검색결과

검색조건
좁혀보기
검색필터
결과 내 재검색

간행물

    분야

      발행연도

      -

        검색결과 4

        1.
        2014.05 구독 인증기관 무료, 개인회원 유료
        The Ministry of Environment established a data base platform called environmental statistic portal. From there we collected environmental statistics including sulfurous acid gas, fine dust, carbon monoxide, nitrogen dioxide, household waste, domestic waste, construction waste, the number of factories, the amount of waste water, the amount of organic matter, etc. We collected the number of tuberculosis (TB) patients from National Health Service in Korean Statistical Information Service. We consider the number of TB patients and environmental statistics as a dependent variable and predictors, respectively. A multiple regression analysis is performed to find out significant predictors that affect the number of TB patients. A deep analysis is done to discover the relationship between significant predictors and the dependent variable depending on national district areas, i.e. Gu or Goon, by use of a multivariate analysis and a covariance analysis.
        3,000원
        2.
        2004.09 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The soaring increase in the number of Internet users combined with the constant computerization of business process has created new opportunities for computer criminals and terrorist. Fortunately, the computer security field is also progressing at a brisk rate. In particular, the field of computer forensics brings new ways of preserving and analyzing evidence related to computer crime. Computer forensics is a new emerging professions of the 21st century. It is the collection, preservation, analysis, and presentation of computer related evidence. For this reason, the various technology of computer forensics is regarded as a powerful tool for suppressing computer crime. Our aims is to introduce the overview of computer forensics technology. We also present the survey results of the state of the art of computer forensics in the domestics and of foreign country.
        4,200원
        3.
        2004.09 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The existing PKI authentication structure uses the OCSP method. The primary task of OCSP is to verify the status of a transaction after verifying the validity of the certificate; but, because of continuing policy changes and updates within the PKI authentication method, the status of certificates and the structures are not consistent. Therefore, the SCVP method can be selected as the broadest method for completing authentication tasks accurately because the SCVP method includes validation of policy changes. An appropriate method for building an mobile environment within the capabilities of low-memory and reduced processing CPU needs to be assessed and developed. This thesis proposes a verification method that is independent of platform and applicable to any 05 in building and expanding the mobile environment.
        4,600원
        4.
        2000.11 구독 인증기관 무료, 개인회원 유료
        Broadband networks are designed to support a wide variety of services with different traffic characteristics and demands for Quality of Services. Bandwidth allocation methods can be classified into two major categories: static and dynamic. In static allocation, bandwidth is allocated only at call setup time and the allocated bandwidth is maintained during a session. In dynamic allocation, the allocated bandwidth is negotiated during a session. The purpose of this paper is to develop policies for deciding and for adjusting the amount of bandwidth requested for a best effort connection over such as ATM networks. This method is to develop such policies that a good trade off between utilization and latency using cell delay variation to the forecast the incoming traffic in the next period. The performances of the different polices are compared by simulations.
        3,000원