10 research outputs found

    ์ œ์กฐ์—…์˜ ์„œ๋น„์Šค ์‚ฐ์—…ํ™”์— ๊ด€ํ•œ ์—ฐ๊ตฌ : ๋ฏธ๊ตญ๊ณผ ์ผ๋ณธ ์‚ฌ๋ก€๋ฅผ ์ค‘์‹ฌ์œผ๋กœ

    No full text
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :๊ฒฝ์˜ํ•™๊ณผ ๊ฒฝ์˜ํ•™์ „๊ณต,2002.Maste

    ์ˆ˜์ค€๋ณ„ ์ •๋ถ€์˜ ์˜ˆ์‚ฐ์ง€์ถœ๋ณ€๋™ํŒจํ„ด ๋ถ„์„ ์—ฐ๊ตฌ : ๊ด€์ฒญํ˜•์„ฑ๋ชจํ˜• ์ ์šฉ์„ ์ค‘์‹ฌ์œผ๋กœ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ํ–‰์ •๋Œ€ํ•™์› ํ–‰์ •ํ•™๊ณผ, 2017. 8. ์ตœํƒœํ˜„.์˜ˆ์‚ฐ๊ฒฐ์ •์ด๋ก ์€ ํ–‰์ •ํ•™์˜ ์˜ค๋ž˜๋œ ์—ฐ๊ตฌ์ฃผ์ œ๋‹ค. ํŠนํžˆ ์ ์ฆ์ฃผ์˜๊ฐ€ ์˜ˆ์‚ฐ์ด๋ก ์˜ ์ฃผ๋ฅ˜์ด๋ก ์œผ๋กœ ๋…ผ์˜๋˜์–ด์˜ด์— ๋”ฐ๋ผ, ์‹ค์ œ ์˜ˆ์‚ฐ์ง€์ถœ์ด ์ ์ฆ์ฃผ์˜๋ฅผ ๋”ฐ๋ฅด๋Š”์ง€ ์—ฌ๋ถ€๋ฅผ ์ค‘์‹ฌ์œผ๋กœ ์˜ˆ์‚ฐ์ง€์ถœ๋ณ€๋™ํŒจํ„ด์— ๋Œ€ํ•œ ๊ฒ€์ฆ์ด ์ตœ๊ทผ๊นŒ์ง€ ์ง€์†์ ์œผ๋กœ ์ด๋ฃจ์–ด์ ธ์™”๋‹ค. ์ง€๊ธˆ๊นŒ์ง€์˜ ์˜ˆ์‚ฐ๊ฒฐ์ •์ด๋ก  ์—ฐ๊ตฌ๋“ค์€ ์˜ˆ์‚ฐ๊ฒฐ์ •์ฃผ์ฒด๋“ค์ด ๊ฐ€์ง€๋Š” ์˜ˆ์‚ฐ์— ๋Œ€ํ•œ ํšจ์šฉ์ด ๋™์ผํ•˜๋‹ค๋Š” ๊ฐ€์ •์„ ์ „์ œ๋กœ ํ•œ๋‹ค. ์˜ˆ์‚ฐ์„ ์ข…๋ฅ˜์™€ ์„ฑ์งˆ์— ์ƒ๊ด€์—†์ด ๋™์ผํ•œ ํฌ๊ธฐ์˜ ํšจ์šฉ์ด ๋ฐœ์ƒํ•˜๋Š” ์ž์›์œผ๋กœ ๊ฐ€์ •ํ•œ ํ›„, ์˜ˆ์‚ฐ๋ณ€๋™์ด ์ ์ฆ์ ์ธ์ง€ ์—ฌ๋ถ€๋ฅผ ๊ฒ€์ฆํ•˜๋Š” ๊ฒƒ์— ์ค‘์ ์„ ๋‘๊ณ  ์žˆ๋Š” ๊ฒƒ์ด๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ด๋Ÿฌํ•œ ๊ฐ€์ •์ด ํ˜„์‹ค์ ์œผ๋กœ ํƒ€๋‹นํ•œ์ง€์— ๋Œ€ํ•ด์„œ ์˜๋ฌธ์„ ์ œ๊ธฐํ•ด๋ณผ ํ•„์š”๊ฐ€ ์žˆ๋‹ค. ๋งŒ์•ฝ ์˜ˆ์‚ฐ์˜ ์„ฑ์งˆ์— ๋”ฐ๋ผ ํšจ์šฉ์ด ์ผ์ •ํ•˜์ง€ ์•Š๋‹ค๋ฉด, ๊ธฐ์กด ์—ฐ๊ตฌ๊ฒฐ๊ณผ๋“ค์„ ์ผ๋ฐ˜ํ™”ํ•˜๊ธฐ๋Š” ๋งค์šฐ ์–ด๋ ค์šธ ๊ฒƒ์ด๋‹ค. ์ด๋Ÿฌํ•œ ๋งฅ๋ฝ์—์„œ ์˜ˆ์‚ฐ์˜ ์„ฑ์งˆ์„ ํ•˜๋‚˜์˜ ๋ณ€์ˆ˜๋กœ์„œ ํฌํ•จํ•˜๊ณ ์ž ํ•˜๋Š” ๋…ธ๋ ฅ์€ ๋งค์šฐ ์˜๋ฏธ ์žˆ๋Š” ์ผ์ด๋‹ค. ์ด ์—ฐ๊ตฌ๋Š” ์˜ˆ์‚ฐ๊ฒฐ์ •์ด๋ก ์— ์˜ˆ์‚ฐ์˜ ์„ฑ์งˆ์„ ๊ณ ๋ คํ•˜๊ธฐ ์œ„ํ•ด Dunleavy์˜ ๊ด€์ฒญํ˜•์„ฑ๋ชจํ˜•์„ ์ ์šฉํ•จ์œผ๋กœ์จ ๊ธฐ๊ด€์˜ ์˜ˆ์‚ฐ๊ตฌ์กฐ๋ฅผ ํ™œ์šฉํ•˜์˜€๋‹ค. ๊ทธ๋ฆฌ๊ณ  ์˜ˆ์‚ฐ๊ตฌ์กฐ์™€ ์˜ˆ์‚ฐ์ง€์ถœ๋ณ€๋™ํŒจํ„ด์˜ ๊ด€๊ณ„๋ฅผ ์‚ดํŽด๋ณด์•˜๋‹ค. ์ด ๋•Œ ์˜ˆ์‚ฐ๊ตฌ์กฐ์™€ ์ •๋ถ€์ˆ˜์ค€์˜ ๋ฐ€์ ‘ํ•œ ๊ด€๋ จ์„ฑ์„ ์ค‘์š”ํ•˜๊ฒŒ ๊ณ ๋ คํ•˜์—ฌ, ์ •๋ถ€์ˆ˜์ค€์— ๋”ฐ๋ฅธ ์ฐจ์ด๋ฅผ ๋ถ„์„ํ•˜์˜€๋‹ค. ๋ถ„์„๊ฒฐ๊ณผ, ์ •๋ถ€์ˆ˜์ค€๋ณ„๋กœ ์˜ˆ์‚ฐ๊ตฌ์กฐ ๋ถ„์„๊ฒฐ๊ณผ์™€ ์˜ˆ์‚ฐ์ง€์ถœ์˜ ๋ณ€๋™ํŒจํ„ด์ด ์ฐจ๋ณ„์ ์œผ๋กœ ๋‚˜ํƒ€๋‚ฌ๋‹ค. ์ค‘์•™์ •๋ถ€๋Š” ๋‹ค์–‘ํ•œ ๊ธฐ๋Šฅ์„ ์ˆ˜ํ–‰ํ•˜๋ฉด์„œ, ๋‹จ์ ˆ๊ท ํ˜•์ด๋ก ์  ์˜ˆ์‚ฐ์ง€์ถœ๋ณ€๋™์„ ๋ณด์˜€๋‹ค. ๊ด‘์—ญ์ž์น˜๋‹จ์ฒด๋Š” ํ†ต์ œ๊ธฐ๊ด€์œผ๋กœ ๋ถ„๋ฅ˜๋˜์—ˆ๊ณ , ์˜ˆ์‚ฐ๋ณ€๋™์€ ์ ์ฆ์  ๋ณ€๋™์„ ๋”ฐ๋ž๋‹ค. ๊ธฐ์ดˆ์ž์น˜๋‹จ์ฒด๋Š” ์ด์ „/๊ณ„์•ฝ๊ธฐ๊ด€์œผ๋กœ ๋ถ„๋ฅ˜๋˜์—ˆ๊ณ , ๋‹จ์ ˆ๊ท ํ˜•์ด๋ก ์  ์˜ˆ์‚ฐ๋ถ„ํฌ๋ฅผ ๋”ฐ๋ž๋‹ค. ๋˜ํ•œ ๊ธฐ๊ด€์œ ํ˜•๋ณ„ ์˜ˆ์‚ฐ์ง€์ถœ๋ณ€๋™ํŒจํ„ด ๋ถ„์„ ๊ฒฐ๊ณผ์—์„œ ํ†ต์ œ๊ธฐ๊ด€์€ ์ ์ฆ์ ์œผ๋กœ, ์ด์ „/๊ณ„์•ฝ๊ธฐ๊ด€๊ณผ ์ „๋‹ฌ๊ด€๋ จ๊ธฐ๊ด€์ด ๋‹จ์ ˆ๊ท ํ˜•์ ์œผ๋กœ ๋ณ€๋™ํ•˜์—ฌ ๋ถ„์„๊ฒฐ๊ณผ๊ฐ€ ์ผ๊ด€๋œ ๋ชจ์Šต์„ ๋ณด์˜€๋‹ค. ์˜ˆ์‚ฐ๋‹จ์ ˆํ˜„์ƒ์˜ ๋นˆ๋„๋Š” ์ค‘์•™์ •๋ถ€์—์„œ, ๊ทธ๋ฆฌ๊ณ  ํ•ต์‹ฌ์˜ˆ์‚ฐ์—์„œ ๊ฐ€์žฅ ๋งŽ์ด ๋ฐœ์ƒํ•˜์˜€๋‹ค. ์—ฐ๊ตฌ๊ฒฐ๊ณผ๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ํ•จ์˜๋ฅผ ๋„์ถœํ•˜๋ฉด ๋‹ค์Œ๊ณผ ๊ฐ™๋‹ค. ์ฒซ์งธ, ์ •๋ถ€๊ธฐ๊ด€์˜ ์˜ˆ์‚ฐ๊ตฌ์กฐ๊ฐ€ ์˜ˆ์‚ฐ์ง€์ถœ๋ณ€๋™ํŒจํ„ด์˜ ์ค‘์š”ํ•œ ์˜ํ–ฅ์š”์ธ์œผ๋กœ ๊ณ ๋ ค๋˜์–ด์•ผ ํ•จ์„ ์•Œ ์ˆ˜ ์žˆ์—ˆ๋‹ค. ๋˜ํ•œ ์˜ˆ์‚ฐ๊ฒฐ์ •์—ฐ๊ตฌ์— ์žˆ์–ด์„œ ์˜ˆ์‚ฐ์˜ ์ข…๋ฅ˜์™€ ์„ฑ์งˆ์„ ๋ถ„์„์— ํฌํ•จํ•ด์•ผ ํ•  ํ•„์š”์„ฑ์„ ์ œ์–ธํ•˜์˜€๋‹ค. ๋‘˜์งธ, ์ •๋ถ€์ˆ˜์ค€์— ๋”ฐ๋ผ ์˜ˆ์‚ฐ๊ตฌ์กฐ ๋ฐ ์˜ˆ์‚ฐ์ง€์ถœ๋ณ€๋™ํŒจํ„ด์ด ๋‹ฌ๋ผ์ง„๋‹ค๋Š” ๋ถ„์„๊ฒฐ๊ณผ๋ฅผ ํ†ตํ•ด ์˜ˆ์‚ฐ์ง€์ถœ์ด๋ก ์—์„œ ์ •๋ถ€์ˆ˜์ค€์˜ ์ค‘์š”์„ฑ์„ ๋ฐœ๊ฒฌํ•˜์˜€๋‹ค. ์…‹์งธ, ๊ด€์ฒญํ˜•์„ฑ๋ชจํ˜•๊ณผ ์˜ˆ์‚ฐ์ง€์ถœ์ด๋ก ์˜ ํ†ตํ•ฉ๊ฐ€๋Šฅ์„ฑ์„ ๊ฒ€ํ† ํ•˜์˜€๋‹ค. ๋„ท์งธ, ์˜ˆ์‚ฐ์ง€์ถœ์ด๋ก ์„ ๋‘˜๋Ÿฌ์‹ผ ๋‹ค์–‘ํ•œ ์ด๋ก ์  ์‹œ์‚ฌ์ ์„ ๋„์ถœํ•˜์˜€๋‹ค. ์šฐ๋ฆฌ๋‚˜๋ผ ์ •๋ถ€์ˆ˜์ค€๋ณ„ ๊ธฐ๋Šฅ์ˆ˜ํ–‰๋ฐฉ์‹๊ณผ ์˜ˆ์‚ฐ๊ตฌ์กฐ์˜ ์ฐจ์ด๋ฅผ ์ „์ˆ˜์กฐ์‚ฌ์— ๊ฐ€๊นŒ์šด ๋ถ„์„์„ ํ†ตํ•ด์„œ ๋ฐํ˜”๊ณ , ์ตœ๊ทผ ์ „ํ†ต์ ์ธ ์ •๋ถ€๊ธฐ๋Šฅ์ด ์ƒˆ๋กœ์šด ๊ธฐ๋Šฅ์œผ๋กœ ๋ณ€ํ™”๋˜์—ˆ์„ ๊ฐ€๋Šฅ์„ฑ์„ ๋ฐœ๊ฒฌํ•˜์˜€๋‹ค. ๋‹ค์„ฏ์งธ, ์‹ค์ œ ์˜ˆ์‚ฐ์ง€์ถœ์ž๋ฃŒ๋ฅผ ๋ถ„์„ํ•˜์—ฌ ์ •์ฑ…์  ์‹œ์‚ฌ์ ์„ ๋„์ถœํ•  ์ˆ˜ ์žˆ์—ˆ๋‹ค. ์ค‘์•™์ •๋ถ€๊ฐ€ ์ง€๋ฐฉ์ž์น˜๋‹จ์ฒด์— ๋น„ํ•ด ๋ณด๋‹ค ์ •์ฑ…์  ๋ณ€๋™์ด ํฌ๋‹ค๋Š” ๊ฒƒ์„ ๋…ผ์˜ํ•˜์˜€๊ณ , ๊ด‘์—ญ์ž์น˜๋‹จ์ฒด์˜ ํ†ต์ œ๊ธฐ๊ด€ํ™” ๊ฒฝํ–ฅ์ด ๋‚˜ํƒ€๋‚˜ ๊ด‘์—ญ์ž์น˜๋‹จ์ฒด ํ์ง€๋ก ์„ ๊ธฐ๋Šฅ์  ์ธก๋ฉด์—์„œ ๋…ผ์˜ํ•ด๋ณผ ํ•„์š”์„ฑ์„ ์ œ๊ธฐํ•˜์˜€๋‹ค. ๋˜ํ•œ ์‹ค์ œ ์˜ˆ์‚ฐ์ง€์ถœ๋ณ€๋™์ด ๋‹จ์ ˆ๊ท ํ˜•์ ์œผ๋กœ ๋‚˜ํƒ€๋‚˜๋Š” ๊ฒฝํ–ฅ์ด ๋ฐœ๊ฒฌ๋จ์— ๋”ฐ๋ผ ์ ์ฆ์  ํ–‰ํƒœ๋ฅผ ๋ฌธ์ œ์˜์‹์œผ๋กœ ํ•˜๋Š” ํ•ฉ๋ฆฌ์ฃผ์˜์  ์˜ˆ์‚ฐ๊ฐœํ˜์˜ ์ ์ ˆ์„ฑ์„ ๋น„ํŒ์ ์œผ๋กœ ๊ฒ€ํ† ํ•  ํ•„์š”์„ฑ์„ ๋ฐœ๊ฒฌํ•˜์˜€๋‹ค. ์ด ์—ฐ๊ตฌ๋Š” ์˜ˆ์‚ฐ์˜ ์ข…๋ฅ˜์™€ ์„ฑ์งˆ์„ ๊ณ ๋ คํ•จ์œผ๋กœ์จ ๊ธฐ์กด ์˜ˆ์‚ฐ์ง€์ถœ์ด๋ก ์„ ๋ณด์™„ํ•˜์˜€๋‹ค๋Š” ์ ์—์„œ ์˜์˜๋ฅผ ๋ฐœ๊ฒฌํ•  ์ˆ˜ ์žˆ๋‹ค. ๋˜ํ•œ ํ–ฅํ›„ ์˜ˆ์‚ฐ๊ฒฐ์ •์ด๋ก ์˜ ๊ฒ€์ฆ๋ฐฉ๋ฒ•์˜ ์ •๊ตํ™”์— ๊ธฐ์—ฌํ•  ๊ฒƒ์œผ๋กœ ๊ธฐ๋Œ€๋œ๋‹ค.์ œ 1 ์žฅ ์„œ ๋ก  1 ์ œ 1 ์ ˆ ์—ฐ๊ตฌ์˜ ๋ฐฐ๊ฒฝ๊ณผ ์˜์˜ 1 ์ œ 2 ์ ˆ ์—ฐ๊ตฌ์˜ ๋ฒ”์œ„ ๋ฐ ์—ฐ๊ตฌ ๋ฐฉ๋ฒ• 3 ์ œ 2 ์žฅ ์ด๋ก ์  ๋…ผ์˜์™€ ์„ ํ–‰์—ฐ๊ตฌ ๊ฒ€ํ†  5 ์ œ 1 ์ ˆ ์ •๋ถ€์ง€์ถœ์ด๋ก : ์ ์ฆ์ฃผ์˜์™€ ๋‹จ์ ˆ๊ท ํ˜•์ด๋ก ์„ ์ค‘์‹ฌ์œผ๋กœ 5 1. ์ •๋ถ€์ง€์ถœ์ด๋ก  ๊ฐœ๊ด€ 5 2. ์ •๋ถ€์ง€์ถœ์ด๋ก  ์„ ํ–‰์—ฐ๊ตฌ ๊ฒ€ํ†  8 3. ์ •๋ถ€์ง€์ถœ์ด๋ก  ํ‰๊ฐ€ 10 ์ œ 2 ์ ˆ ๊ด€์ฒญํ˜•์„ฑ๋ชจํ˜• 13 1. ๊ด€์ฒญํ˜•์„ฑ๋ชจํ˜• ๊ฐœ๊ด€ 13 2. ๊ด€์ฒญํ˜•์„ฑ๋ชจํ˜• ์„ ํ–‰์—ฐ๊ตฌ ๊ฒ€ํ†  16 3. ๊ด€์ฒญํ˜•์„ฑ๋ชจํ˜• ํ‰๊ฐ€ 17 ์ œ 3 ์žฅ ์—ฐ๊ตฌ์„ค๊ณ„ 20 ์ œ 1 ์ ˆ ์—ฐ๊ตฌ๋ฌธ์ œ์˜ ์ •์˜ 20 ์ œ 2 ์ ˆ ์—ฐ๊ตฌ ๋ฐฉ๋ฒ• 21 1. ์—ฐ๊ตฌ์˜ ๋ถ„์„ํ‹€ 21 2. ์—ฐ๊ตฌ ๋ถ„์„ ๋Œ€์ƒ 23 3. ์—ฐ๊ตฌ ๋ถ„์„ ๋ฐฉ๋ฒ• 27 1) ์ฆ๊ฐ๋ฅ  ๋„์ถœ ๋ฐฉ๋ฒ• 28 2) ์˜ˆ์‚ฐ์œ ํ˜•์˜ ๋ถ„๋ฅ˜ ๋ฐฉ๋ฒ• 29 3) ์˜ˆ์‚ฐ๊ตฌ์กฐ ๋ถ„์„ ๋ฐฉ๋ฒ• 31 4) ์˜ˆ์‚ฐ์ง€์ถœ๋ณ€๋™ํŒจํ„ด ๋ถ„์„ ๋ฐฉ๋ฒ• 32 5) ์˜ˆ์‚ฐ๋‹จ์ ˆ์  ๋ถ„์„ ๋ฐฉ๋ฒ• 36 ์ œ 4 ์žฅ ๋ถ„์„๊ฒฐ๊ณผ 38 ์ œ 1 ์ ˆ ์˜ˆ์‚ฐ๊ตฌ์กฐ ๋ถ„์„๊ฒฐ๊ณผ 38 1) ์ค‘์•™์ •๋ถ€ 38 2) ๊ด‘์—ญ์ž์น˜๋‹จ์ฒด 40 3) ๊ธฐ์ดˆ์ž์น˜๋‹จ์ฒด 42 4) ์˜ˆ์‚ฐ๊ตฌ์กฐ ๋ถ„์„๊ฒฐ๊ณผ ์š”์•ฝ 43 ์ œ 2 ์ ˆ ๊ธฐ๊ด€ ๋ฐ ์˜ˆ์‚ฐ์œ ํ˜•๋ณ„ ์ง€์ถœ๋ณ€๋™ํŒจํ„ด ๋ถ„์„๊ฒฐ๊ณผ 44 1. ๊ธฐ๊ด€์œ ํ˜•๋ณ„ 44 2. ์˜ˆ์‚ฐ์œ ํ˜•๋ณ„ 45 ์ œ 3 ์ ˆ ์ •๋ถ€์ˆ˜์ค€๋ณ„ ์ง€์ถœ์ด์•ก๋ณ€๋™ํŒจํ„ด ๋ถ„์„๊ฒฐ๊ณผ 46 ์ œ 4 ์ ˆ ์˜ˆ์‚ฐ๋‹จ์ ˆ์  ๋ถ„์„๊ฒฐ๊ณผ 48 ์ œ 5 ์žฅ ๊ฒฐ๋ก  50 ์ œ 1 ์ ˆ ์—ฐ๊ตฌ๊ฒฐ๊ณผ ๋ฐ ํ•จ์˜ 50 1. ์—ฐ๊ตฌ๊ฒฐ๊ณผ 50 2. ์ด๋ก ์  ํ•จ์˜ 52 3. ์ •์ฑ…์  ํ•จ์˜ 56 ์ œ 2 ์ ˆ ์—ฐ๊ตฌ์˜ ํ•œ๊ณ„ ๋ฐ ๊ณผ์ œ 58Maste

    A study of Properties preserved under power series ring

    No full text
    Maste

    The effect of a stretching exercise on myofascial pain syndrome patients

    No full text
    ์‚ฐ์—…๋ณด๊ฑดํ•™๊ณผ/์„์‚ฌ[ํ•œ๊ธ€]๋ชฉ์ : ์ค‘์†Œ๊ทœ๋ชจ ์‚ฌ์—…์žฅ์˜ ๊ทผ๋ง‰ํ†ต ์ฆํ›„๊ตฐ ํ™˜์ž์—์„œ ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋Š” ๊ทผ๋ง‰ํ†ต ์ฆํ›„๊ตฐ์˜ ๊ด€๋ฆฌ๋ฅผ ์œ„ํ•œ ๋ฐฉ๋ฒ•์œผ๋กœ ๊ทผ๋กœ์ž ์Šค์Šค๋กœ ์‹ค์‹œํ•  ์ˆ˜ ์žˆ๋Š” ์šด๋™ ํ”„๋กœ๊ทธ๋žจ์˜ ํšจ๊ณผ๋ฅผ ์•Œ์•„๋ณด๊ณ ์ž ํ•˜์˜€๋‹ค.๋ฐฉ๋ฒ•: ์ค‘์†Œ๊ทœ๋ชจ ์‚ฌ์—…์žฅ์— ๊ทผ๋ฌดํ•˜๋Š” ๊ทผ๋กœ์ž 393๋ช…์—๊ฒŒ ์„ค๋ฌธ์กฐ์‚ฌ๋ฅผ ์‹ค์‹œํ•˜์—ฌ ์ฆ์ƒ ์œ ์†Œ๊ฒฌ์ž๋ฅผ ์„ ๋ณ„ํ•˜๊ณ , ์„ ๋ณ„๋œ ๋Œ€์ƒ์ž๋“ค์„ ์ง„์ฐฐํ•˜์—ฌ ๊ทผ๋ง‰ํ†ต ์ฆํ›„๊ตฐ์„ ์ง„๋‹จํ•˜์˜€๋‹ค. ๊ทผ๋ง‰ํ†ต ์ฆํ›„๊ตฐ์œผ๋กœ ์ง„๋‹จ๋œ ํ™˜์ž 119๋ช… ์ค‘ ์–ด๊นจ ๋ถ€์œ„์˜ ๋‹ค๋ฅธ ๊ทผ๊ณจ๊ฒฉ๊ณ„์งˆํ™˜์ด ๋™๋ฐ˜๋œ ํ™˜์ž 11๋ช…์„ ์ œ์™ธํ•œ 108๋ช…์—๊ฒŒ 6์ฃผ ๋™์•ˆ์˜ ์ŠคํŠธ๋ ˆ์นญ ์šด๋™ ํ”„๋กœ๊ทธ๋žจ์„ ์ฒ˜๋ฐฉํ•˜์˜€๋‹ค. ์น˜๋ฃŒ ์ „ํ›„์˜ ํ†ต์ฆ ์ •๋„๋ฅผ Visual analogue scale(VAS)์„ ์ด์šฉํ•ด ํŒŒ์•…ํ•˜์˜€๊ณ , ์šด๋™ ํ”„๋กœ๊ทธ๋žจ์— ๋Œ€ํ•œ ์ˆœ์‘๋„๋ฅผ ์น˜๋ฃŒ 3์ฃผ์™€ ์น˜๋ฃŒ ํ›„์— ํ‰๊ฐ€ํ•˜์˜€๋‹ค.๊ฒฐ๊ณผ: ์ „์ฒด ๋Œ€์ƒ์ž 393๋ช… ์ค‘ ๊ทผ๋ง‰ํ†ต ์ฆํ›„๊ตฐ ํ™˜์ž๋Š” 119๋ช…์œผ๋กœ 30.28%์˜ ์œ ๋ณ‘๋ฅ ์„ ๋ณด์˜€์œผ๋ฉฐ, ์šด๋™ ํ”„๋กœ๊ทธ๋žจ์„ ์‹ค์‹œํ•œ 108๋ช…์˜ ํ™˜์ž๋“ค์€ ์šด๋™ ์ „์— ๋น„ํ•ด ์šด๋™ ํ›„ ํ†ต์ฆ ์ง€์ˆ˜๊ฐ€ ์œ ์˜ํ•˜๊ฒŒ ๊ฐ์†Œํ•˜์˜€๋‹ค. ์šด๋™์น˜๋ฃŒ์˜ ํšจ๊ณผ์— ์˜ํ–ฅ์„ ์ฃผ๋Š” ๋ณ€์ˆ˜๋กœ๋Š” ์šด๋™ ํ”„๋กœ๊ทธ๋žจ์— ๋Œ€ํ•œ ์ˆœ์‘๋„์™€ ์ดˆ๊ณผ๊ทผ๋ฌด ์—ฌ๋ถ€์ด์—ˆ๋‹ค.