(JBE Vol. 20, No. 4, July 2015) (Regular Paper) 20 4, (JBE Vol. 20, No. 4, July 2015) ISSN
|
|
- 인혜 저
- 2 years ago
- Views:
Transcription
1 (JBE Vol. 20, No. 4, July 2015) (Regular Paper) 20 4, (JBE Vol. 20, No. 4, July 2015) ISSN (Online) ISSN (Print) 2-Subset Difference a), a) 2-Subset Difference Broadcast Encryption System Based on Secret Sharing Method Jae Hwan Lee a) and Jong Hwan Park a). Subset Difference(SD), (PRG: Pseudo-Random Generator) (SS: Secret Sharing). 2-SD SD. 2-SD SD. PRG SS 2-SD Jae Hwan Lee[9] SS SD SS 2-SD. SS SD 25%. 2-SD. Abstract Broadcast encryption system is a cryptographic primitive that enables a sender to broadcast a message to a set of receivers in a secure channel. Out of previous proposed broadcast encryption systems, the most effective is the one that uses the Subset Difference(SD) method in a binary tree structure. The SD method has been realized by two underlying approaches: Pseudo-Random Generator(PRG) and Secret Sharing(SS). 2-SD method is the generalized version of the SD method by which two subsets of revoked receivers can be dealt with by one subset (in an SD-based broadcast encryption system). The primary advantage of the 2-SD method is to further reduce the size of transmission overhead, compared to the SD method. Until now, however, there is no known broadcast encryption system that is based on such a 2-SD technique using either PRG or SS basis. In this paper, we suggest a new 2-SD broadcast encryption system using the SS-based technique that was suggested by Jae Hwan Lee et al. in 2014[9]. The new system can reduce the size of ciphertext by 25% of the one in the previous SS-based broadcast encryption system. Also, on a theoretical note, ours is the first 2-SD broadcast encryption system that is provably secure. Keyword : broadcast encryption, subset difference, secret sharing a) ICT (Department of Computer Science, College of ICT Convergence, Sangmyung University) Corresponding Author : (Jong Hwan Park) jhpark@smu.ac.kr Tel: ORCID: () (NRF-2014R1A1A ). Manuscript received April 14, 2015; revised June 24, 2015; accepted June 24, 2015.
2 1 : 2-Subset Difference (Jae Hwan Lee et al.: 2-Subset Difference Broadcast Encryption System Based on Secret Sharing Method). [1].,. TV, PPV (pay-per-view TV), DRM(Digital Right Management).,,., ( ~ ).. ( ) [2] [3][4][5] Naor, Naor, Lotspiech [2] SD(Subset Difference) ( ).,, log, log. SD Subset (PRG: Pseudo-random generator). PRG trade-off [6][7][8]. [9] Shamir -(Secret Sharing) SD ( ). PRG (security loss),. SD PRG SD 2-SD Fig. 1. Subset representation in SD(left) and 2-SD(right) methods SD [ 1]. root subtree root subtree. [ 1]. root subtree root subtree. 2-SD subtree SD [10] Naor 2-SD. 2-SD 1/ [11] 2-SD (collusion attack). Bhattacherjee [8] 2-SD,
3 (JBE Vol. 20, No. 4, July 2015) PRG SD. [8] 2-SD. 2-SD ( ) [8]. [8] worst case. 2-SD. [9] 2-SD. 2-SD ( 2- ) - -, -. 2-, log,., 1/4.., 1., 2- Table 1. Comparison between the previous, schemes and our new 2- scheme [2] log log CCA1 [9] log 2- log weak CCA1 weak CCA1 Subset Cover,,, setup, weak CCA1 : [9] =.,, : : 2- = 1 : 1.7 : [ 1],, 2-. PRG 2-SD.. 1.,.. 1..,. =. - (setup), (Encryption), (decryption) Setup( ):,. 2. Encryption( ):,.. 3. Decryption( ):.,.
4 1 : 2-Subset Difference (Jae Hwan Lee et al.: 2-Subset Difference Broadcast Encryption System Based on Secret Sharing Method) 2. Subset Cover Subset Cover, disjoint. =. CoverFinding,.,. (),., Subset Cover subset Subset Cover. 2.1 (Setup)..,. 2.2 (Encryption) , (Decryption), [9], (weak CCA1). (CCA1: Chosen ciphertext and launch-time attack) [2]., (collusion attack).,.,
5 (JBE Vol. 20, No. 4, July 2015) weak CCA1 CCA1. ( ),.. weak CCA1 ( ). - Setup. Setup(,n) ( ). - Adversarial Action... (1).. (2),.. (3),.. - Challenge.. bit. b=1 Encrypt(, ). b=0 Encrypt(, ). 1. weak CCA1 (negligible), weak CCA1. 4. =( ). CCA1 CCA1. CCA1 ( ). - Setup.. - Adversarial Action.. (1). (2). - Challenge.. bit. b=1. b=0. - Guess.. - Guess.. bit b. advantage Pr. bit b. advantage Pr.
6 1 : 2-Subset Difference (Jae Hwan Lee et al.: 2-Subset Difference Broadcast Encryption System Based on Secret Sharing Method) 2. CCA1 (negligible), CCA CCA1 one-time (CAP: chosen-plaintext attack). one-time CPA ( ). - Setup.. - Challenge.. bit. b=1. b=0. - Guess.. bit b. advantage Pr. 3. one-time CPA (ne- gligible), one- time CPA. 6. Shamir (SS: Secret Sharing) Shamir -SS -SS. (prime). -SS, 1.,. share, share 2. Lagrange. -SS 2.,. share 3, 2 share.. bit. -SS, b=1, b=0.. bit b. A. Pr.. Pr Pr -SS,.,,,. Pr.. Pr Pr
7 (JBE Vol. 20, No. 4, July 2015). Secret Sharing 2-SD 1. : 2 Secret Sharing 2. SS 2-SD Subset Fig. 2. Subset form in 2- leaf. Naor, Naor, Lotspiech [2] SD(Subset Difference) subtree root. 2-SD root subtree. [ 2], root root. 2-SD ( ), SD. 2-SD SD, 2-SD. SD (PRG: Pseudo-random generator) (SS: Secret Sharing). SD, PRG root PRG, SS root depth -SS. 2-SD. Bhattacherjee [8] PRG 2-SD, 3 ( root ). SS 2-SD. [9] 2-SD Coverfinding. 2-,,, log,., log,,. (worst case) 2- bits, bits, 2-25% SS. [ 2] root subtree.. 1), 2) root subtree, root subtree.. 1)
8 1 : 2-Subset Difference (Jae Hwan Lee et al.: 2-Subset Difference Broadcast Encryption System Based on Secret Sharing Method), 2. [ 2],..,.. ( ),,. 1 -SS. root depth -SS, 2- ( ) depth -SS. depth ( -SS). -SS, 2.,. 2-, Coverfinding disjoint Coverfinding. Coverfinding disjoint. Coverfind- ing,. root subtree ( ) ( ).. 2). 1), ), ) 3) 2- Coverfinding ( ) ( )... Coverfinding root leaf, Steiner Tree, root disjoint ), root. 2), Coverfinding. 3) setup.
9 (JBE Vol. 20, No. 4, July 2015) Coverfinding let let let while( ) { Find two revoked node, in such that the least-common-ancestor of, does not con tain any other revoked node. 2- if and then else if and then else if and then set Remove nodes that are descendants of } return 2.2 Coverfinding Coverfinding while. 1. root. root while root root. while. worst case 1,. 3. Secret-sharing 2-SD Fig. 3. Example of key assignment in ). 2) =( ). 3) (AES ) 128 (prime). 4). 5) leaf (full binary tree),. 1.1 (Setup) 1. root subtree depth 1..
10 1 : 2-Subset Difference (Jae Hwan Lee et al.: 2-Subset Difference Broadcast Encryption System Based on Secret Sharing Method) 2. 1 root depth log. deg deg 6-8. deg deg 3. root subtree subtree depth subtree depth 2.,. 2 leaf depth. 1 III.2 2. [ 3] depth 4 root subtree root depth log. 5. root leaf SS deg. 7. -SS deg. 8. deg deg. 9. subtree root 10. -SS deg deg deg deg -SS deg deg deg deg deg deg.., deg log, 0 log log,. deg log, 0 log log,. log log log, log. 1.2 (Encryption), Coverfinding. 3. subtree depth,
11 (JBE Vol. 20, No. 4, July 2015) (6) index.. 7. (5). 8. subtree depth depth, 2, ,. 11. index deg deg., Coverfinding. 2- Coverfinding., (Decryption). deg deg 1. deg index. 5. deg deg
12 1 : 2-Subset Difference (Jae Hwan Lee et al.: 2-Subset Difference Broadcast Encryption System Based on Secret Sharing Method) ( ) Lagrange. 1,. mod deg index , ( ) Lagrange. 2,,. mod , modular =( ) CCA1, one-time CPA. weak CCA1. weak CCA1, CCA1, one-time CPA, 2-SD setup. ) weak CCA1. =( ) CCA1 one-time CPA
13 (JBE Vol. 20, No. 4, July 2015).. 4) (11).,.. Pr. weak CCA1.. advantage (negligible). Claim 1. Pr Pr setup.. (,.) root subtree leaf. 1), ( ). ( ),. 2), (). ( ), ( ). ( ), ( ). ) weak CCA1.,. 4) [9], 1 secret sharing.
14 1 : 2-Subset Difference (Jae Hwan Lee et al.: 2-Subset Difference Broadcast Encryption System Based on Secret Sharing Method),. ( ) (statistically identical). 5) () ( ),. weak CCA1.,... (, ),. 2. advantage 0. (II. 6 ) Claim 2. Pr Pr ) weak CCA1. setup. CCA1. 1), ( ). ( ),.. ( ), (abort). 2), (). (), (). ( ).,.... 5) 2-SD setup, (independently).
15 (JBE Vol. 20, No. 4, July 2015),. (abort), CCA1. abort 2-SD setup. Pr Pr. Claim 3. Pr Pr ) Claim 1., Claim 1, Claim 2, Claim 3. Claim 4, Claim 5, Claim 6. Claim 4. Pr Pr (for ) Claim 5. Pr Pr (for ),...,.. one-time CPA.... (15). Claim 6. Pr Pr (for ) Claim 7. Pr Pr ) weak CCA1. setup. one-time CPA. ( ) (). Pr Pr Pr Pr Pr Pr Pr Pr Pr Pr Pr Pr Pr Pr, 4..,. 2-SD.
16 1 : 2-Subset Difference (Jae Hwan Lee et al.: 2-Subset Difference Broadcast Encryption System Based on Secret Sharing Method) PRG(Pseudo-Random Generator) SD [2], SS(Secret Sharing) SD [9], SS(Secret Sharing) 2-SD 2-. [ 2] 1), 2), 3),, deg deg [] (header).,., 2- Coverfinding (worst case).. 1 index 1 overhead. 2- deg. (17). index. index [9].. index log bits. leaf log bits. index log bits., AES bits, 128bits. AES 128bits block 128bits. index log bits Cover- finding worst case 2- log bits bits(192KB), bits(320KB) bits(240kb). 2-, ( =80)/320 = 1/4 2. Table 2. Performance comparison to the existing methods [2] log log log [9] log log 2- log log
17 (JBE Vol. 20, No. 4, July 2015). < <2-., 320/192= /192= log.., 128bits bits(7.8KB) bits(151KB) 151/7.8= log PRG, 2- Lagrange -SS -SS... [9] - SD (Subset Difference) 2-SD. 2-SD - -, 2-SD Coverfinding. 2-SD 25%. (worst case) [9]. ( ) 2-SD. (PRG) 2-SD,. (References) [1] A. Fiat and M. Naor, "Broadcast encryption," Proceedings of the CRYPTO'93, volume 773 of LNCS, pp , Aug [2] D. Naor, M. Naor and J. Lotspiech, "Revocation and tracing schemes for stateless receivers," Proceedings of the CRYPTO 2001, vol of LNCS, pp , Feb [3] Y. Dodis and N. Fazio, "Public key broadcast encryption for stateless receivers," Proceedings of the Digital Rights Management Workshop, vol of Lecture Notes in Computer Science, pp , [4] D. Boneh, C. Gentry and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys," Proceedings of the CRYPTO 2005, vol of LNCS, pp , Aug [5] ChongHee Kim, YongHo Hwang and PilJoong Lee, "An efficient public key trace and revoke scheme secure against adaptive chosen ciphertext attack," Proceedings of the ASIACRYPT 2003, vol of LNCS, pp , Nov/Dec [6] D. Halevy and A. Shamir, "The LSD broadcast encryption scheme," Proceedings of the CRYPTO 2002, vol of LNCS, pp , Aug [7] M.T. Goodrich, J.Z. Sun and R. Tamassia, "Efficient tree-based revocation in groups of low-state devices," Proceedings of the CRYPTO 2004, vol of LNCS, pp , Aug [8] S. Bhattacherjee and P. Sarkar, Tree based symmetric key broadcast
