http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
약한 층리면이 발달된 셰일층의 방향성 시추공의 안정성 분석
윤재필,김현태,박희원 한국자원공학회 2013 한국자원공학회지 Vol.50 No.3
본 연구에서는 약한 층리면이 발달된 셰일층에서 방향성 시추시 발생할 수 있는 안정성 문제를 분석하였다. 분석을 위해 대체로 지질학적 특성과 암석역학적 자료가 잘 알려진 캐나다 북동 브리티시 콜롬비아 지역의 셰일층을 선택하였다. 연구 결과 약한 층리면이 발달되어 있는 셰일층의 경우에는 붕괴 시 비대칭적 붕괴가 일어나는 것을 알 수 있었다. 또한, 약한 층리면이 발달한 경우에는 시추공이 층리면에 대해 수직에 가까울수록 더욱 안정적인 것을 알 수 있었다. 이러한 경우 최적의 방향성 시추궤도의 선정은 시추이수의 비중을 높이지 않고서도 안정적 시추를 가능케 함을 알 수 있었다. 이 연구 방법 및 결과는 향후 지질학적으로 이 연구지역과 유사한 퇴적특성을 지닌 셰일층에서의 방향성 시추 안정성 평가에 활용할 수 있을 것이다. In this paper, directional wellbore stability analysis is carried out for the shales in which weak bedding planes are developed. Shale layers in Northeastern British Columbia area has been selected for the wellbore stability analysis due to well-known geological and geomechanical properties. In the case of shale layer with weak bedding planes, it was found that breakouts around the wellbore developed asymmetrically. It was also found that wellbore is more stable with the trajectory almost perpendicular to the weak bedding planes. In this case, less mud weight can be applied to achieve more stable directional wellbore with this trajectory. It is expected that the methodologies and results in this paper can be beneficial to wellbore stability analyses for shale layers with similar geological and geomechanical setting to this research area.
북한 사이버 공격그룹 해킹사례 분석을 통한 BGP Archive Data 기반 사이버 정보감시정찰(Cyber ISR) 시각화 방안 연구
윤재필,신동규 국방보안연구소 2021 국방과 보안 Vol.3 No.2
With the worldwide epidemic of COVID-19, related threats persist in cyberspace as well. The North Korean cyber-attack group is attempting a spear-phishing APT attack that exploits social issues including COVID-19. In January 2021, a hacking attack, presumed to be Kimsuky, a North Korean cyber- attack group, occurred intending to steal research data related to COVID-19. In this paper, we estimated the origin of the attack by analyzing hacking cases through cyber intelligence-based profiling techniques and correlation analysis using BGP archive data. Through this, we propose an implementation of the cyber intelligence surveillance and reconnaissance (Cyber ISR) visualization method based on BGP archive data. In the future, in connection with research on the cyber command and control system, a study on the cyber battlefield area, cyber ISR, and a traceback visualization model for the origin of the attack will be conducted.
우연히 발견된 무증상성 기종성 방광염 국내 증례 종합 고찰
윤재필 ( Yun Jae Pil ),서장원 ( Seo Jang Won ),김상현 ( Kim Sang Hyeon ),박수길 ( Park Su Gil ) 대한신장학회 2004 Kidney Research and Clinical Practice Vol.23 No.1
Emphysematous cystitis is a rare disease that is associated with diabetes mellitus, neurogenic bladder, chronic genitourinary infection, and malignancy. Fever, chill, abdominal pain, and urinary difficulties were the most frequent presenting symptoms associated with emphysematous cystitis. We report a case of incidentally detected asymptomatic emphysematous cystitis in a 67 years old female patient with diabetic nephropathy. We review characteristic features of all 19 cases that has been reported in korean medical journals till now. Risk factors for this condition appear to be female sex, old age, and diabetes mellitus. (Korean J Nephrol 2004;23(1):174-179)
사이버공간 내 상황인식을 위한 사이버 공통 작전 상황도 연구
김국진,윤재필,윤석준,강지원,김경신,신동규,Kim, Kook-jin,Youn, Jae-pil,Yoon, Suk-joon,Kang, Ji-won,Kim, Kyung-shin,Shin, Dong-kyoo 한국인터넷정보학회 2022 인터넷정보학회논문지 Vol.23 No.5
Cyber-attacks occur in the blink of an eye in cyberspace, and the damage is increasing all over the world. Therefore, it is necessary to develop a cyber common operational picture that can grasp the various assets belonging to the 3rd layer of cyberspace from various perspectives. By applying the method for grasping battlefield information used by the military, it is possible to achieve optimal cyberspace situational awareness. Therefore, in this study, the visualization screens necessary for the cyber common operational picture are identified and the criteria (response speed, user interface, object symbol, object size) are investigated. After that, the framework is designed by applying the identified and investigated items, and the visualization screens are implemented accordingly. Finally, among the criteria investigated by the visualization screen, an experiment is conducted on the response speed that cannot be recognized by a photograph. As a result, all the implemented visualization screens met the standard for response speed. Such research helps commanders and security officers to build a cyber common operational picture to prepare for cyber-attacks.
최세호,김명수,윤재필,박무성,이성기,신동규 국방보안연구소 2022 국방과 보안 Vol.4 No.2
In order to respond to unknown cyber threats, it is defended with a multi-level deep information protection system, but cyber attacks concentrate all resources on the weakest point of the information protection system. In this situation, it is not possible to respond 100% to a cyber attack within a limited time, so when a cyber attack is recognized, it is a cyber resilience that can quickly respond to prevent the spread of damage in the system operation state and return to the state before the cyber attack as soon as possible. In this paper, we propose a procedure for optimizing cyber defense activities so that we can act according to the response and recovery phase of cyber resilience, and compare the results of a training case that have actually been put into action to verify the infringement response time for each type of cyber attack. In the future, it is expected that the response time for each cyber defense activity will be subdivided and used for cyber combat power index research.
미래 육군 사이버전 전투체계 수행개념 분석을 통한 MITRE D3FEND 기반 사이버 방어전술 모델 연구
백동준,손영식,윤재필,김강석 국방보안연구소 2022 국방과 보안 Vol.4 No.1
The rapid development of science and technology is bringing about epochal changes in all fields of human beings, and in particular, it has a huge impact on the defense and military field, changing the essence of the concept of warfighting. The future battlefield is expanding not only in land, sea, air, and space, but also in cyberspace, and at the present time facing the Russo-Ukraine war, the future battlefield is The means and methods are changing into a hybrid form. This paper proposes security measures for each cyber threat and defense tactics from the defender's perspective by visualizing cyber defense tactics based on the MITER D3FEND framework as a knowledge graph through an analysis of the future army cyber warfare combat system performance concept. In the future, it is planned to conduct effective defense tactic research by analyzing the procedures and tactics of the North Korean cyber attack group.