130 research outputs found

    ๋ฏธ๋ž˜์ˆ™๋ จ์ˆ˜์š”์˜ ์‹๋ณ„๊ณผ ์ „๋ง : ์œ ๋Ÿฝ์˜ ์—ฐ๊ตฌํ˜„ํ™ฉ

    Get PDF
    ์ธ๋ ฅ์ˆ˜๊ธ‰์˜ ์งˆ์  ๋ถˆ์ผ์น˜(์ˆ™๋ จ ๋ถˆ์ผ์น˜)๋ฅผ ์‚ฐ์—…๋ณ„๋กœ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ ์‹œ๋„ ์˜ ํ•˜๋‚˜๋กœ์„œ โ€˜์‚ฐ์—…๋ณ„ ๋ฏธ๋ž˜์ˆ™๋ จ์ˆ˜์š”์˜ ์‹๋ณ„๊ณผ ์ „๋งโ€™์— ๋Œ€ํ•˜์—ฌ ์œ ๋Ÿฝ์˜ ๋ฐฉ๋ฒ•๋ก ์„ ๊ฒ€ํ† ํ•˜๊ณ  ์šฐ๋ฆฌ๋‚˜๋ผ์—์˜ ์ ์šฉ๊ฐ€๋Šฅ์„ฑ๊ณผ ์กฐ๊ฑด๋“ค์„ ๊ฒ€ํ† ํ•ด ๋ด„. โ€˜๊ฑฐ์‹œ์ ์ธ๋ ฅ์ˆ˜๊ธ‰์ „๋ง(์–‘์  ์ ‘๊ทผ)โ€™๊ณผ์˜ ์ฐจ์ด์ , ์งˆ์  ์ „๋ง์˜ ์„ธ ๊ฐ€์ง€ ์ ‘๊ทผ๋ฐฉ๋ฒ•(์‚ฐ์—…์—ฐ๊ตฌ, ์ˆ™๋ จ์š”๊ฑด๋ถ„์„, ์‹œ๋‚˜๋ฆฌ์˜ค)๊ณผ ์ฃผ์š” ์‚ฌ๋ก€๋ฅผ ์‚ดํŽด๋ณด๊ณ  ์šฐ๋ฆฌ๋‚˜๋ผ์—์„œ ์ˆ™๋ จ์ˆ˜์š” ์ „๋ง๋ฐฉ๋ฒ•์˜ ์ ์šฉ์„ ์œ„ํ•œ ์ „์ œ์กฐ๊ฑด๋“ค์— ๋Œ€ํ•ด ์ •๋ฆฌํ•จโ… . ์„œ๋ก  1 โ…ก. ์‚ฐ์—…๋ณ„ ์ธ๋ ฅ์ „๋ง์˜ ํ•„์š”์„ฑ๊ณผ ์ฃผ์š”๋ฌธ์ œ 3 โ…ข. โ€˜๋ฏธ๋ž˜์ˆ™๋ จ์ˆ˜์š”์˜ ์‹๋ณ„๊ณผ ์ „๋งโ€™ ๋ฐฉ๋ฒ•๋ก : ์œ ๋Ÿฝ์˜ ์—ฐ๊ตฌํ˜„ํ™ฉ 21 โ…ฃ. ์†Œ๊ฒฐ: ์ˆ™๋ จ์ˆ˜์š”๋ถ„์„์„ ์œ„ํ•œ ์กฐ๊ฑด๋“ค 37 ์ฐธ๊ณ ๋ฌธํ—Œ 3

    INVESTIGATION ON THE IMMUNOLOGICAL SPECIFICITY OF CORONA VIRUS UTILIZING BIOINFORMATICS METHOD

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋ณด๊ฑด๋Œ€ํ•™์› : ๋ณด๊ฑดํ•™๊ณผ ์ƒ๋ช…์ •๋ณดํ•™์ „๊ณต, 2016. 8. ์†ํ˜„์„.์ƒˆ๋กœ์šด ๊ฐ์—ผ๋ณ‘์˜ ์ฐฝ๊ถ์€ ๊ณต์ค‘ ๋ณด๊ฑด์— ์‹ฌ๊ฐํ•œ ์œ„ํ˜‘์ด๊ณ  ํ•ด๊ฒฐํ•ด์•ผ ํ•  ๊ณผ์ œ์ด๋‹ค. 2015๋…„ ํ•œ๊ตญ์— ์ถœํ˜„ํ•œ ์ค‘๋™ ํ˜ธํก๊ธฐ ์ฆํ›„๊ตฐ์„ ์ผ์œผํ‚จ ์ฝ”๋กœ๋‚˜ ๋ฐ”์ด๋Ÿฌ์Šค(MERS-CoV)๋Š” ๊ตญ๋ฏผ๊ณผ ๋ณด๊ฑด๋‹น๊ตญ์— ํ˜ผ๋ž€์„ ์ฃผ์—ˆ๊ณ , ์‚ฌํšŒ๊ฒฝ์ œ์ ์œผ๋กœ ์‹ฌ๊ฐํ•œ ์†์‹ค์„ ์ดˆ๋ž˜ ํ•˜์˜€๋‹ค. ๊ฒฐ๊ณผ์ ์œผ๋กœ, ํ•œ๊ตญ์˜ ๊ฐ์—ผ๋ณ‘ ๋Œ€์‘ ์ฒด๊ณ„์™€ ์˜๋ฃŒ์„œ๋น„์Šค ํ™˜๊ฒฝ์˜ ๋ฌธ์ œ์ ์„ ์ธ์‹ํ•˜๊ฒŒ ๋˜์—ˆ์œผ๋ฉฐ, ๊ณ ์œ„ํ—˜์„ฑ ๋ฐ”์ด๋Ÿฌ์Šค ๊ฐ์—ผ์— ๋Œ€์ฒ˜ํ•˜๋Š” ํ•œ๊ตญ์˜ ๋ณด๊ฑด ํ˜„ํ™ฉ๊ณผ ํ•œ๊ณ„์ ์„ ๋ณด์—ฌ ์ฃผ์—ˆ๊ณ , ์น˜๋ฃŒ์ œ์™€ ๋ฐฑ์‹ ์˜ ๊ฐœ๋ฐœ์ด๋ผ๋Š” ๊ณผ์ œ๋ฅผ ๋‚จ๊ฒจ ์ฃผ์—ˆ๋‹ค. 60๋…„์ „์— ์ฒ˜์Œ ๋ฐœ๊ฒฌ๋œ ์ฝ”๋กœ๋‚˜ ๋ฐ”์ด๋Ÿฌ์Šค๋Š” 2003๋…„ ์‚ฌ๋žŒ์—๊ฒŒ ์น˜๋ช…์ ์ธ ํ˜ธํก๊ธฐ ๊ฐ์—ผ์„ ์ผ์œผํ‚ค๋Š” SARS-CoV๊ฐ€ ์œ ํ–‰ ๋˜๋ฉด์„œ ์„ธ์ƒ์˜ ์ฃผ๋ชฉ์„ ๋ฐ›๊ฒŒ ๋˜์—ˆ๋‹ค. ๊ทธ ํ›„ ์ฝ”๋กœ๋‚˜ ๋ฐ”์ด๋Ÿฌ์Šค์˜ ๋ณ‘์›์„ฑ ๋ฐ ์ˆ™์ฃผ์˜ ๋ฉด์—ญ๋ฐ˜์‘์— ๊ด€ํ•œ ์ดํ•ด๊ฐ€ ํ•„์š”ํ•จ์„ ์žฌ์กฐ๋ช…ํ•˜๊ฒŒ ๋˜์—ˆ๋‹ค. ์ „ ์„ธ๊ณ„์ ์œผ๋กœ ์ฝ”๋กœ๋‚˜ ๋ฐ”์ด๋Ÿฌ์Šค์— ๋Œ€ํ•œ ์—ฐ๊ตฌ๊ฐ€ ์ง„ํ–‰์ด ๋˜๊ณ  ์žˆ์–ด์„œ, ์ฝ”๋กœ๋‚˜ ๋ฐ”์ด๋Ÿฌ์Šค์˜ ๋ถ„์ž ์ƒ๋ฌผํ•™์ ์ธ ๊ฒฐ๊ณผ์™€ ๋ฉด์—ญ ๊ธฐ์ „์ด ๋ฐํ˜€์ง€๊ณ ๋Š” ์žˆ์ง€๋งŒ, ์•„์ง ์ •๋ณด๋“ค์ด ์‚ฐ์žฌ๋˜์–ด ์žˆ๊ณ , ๊ธฐ์กด์— ๊ตฌ์ถ•๋œ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค๋“ค ๋˜ํ•œ ์ ‘๊ทผ๊ณผ ์ด์šฉ์ด ์šฉ์ดํ•˜์ง€ ์•Š๋‹ค. ๋”ฐ๋ผ์„œ ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ์ฝ”๋กœ๋‚˜ ๋ฐ”์ด๋Ÿฌ์Šค์™€ ๋ฉด์—ญ ๊ด€๋ จ ๋‹จ๋ฐฑ์งˆ๋“ค์˜ ์ƒ๋ฌผํ•™์  ํŠน์ง• ๋ฐ ์œ ์ „์ž ์ •๋ณด๋ฅผ ์ œ๊ณตํ•˜๋Š” HCoV-IMDB๋ฅผ ๊ตฌ์ถ•ํ•˜์—ฌ ์—ฐ๊ตฌ์ž๋“ค ์—๊ฒŒ ์œ ์šฉํ•œ ์ •๋ณด๋ฅผ ์ œ๊ณตํ•ด ์ฃผ๊ณ ์ž ํ•œ๋‹ค. ๊ตฌ์ถ•๋œ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค์˜ ์ž๋ฃŒ๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ๊ณ„ํ†ต ๋ฐœ์ƒ ๋ถ„์„์„ ์‹œํ–‰ํ•˜์—ฌ ๊ธฐ์กด์— ์•Œ๋ ค์ง€์ง€ ์•Š์•˜๋˜ ์ฝ”๋กœ๋‚˜ ๋ฐ”์ด๋Ÿฌ์Šค์˜ ์œ„ํ—˜์„ฑ์„ ์˜ˆ์ธกํ•œ ๊ฒฐ๊ณผ, HCoV-OC43์˜ S ๋‹จ๋ฐฑ์งˆ์ด MERS-CoV์˜ S๋‹จ๋ฐฑ์งˆ๊ณผ ์ง„ํ™”์ ์œผ๋กœ ์œ ์‚ฌํ•˜์˜€์œผ๋ฉฐ, ์ด๋ฅผ ํ†ตํ•˜์—ฌ HCoV-OC43์˜ ๋ณ€์ด ์—ฌ๋ถ€์˜ ์ง€์†์ ์ธ ๊ฐ์‹œ๊ฐ€ ํ•„์š”ํ•จ์„ ์ œ์‹œํ•˜์˜€๋‹ค. ๋ณธ ์—ฐ๊ตฌ๋Š” ์ƒˆ๋กœ์šด ๋ฐ”์ด๋Ÿฌ์Šค์˜ ์ฐฝ๊ถ๊ณผ ๊ธฐ์กด์˜ ๋ฐ”์ด๋Ÿฌ์Šค์˜ ๊ฐ์‹œ ๋“ฑ์— ์ด์šฉ ํ•  ์ˆ˜ ์žˆ๋Š” ๋ฐ”์ด์˜ค์ธํฌ๋งคํ‹ฑ์Šค์ ์ธ ๋ถ„์„ ๋ฐฉ๋ฒ•์„ ์ œ๊ณตํ•จ์œผ๋กœ์จ ์˜ˆ๋ฐฉ์„ ์œ„ํ•œ ๋ณด๊ฑดํ•™์  ๋ฐฉ๋ฒ•์„ ์ œ์‹œํ•˜์˜€๋‹ค. ๋˜ํ•œ, ์ฝ”๋กœ๋‚˜ ๋ฐ”์ด๋Ÿฌ์Šค์˜ ๋ฉด์—ญ ํŠน์ด์„ฑ ๋ถ„์„์„ ์œ„ํ•˜์—ฌ, ๋„คํŠธ์›Œํฌ ๋ถ„์„์„ ์‹œํ–‰ํ•œ ๊ฒฐ๊ณผ, ์‚ฌ๋žŒ ๋‹จ๋ฐฑ์งˆ์˜ IC1 ๋‹จ๋ฐฑ์งˆ๊ณผ SARS-CoV์˜ ๋น„๊ตฌ์กฐ ๋‹จ๋ฐฑ์งˆ๋“ค ์‚ฌ์ด์˜ ์ƒํ˜ธ ์ž‘์šฉ์„ ํ™•์ธํ•˜์˜€๋‹ค. IC1์€ ๋ฉด์—ญ๊ธฐ์ „ ์ค‘ ๋ณด์ฒด๊ณ„์˜ ํ™œ์„ฑ, ํ˜ˆ์•ก์‘๊ณ , ํ”ผ๋ธŒ๋ฆฐ์˜ ๋ถ„ํ•ด์™€ ํ‚ค๋‹Œ ํ•ฉ์„ฑ ๋“ฑ์˜ ๋ฌผ๋ฆฌ์ ์ธ ๊ธฐ์ „์— ๊ด€์—ฌํ•˜๋Š” ๋‹จ๋ฐฑ์งˆ๋กœ์จ ์•ž์œผ๋กœ ์—ฐ๊ตฌ๊ฐ€ ๋” ์ง„ํ–‰์ด ๋œ๋‹ค๋ฉด, ์•„์ง ๋ฐํ˜€์ง€์ง€ ์•Š์€ ์ฝ”๋กœ๋‚˜ ๋ฐ”์ด๋Ÿฌ์Šค์˜ ๋ฉด์—ญ ๊ธฐ์ „์˜ ์ดํ•ด์— ๋Œ€ํ•œ ์‹ค๋งˆ๋ฆฌ๋ฅผ ์ œ๊ณตํ•ด ์ฃผ๊ณ  ์ด๋Š” ํ•ญ์ƒ์ œ๋‚˜ ๋ฐฑ์‹ ์˜ ๊ฐœ๋ฐœ์— ๋„์›€์„ ์ค„ ์ˆ˜ ์žˆ์„ ๊ฒƒ์ด๋‹ค. ๋” ๋‚˜์•„๊ฐ€์„œ๋Š” ๊ฐœ์ธ์˜ ์œ ์ „์  ์ฐจ์ด์— ์ ํ•ฉํ•œ ๊ฐœ์ธ ๋งž์ถคํ˜• ์น˜๋ฃŒ์ œ์˜ ๊ฐœ๋ฐœ์— ๊ธฐ๋ฐ˜์ด ๋˜๋Š” ์—ฐ๊ตฌ ์ž๋ฃŒ๊ฐ€ ๋  ๊ฒƒ์ด๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ ์ด์šฉํ•œ ๋„คํŠธ์›Œํฌ ๋ถ„์„ ๋ฐฉ๋ฒ•์€ ๊ธฐ์กด์˜ ๋ฉด์—ญํ•™์  ์—ฐ๊ตฌ ๊ฒฐ๊ณผ๋“ค์„ ํ†ตํ•ฉํ•˜์—ฌ ๋ณด์—ฌ ์คŒ์œผ๋กœ์จ ๊ฐ„๊ณผํ•˜๊ณ  ๋„˜์–ด๊ฐˆ ์ˆ˜ ์žˆ๋Š” ๋ถ€๋ถ„์˜ ํ•ด์„์ด ๊ฐ€๋Šฅํ•˜๋ฉฐ, ์ด๋Ÿฌํ•œ ์—ฐ๊ตฌ๋Š” ์‹œ์Šคํ…œ์ ์ธ ๋ฉด์—ญ ๊ธฐ์ „์˜ ์ดํ•ด์— ๊ธฐ์ดˆ๋กœ ์‚ฌ์šฉ๋  ์ˆ˜ ์žˆ์„ ๊ฒƒ์ด๋‹ค.์ œ 1์žฅ. ์„œ ๋ก  1 1.1 ์—ฐ๊ตฌ๋ฐฐ๊ฒฝ 1 1.1.1 ์ฝ”๋กœ๋‚˜ ๋ฐ”์ด๋Ÿฌ์Šค์˜ ํŠน์ง• 1 1.1.2 ์ฝ”๋กœ๋‚˜ ๋ฐ”์ด๋Ÿฌ์Šค์˜ ์œ ํ–‰ 5 1.1.3 ์ฝ”๋กœ๋‚˜ ๋ฐ”์ด๋Ÿฌ์Šค์˜ ์—ฐ๊ตฌํ˜„ํ™ฉ 8 1.2 ์ฝ”๋กœ๋‚˜ ๋ฐ”์ด๋Ÿฌ์Šค์™€ ์ˆ™์ฃผ์˜ ์ƒํ˜ธ์ž‘์šฉ 11 1.2.1 ๋ฐ”์ด๋Ÿฌ์Šค์™€ ๋ฉด์—ญ์‹œ์Šคํ…œ์˜ ์ž‘์šฉ 11 1.2.2 ๋ฐ”์ด๋Ÿฌ์Šค์™€ ์ƒํ˜ธ์ž‘์šฉํ•˜๋Š” ๋ฉด์—ญ ๋‹จ๋ฐฑ์งˆ 12 1.3 ์ฝ”๋กœ๋‚˜ ๋ฐ”์ด๋Ÿฌ์Šค์— ๋Œ€ํ•œ ์ƒ๋ช…์ •๋ณดํ•™์  ๋ถ„์„ 17 1.3.1 ๋ฐ”์ด๋Ÿฌ์Šค์™€ ๋ฉด์—ญ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ๊ตฌ์ถ• ํ˜„ํ™ฉ 17 1.3.2 ๊ณ„ํ†ต์ˆ˜ ๋ถ„์„๋ฒ• 19 1.3.3 ๋„คํŠธ์›Œํฌ ๋ถ„์„๋ฒ• 20 1.4 ์—ฐ๊ตฌ์˜ ํ•„์š”์„ฑ 23 1.5 ์—ฐ๊ตฌ์˜ ๋ชฉ์  26 ์ œ 2์žฅ. ์—ฐ๊ตฌ ๋ฐฉ๋ฒ• 36 2.1 ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘ ๋ฐ ๊ฐ€๊ณต 36 2.2 ์‹œ์Šคํ…œ ๊ฐœ๋ฐœ ํ™˜๊ฒฝ ๋ฐ BLAST ์„œ๋ฒ„ ๊ตฌ์ถ• 38 2.3 ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ๊ตฌํ˜„ 39 2.4 ๊ณ„ํ†ต์ˆ˜ ์ž‘์„ฑ 41 2.5 ๋„คํŠธ์›Œํฌ ์ž‘์„ฑ 45 ์ œ 3์žฅ. ์—ฐ๊ตฌ ๊ฒฐ๊ณผ 50 3.1 ๋ฉด์—ญ ํŠน์ด์„ฑ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ๊ตฌ์ถ• 50 3.2 ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ๊ธฐ๋ฐ˜ ๊ณ„ํ†ต์ˆ˜ ๋ถ„์„ 52 3.3 ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ๊ธฐ๋ฐ˜ ๋„คํŠธ์›Œํฌ ๋ถ„์„ 53 ์ œ 4์žฅ. ๊ณ  ์ฐฐ 63 4.1 ์—ฐ๊ตฌ ๊ฒฐ๊ณผ์˜ ๊ณ ์ฐฐ 63 4.2 ์—ฐ๊ตฌ์˜ ํ•œ๊ณ„์  ๋ฐ ํ–ฅํ›„ ์—ฐ๊ตฌ์˜ ์ œ์•ˆ 69 4.2.1 ์—ฐ๊ตฌ์˜ ํ•œ๊ณ„์  69 4.2.2ํ–ฅํ›„ ์—ฐ๊ตฌ์˜ ์ œ์•ˆ 71 4.3 ๊ธฐ๋Œ€์„ฑ๊ณผ 73 4.4 ๋ณด๊ฑดํ•™์  ํ™œ์šฉ๋ฐฉ์•ˆ 74 ์ œ 5์žฅ. ๊ฒฐ๋ก  ๋ฐ ์ด๋ก  76 5.1 ๊ฒฐ ๋ก  76 5.2 ์ด ๋ก  79 ์ฐธ๊ณ  ๋ฌธํ—Œ 80 Abstract 95 ๋ถ€๋ก : ๊ณ„ํ†ต์ˆ˜ ๋ถ„์„ ๊ฒฐ๊ณผ 97Maste