18 1 : 2-Subset Difference (Jae Hwan Lee et al.: 2-Subset Difference Broadcast Encryption System Based on Secret Sharing Method) encryption, IACR Cryptology eprint Archive, Report 2013/786, [9] Jae Hwan Lee and Jong Hwan Park, Broadcast encryption system using secret sharing and subset difference methods, Journal of Broadcast Engineering, 20(1), pp , Jan [10] Ji Yong Jang, Dae Hun Nyung, and Joo Seok Song, 2-Subset Difference scheme for broadcast encryption, Journal of the Korea Institute of Information Security & Cryptology, 16(4), pp.1-5, Aug [11] Jae Hwan Lee and Jong Hwan Park, Security analysis of broadcast encryption system based on 2-subset difference method, Journal of Broadcast Engineering, 19(4), pp , July ~ : - :, : () : () : () ~ : () ~ : BK ~ : - ORCID : - :, ID-based,,
(JBE Vol. 20, No. 1, January 2015) (Regular Paper) 20 1, (JBE Vol. 20, No. 1, January 2015) ISSN 228
(JBE Vol. 20, No. 1, January 2015) (Regular Paper) 20 1, 2015 1 (JBE Vol. 20, No. 1, January 2015) http://dx.doi.org/10.5909/jbe.2015.20.1.92 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) Subset Difference
More information09권오설_ok.hwp
(JBE Vol. 19, No. 5, September 2014) (Regular Paper) 19 5, 2014 9 (JBE Vol. 19, No. 5, September 2014) http://dx.doi.org/10.5909/jbe.2014.19.5.656 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) a) Reduction
More information(JBE Vol. 21, No. 1, January 2016) (Regular Paper) 21 1, (JBE Vol. 21, No. 1, January 2016) ISSN 228
(JBE Vol. 1, No. 1, January 016) (Regular Paper) 1 1, 016 1 (JBE Vol. 1, No. 1, January 016) http://dx.doi.org/10.5909/jbe.016.1.1.60 ISSN 87-9137 (Online) ISSN 16-7953 (Print) a), a) An Efficient Method
More informationTHE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. vol. 29, no. 10, Oct ,,. 0.5 %.., cm mm FR4 (ε r =4.4)
THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2018 Oct.; 29(10), 799 804. http://dx.doi.org/10.5515/kjkiees.2018.29.10.799 ISSN 1226-3133 (Print) ISSN 2288-226X (Online) Method
More informationpublic key private key Encryption Algorithm Decryption Algorithm 1
public key private key Encryption Algorithm Decryption Algorithm 1 One-Way Function ( ) A function which is easy to compute in one direction, but difficult to invert - given x, y = f(x) is easy - given
More information08김현휘_ok.hwp
(Regular Paper) 21 3, 2016 5 (JBE Vol. 21, No. 3, May 2016) http://dx.doi.org/10.5909/jbe.2016.21.3.369 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) a), a) An Audio Coding Technique Employing the Inter-channel
More information디지털포렌식학회 논문양식
ISSN : 1976-5304 http://www.kdfs.or.kr Virtual Online Game(VOG) 환경에서의 디지털 증거수집 방법 연구 이 흥 복, 정 관 모, 김 선 영 * 대전지방경찰청 Evidence Collection Process According to the Way VOG Configuration Heung-Bok Lee, Kwan-Mo
More informationDBPIA-NURIMEDIA
논문 10-35-03-03 한국통신학회논문지 '10-03 Vol. 35 No. 3 원활한 채널 변경을 지원하는 효율적인 IPTV 채널 관리 알고리즘 준회원 주 현 철*, 정회원 송 황 준* Effective IPTV Channel Control Algorithm Supporting Smooth Channel Zapping HyunChul Joo* Associate
More informationTHE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Nov.; 26(11),
THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2015 Nov.; 26(11), 985991. http://dx.doi.org/10.5515/kjkiees.2015.26.11.985 ISSN 1226-3133 (Print)ISSN 2288-226X (Online) Analysis
More information012임수진
Received : 2012. 11. 27 Reviewed : 2012. 12. 10 Accepted : 2012. 12. 12 A Clinical Study on Effect of Electro-acupuncture Treatment for Low Back Pain and Radicular Pain in Patients Diagnosed with Lumbar
More informationTHE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Feb.; 29(2), IS
THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2018 Feb.; 29(2), 93 98. http://dx.doi.org/10.5515/kjkiees.2018.29.2.93 ISSN 1226-3133 (Print) ISSN 2288-226X (Online) UHF-HF
More information14.531~539(08-037).fm
G Journal of the Korea Concrete Institute Vol. 20, No. 4, pp. 531~539, August, 2008 š x y w m š gj p { sƒ z 1) * 1) w w Evaluation of Flexural Strength for Normal and High Strength Concrete with Hooked
More informationDBPIA-NURIMEDIA
무선 센서 네트워크 환경에서 링크 품질에 기반한 라우팅에 대한 효과적인 싱크홀 공격 탐지 기법 901 무선 센서 네트워크 환경에서 링크 품질에 기반한 라우팅에 대한 효과적인 싱크홀 공격 탐지 기법 (A Effective Sinkhole Attack Detection Mechanism for LQI based Routing in WSN) 최병구 조응준 (Byung
More informationTHE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. vol. 29, no. 6, Jun Rate). STAP(Space-Time Adaptive Processing)., -
THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2018 Jun.; 29(6), 457463. http://dx.doi.org/10.5515/kjkiees.2018.29.6.457 ISSN 1226-3133 (Print)ISSN 2288-226X (Online) Sigma-Delta
More information°í¼®ÁÖ Ãâ·Â
Performance Optimization of SCTP in Wireless Internet Environments The existing works on Stream Control Transmission Protocol (SCTP) was focused on the fixed network environment. However, the number of
