http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
차연수,이태규,양희천,김용휘 한국농화학회 1985 Applied Biological Chemistry (Appl Biol Chem) Vol.28 No.4
Physicochemical properties of the Lotus root starch were investigated. The shape of starch granules was elliptical with the average size of 29∼35μ. Starch showed B-type X-ray pattern. The content of amylose was 22.1%. The blue for starch and amylose were 0.280 and 0.692, respectively. The alkali number was 4.74. By X-ray diffraction examination, gelatinization began at 55℃∼60℃ and almost completed at 65℃∼70℃.
車連水,李泰圭,梁熙天 又石大學校 1984 論文集 Vol.6 No.-
This experiment was attempted to studies on nutrition value of pond snail. The results are summarized as follows. 1. The proximate composition of pond snail was shown to be crude protein 60,84%, Crude vat 7.89%, CRUDE ASH 14,26% and total sugar 17.89%, respectively. 2. Glu. Asp. Leu. and Phe. were dominant amino acid in pond snail, having 16.77%, 8.6%, 7.99% and 7.19% of total free amino and content respectively. The content of essential amino acid were Ileu. 217.9mg, Leu467.3 mg, Lys. 393.4 mg, Phe. 421.1 mg, Thr. 269.0 mg and Val. 251.1 mg, respectively. 3. The predominant fatty acids were Stearic 30.97%, Palmitic 28.49%, Linolenic 15% and Linaleic 8.12%, Respectively and the P/S Ratio was 0.54. 4. The content of minerals in pond snail were K 1050 mg, Na 106 mg, Ca 1202 mg, Mg 43.3 mg, Cu 10.5 mg, Fe 8 mg and Zn 0.9 mg, respectively.
관리자에게 경고 알림을 보낸 후 트래픽 측정을 기준으로 RDDoS 공격을 방어하는 시스템 설계
차연수,김완태 (사)디지털산업정보학회 2024 디지털산업정보학회논문지 Vol.20 No.1
Recently, a social issue has arisen involving RDDoS attacks following the sending of threatening emails to security administrators of companies and institutions. According to a report published by the Korea Internet & Security Agency and the Ministry of Science and ICT, survey results indicate that DDoS attacks are increasing. However, the top response in the survey highlighted the difficulty in countering DDoS attacks due to issues related to security personnel and costs. In responding to DDoS attacks, administrators typically detect anomalies through traffic monitoring, utilizing security equipment and programs to identify and block attacks. They also respond by employing DDoS mitigation solutions offered by external security firms. However, a challenge arises from the initial failure in early response to DDoS attacks, leading to frequent use of detection and mitigation measures. This issue, compounded by increased costs, poses a problem in effectively countering DDoS attacks. In this paper, we propose a system that creates detection rules, periodically collects traffic using mail detection and IDS, notifies administrators when rules match, and Based on predefined threshold, we use IPS to block traffic or DDoS mitigation. In the absence of DDoS mitigation, the system sends urgent notifications to administrators and suggests that you apply for and use of a cyber shelter or DDoS mitigation. Based on this, the implementation showed that network traffic was reduced from 400 Mbps to 100 Mbps, enabling DDoS response. Additionally, due to the time and expense involved in modifying detection and blocking rules, it is anticipated that future research could address cost-saving through reduced usage of DDoS mitigation by utilizing artificial intelligence for rule creation and modification, or by generating rules in new ways.