http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
손애랑,최지영,김정아,조세훈,허광화,박성희,정시련,정태천,장영동,손근종,이승호 한국생약학회 2005 생약학회지 Vol.36 No.1
develop an whitening cosmetics, we isolated the melanogenesis inhibitors from the unripe fruits of Poncirus tri-foliata (Rutaceae). Isolated compounds were identified as poncirin(1), naringin(2), bis(2-methylheptyl)phthalate(3), avenalumicacid methyl ester(4) by comparison of physical and spectral data with those reported in the literature. Among the isolated com-pounds, bis(2-methylheptyl)phthalate showed most potent inhibitory effect on the melanogenesis in cultured B-16 mouse mel-anoma cell lines(IC50, 36.8M) compared with kojic acid(IC50, 150M).Key wordsPoncirus trifoliata, Rutaceae, bis(2-methylheptyl)phthalate, whitening cosmetics, melanogenesis inhibitors
손영동 ( Son Young Dong ),이민재 ( Lee Min Jae ) 한국군사학회 2017 군사논단 Vol.89 No.-
It is unlikely that global warfare will occur due to super connectedness, but there is still a risk of conflict in many regions. In many parts of the world, civil war and endless terrorism are taking place, and the tools of warfare available to national and non-state actors are diversifying. Among them, cyber weapons which are much cheaper than other weapons and can be obtained easily by anyone, can put the critical infrastructures of a country at risk simultaneously. The characteristics of cyber threats are that surprise attack and destruction vary. The situation can change at any time if terrorists who are focused on mass destruction and extreme social turmoil understand the degree of destruction caused by new weapons. If the disgruntled terrorist group uses the lethal and destructive cyber skills properly, the size of the confusion can surpass that of traditional warfare. It is not just a hostile relationship. Just as a hacker group declares propaganda against the state and claims that they are legions, the notion of a regular army in cyberspace is slim, and the free and disordered internet provides a better environment for causing social disruption. Cyber space has significantly lowered the barriers to attacks by state and non-state actors, and the internet which is linked intricately, has become a new stage of action for terrorists. Even if they were not physically armed with nuclear weapons or missiles, weapons t process them were added to their hands. Cyber warfare with asymmetric and non-frontal characteristics is a battle of time and technology, and a battle of human perception. Until now, the border line between the countries was the criterion of national security. However in the digital world, the cyber countermeasures of the countries, the human resources, technology, and digital leadership to support them are the frontiers. In this paper, we propose a soft killing threat that is getting more and more sophisticated, an attack on infrastructure that is becoming more radical, the aspect of North Korea`s cyber provocation, and finally the direction of our military. The strengthening of cyber power can serve as a driving force to open a new horizon for military innovation, and it is necessary to make cyber security, which combines national security and growth power, a top priority for national defense reform.
손영동 ( Son Young-dong ) 한국군사학회 2018 군사논단 Vol.94 No.-
With almost all personal, social and national activities connected to the network, now we cannot imagine a world without the internet. The connectivity of economic activity is becoming denser and is gradually weakening the independence of nations. Many countries have been unable to develop their own economic and foreign policy, and a rise of warfare costs is decreasing the possibility that a country will unilaterally strike an all-out war. Cyber space which has already become a source of wealth, is becoming the epicenter of terrorism. As the real world and the virtual world get mixed up, the greater the connectivity, the more vulnerable we are to various terrorist threats. For the extreme terrorist group, there are more opportunities to do massive damage with cyber attacks. Cyber attacks can cause tremendous confusion and fear to victims or potential victims because it is difficult to track the epicenter. Almost every country, including the United States, China, Israel, Russia, Britain, and Japan, are building effective and robust systems to respond to any form of cyber threats. The most intense cyber warfare areas in the world are the United States versus China and Russia, Israel versus Arab countries, and the Republic of Korea with the best cyber infrastructure. Countries around the world are struggling to create a response system to fight against the upcoming cyber warfare by establishing an organization that is dedicated to cyber warfare. Beyond the defense measures to prevent cyber attacks, they are developing cyber weapons such as malicious codes and electronic bombs that can paralyze infrastructure of other countries, and have created a secret organization that is not part of any government sector in order to avoid retaliation.