RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 음성지원유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        구강 스캐너 거울면의 오염도가 스캔 데이터의 정확도에 미치는 영향 평가

        정윤수,정창모,윤미정,허중보,이소현,이현종 대한치과의사협회 2021 대한치과의사협회지 Vol.59 No.6

        Purpose: This study was conducted to evaluate the influence of contamination of the scan-mirror on the accuracy of obtained scan data by using two type of intra-oral scanner. Materials & methods: After printing the Crown & inlay specimens according to the ISO standard, the data values of the specimens were calculated using a model scanner and two intra-oral scanners. Experimental groups were classified into three groups according to cleanliness of scan-mirror. Each group performed 10 repeated scans. Data analysis was performed with statistical software (SPSS 25, IBM Corp., Armonk, New York, USA) to check the normality of data sets andA NOVA & Bonferroni test was performed for multiple comparisons betwen groups. Results: The d1(top diameter of cylinder), d2(bottom diameter of cylinder), h(cylinder height) values of the crown specimens and d1(top diameter of cavity), d2(bottom diameter of cavity), h(cavity height) of the inlay specimens compared with the reference data using two intra-oral scanners were similar for each group. Discussion: In the scanning process, it was observed on the screen that a data value that deviated from the normal range was inputted in the group with higher level of contamination, but they were removed through the software’s own filtering and post-processing, and it was found that there was no significant effect on the result values. Conclusion: Under the conditions of this study, as the degree of contamination of the scan-mirror surface increased, an inaccurate capture screen appeared, but it did not significantly affect the accuracy and percision of the scan data.

      • SCOPUSKCI등재

        식품의 세균학적 표준연구 2

        정윤수,장건형 한국미생물학회 1965 미생물학회지 Vol.3 No.1

        Higher number in colony counts in coliforms, total aerobes, and anerobes was obtained from marketable soy-bean mash than front that in fermented tank. The ratio between coliform contamination and total viable cells was higher in red pepper mash than in soy-bean mash. E. coli, contaminated in soy-bean mash persisted longer at low temperature ($0^{\circ}C$-$^5{\circ}C$) than at room temperature and they vanished after seven days of storage at room temperature. At 30.deg.C and 35.deg.C, these organisms were more effected than at room temperature. E. coli cells, inoculated in red pepper mash, were not recovered at room temperature after five days incubation. Soy-bean mash, completely fermented at normal conditions, were detected to contain $10^8$- $10^9$ organisms per gram of sample. On the contrary, marketable soy-bean mash were found to have more than 10$^{9}$ per gram samples. Since samples were found to have more than $10^9$ aerobes and anaerobes per gram, contamination of coliforms seemed to be apparent.

      • SCOPUSKCI등재

        Aspergillus tubingensis의 acid protease에 관한 연구 II

        정윤수,고동성,조영,이금수,Chung, Yun-Su,Ko, Dong-Sung,Cho, Young,Lee, Keum-Soo 한국미생물학회 1982 미생물학회지 Vol.20 No.4

        Acid protease produced from Aspergillus tubingensis was pruified by ethanol fractionation, dialysis, and DEAE cellulose column chromatography. As a result of purification its specific activity increased to 5.4 times, and percent recovery was 39. The kinetic constants of the enzyme were studied. Km and Vmax was $1.5{\times}10^{-7}M\;and\;0.11{\Delta}O.D/min$ , respectively, when casein was used as substrate. The order of Km value of several proteins is : casein<hemolobin<BSA<cytochrome C, and that of Vmax is : myoglobin<casein<hemoglobin<BSA<cytochrome C. In case of BSA, substrate inhibition pattern was found. The enzyme was remarkably inhibited by EPNP, TPCK and NBS which inhibit carboxyl and tryptophan groups in the active site, and this property is similar with that of pepsin. The results of inhibition study show that carboxyl group of aspartic acid or glutamic acid takes roll in neucleophilic attack to peptide bond, and tryptophan group is involved in the binding site.

      • SCOPUSKCI등재

        Aspergillus tubingensis의 acid protease에 관한 연구 I

        정윤수,조영,한석현,Chung, Yun-Su,Cho, Young,Han, Suk-Hyun 한국미생물학회 1982 미생물학회지 Vol.20 No.3

        The strain of Aspergillus, 6368A, producing acid protease showing high activity was isolated from soil, as a result of wide research about mold group. This strain was identified as a species of Aspergillus tubingensis by the investigation of morphological characteristics. The change of the enzyme production under the various media and culture condition was also studied. The optimum pH and stability of crude acid protease are 2.5, 2.0~4.5 and the optimum temeprature and thermal inactivation waas shown $50^{\circ}C,\;55^{\circ}C$, respectively. From the result of the study on the effects of metal ions, it was found that $MnCl_2,\;CoCl_2,\;CuCl_2,\;SrCl_2,\;and\;NiCl_2$ slightly increased the enzyme activity, on the other hand $ZnCl_2,\;CaCl_2,\;MgCl_2,\;SLS,\;and\;KMnO_4$ decreased it.

