검색결과

검색조건
좁혀보기
검색필터
결과 내 재검색

간행물

    분야

      발행연도

      -

        검색결과 41

        1.
        2017.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        In the 21st century, information and communication technology (ICT) worldwide presents a new vision for agriculture. Time and place, as well as the high-tech industry, to overcome barriers to the fusion of the so-called "smart agriculture," are changing the agricultural landscape. Core container production in precision agriculture for mushroom cultivation, optimal temperature, humidity, irradiation, self-regulation of factors such as carbon dioxide, and environment for mushroom cultivation were adopted. Lentinula edodes (shiitake) is an edible mushroom native to East Asia, cultivated and consumed in many Asian countries. It is considered to be medicinal in certain practices of traditional medicine. We used different controlled light sources (Blue-Red-White-combined LED, blue LED, red LED, and fluorescent light) with different LED radiation intensities (1.5, 10.5, and 20.5 μmol/㎡s for LEDs) to compare growth and development. Mushrooms were treated with light in a 12-hour-on/ 12-hour-off cycle, and maintained in a controlled room at 19~21°C, with 80~90% humidity, and an atmospheric CO2 concentration of 1,000 ppm for 30 days. Growth and development differed with the LED source color and LED radiation intensity. Growth and development were the highest at 10.5 μmol/㎡s of blue LED light. After harvesting the fruit bodies, we measured their weight and length, thickness of pileus and stipe, chromaticity, and hardness. The 10.5 μmol/㎡s blue-LED-irradiated group showed the best harvest results with an average individual weight of 39.82 g and length of 64.03 mm, pileus thickness of 30.85 mm and pileus length of 43.22 mm, and stipe thickness of 16.96 mm with fine chromaticity and hardness. These results showed that blue LED light at 10.5 μmol/㎡s exerted the best effect on the growth and development of L. edodes (shiitake) mushroom in the ICT-system container-type environment.
        4,000원
        2.
        2016.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        Drought is one of important environmental stress for plant. Drought has deleterious effect to plant growth including maize (Zea mays L.) such as vegetative and/or reproductive growth, root extension, photosynthesis efficiency, flowering, anthesis-silking interval (ASI), fertilization, and grain filling. In this study, we screened drought tolerant maize in 21 cultivars from different sources, sixteen NAM parent lines (B73, CML103, CML228, CML247, CML277, CML322, CML333, CML69, Ki11, Ki3, Ky21, M37W, Mo18w, NC350, Oh43 and Tx303), four Korean hybrids (Cheongdaok, Gangdaok, Kwangpyeongok and Pyeonganok) and one Southeast Asian genotype (DK9955). Drought stress (DS) index was evaluated with leaf rolling score at seedling stage and ASI at silking date. The leaf rolling scoring of CML228, DK9955 and Ki11 were determined 1.28, 1.85, 1.86, respectively. However, M37W, Kwangpyeongok, B73 and NC350 were determined over the 3. ASI analysis revealed that CML228, CML103, Cheongdaok, NC350, B73, CML322, Kwangpyeongok and Ki11 are represented less than 5 days under DS and less than 3 days of difference between DS and well-watered (WW), but CML69, Ki3, Pyeonganok, M37W, Mo18w and Gangdaok were represented more than 10 days under DS and more than 8 days of difference between DS and WW. Multi-Dimensional Scaling (MDS) analysis determined CML228, Ki11, and CML322 were regarded as drought tolerance cultivars. Eventually, Ki11 showed genetic similarity with Korean cultivars by QTL analysis and MDS analysis. Ki11 has a potential for development of drought tolerance maize with Korean cultivars.
        4,000원
        3.
        2011.10 KCI 등재 구독 인증기관 무료, 개인회원 유료
        본 연구는 한려해상국립공원 특별보호구로 지정된 히어리군락의 생육상태와 향후 자생지의 지속적인 보전 및 관리를 위한 기초자료로 활용하고자 분석하였다. 히어리군락은 계곡부에 위치하고 있었으며, 암 및 자갈 노출도가 60%이상으로 식피율이 낮게 나타났고 계곡범람으로 조사구의 훼손과 교란현상이 나타나고 있었다. 히어리군락의 교목층은 졸참나무와 소나무가 우점하였으며, 아교목층은 히어리, 당단풍, 사람주나무, 편백, 산딸나무가 우점하였다. 관목층은 작살나무, 청미래덩굴 등이 우점하였으며, 초본층은 애기나리 등이 우점하였다. 계곡부에 위치한 히어리군락의 3년동안(2008∼2010년) 생육기인 5∼9월의 강수량 및 강우일수는 점차 증가하여 침식 및 훼손 등의 교란가능성이 높았으며 히어리가 주로 수광량이 높은 계곡부에 분포함으로서 성숙된 종자의 산포가 토양층이 얕은 계곡으로 분산되어 유묘 발생에 의한 개체군 증가가 빈약하였다.
