검색결과

검색조건
좁혀보기
검색필터
결과 내 재검색

간행물

    분야

      발행연도

      -

        검색결과 302

        123.
        2008.06 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The ubiquitous, which is developed for human's convenience, uses the concept of situation awareness that communicates with computer and performs a certain work without user's recognition. In order to collect the information of situation, many devices are required. Also, in the condition of ubiquitous middleware, priority is given to effective controls of various devices. There are many devices for collecting the information of situation awareness such as sensor, RFID, etc. Among them, in the use of RFID, the researcher performed the experiment, in which multiple readers were used depending on the necessity of awareness information, and found the problem of intervention between readers occurring when multiple readers are used. The paper handles the problem of intervention causing from using multiple readers and suggests middleware design module using session manager to solve the problem.
        4,000원
        125.
        2007.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        6,100원
        128.
        2007.06 KCI 등재 구독 인증기관 무료, 개인회원 유료
        Payment and security requirement are playing an increasingly critical role in RFID system, allegedly the core of the ubiquitous, especially in logistics. Therefore, security technology has been playing essential role gradually unlike the past when only the perception of equipment was considered important technology. The current encoding system allows the access only to the user who has the secret key. Many encoding algorithm has been studied to ensure the security of secret key. Security protocol is the most typical way to authorize appropriate user perception by using the data and secret key to proceed the encoding and transmit it to the system in order to confirm the user. However, RFID system which transmits more than dozens of data per second cannot be used if the algorithm and protocol of the existing wired system are used because the performance will degrade as a consequence. Security protocol needs to be designed in consideration of property of RFID and hardware. In this paper, a protocol was designed using SNEP(Sensor Network Encryption Protocol), the security protocol used for the sensor similar to RFID- not the current system used in wired environment- and ECC (Elliptic Curve Cryptography: oval curve encoding), the encoding algorithm.
        4,000원
        130.
        2007.03 KCI 등재 구독 인증기관 무료, 개인회원 유료
        본 연구는 소 체외 수정란의 팽창 및 hatching시 prostaglandin 와 prostaglandin 의 영향에 대하여 검토하였다. 체외 수정란의 체외 배양시 다음과 같이 (1) 0, 1, 10 및 100ng/ml , (2) 0, 1, 10 및 100ng/ml , (3) low (1ng/ml : 1ng/ml), (4) low , (5) high (10ng/ml : 1ng/ml), (6) high : high (10ng/ml : 10ng/ml)로
        4,000원
        132.
        2006.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        RFID/USN is important infrastructure of the ubiquitous society. And so, It is various and practical research is attempted. These two base technology have physical characteristic and complement relationship. Like this relationship is applied Following example that is system research which manages warehouse stocks and conditions. First, We adhere RFID Tag at the Pallet of the warehouse and do identification goods. And then, It grasps the environment state information of stocks with sensor module which has Zigbee wireless communication function. From like this process RFID Tag information and jop-control command of sensor node also it is exposed to air. Therefore, We control sensor node in USN/RFID environment through the mobile device. And system design for the security Apply of the process is main purpose of this paper's. We propose the condition and function of the mobile device to the secondary. And We define the relation of the sensor node with RFID to be arranged to a warehouse. Finally, This paper is designed to find a trade-off of the following viewpoints. First, We offer suitable sensor-control information to a actual manager. Second, We offer RFID tag security approach to control the action of the sensor. Third, It increases the survivability of sensor node form.
        5,200원
        133.
        2006.10 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The present study is to analyze the thermoelectric properties of thermoelectric materials fabricated by the mechanical grinding process. The powders were prepared by the combination of mechanical milling and reduction treating methods using simply crushed pre-alloyed powder. The mechanical milling was carried out using the tumbler-ball mill and planetary ball mill. The tumbler-ball milling had an effect on the carrier mobility rather than the carrier concentration, whereas, the latter on the carrier concentration. The specific electric resistivity and Seebeck coefficient decreased with increasing the reduction-heat-treatment time. The thermal conductivity continuously increased with increasing the reduction-heat-treatment time. The figure of merit of the sintered body prepared by the mechanical grinding process showed higher value than one of the sintered body of the simply crushed powder.
        4,000원
        134.
        2006.06 KCI 등재 구독 인증기관 무료, 개인회원 유료
        최근 FRP Plate를 이용한 철근콘크리트 구조물의 보수보강 방법으로 많은 연구가 수행되어 왔다. 이러한 FRP Plate로 보강된 구조물의 경우 보강재 단부의 조기탈락에 대한 문제점이 많은 연구를 통하여 지적되었다. 본 논문은 이러한 보강재 단부의 조기탈락에 대한 대안으로 CFRP Plate 외부부착공법에 있어서 단부를 보강철물을 이용하여 2차적으로 보강하는 방법 및 CFRP-Rod 표면매립공법으로 횝 보강된 철근콘크리트 보의 구조적 거동 및 휨 보강 성능을 파악하는데 그 목적이 있다. 또한 보강 방법에 따른 효과적인 휨 보강 성능을 파악하기 위하여 CFRP Plate 외부부착공법과 CFRP-Rod 표면매립공법을 실험을 통하여 이를 비교 고찰하여 휨 보강 성능효과를 알아본다.
        4,000원
        136.
        2006.03 KCI 등재 구독 인증기관 무료, 개인회원 유료
        Recently, a bioactive foam reactor (BFR) using a surfactant and suspended microorganisms has been suggested as an suitable alternative to conventional packed-bed biofilters. This study was conducted to demonstrate the feasibility of applying the BFR using styrene as a model compound and investigate the effect of the gas residence time on mass transfer and biodegradation rates. At a gas residence time of 40 seconds, the BFR achieved high styrene removal efficiencies greater than 80%, but the biodegradation rate controlled the overall efficiency as the styrene inlet concentration increased. Meanwhile, at a gas residence time of 20 seconds, the change of the styrene removal efficiency was less sensitive to the inlet styrene concentration, indicating the BFR system was operated under the mass transfer limited condition. Therefore, the mass transfer rate needs to balance with the biodegradation rate in the BFR system, and the foam stability had a significant effect on the mass transfer. In the BFR, the maximum elimination capacity was found to be 117 g/㎥/hr, which was higher than those reported in the literature. This finding indicates that the BFR can be an efficient method for the treatment of various VOCs and expand an application range of biological processes.
        4,000원
        139.
        2004.09 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The soaring increase in the number of Internet users combined with the constant computerization of business process has created new opportunities for computer criminals and terrorist. Fortunately, the computer security field is also progressing at a brisk rate. In particular, the field of computer forensics brings new ways of preserving and analyzing evidence related to computer crime. Computer forensics is a new emerging professions of the 21st century. It is the collection, preservation, analysis, and presentation of computer related evidence. For this reason, the various technology of computer forensics is regarded as a powerful tool for suppressing computer crime. Our aims is to introduce the overview of computer forensics technology. We also present the survey results of the state of the art of computer forensics in the domestics and of foreign country.
        4,200원
        140.
        2004.09 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The existing PKI authentication structure uses the OCSP method. The primary task of OCSP is to verify the status of a transaction after verifying the validity of the certificate; but, because of continuing policy changes and updates within the PKI authentication method, the status of certificates and the structures are not consistent. Therefore, the SCVP method can be selected as the broadest method for completing authentication tasks accurately because the SCVP method includes validation of policy changes. An appropriate method for building an mobile environment within the capabilities of low-memory and reduced processing CPU needs to be assessed and developed. This thesis proposes a verification method that is independent of platform and applicable to any 05 in building and expanding the mobile environment.
        4,600원