๊ฒฐ๋ก : ์ด ์—ฐ๊ตฌ์˜ ๊ฒฐ๊ณผ์— ์˜ํ•˜๋ฉด ์ค‘์†Œ๊ทœ๋ชจ ์‚ฌ์—…์žฅ์˜ ๊ทผ๋ง‰ํ†ต ์ฆํ›„๊ตฐ ํ™˜์ž ๊ด€๋ฆฌ๋ฅผ ์œ„ํ•œ ์šด๋™ ํ”„๋กœ๊ทธ๋žจ์€ ํšจ๊ณผ๊ฐ€ ์žˆ์—ˆ์œผ๋ฉฐ, ์šด๋™์น˜๋ฃŒ์˜ ํšจ๊ณผ๋ฅผ ๋†’์ด๊ธฐ ์œ„ํ•ด์„œ๋Š” ํ™˜์ž๊ฐ€ ์ฒ˜๋ฐฉ๋œ ์šด๋™ ํ”„๋กœ๊ทธ๋žจ์˜ ๋‚ด์šฉ์„ ์ž˜ ์‹ค์‹œํ•˜๊ณ , ์ดˆ๊ณผ๊ทผ๋ฌด๋ฅผ ์ž์ œํ•˜๋Š” ๊ฒƒ์ด ์ข‹์„ ๊ฒƒ์œผ๋กœ ํŒ๋‹จ๋œ๋‹ค. [์˜๋ฌธ]restrictio

    UPFC operating scheme for various operating conditions of power system

    No full text
    ํ•™์œ„๋…ผ๋ฌธ(๋ฐ•์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€,2002.Docto

    Mitigating Distributed RREQ Flooding with Aggregation for Reactive Ad hoc Routing Protocols

    No full text
    Master์ตœ๊ทผ ๋ชจ๋ฐ”์ผ ๊ธฐ๊ธฐ์˜ ๋Œ€์ค‘ํ™”์™€ ๋ฌด์„  ๋„คํŠธ์›Œํ‚น ๊ธฐ์ˆ ์˜ ๋ฐœ๋‹ฌ๋กœ ์ธํ•˜์—ฌ, ๋ชจ๋ฐ”์ผ ๊ธฐ๊ธฐ ๊ฐ„์˜ ํ†ต์‹ ์— ๋Œ€ํ•œ ์š”๊ตฌ๊ฐ€ ์ฆ๊ฐ€๋˜๊ณ  ์žˆ๋‹ค. ์• ๋“œ ํ˜น ๋„คํŠธ์›Œํ‚น์€ ์ด๋ฅผ ์œ„ํ•œ ๋„คํŠธ์›Œํฌ ๊ธฐ์ˆ ๋กœ, AP ์—†์ด ๋…ธ๋“œ ๊ฐ„์— ์ž„์˜๋กœ ๋„คํŠธ์›Œํฌ๋ฅผ ๊ตฌ์„ฑํ•˜์—ฌ ํ†ต์‹ ์ด ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•œ๋‹ค. ๋ฐ˜์‘์  ๋ผ์šฐํŒ… ํ”„๋กœํ† ์ฝœ์€ ๋…ธ๋“œ์˜ ์ด๋™์„ฑ์ด ์กด์žฌํ•˜๋Š” ์• ๋“œ ํ˜น ๋„คํŠธ์›Œํฌ์— ์ ํ•ฉํ•œ ๊ฒƒ์œผ๋กœ ์•Œ๋ ค์ง„ ๋ฐฉ๋ฒ•์œผ๋กœ, ํŒจํ‚ท์„ ๋ณด๋‚ด๊ณ ์ž ํ•  ๋•Œ ๋ชฉ์ ์ง€๊นŒ์ง€์˜ ๊ฒฝ๋กœ๋ฅผ ๋ธŒ๋กœ๋“œ์บ์ŠคํŠธ์— ๊ธฐ๋ฐ˜ํ•˜์—ฌ ์ฐพ๋Š”๋‹ค. ๊ณต๊ฒฉ์ž๋Š” ์ด ์ ์„ ์ด์šฉํ•˜์—ฌ ์žฆ์€ ๊ฒฝ๋กœ ์š”์ฒญ์„ ๋ฐœ์ƒ์‹œํ‚ค๋Š” RREQ ํ”Œ๋Ÿฌ๋”ฉ ๊ณต๊ฒฉ์œผ๋กœ ๋„คํŠธ์›Œํฌ ๋Œ€์—ญํญ์„ ์†Œ๋ชจ์‹œํ‚ฌ ์ˆ˜ ์žˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ๋ฐ˜์‘์  ๋ผ์šฐํŒ… ํ”„๋กœํ† ์ฝœ์˜ ์ทจ์•ฝ์ ์„ ์ด์šฉํ•œ ๋ถ„์‚ฐ ์„œ๋น„์Šค ๊ฑฐ๋ถ€ ๊ณต๊ฒฉ (Distributed Denial of Service)๊ณผ ์ด์— ๋Œ€ํ•œ ์™„ํ™” ๋ฐฉ๋ฒ•์„ ์ œ์‹œํ•œ๋‹ค. ๋ถ„์‚ฐ RREQ ํ”Œ๋Ÿฌ๋”ฉ ๊ณต๊ฒฉ์€ ์ ์€ ์ˆ˜์˜ ๊ณต๊ฒฉ ๋…ธ๋“œ๋กœ๋„ ๋„คํŠธ์›Œํฌ ์ „์ฒด์˜ ๋Œ€์—ญํญ์„ ์ฐจ์ง€ํ•˜์—ฌ ์ •์ƒ ํ†ต์‹ ์„ ๋ฐฉํ•ดํ•œ๋‹ค๋Š” ์ ์—์„œ ์น˜๋ช…์ ์ด๋‹ค. ์ œ์•ˆํ•˜๋Š” ๋ฐฉ๋ฒ•์€ ๋„คํŠธ์›Œํฌ ์ƒํƒœ๋ฅผ ๊ณ ๋ คํ•˜์—ฌ RREQ ํ—ˆ์šฉ ์ž„๊ณ„๊ฐ’์„ ์ ์šฉํ•˜๋Š” ๊ธฐ์กด ๋ฐฉ๋ฒ•๊ณผ ๋‹ค์ˆ˜์˜ RREQ ๋ฉ”์‹œ์ง€๋ฅผ ์ง‘ํ•ฉํ•˜์—ฌ ์ „๋‹ฌํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ํ•จ๊ป˜ ์ ์šฉํ•˜์—ฌ ํ”Œ๋Ÿฌ๋”ฉ ๊ณต๊ฒฉ์„ ํšจ๊ณผ์ ์œผ๋กœ ์™„ํ™”ํ•œ๋‹ค. ์ œ์•ˆํ•˜๋Š” ์ง‘ํ•ฉ ๋ฐฉ๋ฒ•์€ ํ†ต๊ณ„์  ์ž„๊ณ„๊ฐ’ ๋ฐฉ๋ฒ•์„ ํ†ต๊ณผํ•˜๋Š” ์•…์˜์  RREQ์˜ ์ˆ˜๋ฅผ ํšจ๊ณผ์ ์œผ๋กœ ์ค„์ž„์œผ๋กœ์จ ๊ณต๊ฒฉ ๋ฐœ์ƒ ์‹œ์—๋„ ์ •์ƒ ํ†ต์‹ ์˜ ํŒจํ‚ท ์ „๋‹ฌ๋ฅ ๊ณผ ์ฒ˜๋ฆฌ๋Ÿ‰์˜ ํ”ผํ•ด๋ฅผ ์™„ํ™”ํ•  ์ˆ˜ ์žˆ๋‹ค. ๋˜ํ•œ ๊ธฐ์กด์˜ ๋ฐฉ๋ฒ•๊ณผ๋Š” ๋‹ฌ๋ฆฌ ์ •์ƒ ๋…ธ๋“œ์˜ ์ผ์‹œ์ ์ธ ๋‹ค์ˆ˜ RREQ ์ „์†ก์˜ ๊ฒฝ์šฐ์—๋„ RREQ๋ฅผ ๋“œ๋กญํ•˜์ง€ ์•Š๊ณ  ์ „๋‹ฌํ•˜๋ฏ€๋กœ ์˜คํƒ์œผ๋กœ ์ธํ•œ ํ”ผํ•ด๊ฐ€ ์ ๋‹ค.Route discovery in a reactive ad hoc routing protocol is based on broadcasting. An attacker can launch a RREQ (Route Request) flooding attack by exploiting the vulnerability in the route discovery. As a result of a RREQ flooding attack, normal nodes are damaged for communication. If an attacker compromises other nodes and launches a flooding attack in a distributed manner, only a few attack nodes can occupy the whole bandwidth with routing packets and disturb the normal communication of a network. In this thesis, we present a distributed RREQ flooding attack and the RREQ aggregation method needed to mitigate the attack. The proposed method assembles several RREQs into an aggregated RREQ and then forwards the aggregated RREQ. The proposed scheme adopts a statistical rate control to identify an attacker and reduces the number of broadcast packets which have passed the rate control using the aggregation method. Experiment results show that the proposed scheme performs better than previous statistical rate control scheme

