http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
임채호,조인성,유승목 (사)한국CDE학회 2014 한국 CAD/CAM 학회 학술발표회 논문집 Vol.2014 No.2
Nowadays, the industry requires higher reliability and more precision than existing 2D X-ray of vision base testing technology. So, the needs of internal defects testing technology based on 3D transillumination images is increasing more and more. However, only a few developed countries like USA, Germany, and Japan etc. have the original technology about 3D transillumination image because of very high technology barrier to entry that engineering fileld. Therefore, platform technology development based on 3D transillumination image is necessary for the quality and enhancement of competitive power of parts making industry. In this study, systematization and development of integrated technology in order to check and observe the inner part of manufactured products using CT X-ray without cutting products was performed. Concretely, 1) the localization of principal industrial CT components, 2) the development of a software for high speed processing and analysis of images, 3) the research and development of the building technology of automated integration computed tomography testing machine were implemented. Accordingly, the outline of development technology and research result until now and future direction with some examples will be introdued in this paper.
인터넷 해킹피해 시스템자동분석에이젼트(AIAA) 및 침입자 역추적 지원도구 구현
임채호,원유헌,Im, Chae-Ho,Won, Yu-Heon 한국정보처리학회 1999 정보처리학회논문지 Vol.6 No.11
Autonomous Intrusion Analysis Agent(AIAA) is Incident Response Team staff's tool that scans, analyses, reports and alerts the traces of intrusion based on system logs and intruder's backdoors inside compromised system by IR staff after security incident is reported to the IR team. AIAA is intelligent to recognize to check out who is intruder from all the user accounts and to report the suspected candidates to the master control system in IR team. IR staff who controls AIAA with master system can pick up an intruder from the candidates reported by AIAA agent and review all related summary reports and details including source host's mane, finger information, all illegal behavior and so on. AIAA is moved to compromised system by the staff to investigate the signature of intrusion along the trace of victim hosts and it is also operated in secret mode to detect the further intrusion. AIAA is alive in all victim systems until the incident is closed and IR staff can control AIAA operation and dialogue with AIAA agent in Web interface.