http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
부분입사형 초음속 터빈의 블레이드 표면 온도에 블레이드 앞전 형상이 미치는 영향
이상도(Sangdo Lee),김귀순(Kuisoon Kim),이인철(Inchul Lee),구자예(Jayae Koo),문인상(Insang Mun),이수용(Suyoung Lee) 한국추진공학회 2008 한국추진공학회지 Vol.12 No.4
In this paper, numerical analysis of the surface gas temperature on turbine blades has been performed to investigate the temperature profiles characteristics of a partial admission supersonic turbine driven by high temperature and pressure gas of pyro-starter with two different types of turbine blade edge shape. In order to examine the surface gas temperature on turbine blades at initial starting, computations tlave been carried out at several turbine rotational speeds in the range of 0~10,000 rpm for each type of turbine edge shape. Sharp edge and Round edge types were taken as the turbine edge shape factor. As turbine rotational speed increased, the average temperature of turbine blades was further decreased. It was also found that the surface temperature of turbine blades with a sharp edge was lower than round-type edge turbine blades.
A Study on a Job Stress Evaluation Methodology using data mining and RSM
Yonghee Lee,Dongchoon Lee,Byungun Lee,Sangdo Lee 대한인간공학회 2007 대한인간공학회 학술대회논문집 Vol.- No.-
Job stress is caused by a poor match between us and our complicated condition that can be classified with physical, psychosocial and environmental factors. While a factor analysis and management policy conduct through a survey research which is used to study job stress problem mostly, there are limitations such as dimensionality associated with large data set of stress factors problem. In order to address the limitations on the data computing and analysis capabilities, we propose an advanced survey analysis procedure incorporating Data Mining (DM) into a statistical analysis, and provide detailed statistical relationships among the factors and interesting responses by utilizing Response Surface Methodology (RSM). The objective of this research is to show how DM techniques can be effectively applied into a survey analysis related to a job stress evaluation by applying a correlation-based feature selection (CBFS) method.
이언(Eon Lee),강형석(Hyoungseok Kang),이상석(Sangseok Lee),노상도(Sangdo Noh),이창우(KwangMyong lee),이광명(ChangWoo Lee) (사)한국CDE학회 2010 한국 CAD/CAM 학회 학술발표회 논문집 Vol.2010 No.1
Building Information Modeling (BIM) is the virtual representation of the physical and functional characteristics of a facility from inception onward. As such, it serves as a shared information repository for collaboration throughout a facility’s lifecycle. BIM is a new paradigm which can perform a diverse engineering activity such as design, simulation, structure analysis, etc and support a based information model in construction industry. In these days, many construction companies tried to perform a project efficiently by constructing and using BIM and carried out a research related in PMIS(Project Management Information System), etc. But a real case of research focused on 3D modeling object and control and share of engineering information is insufficient. In this research, we suggest an efficient BIM model and information share system based PLM for collaboration based on analyzing and researching a case of constructing BIM when perform construction project.
( Sangdo Lee ),( Jun-ho Huh ) 한국정보처리학회 2019 한국정보처리학회 학술대회논문집 Vol.26 No.2
The results from the analysis of recent security breach cases of industrial control systems revealed that most of them were caused by the employees of a partner company who had been managing the control system. For this reason, the majority of the current company security management systems have been developed focusing on their performances. Despite such effort, many hacking attempts against a major company, public institution or financial institution are still attempted by the partner company or outsourced employees. Thus, the institutions or organizations that manage Industrial Control Systems (ICSs) associated with major national infrastructures involving traffic, water resources, energy, etc. are putting emphasis on their security management as the role of those partners is increasingly becoming important as outsourcing security task has become a common practice. However, in reality, it is also a fact that this is the point where security is most vulnerable and various security management plans have been continuously studied and proposed. A system that enhances the security level of a partner company with a Virtual Desktop Infrastructure (VDI) has been developed in this study through research on the past performances of partner companies stationed at various types of industrial control infrastructures and its performance outcomes were statistically compiled to propose an appropriate model for the current ICSs by comparing vulnerabilities, measures taken and their results before and after adopting the VDI.
Sangdo Oh,Chaeho Lee,Sukki Yoon,Kacy K. Kim,Yung Kyun Choi 글로벌지식마케팅경영학회 2015 Global Fashion Management Conference Vol.2015 No.06
This research examines the effect of luxury brand's logo on disparity between explicit and implicit attitudes. Using implicit association test, the results show that there is no correlation between implicit attitude and explicit attitude towrd a luxury product when luxury brand's logo is present (i.e., Prada). In contrast, implicit attitude and explicit attitude are negatively correlated when luxury logo is absent (i.e., Bottega Veneta).
A Study on Psychological Change of Depressed Children in a Psychotherapy Program with Loess
Lee Younghee,Lee Sangdo 국제온돌학회 2016 International Journal of Ondol Vol.9 No.2
The purpose of this study is to develop a psychotherapy program using loess that can help to reduce depression and daily life stress and to improve self - esteem. When depression begins in childhood, it is confirmed that the recurrence rate is very high in adulthood. There was no significant change in depression as a physical symptom with the use of loess, but it was significantly decreased in negative depression symptom that derogatory oneself, and significant decrease in loss of interest, behavioral problems, and depressed emotions. This suggests that psychological and social intervention for children with depression can be effectively promoted and depression can be reduced by suggesting appropriate psychotherapeutic interventions for children to cope with depression.