    2007๋…„ ์ •๋ถ€๋ถ€์ฒ˜ ์—…๋ฌด๋ณด๊ณ : HRD ์ •์ฑ…์ค‘์‹ฌ์œผ๋กœ] ๊ต์œก์ธ์ ์ž์›๋ถ€

    Get PDF
    ์ดˆ์ค‘๋“ฑ ๊ณต๊ต์œก์˜ ๋‚ด์‹คํ™”์™€ ๊ณ ๋“ฑ๊ต์œก์˜ ์ˆ˜์›”์„ฑ ์ถ”๊ตฌ ์ธ์ ์ž์›๊ฐœ๋ฐœ ์ •์ฑ…์˜ ์—ฐ๊ณ„์กฐ์ • ์—ญํ•  ๊ต์œก์•ˆ์ „๋ง ๊ตฌ์ถ•์œผ๋กœ ๊ต์œก๊ฒฉ์ฐจ ์™„

    ์ œ์กฐ์—… ์ƒ์‚ฐ์ง ๊ทผ๋กœ์ž์˜ ์ˆ™๋ จํ–ฅ์ƒ์ด ์Šน์ง„๊ณผ ์ž„๊ธˆ์— ๋ฏธ์น˜๋Š” ์˜ํ–ฅ

    Get PDF
    ๋ณธ ์—ฐ๊ตฌ๋Š” ์ œ์กฐ์—… ์ƒ์‚ฐ์ง ๊ทผ๋กœ์ž์˜ ์ˆ™๋ จํ–ฅ์ƒ์ด ์Šน์ง„๊ณผ ์ž„๊ธˆ์— ๋ฏธ์น˜๋Š” ์˜ํ–ฅ์„ ๋ถ„์„ํ•˜์˜€๋‹ค. ๋จผ์ €, ์ˆ™๋ จํ–ฅ์ƒ์˜ ์‹คํƒœ๋ฅผ ๋ณด๋ฉด ๊ทผ๋กœ์ž์˜ ํ•™๋ ฅ์ด ๋†’์„์ˆ˜๋ก, ๋Œ€๊ธฐ์—…(1000์ธ ์ด์ƒ)์— ์ข…์‚ฌํ• ์ˆ˜๋ก ์ˆ™๋ จํ–ฅ์ƒ(๊ธฐ์ˆ ์  ๋‹ค๋Šฅ๊ณตํ™”)์ž์˜ ๋น„์œจ๊ณผ ํ–ฅ์ƒ ์ •๋„๊ฐ€ ๋” ๋†’์•˜๋‹ค. ๊ธฐ์—…๋ณ„๋กœ ์ œ๋„๋‚˜ ๋…ธ๋ ฅ์˜ ์ฐจ์ด์— ๋”ฐ๋ผ ๋‹ค๋ฅด๊ฒ ์ง€๋งŒ, ํ•™๋ ฅ, ๊ทผ์†, ๊ธฐ์—…๊ทœ๋ชจ์™€ ์ง๋ฌด์ˆ˜์ค€์„ ํ†ต์ œํ•  ๋•Œ, ๊ณ ์†์Šน์ง„์ œ๋„๋‚˜ ๊ด€๋ฆฌ์ง์œผ๋กœ ์Šน์ง„๊ฒฝ๋กœ์˜ ์กด์žฌ์™€ ๊ฐ™์€ ์ธ์‚ฌ๊ด€๋ฆฌ๋ณ€์ˆ˜๋“ค์€ ๊ฐœ๋ณ„ ๊ทผ๋กœ์ž ์ˆ™๋ จํ–ฅ์ƒ์— ํ†ต๊ณ„์ ์œผ๋กœ ์œ ์˜ํ•˜๊ฒŒ ์˜ํ–ฅ์„ ์ฃผ๊ณ  ์žˆ์ง€ ์•Š์•˜๋‹ค. ์ƒ์‚ฐ๊ธฐ๋Šฅ์ง ๊ทผ๋กœ์ž์˜ ์ˆ™๋ จํ–ฅ์ƒ์€ ์Šน์ง„ํ™•๋ฅ ์„ ๋†’์ผ ๋ฟ ์•„๋‹ˆ๋ผ ์žฅ๊ธฐ๊ทผ์† ๊ทผ๋กœ์ž๋ฅผ ์ค‘์‹ฌ์œผ๋กœ ์ž„๊ธˆํ–ฅ์ƒ์— ์ค‘์š”ํ•˜๊ฒŒ ์˜ํ–ฅ์„ ์ฃผ๋ฉฐ, ์ด ๊ณผ์ •์—์„œ ์ธ์‚ฌ๊ด€๋ฆฌ ์ œ๋„๋ณ€์ˆ˜๋“ค๋„ ํ†ต๊ณ„์ ์œผ๋กœ ์œ ์˜ํ•˜๊ฒŒ ์˜ํ–ฅ์„ ์ค€๋‹ค๋Š” ๊ฒƒ์ด๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์—ญ์œผ๋กœ ์ž„๊ธˆ์ด๋‚˜ ์Šน์ง„, ๊ทธ๋ฆฌ๊ณ  ์ธ์‚ฌ๊ด€๋ฆฌ๋ณ€์ˆ˜๋“ค์ด ๊ทผ๋กœ์ž์˜ ์ˆ™๋ จํ–ฅ์ƒ์„ ์œ ์ธํ•˜๋Š”๋ฐ ์œ ํšจํ•˜๊ฒŒ ์ž‘๋™ํ•˜๊ณ  ์žˆ๋Š”๊ฐ€? ์ด์— ๋Œ€ํ•˜์—ฌ ๋ณธ ์—ฐ๊ตฌ๋Š” ์œ ๋ณด์ ์ด๋ผ๊ณ  ๋ณธ๋‹ค. ๊ทผ๋กœ์ž์˜ ์ˆ™๋ จํ–ฅ์ƒ ๊ณผ์ •์— ํ•™๋ ฅ๋ณ„, ๊ทœ๋ชจ๋ณ„ ์ฐจ์ด๊ฐ€ ์žˆ๊ณ , ์ธ์‚ฌ๊ด€๋ฆฌ๊ด€๋ จ ๋ณ€์ˆ˜๋“ค์ด ์œ ํšจํ•˜๊ฒŒ ์ž‘๋™ํ•˜๋Š” ๊ฒƒ์œผ๋กœ ๋‚˜ํƒ€๋‚˜์ง€ ์•Š๊ณ  ์žˆ๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค.โ… . ์„œ๋ก  โ…ก. ์„ ํ–‰์—ฐ๊ตฌ์™€ ์‹ค์ฆ๋ถ„์„ ๊ฐ€์„ค โ…ข. ์ž๋ฃŒ์™€ ์ถ”์ •์‹ โ…ฃ. ์ถ”์ •๊ฒฐ๊ณผ โ…ค. ๊ฒฐ๋ก ๊ณผ ์‹œ์‚ฌ์  ์ฐธ๊ณ ๋ฌธ

    Arithmetics of Ciphertexts under Homomorphic Encryption

