RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • 椎弓切除術時 小量의 Morphine과 局麻劑를 混注한 硬膜外麻醉 및 術後 鎭通效果

        박욱,田容愛,金晟烈 순천향대학교 1981 논문집 Vol.4 No.1

        From September 1979 through April 1980, we had carried out continuoua lumbar epidural anesthesia (2% lidocaine 20m1) with small dose of morphine and single dose caudal anest-hesia (2% lidocaine. 15-20m1) for 16 cases of lumbar laminectomy. And also we observed the effects of postanesthetic pain relief by administered morphine (2mg) into lumbar epidural space. The results of this study were as follows: 1. Age distribution was from 20 to 60 years, sex distribution was 14 in men and 2 in women, and physical states was in ASA class I in all cases. 2. The trite of herniated intervertebral disc was L4-5 in 15 cases and L3-4 in one. The epidural puncture site was selected 2-3 vertebral segments cephalad from the lesion. 3. The morphine amount administered with lidocaine into lumbar epidural space was 2mg in all cases. 4. The duration of pain relief from the induction of anesthesia was average 17.5 hours, and from the additional epidural injection of morphine (2mg) in ward was average 13.5 hours. 5. There was no neurological deficit or sequele except nausea in one case postoperatively. Therefore this anestihetic method was not only satisfactory for laminectomy but also safer and simpler in the fixation of spinal anesthetic level by patient's position change than spinal anesthesia, and faster in the postanesthetic ambulation thats general anestesia. Moreover. surgeon'a acceptability was excellent and anestesiologist's load was more reduced than general anestheia.

      • RFID/USN 환경의 인증 기법에 관한 연구

        김성열 청주대학교 2010 産業科學硏究 Vol.28 No.1

        In RFID/USN, situation and circumstances of the person or thing, and a variety of sensing nodes, data collection and service information for the user authentication receive over the network and the sensing nodes. In the process of personal identification information obtained through unlawful disclosure or other use of the authentication information of various types have been caused by a serious illegal ubiquitous network society is emerging as a new issue. In this study, RFID/USN is applied to identify the various security and authentication techniques and related protocols should focus on research analysis. The results of this study, a new RFID/USN authentication system is to take advantage of development

      • 모바일 어플리케이션 보안 위협에 관한 연구

        김성열 청주대학교 2013 産業科學硏究 Vol.31 No.1

        Recently, according to the explosive spread of using smart phones, without limitation on the time and place, used in the various information in the Internet environment changed, the increase of mobile open platform and the App Store due to the appearance of interest in mobile applications is increasing. In this study, various mobile environments, the mobile infrastructure and mobile applications for a variety of security threats, in order to act accordingly, related security threats and countermeasures should focus on research and analysis.

      • Shock로 發生한 成人 Respiratory Distress Syndrome

        安喜淳,張連珍,金仁世,趙裕永,金晟烈 순천향의과대학 1978 Journal of Soonchunhyang Medical Science Vol.1 No.1

        The adult respiratory distress syndnome was originated from acute hemorhagic and septic shock in 3 patients after operation. All patients recovered with active management (PEEP,albumin,diuretics,and steroid) and various intensive therapies. Etio-logical, Pathophysiological and therapeutic points in A.R.D.S. were discussed with review of articles.

      • 敎師勤務成績 評定方法 改善을 위한 硏究

        金成烈 西原大學校 1982 西原大學 論文集 Vol.11 No.-

        As long as teachers are evaluated by their administrators in a formal on-going program, they have a right to expect that evaluations will be conducted as scientifically, objectically, and fairly as possible in light of present knowledge. The characteristics for successful teacher evaluation program are (1) that the teacher as well as principals are actively involved in developing the evaluation plan and reviewing it constantly and (2) that the purpose of the program is essentially to improve instruction and help the teachers become more successful in pursuing their profession. Therefore, the results of evaluation should be open, and teachers with principals should evaluate themselves, and the evaluating factors should be composed of a list of traits, skills or behaviors of teacher. Adding rating scales to these checklists, it will be accomplished at once two purposes of teacher evaluation: improving instruction and helping teachers succeed, and to rate teachers for administrative purposes. In the content of teacher evaluation, teacher's instruction behavior and classroom performance should be emphasized more than other factors.

      • 인트라넷 구축을 위한 보안 시스템 설계

        김성열 청주대학교 산업과학연구소 1996 産業科學硏究 Vol.14 No.-

        This paper presents the design for a security system for the construction of Intranet. The great Internet explosion during the past two or three years is largely fueled by the prospect of performing business online and other areas. Furthermore, Intranet interest have exploded in the last few years But, on existing security framework are lack and many problems. Therefore, we propose to design a new security system(firewall-like) for the Intranet systems. The proposed security system consists of 3 parts : internal, bastion host, and external. The internal part consists of LAN(including a screen router) and host, internet service servers The bastion host has several gateway modules(FTP, SMTP, NNTP, etc) The external part consists of DMZ(including a public sorter and screen router) and Internet connection interface devices. The new security system is almost completely guaranteed as it has been checked three times.

      • DDoS 공격 패킷의 침입 탐지에 관한 연구

        김성열 청주대학교 2004 産業科學硏究 Vol.22 No.1

        This paper attempts a comprehensive scoping of the DDoS(Distributed Denial of Service) problem. DDoS attacks are a virulent, relatively new type of attack on the availability of Internet services and resources. DDoS attackers infiltrate large numbers of computers by exploiting software vulnerabilities, to set up DDoS attack networks. We propose new taxonomies to categorize DDoS attack networks, to classify the different techniques used in a DDoS attack, and to describe the characteristics of the software tools used in setting up a DDoS attack network. These taxonomies help us to understand the similarities and differences in DDoS attacks and tools, and the scope of the DDoS problem. Given this new understanding, we propose classes of countermeasures that target the DDoS problem before, during and after an actual DDoS attack. This work is intended to stimulate research into creative, effective and efficient defenses and detection mechanisms for DDoS attacks, and to assist in creating comprehensive solutions that will provide a more generalized and effective approach to countering both known and derivative DDoS attacks.

      • ICCSA 2004 참관기

        김성열 건국대학교 산업기술연구원 2005 건국기술연구논문지 Vol.30 No.-

        2004년 5월 14일부터 5월 16일까지 Italy의 Assisi에서 개최된 Internatinal Conference on Computation Science and its Applications (ICCSA) 2004 학회에 참여하였다. ICCSA는 Computational Science 및 그 주변 다양한 분야의 석학들과 젊은 학생들이 모여 서로 연구 결과를 발표하고 교류의 장을 가지는 계기로 활용되고 있다. 2004년에는 University of Perugia에서 주최하여, 그 근방인 Assisi의 S. Maria degli Angeli를 venue로 하여 개최되었다.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