        4,000원
        4.
        2008.06 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The ubiquitous, which is developed for human's convenience, uses the concept of situation awareness that communicates with computer and performs a certain work without user's recognition. In order to collect the information of situation, many devices are required. Also, in the condition of ubiquitous middleware, priority is given to effective controls of various devices. There are many devices for collecting the information of situation awareness such as sensor, RFID, etc. Among them, in the use of RFID, the researcher performed the experiment, in which multiple readers were used depending on the necessity of awareness information, and found the problem of intervention between readers occurring when multiple readers are used. The paper handles the problem of intervention causing from using multiple readers and suggests middleware design module using session manager to solve the problem.
        4,000원
        5.
        2007.06 KCI 등재 구독 인증기관 무료, 개인회원 유료
        Payment and security requirement are playing an increasingly critical role in RFID system, allegedly the core of the ubiquitous, especially in logistics. Therefore, security technology has been playing essential role gradually unlike the past when only the perception of equipment was considered important technology. The current encoding system allows the access only to the user who has the secret key. Many encoding algorithm has been studied to ensure the security of secret key. Security protocol is the most typical way to authorize appropriate user perception by using the data and secret key to proceed the encoding and transmit it to the system in order to confirm the user. However, RFID system which transmits more than dozens of data per second cannot be used if the algorithm and protocol of the existing wired system are used because the performance will degrade as a consequence. Security protocol needs to be designed in consideration of property of RFID and hardware. In this paper, a protocol was designed using SNEP(Sensor Network Encryption Protocol), the security protocol used for the sensor similar to RFID- not the current system used in wired environment- and ECC (Elliptic Curve Cryptography: oval curve encoding), the encoding algorithm.
        4,000원
        6.
        2006.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        RFID/USN is important infrastructure of the ubiquitous society. And so, It is various and practical research is attempted. These two base technology have physical characteristic and complement relationship. Like this relationship is applied Following example that is system research which manages warehouse stocks and conditions. First, We adhere RFID Tag at the Pallet of the warehouse and do identification goods. And then, It grasps the environment state information of stocks with sensor module which has Zigbee wireless communication function. From like this process RFID Tag information and jop-control command of sensor node also it is exposed to air. Therefore, We control sensor node in USN/RFID environment through the mobile device. And system design for the security Apply of the process is main purpose of this paper's. We propose the condition and function of the mobile device to the secondary. And We define the relation of the sensor node with RFID to be arranged to a warehouse. Finally, This paper is designed to find a trade-off of the following viewpoints. First, We offer suitable sensor-control information to a actual manager. Second, We offer RFID tag security approach to control the action of the sensor. Third, It increases the survivability of sensor node form.
        5,200원
        7.
        2004.09 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The soaring increase in the number of Internet users combined with the constant computerization of business process has created new opportunities for computer criminals and terrorist. Fortunately, the computer security field is also progressing at a brisk rate. In particular, the field of computer forensics brings new ways of preserving and analyzing evidence related to computer crime. Computer forensics is a new emerging professions of the 21st century. It is the collection, preservation, analysis, and presentation of computer related evidence. For this reason, the various technology of computer forensics is regarded as a powerful tool for suppressing computer crime. Our aims is to introduce the overview of computer forensics technology. We also present the survey results of the state of the art of computer forensics in the domestics and of foreign country.
        4,200원
        8.
        2004.09 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The existing PKI authentication structure uses the OCSP method. The primary task of OCSP is to verify the status of a transaction after verifying the validity of the certificate; but, because of continuing policy changes and updates within the PKI authentication method, the status of certificates and the structures are not consistent. Therefore, the SCVP method can be selected as the broadest method for completing authentication tasks accurately because the SCVP method includes validation of policy changes. An appropriate method for building an mobile environment within the capabilities of low-memory and reduced processing CPU needs to be assessed and developed. This thesis proposes a verification method that is independent of platform and applicable to any 05 in building and expanding the mobile environment.
        4,600원
        9.
