http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
전국에서 도축된 가축의 잔류검사에서 검출된 잔류물질 비교조사
박찬일 ( Chanil Park ),김지향 ( Ji Hyang Kim ),방성민 ( Seong Min Bang ),박양순 ( Yang Soon Park ),고대성 ( Dae Sung Go ) 한국동물위생학회 2020 한국동물위생학회지 (KOJVS) Vol.43 No.1
It was carried out to investigate the antibiotic residues detected by the residue tests for edible tissues of slaughtered livestock in Korea from January to November in 2019. Positive cases of qualitative test and analytical test for 11 months were 689 and 341, respectively. Positive cases of analytical test for cattle, pigs, horses and poultry were 164, 168, 2 and 7, respectively. Antibiotics were detected from 472 materials from 341 cases and classified as β-lactams 162 (37.9%), aminoglycosides 141 (33%), quinolones 69 (16.2%), sulfonamides 23 (5.4%), amphenicols 10 (2.3%), tetracyclines 9 (2.1%), macrolides 6 (1.4%) and the rest 7 (1.4%). Other materials were benzyl penicillin 119 (27.9%), (dihydro)streptomycin 105 (24.6%) and enrofloxacin (including ciprofloxacin) 39 (9.1%). In conclusion, strict management of benzyl penicillin and streptomycin in cattle and pigs should be implemented to reduce the positive cases of slaughtered livestock in Korea.
이동에이전트를 이용한 네트워크 패킷기반 침입탐지 시스템
방성민,송왕철 濟州大學校 情報通信硏究所 2000 情報通信硏究所論文集 Vol.3 No.-
The networked environment has the possibility of the illegal access to the private informations and the attacks via networks. Therefore. security management technologies to protect networks from intrusions and network attacks have been given much attention. Intrusion detection system is an important component of the security management system for large network. It is hard to adapt to the heterogeneous internet environment because of the conventional intrusion detection system depends on the specific system environments. The new intrusion detection architecture with mobile agent technology is proposed in the paper. The mobile agent is an itinerary software program that autonomously runs on behalf of its operator in a network environment. It helps the adaptability in the intrusion detection system and decrease the network traffic. For the purpose. we analyze the attack patterns and design the new intrusion detection architecture.