More informationDBPIA-NURIMEDIA
The e-business Studies Volume 17, Number 4, August, 30, 2016:319~332 Received: 2016/07/28, Accepted: 2016/08/28 Revised: 2016/08/27, Published: 2016/08/30 [ABSTRACT] This paper examined what determina
More information인문사회과학기술융합학회
Vol.5, No.5, October (2015), pp.471-479 http://dx.doi.org/10.14257/ajmahs.2015.10.50 스마트온실을 위한 가상 외부기상측정시스템 개발 한새론 1), 이재수 2), 홍영기 3), 김국환 4), 김성기 5), 김상철 6) Development of Virtual Ambient Weather Measurement
More informationÀ±½Â¿í Ãâ·Â
Representation, Encoding and Intermediate View Interpolation Methods for Multi-view Video Using Layered Depth Images The multi-view video is a collection of multiple videos, capturing the same scene at
More information<30362E20C6EDC1FD2DB0EDBFB5B4EBB4D420BCF6C1A42E687770>
327 Journal of The Korea Institute of Information Security & Cryptology ISSN 1598-3986(Print) VOL.24, NO.2, Apr. 2014 ISSN 2288-2715(Online) http://dx.doi.org/10.13089/jkiisc.2014.24.2.327 개인정보 DB 암호화
More information[ReadyToCameral]RUF¹öÆÛ(CSTA02-29).hwp
RUF * (A Simple and Efficient Antialiasing Method with the RUF buffer) (, Byung-Uck Kim) (Yonsei Univ. Depth of Computer Science) (, Woo-Chan Park) (Yonsei Univ. Depth of Computer Science) (, Sung-Bong
More information<BFA9BAD02DB0A1BBF3B1A4B0ED28C0CCBCF6B9FC2920B3BBC1F62E706466>
001 002 003 004 005 006 008 009 010 011 2010 013 I II III 014 IV V 2010 015 016 017 018 I. 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 III. 041 042 III. 043
More information2 : (JEM) QTBT (Yong-Uk Yoon et al.: A Fast Decision Method of Quadtree plus Binary Tree (QTBT) Depth in JEM) (Special Paper) 22 5, (JBE Vol. 2
(Special Paper) 22 5, 2017 9 (JBE Vol. 22, No. 5, Sepember 2017) https://doi.org/10.5909/jbe.2017.22.5.541 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) (JEM) a), a), a) A Fast Decision Method of Quadtree
More information<31325FB1E8B0E6BCBA2E687770>
88 / 한국전산유체공학회지 제15권, 제1호, pp.88-94, 2010. 3 관내 유동 해석을 위한 웹기반 자바 프로그램 개발 김 경 성, 1 박 종 천 *2 DEVELOPMENT OF WEB-BASED JAVA PROGRAM FOR NUMERICAL ANALYSIS OF PIPE FLOW K.S. Kim 1 and J.C. Park *2 In general,
More informationTHE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Dec.; 27(12),
THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2016 Dec.; 27(12), 1036 1043. http://dx.doi.org/10.5515/kjkiees.2016.27.12.1036 ISSN 1226-3133 (Print) ISSN 2288-226X (Online)
More informationTHE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Jun.; 27(6),
THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2016 Jun.; 276), 504511. http://dx.doi.org/10.5515/kjkiees.2016.27.6.504 ISSN 1226-3133 Print)ISSN 2288-226X Online) Near-Field
More information07변성우_ok.hwp
2 : (Regular Paper) 19 5, 2014 9 (JBE Vol. 19, No. 5, September 2014) http://dx.doi.org/10.5909/jbe.2014.19.5.631 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) a), a), b) Metadata Management System Implementation
More information2 : (Jaeyoung Kim et al.: A Statistical Approach for Improving the Embedding Capacity of Block Matching based Image Steganography) (Regular Paper) 22
(Regular Paper) 22 5, 2017 9 (JBE Vol. 22, No. 5, September 2017) https://doi.org/10.5909/jbe.2017.22.5.643 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) a), a), b) A Statistical Approach for Improving
More informationTHE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Sep.; 30(9),
THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2019 Sep.; 30(9), 712 717. http://dx.doi.org/10.5515/kjkiees.2019.30.9.712 ISSN 1226-3133 (Print) ISSN 2288-226X (Online) MOS
More informationⅠ. 들어가는 말 2005년 6월에 발생한 인터넷뱅킹 해킹 사건이 2005년 가장 기억에 남는 정보보호 뉴 스로 선정되었다고 한다. 해킹 등으로 인해 개인의 PC가 악의적인 해커에 의해 장악이 된 경우에는 어떤 보안시스템도 제 기능을 다하지 못함에도 불구하고, 해킹 사
공인인증체계에서 이용되는 보안 알고리즘의 안전성 전자인증센터 과장 이한욱(tubby@kftc.or.kr) I. 들어가는 말 84 II. 보안 알고리즘 종류 85 1. 대칭키 알고리즘 85 2. 알고리즘 87 3. 해쉬 알고리즘 91 III. 공인인증체계에서 보안 알고리즘 활용 93 IV. 보안 알고리즘 공격방법 95 1. 대칭키 알고리즘 공격방법 95 2.
More informationTHE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Jun.; 27(6),
THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2016 Jun.; 27(6), 495 503. http://dx.doi.org/10.5515/kjkiees.2016.27.6.495 ISSN 1226-3133 (Print) ISSN 2288-226X (Online) Design
More information20(53?)_???_O2O(Online to Offline)??? ???? ??.hwp
O2O(Online to Offline)서비스 전략방향 연구 - 모바일 사용자 경험 디자인(UX Design)을 중심으로 - O2O(Online to Offline) Service Strategy Research -Focusing on Mobile UX Design- 주저자 김 형 모 Kim, Hyung-mo BK21플러스 다빈치 창의융합인재양성사업단 BK21Plus
More information(JBE Vol. 21, No. 3, May 2016) HE-AAC v2. DAB+ 120ms..,. DRM+(Digital Radio Mondiale plus) [3] xhe-aac (extended HE-AAC). DRM+ DAB HE-AAC v2 xhe-aac..
