http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Kwon, Seungmin,Yoo, Hong Hee Korean Society for Precision Engineering 2015 International Journal of Precision Engineering and Vol.16 No.10
In a multi-packet blade system, random mistuning always exists among blades due to several reasons such as manufacturing tolerance, material irregularity and operation wear. It is well known that mistuning in a periodic structure often results in vibration phenomena such as mode and transient response localization. In this paper, a structural dynamic model of a randomly mistuned rotating multi-packet blade system subjected to cyclic nozzle forces is proposed. The accuracy of the proposed model is first validated by comparing its numerical results to those obtained with a finite element model. Then, using the proposed model, the relation between mode and transient response localization is investigated and a design guideline for multi-packet blade systems subjected to cyclic nozzle forces is suggested.
Taxonomic revision of the subgenus Bothynoptera (Coleoptera: Carabidae) from Korea
Seungmin Shin,Eun Young Choi,Jong Bong Choi,Myeonghwan Kim,Taeyeong Kwon,Hee Soo Lee,Sodavy Gnim,Jong Kyun Park 한국응용곤충학회 2024 한국응용곤충학회 학술대회논문집 Vol.2024 No.04
Subgenus Bothynoptera Schaum, 1863 of the genus Parena is mainly found in Oriental region. Despite this widespread distribution, species of the subgenus Bothynoptera are poorly known in Korea. While a total of 14 species have been recorded worldwide, only 3 species have been recorded in Korea. In this study, as a revisional work of Korean known species, a pictorial key and photographs of habitus and male genitalia for each species are provided, with a newly recorded species in Korea.
Seungmin Kim,Kookheui Kwon 한국방사성폐기물학회 2022 한국방사성폐기물학회 학술논문요약집 Vol.20 No.1
KINAC (Korea Institute of Nuclear Non-proliferation and Control) is entrusted with the NSSC (Nuclear Safety And Security Commission) to conduct threat assessments for nuclear facilities. As part of the threat assessment, DBT (Design Basis Threat) must be established every three years, and a threat assessment report must be developed for DBT establishment. This paper suggests a method for collecting and analyzing cyber threat information for the development of a cyber security threat assessment report. Recently, cyber threats not only in the IT (Information Technology) field but also in the ICS (Industrial Control System) field are rapidly increasing. As cyber threats increase, threat information including related attack techniques is also increasing. Although KINAC is conducting a threat assessment on cyber security at nuclear facilities, it cannot collect and analyze all cyber threat information. Therefore, it is necessary to determine a reliable source of threat information for threat assessment, and establish a strategy for collecting and analyzing threat information for DBT establishment. The first method for collecting and analyzing threat information is to first collect threat information on industrial fields with high similarity to nuclear facilities. Most of the disclosed cyber threat information is in the IT field, and most of this information is not suitable for closed-network nuclear facilities. Therefore, it is necessary to first collect and analyze threat information on facilities that use networks similar to nuclear facilities such as energy and financial sector. The second method is to analyze the attack technique for the collected threat information. The biggest factor in DBT reset is whether there is a new threat and how much it has increased compared to the existing threat. Therefore, it is necessary to analyze which attack technique was used in the collected threat information, and as part of the analysis, a cyber attack analysis model such as a kill chain can be used. The last method is to collect and manage the disclosed vulnerability information. In order to manage vulnerabilities, it is necessary to analyze what assets are in the nuclear facility first. By matching the reported vulnerability with the CDA (Critical Digital Asset) in the facility, it is possible to analyze whether the CDA can be affected by a cyber attack.As cyber threats continue to increase, it is necessary to analyze threat cases of similar facilities, attack techniques using attack models, and vulnerability analysis through asset identification in order to develop a threat assessments report.
Kwon Sung Chan,Bang Seungmin,Park Young Nyun,Park Ji Hoon,Kim So Jeong,Jo Jung Hyun,Chung Moon Jae,Park Jeong Youp,Park Seung Woo,Song Si Young,Park Eunhyang,Lee Hee Seung 거트앤리버 소화기연관학회협의회 2023 Gut and Liver Vol.17 No.6
Background/Aims: Programmed death-ligand 1 (PD-L1) expression in tumor cells is associated with a poor biliary tract cancer (BTC) prognosis; tumor-infiltrating immune cells in the tumor microenvironment are associated with a better prognosis. The effect of PD-L1 expression on immune cells on survival is unclear. We investigated the relationship between PD-L1 expression in immune cells and BTC prognosis. Methods: PD-L1 expression was evaluated using an anti-PD-L1 22C3 mouse monoclonal primary antibody, and its relationships with clinical characteristics and prognosis were analyzed using the Cox proportional hazard model to investigate the prognostic performance of PD-L1 in BTC. Results: Among 144 analyzed cases, patients with positive PD-L1 expression in tumor cells and negative PD-L1 expression in immune cells showed poorer overall survival rates than those exhibiting other expressions (tumor cells: hazard ratio [HR]=1.023, p<0.001; immune cells: HR=0.983, p=0.021). PD-L1 expression in tumor cells was an independent predictor of poor overall survival (HR=1.024, p<0.001). In contrast, PD-L1 expression in immune cells was a predictive marker of good prognosis (HR=0.983, p=0.018). Conclusions: PD-L1 expression in immune cells may be used as an independent factor to evaluate the prognosis of patients with BTC.