    Pr\"ufer vv-multiplication domains and related domains of the form D+E[ฮ“โˆ—]D+E[\Gamma^*]

    No full text
    DoctorLet DโŠ†ED \subseteq E be an extension of integral domains, KK bethe quotient field of DD, SS be a(saturated) multiplicative subset of DD with DโŠŠDSD \subsetneq D_S,ฮ“\Gamma be a nonzero torsion-free (additive) grading monoid withฮ“โˆฉโˆ’ฮ“={0}\Gamma \cap -\Gamma =\{0\}, ฮ“โˆ—=ฮ“โˆ–{0}\Gamma^*=\Gamma \setminus \{0\},GG be the quotient group of ฮ“\Gamma, D[ฮ“]D[\Gamma] be the semigroup ring of ฮ“\Gamma over DD,D(S,ฮ“)=D+DS[ฮ“โˆ—]={fโˆˆDS[ฮ“]โˆฃf(0)โˆˆD}D^{(S, \Gamma)}=D+D_S[\Gamma^*]=\{f \in D_S[\Gamma] \mid f(0) \in D\}, and(D,E,ฮ“)=D+E[ฮ“โˆ—]={fโˆˆE[ฮ“]โˆฃf(0)โˆˆD}(D, E, \Gamma)=D+E[\Gamma^*]=\{f \in E[\Gamma] \mid f(0) \in D\}.In this dissertation,we study PvvMDs and related domains in the view of the composite semigroup ring(D,E,ฮ“)(D, E, \Gamma). To do that, we first investigate the domain D(S,ฮ“)D^{(S, \Gamma)}as a special case of (D,E,ฮ“)(D, E, \Gamma).In fact, we show that D(S,ฮ“)D^{(S, \Gamma)} is a PvvMD (resp.,GCD-domain, GGCD-domain, integrally closed AGCD-domain) if and only ifDD is a PvvMD (resp., GCD-domain, GGCD-domain, integrally closed AGCD-domain), ฮ“\Gamma isa valuation semigroup and SS is a tt-splitting (resp., splitting,dd-splitting, almost splitting) set of DD. We also prove thatD(S,ฮ“)D^{(S, \Gamma)} is a Pr\"ufer domain (resp., B\'ezout domain) if and only ifDD is a Pr\"ufer domain (resp., B\'ezout domain), ฮ“\Gamma is a Pr\"ufer submonoid ofQ\mathbb{Q} and DS=KD_S=K.We also give some examples of a nonzero torsion-free (additive) grading valuation semigroup.Next, by using these results, we study the domain (D,E,ฮ“)(D, E, \Gamma).We prove