3 : xhe-aac (Bongho Lee et al.: A Study on the Variable Transmission of xhe-aac Audio Frame) (Special Paper) 21 3, 2016 5 (JBE Vol. 21, No. 3, May 2016) http://dx.doi.org/10.5909/jbe.2016.21.3.357 ISSN
More information10 이지훈KICS2015-03-068.hwp
논문 15-40-05-10 The Journal of Korean Institute of Communications and Information Sciences '15-05 Vol.40 No.05 http://dx.doi.org/10.7840/kics.2015.40.5.851 가로등 인프라를 활용한 안전한 스마트 방범 시스템 차 정 화, 이 주 용 *, 이
More informationTHE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Mar.; 25(3),
THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2014 Mar.; 25(3), 304310. http://dx.doi.org/10.5515/kjkiees.2014.25.3.304 ISSN 1226-3133 (Print)ISSN 2288-226X (Online) Analysis
More information<3136C1FD31C8A35FC3D6BCBAC8A3BFDC5F706466BAAFC8AFBFE4C3BB2E687770>
부동산학연구 제16집 제1호, 2010. 3, pp. 117~130 Journal of the Korea Real Estate Analysts Association Vol.16, No.1, 2010. 3, pp. 117~130 비선형 Mankiw-Weil 주택수요 모형 - 수도권 지역을 대상으로 - Non-Linear Mankiw-Weil Model on Housing
More information03-ÀÌÁ¦Çö
25 3 (2004 9 ) J Korean Oriental Med 2004;25(3):20-31 1), 2), 3) 1) 2) 3) Grope for a Summary Program about Intellectual Property Protection of Traditional Knowledge (TK)etc. Discussed in WIPO Hwan-Soo
More informationTHE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Jul.; 27(7),
THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2016 Jul.; 27(7), 625634. http://dx.doi.org/10.5515/kjkiees.2016.27.7.625 ISSN 1226-3133 (Print)ISSN 2288-226X (Online) Near-Field
More information#Ȳ¿ë¼®
http://www.kbc.go.kr/ A B yk u δ = 2u k 1 = yk u = 0. 659 2nu k = 1 k k 1 n yk k Abstract Web Repertoire and Concentration Rate : Analysing Web Traffic Data Yong - Suk Hwang (Research
More information(
317 318 319 320 1 3 5 5 5 5 2 321 : 1.,,,,, 06 2. X-ray beam penetration (density) (contrast) 03 3. patch coating, precipitation, flaking 03 4. centering 03 5. Esophagus, cardia, fundus, body, angle, antrum,
More informationJournal of Educational Innovation Research 2017, Vol. 27, No. 2, pp DOI: : Researc
Journal of Educational Innovation Research 2017, Vol. 27, No. 2, pp.251-273 DOI: http://dx.doi.org/10.21024/pnuedi.27.2.201706.251 : 1997 2005 Research Trend Analysis on the Korean Alternative Education
More informationexample code are examined in this stage The low pressure pressurizer reactor trip module of the Plant Protection System was programmed as subject for
2003 Development of the Software Generation Method using Model Driven Software Engineering Tool,,,,, Hoon-Seon Chang, Jae-Cheon Jung, Jae-Hack Kim Hee-Hwan Han, Do-Yeon Kim, Young-Woo Chang Wang Sik, Moon
More informationI
I II III (C B ) (C L ) (HL) Min c ij x ij f i y i i H j H i H s.t. y i 1, k K, i W k C B C L p (HL) x ij y i, i H, k K i, j W k x ij y i {0,1}, i, j H. K W k k H K i i f i i d ij i j r ij i j c ij r ij
More information<35335FBCDBC7D1C1A42DB8E2B8AEBDBAC5CDC0C720C0FCB1E2C0FB20C6AFBCBA20BAD0BCAE2E687770>
Journal of the Korea Academia-Industrial cooperation Society Vol. 15, No. 2 pp. 1051-1058, 2014 http://dx.doi.org/10.5762/kais.2014.15.2.1051 멤리스터의 전기적 특성 분석을 위한 PSPICE 회로 해석 김부강 1, 박호종 2, 박용수 3, 송한정 1*
More informationJournal of Educational Innovation Research 2018, Vol. 28, No. 3, pp DOI: NCS : * A Study on
Journal of Educational Innovation Research 2018, Vol. 28, No. 3, pp.157-176 DOI: http://dx.doi.org/10.21024/pnuedi.28.3.201809.157 NCS : * A Study on the NCS Learning Module Problem Analysis and Effective
More information<30312DC1A4BAB8C5EBBDC5C7E0C1A4B9D7C1A4C3A52DC1A4BFB5C3B62E687770>
Journal of the Korea Institute of Information and Communication Engineering 한국정보통신학회논문지(J. Korea Inst. Inf. Commun. Eng.) Vol. 19, No. 2 : 258~264 Feb. 2015 ID3 알고리즘 기반의 귀납적 추론을 활용한 모바일 OS의 성공과 실패에 대한
More informationTHE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Mar.; 28(3),
THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2017 Mar.; 28(3), 163 169. http://dx.doi.org/10.5515/kjkiees.2017.28.3.163 ISSN 1226-3133 (Print) ISSN 2288-226X (Online) PCB
More information8-VSB (Vestigial Sideband Modulation)., (Carrier Phase Offset, CPO) (Timing Frequency Offset),. VSB, 8-PAM(pulse amplitude modulation,, ) DC 1.25V, [2
VSB a), a) An Alternative Carrier Phase Independent Symbol Timing Offset Estimation Methods for VSB Receivers Sung Soo Shin a) and Joon Tae Kim a) VSB. VSB.,,., VSB,. Abstract In this paper, we propose
More information03 장태헌.hwp
THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2013 Aug.; 24(8), 772 780. http://dx.doi.org/10.5515/kjkiees.2013.24.8.772 ISSN 1226-3133 (Print) ISSN 2288-226X (Online) HEMP