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์ˆ˜๋ฆฌ๊ณผํ•™๋ถ€, 2017. 2. ์ฒœ์ •ํฌ.Privacy homomorphism is an important concept for encrypting clear data while allowing one to perform operations on encrypted data without decryption. Although the use of fully homomorphic encryption schemes theoretically allows for the secure evaluation of any function, the evaluation cost is still far from being practical for many functions and no secure solutions have been developed to satisfy the efficiency requirements. In this thesis, the foundation of our simple framework is a set of optimized circuits for the following operations: equality, greater-than comparison and integer addition. We first focus on the applications of homomorphic encryption for private query processing on encrypted databases. In particular, we construct a unied framework to eciently and privately process queries with search and compute operations by applying the underlying circuit primitives. Since genomic data contains numerous distinguishing features and sensitive personal information, a privacy-preserving genome analysis in a cloud computing environment becomes the major issue in bioinformatics. We present a method to perform the exact edit distance algorithm on encrypted data to obtain an encrypted result. We also describe how to privately compute the approximate edit distance between encrypted DNA sequences. Finally we create a homomorphic security system for searching a set of biomarkers to encrypted genomes. We propose an efficient method to securely search a matching position with biomarker and extract the information of DNA sequences at the position without complicated computation such as comparison.1 Introduction 1 1.1 Contributions 2 1.1.1 Private Databse Query Processing 2 1.1.2 Secure Genome Analysis 3 2 Preliminaries 6 2.1 Practical Homomorphic