        2002.05 구독 인증기관 무료, 개인회원 유료
        Real-Time Linux를 이용하여 실시간 운영체제가 요구하는 특성과 요구조건을 분석하고 이러한 요구조건에 부합하도록 리눅스를 하드웨어에 이식하고 하드웨어에 이식하기 위한 방법을 제시하였다. 다른 상용 실시간 운영체제 (RTOS)와는 달리 리눅스는 특정 하드웨어를 지원하기 위한 별도의 개발환경을 제공하지 않는다. 이에 개발환경을 구축하고 부트로더를 개발하기 위해 목표 시스템에 부합하도록 리눅스 커널을 이식하였다. 또한 응용 개발의 유연성을 제공하기 위하여 램디스크를 이용한 파일 시스템을 지원하도록 하였으며, GPIO(general purpose I/O)를 통한 디바이스 드라아버를 제작하는 등의 실험을 통해 시스템의 안정성을 검증하였다 실험에서는 StrongArm SAl110 마이크로프로세서를 이용하였으며 이 실험을 통해 실시간 운영체제로서의 리눅스의 활용 가능성을 확인하였다.
        4,000원
        10.
        2000.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        Broadband networks are designed to support a wide variety of services with different traffic characteristics and demands for Quality of Services. Bandwidth allocation methods can be classified into two major categories: static and dynamic. In static allocation, bandwidth is allocated only at call setup time and the allocated bandwidth is maintained during a session. In dynamic allocation, the allocated bandwidth is negotiated during a session. The purpose of this paper is to develop policies for deciding and for adjusting the amount of bandwidth requested for a best effort connection over such as ATM networks.. This method is to develop such policies that a good trade off between utilization and latency using cell delay variation to the forecast the incoming traffic in the next period. The performances of the different polices are compared by simulations.
        4,300원
        11.
        2000.11 구독 인증기관 무료, 개인회원 유료
        Broadband networks are designed to support a wide variety of services with different traffic characteristics and demands for Quality of Services. Bandwidth allocation methods can be classified into two major categories: static and dynamic. In static allocation, bandwidth is allocated only at call setup time and the allocated bandwidth is maintained during a session. In dynamic allocation, the allocated bandwidth is negotiated during a session. The purpose of this paper is to develop policies for deciding and for adjusting the amount of bandwidth requested for a best effort connection over such as ATM networks. This method is to develop such policies that a good trade off between utilization and latency using cell delay variation to the forecast the incoming traffic in the next period. The performances of the different polices are compared by simulations.
        3,000원
        13.
        2019.11 KCI 등재 서비스 종료(열람 제한)
        This study evaluated the photocatalytic oxidation efficiency of volatile organic compounds by Cu2O -TiO2 under visible-light irradiation. Cu2O-TiO2 was synthesized by an ultrasonic-assisted method. The XRD result indicated successful p-n type photocatalysts. However, no diffraction peaks belonging to TiO2 were observed for the Cu2O-TiO2. The Uv-vis spectra result revealed that the synthesized Cu2O-TiO2 can be activated under visible-light irradiation. The FE-TEM/EDS result showed the formation of synthesized nanocomposites in the commercial P25 TiO2, the undoped TiO2, and Cu2O-TiO2 and componential analysis in the undoped TiO2 and Cu2O-TiO2. The photocatalytic oxidation efficiencies of benzene, toluene, ethylbenzene, and o-xylene with Cu2O-TiO2 were higher than those of P25 TiO2 and undoped TiO2. These results indicate that the prepared Cu2O-TiO2 photocatalyst can be applied effectively to control gaseous BTEX.
        14.
        2018.11 KCI 등재 서비스 종료(열람 제한)
        In this study, we evaluated the photocatalytic oxidation efficiency of aromatic volatile hydrocarbons by using WO3–doped TiO2 nanotubes (WTNTs) under visible-light irradiation. One-dimensional WTNTs were synthesized by ultrasonic-assisted hydrothermal method and impregnation. XRD analysis revealed successful incorporation of WO3 into TiO2 nanotube (TNT) structures. UV-Vis spectra exhibited that the synthesized WTNT samples can be activated under visible light irradiation. FE-SEM and TEM images showed the one-dimensional structure of the prepared TNTs and WTNTs. The photocatalytic oxidation efficiencies of toluene, ethylbenzene, and o-xylene were higher using WTNT samples than undoped TNT. These results were explained based on the charge separation ability, adsorption capability, and light absorption of the sample photocatalysts. Among the different light sources, light-emitting-diodes (LEDs) are more highly energy-efficient than 8-W daylight used for the photocatalytic oxidation of toluene, ethylbenzene, and o-xylene, though the photocatalytic oxidation efficiency is higher for 8-W daylight.
        15.
