this paper, we proposed a strategy for determining the appropriate placement of large-scale charging stations using K-mean algorithm. Also, the initial results were validated utilizing actual electricity usage data from the existing chargers. Currently in Korea, a typical public charging station has two to three chargers to support EV users. As EVs become more popular, new problems arise, such as charger hopping and/or long waiting lines. In order to address these new issues, a large-scale charging station concept which houses more than ten chargers, is suggested. In doing so, a strategic approach for selecting close-to-ideal locations for the charging stations is introduced to maximize the charging station’s effectiveness. In this study, Jeju Island, Korea, which has many EVs, was used as a testbed. With the wealth of EV chargers and their usage data, initial validation of the proposed methodology was made possible. During the evaluation of the best possible locations for the largescale charging stations, we considered the locations of tourist attractions and convenient support facilities, as well as the population. After the evaluations, the proposed locations were validated using actual long-term charger usage data on Jeju Island. The demonstrated strategy for identifying appropriate locations for large-scale charging stations can be used by other tourist heavy islands or even small countries.
신웅철(SHIN, Woongchul) 한국아시아학회 2019 아시아연구 Vol.22 No.1
본 연구에서는 문화적 전환기를 맞이한 12세기의 일본에서 한자字體의 운용 실태 및 변천 양상의 일면을 파악하는 것을 목적으로 한다. 그것을 위해 해당 시기의 한자사전인 圖書寮本 『類聚名義抄』의 표제어에 실린 자체를 대상으로 이시즈카(石塚) 자체변천 모델과의 대조를 통해 고찰하였다. ‘이시즈카 자체변천 모델’은 동아시아 한자문화권에서 한자자체의 운용이 ‘초당(初唐)표준’에서 ‘개성(開成)표준’으로 이행한 것으로 파악한다. 선행연구에서는 각 표준의 지표가 되는 문헌(표준적 문헌)간에 상호비교가 가능한 212자종(字種)을 추출하여 모델의 실상을 구체적으로 실증하였다. 연구방법으로는 위의 212자종에 대응하는 도서료본 표제어 한자 151자종의 자체를 추출하여 다음과 같이 고찰하였다. 먼저 각 용례가 표제어의 배속 부수에 해당하는 글자인지에 따라 나누었다. 그리고 각 용례의 개별 자체가 초당표준과 개성표준 가운데 어느 것에 일치하는지를 검토하였다. 그 결과 다음과 같은 결론을 얻을 수 있었다. 첫째, 전체적으로 초당표준과 일치하는 자종이 85% 가량을 점하고 있어 이시즈카 자체변천 모델에서 말하는 ‘일본적 표준’의 양상과 크게 어긋나지 않는다. 둘째, 그럼에도 7% 남짓에 달하는 자종은 개성표준을 따르고 있다. 12세기는 송나라의 인쇄본이 활발히 일본으로 수입되던 시기이다. 그것에 이미 정착한 개성표준 자체가 기존의 ‘일본적 표준’에 부분적인 변화를 가져온 것으로 해석할 수 있다. The purpose of this research is to grasp the operational conditions and transitional aspects of Chinese characters in the 12th century Japan facing a cultural transformation. To accomplish the purpose as such, the glyphs of the entry words in Zushoryo-bon Ruiju Myogi Sho are examined in contrast to Ishizuka Glyph Transition Model which is regarded in Sinosphere as the glyphic operation of Chinese characters having been transferred from Early Tang standard to Kaicheng standard. The preceding studies have concretely demonstrated the actuality of the model by extracting 212 character types for the cross-comparison between the indexical manuscripts of each standard, the standard manuscripts, so to speak. Meanwhile, it has been suggested that the above mentioned model be verified also for the glyphs in the dictionary of each era. As for the methodological approach, another 151 character types corresponding to the 212 types are extracted from Zushoryo-bon Ruiju Myogi Sho entry words and investigated as follows: first, each example is classified according to whether the character corresponds to that of the heading radical, and second, it is examined whether the individual glyph of each example corresponds to Early Tang standard or Kaicheng standard. Thus, the following conclusions are obtained: first, taken as a whole, the equivalent of Early Tang standard accounts for about 85 percent, which is not really discrepant from what Ishizuka Glyph Transition Model says to be ‘Japanese Standard’, and second, even so, a little over 7 percent follows Kaicheng standard. In fact, it was the 12th century when printed copies from the Song Dynasty were actively imported into Japan. And what can be interpreted from such a socio-historical context is that the glyphs of Kaicheng standard already established in the imported copies have brought about a partial change in the existing ‘Japanese standard’.
Study on Structural and Systematic Security Threats of Vehicle Black Box as Embedded System
Jaehyun Park,WoongChul Choi 한국인터넷방송통신학회 2017 International Journal of Internet, Broadcasting an Vol.9 No.3
Recently, more users have been using IoT embedded systems. Since the wireless network function is a basic and core function in most embedded systems, new security threats and weaknesses are expected to occur. In order to resolve these threats, it is necessary to investigate the security issues in the development stages according to the Security Development Lifecycle (SDL). This study analyzes the vulnerabilities of the embedded systems equipped with the wireless network function, and derives possible security threats and how dangerous such threats are. We present security risks including bypassing the authentication stage required for accessing to the embedded system.
사례 위주로 본 공급자망을 중심으로 한 IT제품 보안 위험
최웅철,Choi, Woongchul 디지털산업정보학회 2016 디지털산업정보학회논문지 Vol.12 No.4
Before an IT product is used, there is a sequence of the process such as the components supply-demand of the product, their assembly and production, their logistics and delivery, and then finally, the product can be used by a user. During this sequence of the process, there can be many security exposures and risks. In this paper, we show, by examining security cases of various IT products, that there are many security exposures in the process of IT products from their production to their delivery to end users and in their use, and also show how critical the security exposures are. Even though there are various security theories, technologies and security controls, there is still weak link from the production of an IT product to its use, and this weak link can lead to security vulnerabilities and risks. This paper tries to call attention to the importance of the execution of the security control and the control components. We examine the practical cases to find out how the security control is paralyzed, and to show how it is compromised by asymmetric security resources. Lastly, from the cases, we examine and review the possible domestic security issues and their countermeasures.