Encryption 6 2.1.1 The BGV-Type Scheme 7 2.1.2 The YASHE Scheme 8 2.1.3 The Ring-GSW Scheme 10 2.2 Human Genome Comparison 11 3 Primitive Arithmetic Circuits under Homomorphic Encryption 13 3.1 Binary Arithmetic Circuits 14 3.1.1 Equality Circuit 14 3.1.2 Greater-Than Comparison Circuit 15 3.1.3 Integer Addition Circuit 16 3.1.4 Maximum & Minimum Circuits 17 3.2 Arithmetic Circuits over the Integers 19 3.2.1 Calibrating Binary Circuit Primitives 20 3.2.2 Arithmetic Circuits over the Integers Based on Fermat's Little Theorem 20 3.2.3 Arithmetic Circuits over the Integers Based on Lagrange Interpolation Formula 21 4 Private Database Query Processing 23 4.1 General-Purpose Search-and-Compute 23 4.1.1 A High-level Overview of Our Approach 25 4.1.2 Security Evaluation 25 4.2 Applications to Encrypted Databases 26 4.2.1 Search Queries 26 4.2.2 Search-and-Compute Queries 28 4.2.3 Join Queries 29 4.3 Performance Improvement 30 4.3.1 Larger Message Spaces with Lazy Carry Processing 30 4.3.2 Calibrating Circuit Primitives 31 4.4 Implementation and Discussion 33 4.4.1 Adjusting the Parameters 34 4.4.2 Experiments for Search Queries 35 4.4.3 Experiments for Search-and-Sum 35 4.4.4 Experiments for Search-and-Count 38 4.5 Handling Join Query 40 5 Secure Genome Analysis Based on Homomorphic Encryption 43 5.1 Exact Edit Distance Algorithm 43 5.1.1 Encrypted Edit Distance Algorithm 43 5.1.2 Optimizations Based on Block Computation 45 5.1.3 Optimization of Encrypted Edit Distance Algorithm Based on Pathnding Method 47 5.1.4 Implementation 50 5.2 Approximate Edit Distance Algorithm 51 5.2.1 Encoding Genomic Data 52 5.2.2 Secure DNA Sequence Comparison with Bit-sliced Implementation 53 5.2.3 Secure DNA Sequence Comparison with Integer-based Implementation 55 5.2.4 Implementation 56 5.3 Secure Searching of Biomarkers 58 5.3.1 Privacy-Preserving Database Searching and Extraction 59 5.3.2 Secure Searching of Biomarkers 63 5.3.3 Optimization Techniques 64 5.3.4 Implementation 66 6 Conclusions 69 Bibliography 71 Abstract (in Korean) 77Docto