        2016.06 KCI 등재 서비스 종료(열람 제한)
        소설 속에 등장하는 인물은 특정한 시공간이 지시하는 특정한 상황 속에 존재 한다. 흔히 소설의 3요소 중 하나인 배경이라고 하는 것이 그것이다. 이 논문은 <최척전>의 전반부에 해당하는 임진왜란 기간 동안 작품 속의 인물들이 존재 한 작중 배경, 즉 몇 년, 몇 월, 며칠에 어떤 장소에 있었는가를 작품 속 증거를 찾아내어 고증하는 것을 목적으로 한다. 인물이 존재하는 시간과 장소 곧 특정 한 상황이 전제되면 그때 그 곳에 있었던 인물과 사건은 그때 그 곳의 상황과 관련하여 좀 더 구체적인 모습으로 드러나리라고 기대한다. 연구방법으로 따지 면 문학지리학의 맥을 잇고 있고 소설배경론에도 속한다. 이러한 시각으로 <최척전>을 보면 <최척전>의 첫들머리에서 최척이 정상사 에게 공부를 하러 가는 시기는 1592년 5월경이고, 옥영이 남원 정상사 집에 오는 시간은 1592년 8월경이다. 두 사람이 만나는 시점은 1593년 1월 말경이다. 최척이 변사정 의병부대에 종군하는 시점은 1593년 2월경이고, 두 사람이 다 시 만나는 시점은 1593년 10월 말이다. 옥영의 억지혼사의 뒷배경에는 제2차 진주성 전투 후 남원 남쪽까지 쳐들어왔다 물러간 일본군의 약탈이 있었다. 정 유재란 시기에 구례 피아골 연곡사로 피난을 간 최척 일가는 불과 하루 이틀 사 이로 엇갈리면서 동아시아 세 나라로 흩어지고 있다. 이렇게 따져놓고 보면 <최척전>에 등장하는 시간과 공간, 즉 인물들이 존재 하고 있던 정확한 날짜와 장소를 거의 재구할 수 있다. 이를 통해 작품 속 인물 들의 형상이나 주제의식 등에 대한 좀 더 진전된 형태의 해석으로 나아갈 수 있 는 길이 열릴 수 있을 것이라 기대한다.
        16.
        2016.05 KCI 등재 서비스 종료(열람 제한)
        The adequacy of urban air quality monitoring networks in the largest metropolitan city, Seoul was evaluated using multivariate analysis for SO2, NO2, CO, PM10, and O3. Through cluster analysis for 5 air pollutants concentrations, existing monitoring stations are seen to be clustered mostly by geographical locations of the eight zones in Seoul. And the stations included in the same cluster are redundantly monitoring air pollutants exhibiting similar atmospheric behavior, thus it can be seen that they are being operated inefficiently. Because monitoring stations groups representing redudancy were different depending on measurement items and several pollutants are being measured at the same time in each air monitoring station, it is seemed to be not easy to integrate or transmigrate stations. But it may be proposed as follows : the redundant stations can be integrated or transmigrated based on ozone of which measures are increasing in recent years and alternatively the remaining pollutants other than the pollutant exhibiting similar atmospheric behavior with nearby station’s can be measured. So it is considered to be able to operate air quality monitoring networks effectively and economically in order to improve air quality.
        17.
        2016.03 KCI 등재 서비스 종료(열람 제한)
        This study was conducted to evaluate maize downy mildew resistance using spreader row technique in Cambodia. A total of forty maize lines were used in this experiment. Seven Korean varieties and seven breeding lines showed high infection rates (80~100%) and highly susceptible (HS) to downy mildew disease in both spring and fall. Also most of nested association mapping (NAM) parent lines were highly susceptible (HS). Meanwhile three inbred lines, Ki3, Ki11, and CML228, showed highly resistant (HR) or resistant (R) in spring and moderately resistant (MR) in fall. These three lines were already known as resistant inbred lines against downy mildew disease. It appears that spreader row technique was suitable for selection of maize downy mildew resistance in Cambodia. The incidence of downy mildew was influenced by weather conditions, especially relative humidity and temperature. Among several inoculation methods to screen for downy mildew resistance, this spreader row technique is effectively and easily used in the field of Southeast Asia.
        18.
        2015.12 KCI 등재 서비스 종료(열람 제한)
        Drought stress has detrimental effects on the seedling development, vegetative/ reproductive growth, photosynthesis, root proliferation, anthesis, anthesis-silking interval (ASI), pollination and grain yield in maize. Typically, two weeks before silking through pollination are an important time in maize life. Here we reviewed the effects of drought stress on growth, physiological/ molecular researches for drought tolerance, and breeding to genomics in maize. Drought stress during kernel development increases leaf dying and lodging, decreases grain filling period and grain yield. Physiological factors of drought stress/ effects are water content, water deficits, and water potential. Nowdays molecular marker assisted breeding method is becoming increasingly useful in the improvement of new germplasm with drought stress tolerance.
