http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
이덕규,이임영 순천향대학교 부설 산업기술연구소 2004 순천향 산업기술연구소논문집 Vol.10 No.2
The method of broadcast encryption has been applied to the transmission of digital information such as multimedia, software, and paid TV on the open network. In this broadcast encryption method, only previously authorized users can gain access to digital information. When broadcast message is transmitted, authorized users can first decode the session key using the previously given private key and get digital information using this session key. This way, users retrieve a message or a session key using the key transmitted by broadcasters. For their part, broadcasters need to generate and distribute keys. Broadcasters should also carry out efficient key renewal when users subscribe or un-subscriver. In this paper use a broadcast, and present the DRM model, using that look into the requirement about the contents and apply also the concept of a broadcast encryption. We offer the authority to copy as the number of reproduction to want to the user, and the low so that we were convenient because we used.
Lee Deok-Gyu,Lim Hye-Jin,Lee Ha-Yeong,김동명,Lee Kyung-Ho,Byun Ju-Young,Shin Yong-Beom 한국바이오칩학회 2023 BioChip Journal Vol.17 No.4
In this study, we introduced a simple method for detecting nucleoside triphosphates (NTPs) using controlled transcription- driven light-up aptamer amplifi cation. Based on the concentration of target NTP, the light-up aptamer was amplifi ed using a DNA template encoding the Broccoli aptamer sequence through an incomplete transcription mixture (without each NTP). The Broccoli aptamer associated with DFHBI-1T produced signifi cantly enhanced fl uorescence signals that could sensitively detect NTPs in a label-free manner. In addition, the proposed assay was useful for quantitatively detecting NTPs in serum. Thus, we expect that this method has great potential for NTP analysis in bioassays and biological researches.
Deok Jea Cha,Ju Il Kim,Min Kwon,Yong Gyu Lee 한국응용곤충학회 2014 한국응용곤충학회 학술대회논문집 Vol.2014 No.10
PVY (Potyviridae: potyvirus) is one of the most important potato virus affecting seed potato production and also it is transmitted non-persistently via aphids. For healthy seed potato production, a virus detection system is highly important in addition to aphid monitoring and control. To achieve this detection method, it need to fast and easy to use. About two decades ago RT-PCR based PVY detection method was developed. However that was very time consuming and has low sensitivity. Here, we developed an advanced PVY detection method which a uses the boiling extraction of the viral RNA from aphid stylet and amplification by specific primers located in the viral capsid protein gene. Therefore, it could directly synthesize cDNA of PVY viral capsid gene from extracted RNA of PVY using one-step RT-PCR method in very short time compared to previous methods due to the omission of RNA extraction step. We confirmed this PVY detection method using the two aphid species (Macrosiphum euphorbiae and Aphis gossypii) that known as PVY vectors. The efficiency of this PVY detection method was 60% to 80% from two the aphid species. Hence, this method could be potentially applied to virus free seed potato production programs.
Software Engineering for Security : Towards Secure Software Architecture
Deok Gyu Lee,Rosslin John Robles,Dong-Ju Kang,Jong Wook Han 한국멀티미디어학회 2008 한국멀티미디어학회 학술발표논문집 Vol.2008 No.1
Most software systems today are related to distributed systems. And because of it, security has been an issue of immense concern. As practiced before, security is incorporated in a software system after all functional requirements have been finished. This paper discusses the need of incorporating security concerns in the software development life cycle. We survey different research areas that are concerned in the merging of software engineering and security. The paper focuses on the use of software architecture to solve problems regarding engineering of secure systems.
A DRM Model for Copyrights Protection based on Hiding Information
Deok Gyu Lee,Jianhua Ma 보안공학연구지원센터 2006 International Journal of Multimedia and Ubiquitous Vol.1 No.4
There have been researches into digital watermarking technology or Fingerprinting vigorously to safeguard 'Protective rights for knowledge and poverty' for digital contents. DRM, Digital Rights Management, is not only 'Protective rights for knowledge and poverty', but also management and systems that are necessary to put out, circulate and use for contents. This technology, DRM, encrypts contents to protect digital contents and they are sold users on. Sellers transmit contents with 'Usage Right' and a license including a key of encryption. The key of encryption decodes encoded files. The right of usage restricts users' application of contents. Even if digital contents that are applied the DRM are coped illegally and circulated, contents will be protected from that because a player of DRM checks existence of licenses and allows contents to be restored. However, this method might cause users to feel inconvenient since the users can only restore contents through the licenses offered by a player or a Smartcard. If radio as well as cable is used popularly in the future, there will be a lot of limits to use those kinds of players. In the method of that, the method using players need different players in order to work successfully in wired and wireless environment. In the case of using Smartcards, there might be a dangerous situation when the Smartcards disappeared. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.
Q-bit의 확률론적 데이터를 이용한 트러스 구조물의 최적 설계
이돈우 ( Lee¸ Don-woo ),하현주 ( Ha¸ Hyun-ju ),이규민 ( Lee¸ Gyu-min ),손수덕 ( Shon¸ Su-deok ),이승재 ( Lee¸ Seung-jae ) 한국구조물진단유지관리공학회 2023 한국구조물진단유지관리공학회 학술발표대회 논문집 Vol.27 No.2
양자 컴퓨팅은 양자 컴퓨터의 개발로 인해 많은 연구자에 의해 개발되고 있지만, 컴퓨터공학 및 물리 등의 분야에 한정되어 연구가 진행되고 있다. 하지만 건축 분야에서는 이러한 신기술의 접목이 늦은 편에 속하며, 양자 컴퓨팅과 같은 신기술을 빠르게 접목할 필요가 있다. 따라서 본 논문에서는 Q-bit의 확률론적 데이터를 이용하여 메모리를 구성하는 메타휴리스틱스 알고리즘을 제안하고, 트러스 구조물 예제에 적용하여 사이즈 및 위상 최적화를 수행하였다.
이덕규 ( Deok Gyu Lee ),한종욱 ( Jong-wook Han ) 한국정보처리학회 2013 한국정보처리학회 학술대회논문집 Vol.20 No.1
본 논문은 비행자료의 상태 및 흐름을 관리하여 내부 혹은 외부의 바이러스의 피해 및 비행자료 변조 및 수정 등의 해킹 발생에서 비행자료 시스템의 가용성, 신뢰성 및 무결성을 강화시켜 비행자료시스템 운영 시 관제 서비스를 마비시키는 다양한 사이버 테레에 대응하여 실시간으로 자동으로 재해를 복구하는 시스템 및 그 방법에 대한 것이다. 관제사가 비행자료 상태 및 흐름 관리함에 있어 비행자료를 일방향으로 상태를 변경하거나, 진행하는 방식이 아닌, 일정 시간동안 비행자료의 시간차를 두어 상태를 관리함으로써 비행자료를 보호하여 시스템을 안전하게 운용할 수 있는 장점을 갖는다.