More information63-69±è´ë¿µ
Study on the Shadow Effect of 3D Visualization for Medical Images ased on the Texture Mapping D.Y. Kim, D.S. Kim, D.K. Shin, D.Y. Kim 1 Dept. of iomedical Engineering, Yonsei University = bstract = The
More informationJournal of Educational Innovation Research 2018, Vol. 28, No. 1, pp DOI: * A Analysis of
Journal of Educational Innovation Research 2018, Vol. 28, No. 1, pp.99-117 DOI: http://dx.doi.org/10.21024/pnuedi.28.1.201803.99 2015 * A Analysis of the Characters and Issues about the 2015 Revised Social
More information02이용배(239~253)ok
A study on the characteristic of land use in subcenter of Seoul. - Cases of Yeongdeungpo and Kangnam Ok Kyung Yuh* Yong-Bae Lee**,. 2010,,..,.,,,,.,,.,,.,,,, Abstract : This study analyzed the land use
More information(JBE Vol. 20, No. 6, November 2015) (Regular Paper) 20 6, (JBE Vol. 20, No. 6, November 2015) ISSN
(JBE Vol. 20, No. 6, November 2015) (Regular Paper) 20 6, 2015 11 (JBE Vol. 20, No. 6, November 2015) http://dx.doi.org/10.5909/jbe.2015.20.6.880 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) a), a) Frame
More information???? 1
The Korean Journal of Applied Statistics (2014) 27(1), 13 20 DOI: http://dx.doi.org/10.5351/kjas.2014.27.1.013 Maximum Tolerated Dose Estimation by Stopping Rule and SM3 Design in a Phase I Clinical Trial
More information04_이근원_21~27.hwp
1) KIGAS Vol. 16, No. 5, pp 21~27, 2012 (Journal of the Korean Institute of Gas) http://dx.doi.org/10.7842/kigas.2012.16.5.21 실험실의 사례 분석에 관한 연구 이근원 이정석 한국산업안전보건공단 산업안전보건연구원 (2012년 9월 5일 투고, 2012년 10월 19일
More information04 김영규.hwp
THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 214 Nov.; 25(11), 1121 1127. http://dx.doi.org/1.5515/kjkiees.214.25.11.1121 ISSN 1226-3133 (Print) ISSN 2288-226X (Online) Planar
More informationJournal of Educational Innovation Research 2018, Vol. 28, No. 4, pp DOI: A Study on Organizi
Journal of Educational Innovation Research 2018, Vol. 28, No. 4, pp.441-460 DOI: http://dx.doi.org/10.21024/pnuedi.28.4.201812.441 A Study on Organizing Software Education of Special Education Curriculum
More informationProblem New Case RETRIEVE Learned Case Retrieved Cases New Case RETAIN Tested/ Repaired Case Case-Base REVISE Solved Case REUSE Aamodt, A. and Plaza, E. (1994). Case-based reasoning; Foundational
More informationDBPIA-NURIMEDIA
The e-business Studies Volume 17, Number 6, December, 30, 2016:275~289 Received: 2016/12/02, Accepted: 2016/12/22 Revised: 2016/12/20, Published: 2016/12/30 [ABSTRACT] SNS is used in various fields. Although
More information6.24-9년 6월
리눅스 환경에서Solid-State Disk 성능 최적화를 위한 디스크 입출력요구 변환 계층 김태웅 류준길 박찬익 Taewoong Kim Junkil Ryu Chanik Park 포항공과대학교 컴퓨터공학과 {ehoto, lancer, cipark}@postech.ac.kr 요약 SSD(Solid-State Disk)는 여러 개의 낸드 플래시 메모리들로 구성된
More information12È«±â¼±¿Ü339~370
http://www.kbc.go.kr/ k Si 2 i= 1 Abstract A Study on Establishment of Fair Trade Order in Terrestrial Broadcasting Ki - Sun Hong (Professor, Dept. of Journalism & Mass Communication,
More information09구자용(489~500)
The Study on the Grid Size Regarding Spatial Interpolation for Local Climate Maps* Cha Yong Ku** Young Ho Shin*** Jae-Won Lee**** Hee-Soo Kim*****.,...,,,, Abstract : Recent global warming and abnormal
More informationDBPIA-NURIMEDIA
박건수 *, 서태영 **, 김종욱 *** ". 요약 Abstract The induction melting furnace using electric generator has been introduced since 1920s, and it began to be widely applied to industrial applications due to increasing
More information<32382DC3BBB0A2C0E5BED6C0DA2E687770>
논문접수일 : 2014.12.20 심사일 : 2015.01.06 게재확정일 : 2015.01.27 청각 장애자들을 위한 보급형 휴대폰 액세서리 디자인 프로토타입 개발 Development Prototype of Low-end Mobile Phone Accessory Design for Hearing-impaired Person 주저자 : 윤수인 서경대학교 예술대학
More information04 최진규.hwp
THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2015 Aug.; 26(8), 710717. http://dx.doi.org/10.5515/kjkiees.2015.26.8.710 ISSN 1226-3133 (Print)ISSN 2288-226X (Online) RF ESPAR
More information09È«¼®¿µ5~152s
Korean Journal of Remote Sensing, Vol.23, No.2, 2007, pp.45~52 Measurement of Backscattering Coefficients of Rice Canopy Using a Ground Polarimetric Scatterometer System Suk-Young Hong*, Jin-Young Hong**,
More information, 41 ( ) * 1) ***.,. I.,..., ( ) ( ).,. ( ) *. ** 1
, 41 (2007 12 ) * 1) ***.,. I.,..., ( ) ( ).,. ( ) *. ** 1 2, 41,. 0..,,.,,.,,.....,,.., 3..,,... II. ( ).,.,. ( ).. : 1 1. 1. ( : 1,000, 4, 41 : 8%, : 3 ) 1,000. ( ) 12%. 1 1, 10 5,000 1 5,800. 1 903.926
More informationJournal of Educational Innovation Research 2019, Vol. 29, No. 1, pp DOI: * Suggestions of Ways