that if EโˆฉK=DE \cap K=D, then (D,E,ฮ“)(D, E, \Gamma) is a PvvMD (resp., GCD-domain, GGCD-domain,Pr\"ufer domain) if and only if D=ED=E, DD is a PvvMD (resp., GCD-domain, GGCD-domain,field) and ฮ“\Gamma is a PvvMS (resp., GCD-semigroup, GGCD-semigroup, Pr\"ufer submonoid of Q\mathbb{Q}).We show that if DโŠŠKโŠ†ED \subsetneq K \subseteq E, then(D,E,ฮ“)(D, E, \Gamma) is a PvvMD (resp., GCD-domain, GGCD-domain, integrally closed AGCD-domain)if and only if DD is a PvvMD (resp., GCD-domain, GGCD-domain, integrally closed AGCD-domain),E=KE=K and ฮ“\Gamma is a valuation semigroup.We also show that if DโŠŠKโŠ†ED \subsetneq K \subseteq E, then(D,E,ฮ“)(D, E, \Gamma) is a B\'ezout domain (resp., Pr\"ufer domain) if and only if DD isa B\'ezout domain (resp., Pr\"ufer domain), E=KE=K and ฮ“\Gamma is a Pr\"ufer submonoid of Q\mathbb{Q}.For the general case, we prove that if DโŠŠED \subsetneq E, then(D,E,ฮ“)(D, E, \Gamma) is a GCD-domain (resp., integrally closed AGCD-domain) if and only ifDD is a GCD-domain (resp., integrally closed AGCD-domain), ฮ“\Gamma is a valuation semigroup andE=DSE=D_S for some splitting (resp., almost splitting) set SS of DD.Also, we show that if DโŠŠED \subsetneq E, then (D,E,ฮ“)(D, E, \Gamma) is a B\'ezout domain if and only ifDD is a B\'ezout domain, E=KE=K andฮ“\Gamma is a Pr\"ufer submonoid of Q\mathbb{Q}. Finally,we characterize generalized Krull domains and GUFDs via the domain (D,E,ฮ“)(D, E, \Gamma).We prove that if GG is of type (0,0,0,โ‹ฏโ€‰)(0, 0, 0, \cdots), then (D,E,ฮ“)(D, E, \Gamma) is a generalized Krull domain (resp.,GUFD) if and only if D=ED=E, DD is a generalized Krull domain (resp., GUFD)and ฮ“\Gamma is a generalized Krull semigroup (resp., weakly factorial GCD-semigroup)
    corecore