http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
프로그램과 실이 측정을 이용한 보청기 적합의 임상적 유용성의 비교
장영수,정혜임,조양선 대한이비인후과학회 2018 대한이비인후과학회지 두경부외과학 Vol.61 No.12
Background and Objectives The main objectives of this study were to determine the clinicalusefulness of the program-assisted and real ear measurement (REM)-assisted fitting ofhearing aids. Subjects and Method Fifteen participants with moderate to moderately severe hearing losswere enrolled in this study. Objective and subjective fitting results were assessed to comparethe benefits between the program-assisted fitting (using a software fitting program) and theREM-assisted fitting. Real ear insertion gain (REIG), sound-field audiometry using warble tone,and Korean Hearing in Noise Test (K-HINT) were performed as objective tests. Sound qualityrating was performed as a subjective test. Results In the program fitting, 48.89% of fitting points failed to come within ±10 dB of theREIG target. In the REM fitting, however, the percentage of failure significantly decreased to23.33% (p=0.013). In K-HINT test, the reception threshold for speech in quiet situation significantlydecreased from 50.1 dB HL with the program fitting to 44.7 dB HL after the REM fitting(p<0.001). In front noise condition, signal-to-noise ratio improved from 4.53 dB to 3.50 dBwith the REM fitting without statistical significance (p=0.099). In the sound quality rating, theREM fitting (4.27±0.56) showed a significantly better sound quality ratings than the programfitting (3.69±0.74) (p=0.017). Conclusion The REM fitting showed better results in both subjective and objective measurementsthan the program fitting
A Study on Database Access Control using Least-Privilege Account Separation Model
장영수 (사)디지털산업정보학회 2019 디지털산업정보학회논문지 Vol.15 No.3
In addition to enabling access, database accounts play a protective role by defending the database from external attacks. However, because only a single account is used in the database, the account becomes the subject of vulnerability attacks. This common practice is due to the lack of database support, large numbers of users, and row-based database permissions. Therefore if the logic of the application is wrong or vulnerable, there is a risk of exposing the entire database. In this paper, we propose a Least-Privilege Account Separation Model (LPASM) that serves as an information guardian to protect the database from attacks. We separate database accounts depending on the role of application services. This model can protect the database from malicious attacks and prevent damage caused by privilege escalation by an attacker. We classify the account control policies into four categories and propose detailed roles and operating plans for each account.