Journal of Educational Innovation Research 2019, Vol. 29, No. 1, pp.65-89 DOI: http://dx.doi.org/10.21024/pnuedi.29.1.201903.65 * Suggestions of Ways to Improve Teaching Practicum Based on the Experiences
More informationLumbar spine
Lumbar spine CT 32 111 DOI : 10.3831/KPI.2010.13.2.111 Lumbar Spine CT 32 Received : 10. 05. 23 Revised : 10. 06. 04 Accepted : 10. 06. 11 Key Words: Disc herniation, CT scan, Clinical analysis The Clinical
More information(JBE Vol. 23, No. 6, November 2018) (Special Paper) 23 6, (JBE Vol. 23, No. 6, November 2018) ISSN 2
(JBE Vol. 23, No. 6, November 2018) (Special Paper) 23 6, 2018 11 (JBE Vol. 23, No. 6, November 2018) https://doi.org/10.5909/jbe.2018.23.6.790 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) ATSC 3.0 UHD
More information大学4年生の正社員内定要因に関する実証分析
190 2016 JEL Classification Number J24, I21, J20 Key Words JILPT 2011 1 190 Empirical Evidence on the Determinants of Success in Full-Time Job-Search for Japanese University Students By Hiroko ARAKI and
More informationJournal of Educational Innovation Research 2017, Vol. 27, No. 3, pp DOI: (NCS) Method of Con
Journal of Educational Innovation Research 2017, Vol. 27, No. 3, pp.181-212 DOI: http://dx.doi.org/10.21024/pnuedi.27.3.201709.181 (NCS) Method of Constructing and Using the Differentiated National Competency
More information록들 Hl, 53l f크 c>c> 시스템구성 @ 동성정보릉선(주) 빼빼빼빼빼 廳 빼빼 :줬했 :~:::::::::::: 텔레뱅킹 ; 음성 쩔훌F 싼섣섣섣1 온앵서버 홈뱅 킹 PC 모덤 i..",.q));;,"ss-=- PC 뱅킹 폈 도듣] 스크린폰 ; 흠칭 ;될01 -
쯤 동성정보통신(주) 개발이사 김 종 훌 KRNET 97 인 터 넷 (l nlernet)의 활용 @ 동성정보흥신(주 l R톨톨톨톨 顧 g 屬 찢없엎었 i:;:;:;:;:;:;:?;;--: o 인터넷 사업 a 인터넷상시사용자의폭발적 증가: 전세게에 5, 000만명 a 인터넷 서비스 제공자의 급격한 증가 a 인터넷올 활용한 비지니스영역의 확대 마인드라넷 2 디.인터넷
More information3. 클라우드 컴퓨팅 상호 운용성 기반의 서비스 평가 방법론 개발.hwp
보안공학연구논문지 Journal of Security Engineering Vol.11, No.4 (2014), pp.299-312 http://dx.doi.org/10.14257/jse.2014.08.03 클라우드 컴퓨팅 상호 운용성 기반의 서비스 평가 방법론 개발 이강찬 1), 이승윤 2), 양희동 3), 박철우 4) Development of Service
More information1 : (Sunmin Lee et al.: Design and Implementation of Indoor Location Recognition System based on Fingerprint and Random Forest)., [1][2]. GPS(Global P
(JBE Vol. 23, No. 1, January 2018) (Regular Paper) 23 1, 2018 1 (JBE Vol. 23, No. 1, January 2018) https://doi.org/10.5909/jbe.2018.23.1.154 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) a), a) Design
More information한국성인에서초기황반변성질환과 연관된위험요인연구
한국성인에서초기황반변성질환과 연관된위험요인연구 한국성인에서초기황반변성질환과 연관된위험요인연구 - - i - - i - - ii - - iii - - iv - χ - v - - vi - - 1 - - 2 - - 3 - - 4 - 그림 1. 연구대상자선정도표 - 5 - - 6 - - 7 - - 8 - 그림 2. 연구의틀 χ - 9 - - 10 - - 11 -
More information11 함범철.hwp
THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2012 Aug.; 23(8), 958 966. http://dx.doi.org/10.5515/kjkiees.2012.23.8.958 ISSN 1226-3133 (Print) LTCC Bluetooth/WiFi A Bluetooth/WiFi
More information<BFACBCBCC0C7BBE7C7D02831302031203139292E687770>
延 世 醫 史 學 제12권 제2호: 29-40, 2009년 12월 Yonsei J Med Hist 12(2): 29-40, 2009 특집논문 3 한국사회의 낙태에 대한 인식변화 이 현 숙 이화여대 한국문화연구원 1. 들어가며 1998년 내가 나이 마흔에 예기치 않은 임신을 하게 되었을 때, 내 주변 사람들은 모두 들 너무나도 쉽게 나에게 임신중절을 권하였다.
More information1. KT 올레스퀘어 미디어파사드 콘텐츠 개발.hwp
Journal of Next-generation Convergence Information Services Technology Vol.4, No.1, June (2015), pp. 1-8 차세대컨버전스정보서비스기술논문지 KT 올레스퀘어 미디어파사드 콘텐츠 개발 Media Fasade Contents Development of KT Olleh Square 김동조
More information½Éº´È¿ Ãâ·Â
Standard and Technology of Full-Dimension MINO Systems in LTE-Advances Pro Massive MIMO has been studied in academia foreseeing the capacity crunch in the coming years. Presently, industry has also started
More informationJournal of Educational Innovation Research 2018, Vol. 28, No. 4, pp DOI: 3 * The Effect of H
Journal of Educational Innovation Research 2018, Vol. 28, No. 4, pp.577-601 DOI: http://dx.doi.org/10.21024/pnuedi.28.4.201812.577 3 * The Effect of Home-based Activities Using Traditional Fairy Tales
More informationDBPIA-NURIMEDIA
The e-business Studies Volume 17, Number 6, December, 30, 2016:237~251 Received: 2016/11/20, Accepted: 2016/12/24 Revised: 2016/12/21, Published: 2016/12/30 [ABSTRACT] Recently, there is an increasing
More information03-서연옥.hwp
농업생명과학연구 49(4) pp.31-37 Journal of Agriculture & Life Science 49(4) pp.31-37 Print ISSN 1598-5504 Online ISSN 2383-8272 http://dx.doi.org/10.14397/jals.2015.49.4.31 국가산림자원조사 자료를 적용한 충남지역 사유림경영율 추정 서연옥
More information06_ÀÌÀçÈÆ¿Ü0926
182 183 184 / 1) IT 2) 3) IT Video Cassette Recorder VCR Personal Video Recorder PVR VCR 4) 185 5) 6) 7) Cloud Computing 8) 186 VCR P P Torrent 9) avi wmv 10) VCR 187 VCR 11) 12) VCR 13) 14) 188 VTR %
