http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
林永煥 陸軍士官學校 1984 한국군사학논집 Vol.26 No.-
The evaluation on 'The Earth', one of the major work of Lee, Kang Soo, has been disagreend between good and bad for a long time, and it is to ve in the same situation now. when we think that exact literary evaluation is the goal of lite-rary study, such disagrrement is a important problem. The aim of this paper is to study on this disagreement, and to evaluate this work exactly. The cause of disagreement of evaluation on this work is to be on disagreement of literary ideas, that is, confrontation between idealism and realism, and if evaluate this work with objective and universal standards of literary evaluation, we can sure that this work is very good work. This is the discussion and the conclusion of this paper.
인터넷상의 동영상 메일을 재생하기 위한 실시간 연출 기법 연구
임영환,이선혜,Im, Yeong-Hwan,Lee, Seon-Hye 한국정보처리학회 1999 정보처리학회논문지 Vol.6 No.4
본 논문은 기존이 텍스트 위주였던 인터넷 한 단계 넘어 동영상, 음향, 그래픽 등 다양한 멀티미디어 데이터를 이용한 프리젠테이션 메일을 제안한다. 이를 개발함에 있어 가장 큰 문제점은 프리젠테이션 메일을 구성하는 요소가 일반적으로 거대한 용량을 가지는 멀티미디어데이터라는 것이다. 거대한 용량의 멀티미디어 데이터는 전송 및 저장에 있어서 많은 문제점을 갖게 되는데, 이를 극복하기 위해 실제 데이터 부분과 제어 데이터를 분리시켜 제어 프로그램만을 전달하고 실제 데이터는 보낸 사람의 컴퓨터에 있거나 고속 접속이 가능한 원격지 서버에 저장되어 실제 연출할 때에 서버로부터 전송하는 방식을 취한다. 이러한 상황에서 젱 프로그램에 포함된 하이퍼프리젠테이션을 인터넷상에서 실시간으로 재생하기 위한 버퍼관리 및 쓰레드 스케줄링 기법을 제안하였다. 그리고 또 다른 문제는 멀티미디어 연출을 제어하는 방법은 일반 사람들이 사용할 수 있을 정도로 쉬워야 한다는 점이다. 본 논문은 제어 프로그램을 제작하는 도구로써 VIP(Visual Interface player)를 이용하였으며 그것을 LAN기반엣 구현하고 실험한 결과를 제시하였다. In this paper, a multimedia mail including video, sound, graphic data has been proposed as the next generation mail of the text based mail. In order to develop the multimedia mail, the most outstanding problem is the fact that the multimedia data are too huge to send them to the receiving end directly. The fact of big data may cause many problems in both transferring and storing the data of the multimedia mail. Our main idea is to separate between a control program for the multimedia presentation and multimedia data. Since the size of a control program is as small as a plain text mail, it has no problem to send it attached to the internet mail to the receiver directly. Instead, the big multimedia data themselves may remain on the sender's computer or be sent to a designated server so that the data may be transferred to the receiver only when the receiver activates the play of the multimedia mail. In this scheme, our research focus is paced on the buffer management and the thread scheduling for the real time play of the multimedia mail on internet. Another problem is to provide an easy way of editing a multimedia presentation for an ordinary people having no programming knowledge. For the purposed, VIP(Visual Interface Player) has been used and the results or multimedia mail implemented on LAN has been described.
林永煥 陸軍士官學校 1976 한국군사학논집 Vol.15 No.-
One important feature of the novel is that is deals with everything which is human. So, there have always been as many kinds of novel as there have been readers to discover them. We often classify the novel according to the subject or theme. We may hereby use the terms such as "historical novel", "psychological novel", "social novel", "political novel", "detective novel", "peasant novel" and the like. This kind of classification of course, is by no means a classification of literary genre and it has no special meaning itself. It helps us in some ways, however to understand what a novelist is trying to say, and how he is conveying his ideas in his works. Just as a novelist may deal with many different aspects of human life, so a particular subject or theme may be expressed in many ways according to the various literary trends. As for the so-called peasant novels, no two writers are alike in their ways of presentation of the peasants life Analysed in this paper are the divergent characteristics of some groups of the peasant novels, and an the basis of this analysis is drawn a conclusion that defines a general inter-relationship of those characteristics.
Effects of Sugar Type on Viability of Frozen-Thawed Canine Spermatozoa
임영환,손정민,신영지,김영실,이두수,윤기영,신상태,조종기 사단법인 한국동물생명공학회 2008 한국동물생명공학회지 Vol.23 No.4
This study was conducted to investigate the effects of type of the sugar supplemented to the extender on the vigor, viability and intact acrosomal rates of frozen-thawed dog spermatozoa. The ejaculated semen was diluted with TRIS- citric acid extender containing 200 mM TRIS, 73 mM citric acid, 6% (v/v) glycerol, 20% (v/v) egg yolk, 1% (v/v) antibiotics (streptomycin/penicillin), 44 mM sugar, which was either glucose, fructose or glucose-fructose combination, and distilled water to make the final volume of 100 ml. Extended semen samples were cooled at 4℃ for an hour, packaged in 0.25 ml straws, equilibrated for 10 minutes in liquid nitrogen vapor, and frozen in liquid nitrogen. Samples were thawed by placing straws into 37℃ water for 120 seconds. After thawing, vigor, viability and intact acrosomal rates of frozen-thawed semen were compared according to type of sugar. No significant differences were observed between glucose and fructose groups. In addition, combination of the 2 sugars also did not show any significant differences in the vigor, viability and intact acrosomal rates. In conclusion, glucose and fructose were equally efficient as sugar supplements for freezing extender.
A Study on Insider Behavior Scoring System to Prevent Data Leaks
임영환,홍준석,국광호,박원형 한국융합보안학회 2015 융합보안 논문지 Vol.15 No.5
The organization shall minimize business risks associated with customer information leaks. Enhance information security activities through voluntary pre-check and must find a way to detect the personal information leakage caused by carelessness and neglect accident. Recently, many companies have introduced an information leakage prevention solution. However, there is a possibility of internal data leakage by the internal user who has permission to access the data. By this thread it is necessary to have the environment to analyze the habit and activity of the internal user. In this study, we use the SFI analytical technique that applies RFM model to evaluate the insider activity levels were carried out case studies is applied to the actual business.