    ์ œ์กฐ์—…์˜ ์žฅ์‹œ๊ฐ„ ์ดˆ๊ณผ๊ทผ๋กœ ์‹คํƒœ์™€ ๊ทธ ์˜ํ–ฅ

    Get PDF
    ์ œ์กฐ์—…์ฒด์—์„œ ์ฃผ๋‹น 12์‹œ๊ฐ„ ์ด์ƒ์˜ ์žฅ์‹œ๊ฐ„ ์ดˆ๊ณผ๊ทผ๋กœ๋Š” ๋Œ€๊ทœ๋ชจ ์‚ฌ์—…์ฒด(33.3%)๋ณด๋‹ค ์ค‘์†Œ๊ทœ๋ชจ ์‚ฌ์—…์ฒด(35.7~50.0%)์—์„œ ๋งŽ์ด ๋ฐœ์ƒํ•˜๊ณ  ์žˆ์Œ. ์žฅ์‹œ๊ฐ„ ์ดˆ๊ณผ๊ทผ๋กœ๋Š” ๊ต๋Œ€์ œ ์ž‘์—…ํŒ€(48.7%)์—์„œ, ์—…๋ฌด์œ ํ˜•์œผ๋กœ๋Š” ๋ถ€ํ’ˆ๊ฐ€๊ณต์—…๋ฌด(41.6%)์™€ ํ’ˆ์งˆ๊ด€๋ฆฌ๏ผŸ๊ฒ€์‚ฌ ๋“ฑ์˜ ๊ธฐํƒ€์—…๋ฌด(48.2%)์—์„œ ์ฃผ๋กœ ๋†’๊ฒŒ ๋‚˜ํƒ€๋‚จ. ๋…ธ๋™์กฐํ•ฉ์ด ์žˆ๋Š” ์‚ฌ์—…์ฒด(45.1%)๊ฐ€ ๋น„๋…ธ์กฐ ์‚ฌ์—…์ฒด(37.3%)๋ณด๋‹ค, ์ž‘์—…์žฅ์˜ ๊ธฐ๊ณ„์„ค๋น„๊ฐ€ ๋…๋ฆฝํ˜• ์ž๋™ํ™”(55.0%)์ด๊ฑฐ๋‚˜ ๋ฐ˜์ž๋™ํ™”(41.7%)์ธ ๊ฒฝ์šฐ๊ฐ€ ์ˆ˜๋™์‹(27.6%)์ธ ๊ฒฝ์šฐ๋ณด๋‹ค ์žฅ์‹œ๊ฐ„ ์ดˆ๊ณผ๊ทผ๋กœ๋ฅผ ํ•˜๋Š” ์ž‘์—…ํŒ€์ด ๋งŽ์Œ. ์ œ์กฐ์—…์˜ ์žฅ์‹œ๊ฐ„ ์ดˆ๊ณผ๊ทผ๋กœ ๊ด€ํ–‰์€ ๊ทผ๋กœ์ž์˜ ์ง๋ฌดํƒœ๋„ ์ „๋ฐ˜์— ๋ถ€์ •์ ์ธ ์˜ํ–ฅ์„ ์ดˆ๋ž˜ํ•˜๋ฉฐ, ๊ทผ๋ฌด์‹œ๊ฐ„ ์ค‘ ๋‚ญ๋น„๋˜๋Š” ์œ ํœด์‹œ๊ฐ„๋„ ๋Š˜๋ฆฌ๊ณ  ์žˆ์Œ. ๊ทผ๋ฌด ์ค‘ ์œ ํœด์‹œ๊ฐ„์ด ์ „์ฒด ๊ทผ๋กœ์‹œ๊ฐ„์˜ 10% ์ด์ƒ์ด๋ผ๋Š” ์‘๋‹ต์ด 20.1%์— ๋‹ฌํ•จ.12 hours per week or more of extended overtime in the manufacturing sector is taking place at a higher rate in small- and medium-sized companies (35.7~50.0%) compared to large companies (33.3%). In general, overtime is occurring mainly where there are teams working on a shift basis (48.7%); and in terms of work type, parts processing work (41.6%) and the work that includes quality management and quality inspection (48.2%) have a high occurrence of overtime. Long hours of overtime are found among work teams in companies with a labor union (45.1%) than companies without a labor union (37.3%), in companies with standalone automated field equipment or semi-automated field equipment (55.0% and 41.7%, respectively) than those in companies with manual field equipment (27.6%). The practice of long hours of overtime work in the manufacturing sector has negative effects on the overall work attitude of workers and is causing increased idle time during work hours. As much as 20.1% responded that idle time makes up more than 10% of the entire work hours

