http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
椎弓切除術時 小量의 Morphine과 局麻劑를 混注한 硬膜外麻醉 및 術後 鎭通效果
박욱,田容愛,金晟烈 순천향대학교 1981 논문집 Vol.4 No.1
From September 1979 through April 1980, we had carried out continuoua lumbar epidural anesthesia (2% lidocaine 20m1) with small dose of morphine and single dose caudal anest-hesia (2% lidocaine. 15-20m1) for 16 cases of lumbar laminectomy. And also we observed the effects of postanesthetic pain relief by administered morphine (2mg) into lumbar epidural space. The results of this study were as follows: 1. Age distribution was from 20 to 60 years, sex distribution was 14 in men and 2 in women, and physical states was in ASA class I in all cases. 2. The trite of herniated intervertebral disc was L4-5 in 15 cases and L3-4 in one. The epidural puncture site was selected 2-3 vertebral segments cephalad from the lesion. 3. The morphine amount administered with lidocaine into lumbar epidural space was 2mg in all cases. 4. The duration of pain relief from the induction of anesthesia was average 17.5 hours, and from the additional epidural injection of morphine (2mg) in ward was average 13.5 hours. 5. There was no neurological deficit or sequele except nausea in one case postoperatively. Therefore this anestihetic method was not only satisfactory for laminectomy but also safer and simpler in the fixation of spinal anesthetic level by patient's position change than spinal anesthesia, and faster in the postanesthetic ambulation thats general anestesia. Moreover. surgeon'a acceptability was excellent and anestesiologist's load was more reduced than general anestheia.
김성열 청주대학교 2010 産業科學硏究 Vol.28 No.1
In RFID/USN, situation and circumstances of the person or thing, and a variety of sensing nodes, data collection and service information for the user authentication receive over the network and the sensing nodes. In the process of personal identification information obtained through unlawful disclosure or other use of the authentication information of various types have been caused by a serious illegal ubiquitous network society is emerging as a new issue. In this study, RFID/USN is applied to identify the various security and authentication techniques and related protocols should focus on research analysis. The results of this study, a new RFID/USN authentication system is to take advantage of development
김성열 청주대학교 2013 産業科學硏究 Vol.31 No.1
Recently, according to the explosive spread of using smart phones, without limitation on the time and place, used in the various information in the Internet environment changed, the increase of mobile open platform and the App Store due to the appearance of interest in mobile applications is increasing. In this study, various mobile environments, the mobile infrastructure and mobile applications for a variety of security threats, in order to act accordingly, related security threats and countermeasures should focus on research and analysis.
Shock로 發生한 成人 Respiratory Distress Syndrome
安喜淳,張連珍,金仁世,趙裕永,金晟烈 순천향의과대학 1978 Journal of Soonchunhyang Medical Science Vol.1 No.1
The adult respiratory distress syndnome was originated from acute hemorhagic and septic shock in 3 patients after operation. All patients recovered with active management (PEEP,albumin,diuretics,and steroid) and various intensive therapies. Etio-logical, Pathophysiological and therapeutic points in A.R.D.S. were discussed with review of articles.
金成烈 西原大學校 1982 西原大學 論文集 Vol.11 No.-
As long as teachers are evaluated by their administrators in a formal on-going program, they have a right to expect that evaluations will be conducted as scientifically, objectically, and fairly as possible in light of present knowledge. The characteristics for successful teacher evaluation program are (1) that the teacher as well as principals are actively involved in developing the evaluation plan and reviewing it constantly and (2) that the purpose of the program is essentially to improve instruction and help the teachers become more successful in pursuing their profession. Therefore, the results of evaluation should be open, and teachers with principals should evaluate themselves, and the evaluating factors should be composed of a list of traits, skills or behaviors of teacher. Adding rating scales to these checklists, it will be accomplished at once two purposes of teacher evaluation: improving instruction and helping teachers succeed, and to rate teachers for administrative purposes. In the content of teacher evaluation, teacher's instruction behavior and classroom performance should be emphasized more than other factors.
김성열 청주대학교 산업과학연구소 1996 産業科學硏究 Vol.14 No.-
This paper presents the design for a security system for the construction of Intranet. The great Internet explosion during the past two or three years is largely fueled by the prospect of performing business online and other areas. Furthermore, Intranet interest have exploded in the last few years But, on existing security framework are lack and many problems. Therefore, we propose to design a new security system(firewall-like) for the Intranet systems. The proposed security system consists of 3 parts : internal, bastion host, and external. The internal part consists of LAN(including a screen router) and host, internet service servers The bastion host has several gateway modules(FTP, SMTP, NNTP, etc) The external part consists of DMZ(including a public sorter and screen router) and Internet connection interface devices. The new security system is almost completely guaranteed as it has been checked three times.
김성열 청주대학교 2004 産業科學硏究 Vol.22 No.1
This paper attempts a comprehensive scoping of the DDoS(Distributed Denial of Service) problem. DDoS attacks are a virulent, relatively new type of attack on the availability of Internet services and resources. DDoS attackers infiltrate large numbers of computers by exploiting software vulnerabilities, to set up DDoS attack networks. We propose new taxonomies to categorize DDoS attack networks, to classify the different techniques used in a DDoS attack, and to describe the characteristics of the software tools used in setting up a DDoS attack network. These taxonomies help us to understand the similarities and differences in DDoS attacks and tools, and the scope of the DDoS problem. Given this new understanding, we propose classes of countermeasures that target the DDoS problem before, during and after an actual DDoS attack. This work is intended to stimulate research into creative, effective and efficient defenses and detection mechanisms for DDoS attacks, and to assist in creating comprehensive solutions that will provide a more generalized and effective approach to countering both known and derivative DDoS attacks.
김성열 건국대학교 산업기술연구원 2005 건국기술연구논문지 Vol.30 No.-
2004년 5월 14일부터 5월 16일까지 Italy의 Assisi에서 개최된 Internatinal Conference on Computation Science and its Applications (ICCSA) 2004 학회에 참여하였다. ICCSA는 Computational Science 및 그 주변 다양한 분야의 석학들과 젊은 학생들이 모여 서로 연구 결과를 발표하고 교류의 장을 가지는 계기로 활용되고 있다. 2004년에는 University of Perugia에서 주최하여, 그 근방인 Assisi의 S. Maria degli Angeli를 venue로 하여 개최되었다.