More information09김정식.PDF
00-09 2000. 12 ,,,,.,.,.,,,,,,.,,..... . 1 1 7 2 9 1. 9 2. 13 3. 14 3 16 1. 16 2. 21 3. 39 4 43 1. 43 2. 52 3. 56 4. 66 5. 74 5 78 1. 78 2. 80 3. 86 6 88 90 Ex e cu t iv e Su m m a r y 92 < 3-1> 22 < 3-2>
More information05(533-537) CPLV12-04.hwp
모바일 OS 환경의 사용자 반응성 향상 기법 533 모바일 OS 환경의 사용자 반응성 향상 기법 (Enhancing Interactivity in Mobile Operating Systems) 배선욱 김정한 (Sunwook Bae) 엄영익 (Young Ik Eom) (Junghan Kim) 요 약 사용자 반응성은 컴퓨팅 시스템에서 가장 중요 한 요소 중에 하나이고,
More information878 Yu Kim, Dongjae Kim 지막 용량수준까지도 멈춤 규칙이 만족되지 않아 시행이 종료되지 않는 경우에는 MTD의 추정이 불가 능하다는 단점이 있다. 최근 이 SM방법의 단점을 보완하기 위해 O Quigley 등 (1990)이 제안한 CRM(Continu
한 국 통 계 학 회 논 문 집 2012, 19권, 6호, 877 884 DOI: http://dx.doi.org/10.5351/ckss.2012.19.6.877 Maximum Tolerated Dose Estimation Applied Biased Coin Design in a Phase Ⅰ Clinical Trial Yu Kim a, Dongjae Kim
More informationTHE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Nov.; 26(11),
THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2015 Nov.; 26(11), 978 984. http://dx.doi.org/10.5515/kjkiees.2015.26.11.978 ISSN 1226-3133 (Print) ISSN 2288-226X (Online) Transceiver
More information<B8F1C2F72E687770>
Transactions of the KSNVE, 23(12) : 1056~1065, 2013 23 12, pp. 1056~1065, 2013 http://dx.doi.org/10.5050/ksnve.2013.23.12.1056 ISSN 1598-2785(Print), ISSN 2287-5476(Online) A Study on the Improvement Plan
More information06_±è¼öö_0323
166 167 1) 2) 3) 4) source code 5) object code PC copy IP Internet Protocol 6) 7) 168 8) 9)10) 11) 12)13) / / 14) 169 PC publisher End User distributor RPG Role-Playing Game 15) FPS First Person Shooter
More information12.077~081(A12_이종국).fm
J. of Advanced Engineering and Technology Vol. 1, No. 1 (2008) pp. 77-81 y w» e wx Á w œw Fabrication of Ceramic Batch Composition for Porcelain by Using Recycled Waste Ceramic Powder Hyun Guen Han, and
More informationTHE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Jul.; 27(7),
THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 16 Jul.; 27(7), 64662. http://dx.doi.org/./kjkiees.16.27.7.646 ISSN 1226-3133 (Print)ISSN 2288-226 (Online) 2D Microwave Image
More informationePapyrus PDF Document
육아지원연구 2008. 제 3권 1 호, 147-170 어린이집에서의 낮잠에 대한 교사와 부모의 인식 및 실제 이 슬 기(동작구 보육정보센터)* 1) 요 약 본 연구의 목적은 어린이집에서의 일과 중 낮잠 시간에 대한 교사와 부모의 인식 및 실제를 알아봄 으로써, 교사와 부모의 협력을 통해 바람직한 낮잠 시간을 모색해 보는 데 있었다. 연구 대상은 서울, 경기지역
More informationÆ÷Àå½Ã¼³94š
Cho, Mun Jin (E-mail: mjcho@ex.co.kr) ABSTRACT PURPOSES : The performance of tack coat, commonly used for layer interface bonding, is affected by application rate and curing time. In this study, bonding
More information07김동회_ok.hwp
(Regular Paper) 19 4, 2014 7 (JBE Vol. 19, No. 4, July 2014) http://dx.doi.org/10.5909/jbe.2014.19.4.510 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) IEEE 802.11n WLAN A-MPDU a), a) Block Ack-based Dynamic
More informationUPMLOPEKAUWE.hwp
시청공간을 넘어 새롭게 소통하기 - 인터넷 기반의 를 중심으로 - New Communication beyond Viewing Space - Focused on Social Television based on Internet - 주저자 오종서 Oh, Jongsir 동서대학교 방송영상전공 조교수 Assistant Professor of Dongseo University
More informationTHE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Sep.; 26(10),
THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2015 Sep.; 26(10), 907 913. http://dx.doi.org/10.5515/kjkiees.2015.26.10.907 ISSN 1226-3133 (Print) ISSN 2288-226X (Online) Prediction
More informationAnalyses the Contents of Points per a Game and the Difference among Weight Categories after the Revision of Greco-Roman Style Wrestling Rules Han-bong
Analyses the Contents of Points per a Game and the Difference among Weight Categories after the Revision of Greco-Roman Style Wrestling Rules Han-bong An 1 & Kyoo-jeong Choi 2 * 1 Korea National Wrestling
More information19_9_767.hwp
(Regular Paper) 19 6, 2014 11 (JBE Vol. 19, No. 6, November 2014) http://dx.doi.org/10.5909/jbe.2014.19.6.866 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) RGB-Depth - a), a), b), a) Real-Virtual Fusion
More information<31362DB1E8C7FDBFF82DC0FABFB9BBEA20B5B6B8B3BFB5C8ADC0C720B1B8C0FC20B8B6C4C9C6C32E687770>
Journal of the Korea Academia-Industrial cooperation Society Vol. 13, No. 4 pp. 1525-1531, 2012 http://dx.doi.org/10.5762/kais.2012.13.4.1525 저예산 독립영화의 구전 마케팅을 위한 스마트폰 모바일 애플리케이션 모델 개발 연구 김혜원 1* 1 청운대학교
More information00표지
09 2007 09 Vol.377 www.corrections.go.kr 004 006 004 010 032 011 022 032 036 038 041 042 044 046 050 COVER STORY 034 163 063 072 075 080 130 140 141 144 146 150 183 184 180 Monthly Correctional Review
More information