Lee, Byung In,Yi, Sangdoe,Hong, Seung Bong,Kim, Myeong-Kyu,Lee, Sang Ahm,Lee, Sang Kun,Shin, Dong-Jin,Kim, Jae Moon,Song, Hong Ki,Heo, Kyoung,Lowe, Wing,Leon, Teresa Wiley (Blackwell Publishing) 2009 Epilepsia Vol.50 No.3
<P>To evaluate the efficacy and safety of pregabalin (PGB) as adjunctive therapy, using a flexible-dosing schedule in Korean patients with refractory partial-onset seizures.</P>
그리드 기반의 가상 스크리닝 클라이언트(DrugScreenr-G) 설계 및 구현
이상도(Sangdo Lee),이세훈(Sehoon Lee),황순욱(Soonwook Hwang),김진철(Jinchel Kim) 한국정보과학회 2010 한국정보과학회 학술발표논문집 Vol.37 No.1B
그리드 인프라를 활용하여 대규모 계산 자원이 필요한 가상 스크리닝(Virtual Screening)에 관한 연구가 국제 WISDOM 프로젝트를 중심으로 활발하게 진행 중에 있다. 기존의 연구들은 싱글 클러스터나 개인의 컴퓨터를 중심으로 계산 자원을 활용하는 방식으로 연구가 진행이 되었다. WISDOM을 중심으로 대규모 말라리아 (Malaria), 조류 독감(Avian Flu) 에 대한 대규모 신약 후보 탐색에 관한 연구들이 진행이 되었으며 한국과학기술정보연구원(KISTI)의 그리드 개발팀은 2007년도부터 국제 공동 파트너로 연구에 참여하고 있다. 공동연구에 참여하면서 신약 연구 개발자들이 Docking 및 그리드 자원을 활용하기 위한 접근 방식에 있어서 기존 방식들을 활용하기 어려운 점과 검색된 신약 물질을 분석하는 도구의 활용이 어려움이 많아 그리드 기반의 가상스크리닝 도구인 DrugScreenr-G(이하, DSG-G 클라리언트)를 개발하게 되었다. 본 논문은 개발된 DSG-G 클라이언트에 관한 개발 및 구조에 관한 내용이다.
제어시설 사이버공격 대응을 위한 사이버보안 프레임워크 (Framework) 연구
이상도(SangDo Lee),신용태(Yongtae Shin) 인문사회과학기술융합학회 2018 예술인문사회융합멀티미디어논문지 Vol.8 No.4
지난 몇년간 발생된 수많은 정보시스템 해킹중 국가적 위험을 불러일으킬만한 사이버공격은 핵시설과 원전에 대한 사이버공격일것이다. 그중 대표적인 것이 이란 핵시설 스턱스넷 공격과 한국의 한 수원 사이버위협이라고 할 수 있다. 전자는 직접적인 사이버공격으로 인해 원전이 멈출 수 있다는 것을 보여주었고, 후자는 사이버해킹 위협만으로도 국민을 공포에 떨게 할 수 있다는 것을 보여주었다. 이 사건들 이후 산업 제어시설에 대한 사이버공격 위험성이 알려져서 보안이 강화되기 시작하였다. 원전 발전소도 이전의 소극적인 인터넷과 분리된 네트워크로 안전하게 운영된다는 개념에서 벗어나서 악성코드 등 사이버테러로 인해 공격을 받을 수 있다는 개념으로 변했다. 두 가지 개념의 차이점은 제어시설도 사이버공격으로 침해될 수 있다는 가능성에 기초하여 대응하기 위한 전략으로 세워졌다는 것이다. 그 점에서 미국은 이미 제어시설에 대한 보안프레임워크를 설정하여 대비하고 있다. 본 논문에서는 제어시설에 대한 사이버보안 공격사례 및 공격 시나리오를 식별하고, 각 시나리오별로 위험요소에 대한 대처방안을 분석한다. 이를 통해 국내 보안프레임워크 설계시 참조해야할 사항을 식별하여 보안성을 강화하고 설계시 안정성을 확보하고자 한다. Among many hacking attempts carried out in the past few years, the cyber-attacks that could have caused a national-level disaster were the attacks against nuclear facilities including nuclear power plants. The most typical one was the Stuxnet attack against Iranian nuclear facility and the cyber threat targeting one of the facilities operated by Korea Hydro and Nuclear Power Co., Ltd (Republic of Korea; ROK). Although the latter was just a threat, it made many Korean people anxious while the former showed that the operation of nuclear plant can be actually stopped by direct cyber-attacks. After these incidents, the possibility of cyber-attacks against industrial control systems has become a reality and the security for these systems has been tightened based on the idea that the operations by network-isolated systems are no longer safe from the cyber terrorism. The ROK government has established a realistic control systems defense concept and in the US, the relevant authorities have set up several security frameworks to prepare for the threats. This paper presented various cyber security attack cases and their scenarios against control systems, along with the analysis of countermeasures for them. Though this task, we attempt to identify the items that need to be considered when designing a domestic security framework to improve security and secure stability.