        19.
        2013.11 서비스 종료(열람 제한)
        1970년대 국내 아파트의 대부분은 선진국의 아파트를 모방하여 수직 쓰레기 설비가 설치되어 있었으나 냄새 문제 및 유지관리 문제, 쓰레기 종량제등 여러 가지 이유로 사라지게 되었다. 그러나, 생활쓰레기의 위생적 처리 및 생활편의의 요구 증대에 따라 점차 수직쓰레기 이송설비의 설치가 늘어나고 있는 상황이다. 쓰레기 이송 설비는 신도시 및 단지 개발에서 공동 투입구를 단지에 설치하는 수평식 쓰레기 이송관로의 설치 운영이 주를 이루었으나, 아파트의 고급화에 따라 각 세대에서 생활쓰레기의 수직이송이 요구되어 기존의 몇몇 아파트에 설치 운영 중에 있다. 수평식 쓰레기 이송관로의 경우는 인위적인 동력장치로 관로 내 강한 음압을 형성하여 집하장까지 이송하는 방식으로 관로의 부식, 마찰에 의한 관로 침식등의 문제는 발생되나 냄새역류 등의 생활상의 문제는 발생되지 않는다. 아파트에 설치되는 수직식 이송관로는 중력을 이용하는 방법으로 많은 동력을 필요하지 않으나 배기 설계 및 운영방법에 따라 냄새의 역류, 냄새 확산들의 생활상의 문제들이 우려되는 시스템이다. 따라서 본 연구에서는 수직형 쓰레기 이송관로의 배기팬의 설치 및 투입구 개방으로 인한 냄새 역류, 쓰레기 투척실의 유지관리방법 등을 도출하여 수직형 쓰레기 이송설비의 장점을 최대한 증대시키고, 건설 후 발생될 수 있는 냄새 민원을 최소화하는 것에 있다. 쓰레기 이송설비에서의 배기팬의 정압은 제조사들의 경험에 의해 결정되어 있었다. 그러나 건물의 형태 및 구획, 높이에 따라 관리시스템 및 팬정압의 범위가 달라져야 한다. 겨울철 고층건물에서 발생하는 연돌현상(Stack effect)에 의한 상부층의 투입구에서는 역류가 발생될 수 있어 투입구실에 발생되는 차압과 투입구 개방 시 배기팬에 의해 발생되는 투입구 음압의 상관관계를 고려해야 한다. 또한 거주자들에 의해 투입구실 바닥에 흘린 쓰레기등에 의해 투입구실에 확산되어 있는 냄새가 E/V홀로 확산되어 거주지역으로 확산될 수 있어 투입구실 배기 공조의 적절한 풍량산정도 중요하다. 즉 투입구 개방 시 쓰레기 이송배관 상층부에 있는 배기팬과 투입구실 배기공조와 연돌효과에 의한 정압차등의 상관적인 관계를 고려하여 설계하여야 한다. 따라서 본연구에서는 네트워크 시뮬레이션을 통한 대상 건물의 연돌효과 크기를 분석하고 CFD(Computational Fluid Dynamics)방법을 통한 배기팬 성능 검증 및 배기공조에 의한 냄새확산 여부들을 분석 시뮬레이션 하였다. 본 연구의 모델로 사용된 약 56층 탑상형 아파트의 경우에 E/V 및 계단실 도어에 약 15pa정도의 차압이 발생되었으며 이때 이송관로 배기팬의 성능은 팬정압 0~400pa, 풍량 0~40CMM정도의 팬성능을 확보할 경우 냄새의 역류는 발생되지 않는 것으로 분석되었다.
        20.
        2011.02 KCI 등재 서비스 종료(열람 제한)
        온라인 게임 시장의 규모가 커짐에 따라 온라인 게임의 서버 성능에 대한 중요성이 커지고 있다. 본 논문은 게임 속의 객체 상태에 대한 동기화 패킷을 줄여 서버의 성능을 높이는 방안을 제안한다. 제안하는 방식은 게임 속의 각 객체의 이동 범위에 대한 예측과 못가는 지역에 대한 처리를 통하여 지형간의 경계이동 횟수가 감소될 수 있도록 지형을 재구성 할 수 있는 해결책을 제공한다. 성능평가는 제안하는 지형분할방식이 기존방법에 비해 동기화 패킷에 대한 처리량이 줄어드는 것을 보여준다.
        1 2 3