      • KCI등재

        스마트폰 사용으로 인한 사용자 프라이버시 피해 현황 분석

        정윤수,Jeong, Yoon-Su 중소기업융합학회 2014 융합정보논문지 Vol.4 No.4

        스마트폰 개발의 발전으로 인하여 사용자의 스마트폰 사용율이 PC 사용율보다 점점 높아지고 있는 실정이다. 스마트폰 사용이 대중화되면서 스마트폰 사용자의 개인신상정보, 금융 정보와 같은 중요한 프라이버시 정보들을 보호하는 연구는 현재 미미한 상태이다. 본 논문에서는 현재까지 연구되었던 스마트폰의 다양한 취약점에 대해서 분석하고 스마트폰 보안 공격 방법에 대한 대응방법 및 스마트포 소비자 분쟁 해결 기준들을 제시한다. 특히, 스마트폰에서 발생하기 쉬운 보안 위협(네트워크, 악성코드, 훔쳐보기 공격 등)을 통해 사용자의 개인정보 유출이나 금전적 손실과 같은 직접적인 피해를 최소화하기 위한 방법들을 분석한다. The usage rate of user due to advances in smartphone development is higher than the usage rate to use a PC. However, smartphone usage popularized research to protect sensitive information, such as smart phone users personal information, financial information is a small state. In this paper, we analyzed the various vulnerabilities in smartphone studies to date have been looking into the corresponding port smart consumer dispute resolution methods and criteria for smartphone security attack methods and analysis. In particular, the threat of such a network, malware, Peep attack of the security threats arising from the smartphone they can avoid or mitigate threats to minimize the smartphone security damage is done to the disclosure of personal information, such as direct damage or financial loss the analysis of that method.

      • KCI등재

        클라우드 환경에서 IoT 정보 오류를 고려한 지형 정보 기반의 키 관리 기법

        정윤수,최정희 한국디지털정책학회 2020 디지털융복합연구 Vol.18 No.10

        In the cloud environment, IoT devices using sensors and wearable devices are being applied in various environments, and technologies that accurately determine the information generated by IoT devices are being actively studied. However, due to limitations in the IoT environment such as power and security, information generated by IoT devices is very weak, so financial damage and human casualties are increasing. To accurately collect and analyze IoT information, this paper proposes a topographic information-based key management technique that considers IoT information errors. The proposed technique allows IoT layout errors and groups topographic information into groups of dogs in order to secure connectivity of IoT devices in the event of arbitrary deployment of IoT devices in the cloud environment. In particular, each grouped terrain information is assigned random selected keys from the entire key pool, and the key of the terrain information contained in the IoT information and the probability-high key values are secured with the connectivity of the IoT device. In particular, the proposed technique can reduce information errors about IoT devices because the key of IoT terrain information is extracted by seed using probabilistic deep learning. 클라우드 환경에서는 센서 및 웨어러블 장치를 이용한 IoT 기기가 다양한 환경에서 응용되고 있으며 그에 따른 IoT 기기에서 생성되는 정보를 정확하게 판별하는 기술들이 활발하게 연구되고 있다. 그러나, 전력 및 보안과 같은 IoT 환경의 제약사항으로 인하여 IoT 장치에서 발생하는 정보가 매우 취약하기 때문에 금전 피해 및 인명 피해가 증가하고 있다. 본 논문에서는 IoT 정보를 정확하게 수집⋅분석하기 위해서 IoT 정보 오류를 고려한 지형 정보 기반의 키 관리 기법을 제안한다. 제안 기법은 IoT 장치를 클라우드 환경에서 임의로 배치할 경우 IoT 장치의 연결성을 확보하기 위해서 IoT 배치 오류를 허용하는 동시에 지형 정보를 개의 그룹으로 그룹핑 하도록 한다. 특히, 각 그룹핑 된 지형 정보에는 전체 키 풀에서 랜덤하게 선택된 임의의 키를 할당한 후 IoT 정보에 포함된 지형 정보의 키와 확률적으로 높은 키 값을 IoT 장치의 연결성으로 확보할 수 있도록 한다. 특히, 제안 기법은 확률적 딥러닝을 이용하여 IoT 지형 정보의 키를 시드로 추출하기 때문에 IoT 장치에 대한 정보 오류를 낮출수 있다.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