    ๋Œ€ํ•™๊ต์ˆ˜์˜ ๊ณ ์šฉ๊ตฌ์กฐ์™€ ๋Œ€ํ•™ ๊ฐ„ ์ด๋™

    Get PDF
    โ—‹ ์šฐ๋ฆฌ๋‚˜๋ผ์˜ ๊ฒฝ์šฐ ๊ณผ๊ฑฐ์—๋Š” ๋Œ€ํ•™๊ต์ˆ˜์˜ ๋Œ€ํ•™ ๊ฐ„ ์ด๋™์ด ๋นˆ๋ฒˆํ•˜์ง€ ์•Š์€ ๊ฒƒ์œผ๋กœ ์•Œ๋ ค์ ธ ์™”์œผ๋‚˜ ์ตœ๊ทผ ๋“ค์–ด ๋Œ€ํ•™ ๊ฐ„ ์ด๋™์ด ๊ณผ๊ฑฐ์— ๋น„ํ•ด์„œ๋Š” ์ƒ๋Œ€์ ์œผ๋กœ ํ™œ์„ฑํ™”๋˜๊ณ  ์žˆ์Œ. ๋”์šฑ์ด ํ–ฅํ›„ ๋Œ€ํ•™ ๊ฐ„ ๊ฒฝ์Ÿ์ด ๋”์šฑ ๊ฒฉํ™”๋  ๊ฒƒ์œผ๋กœ ์ „๋ง๋˜๊ณ  ์žˆ๋Š” ๋งŒํผ, ๊ต์ˆ˜์˜ ๋Œ€ํ•™ ๊ฐ„ ์ด๋™์ด ๋ณด๋‹ค ํ™œ๋ฐœํ•ด์งˆ ๊ฐ€๋Šฅ์„ฑ์ด ์žˆ์Œ. โ—‹ ๊ฒฝ์Ÿ์ฒด์ œ์˜ ๋„์ž…์€ ๊ธฐ๋ณธ์ ์œผ๋กœ ๊ทผ๋กœ์ž์˜ ์›ํ™œํ•œ ์ด๋™์„ ์ „์ œ๋กœ ํ•œ๋‹ค๋Š” ์ ์—์„œ ๊ทธ ์‹คํƒœ์™€ ๋ฉ”์ปค๋‹ˆ์ฆ˜์„ ํŒŒ์•…ํ•˜๋Š” ๊ฒƒ์ด ์ค‘์š”ํ•จ. ๋”ฐ๋ผ์„œ ํ˜„์žฌ ์šฐ๋ฆฌ๋‚˜๋ผ ๋Œ€ํ•™๊ต์ˆ˜์˜ ๋Œ€ํ•™๊ฐ„ ์ด๋™ ์‹คํƒœ๊ฐ€ ์–ด๋–ป๊ณ , ์–ด๋–ค ์š”์ธ๋“ค์ด ์—ฌ๊ธฐ์— ์ฃผ๋œ ์˜ํ–ฅ์„ ๋ฏธ์น˜๊ณ  ์žˆ๋Š”์ง€ ๋ถ„์„ํ•  ํ•„์š”๊ฐ€ ์žˆ์Œ. โ—‹ ๋Œ€ํ•™ ์ „์ž„๊ต์›์˜ ๋Œ€ํ•™๊ฐ„ ์ด๋™ ์‹คํƒœ๋ฅผ ์‚ฌ๋ฆฝ๋Œ€ํ•™์„ ์ค‘์‹ฌ์œผ๋กœ ๋ถ„์„ํ•ด๋ณธ ์ฃผ์š” ๋ถ„์„ ๊ฒฐ๊ณผ๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์Œ. - ์‚ฌ๋ฆฝ๋Œ€ํ•™ ์ „์ž„๊ต์›์˜ ๋Œ€ํ•™ ๊ฐ„ ์ด๋™์€ ์ถ”์„ธ์ ์œผ๋กœ ํ™œ์„ฑํ™”๋˜๊ณ  ์žˆ์Œ. - ์—ฐ๋ น์ด ๋‚ฎ๊ฑฐ๋‚˜ ๊ฒฝ๋ ฅ์ด ์งง์„์ˆ˜๋ก ํƒ€๋Œ€ํ•™์œผ๋กœ์˜ ์ด๋™ ๊ฐ€๋Šฅ์„ฑ์ด ๋†’์•„์ง. - ์ž„๊ธˆ์ˆ˜์ค€์ด ๋‚ฎ๊ฑฐ๋‚˜ ์ด์ง ์ „ ๋Œ€ํ•™์˜ ๋ช…์„ฑ์ด ๋‚ฎ์„์ˆ˜๋ก(์—ฌ๊ธฐ์—์„œ๋Š” ๊ต์ˆ˜ 1์ธ๋‹น ํ•™์ƒ ์ˆ˜, ํ•™๊ต ์†Œ์žฌ์ง€ ๋“ฑ์œผ๋กœ ํŒŒ์•…) ์ „์ž„๊ต์ˆ˜์˜ ํƒ€๋Œ€ํ•™์œผ๋กœ์˜ ์ด๋™ ๊ฐ€๋Šฅ์„ฑ์ด ์ปค์ง. - ์—ฐ๊ตฌ์‹ค์ ์ด ๋Œ€ํ•™๊ฐ„ ์ด๋™์— ๋ฏธ์น˜๋Š” ์˜ํ–ฅ์€ ์ œํ•œ์ ์ด์—ˆ์Œ. - ์ „๊ณต๋ณ„๋กœ๋„ ๋Œ€ํ•™๊ฐ„ ์ด๋™ ๊ฐ€๋Šฅ์„ฑ์— ์ƒ๋‹นํ•œ ์ฐจ์ด๊ฐ€ ์žˆ์—ˆ์Œ. โ… . ๋ฌธ์ œ์ œ๊ธฐ โ…ก. ๋ถ„์„์ž๋ฃŒ โ…ข. ๋Œ€ํ•™๊ต์ˆ˜์˜ ๊ณ ์šฉ๊ตฌ์กฐ์™€ ์ถ”์ด โ…ฃ. ๋Œ€ํ•™๊ต์ˆ˜์˜ ๋Œ€ํ•™ ๊ฐ„ ์ด๋™์˜ ์ถ”์ด์™€ ํŠน์ง• 1. ๋Œ€ํ•™ ๊ฐ„ ์ด๋™์˜ ์‹œ๊ณ„์—ด ์ถ”์ด 2. ๋Œ€ํ•™๊ต์ˆ˜์˜ ์ฃผ์š” ํŠน์„ฑ๊ณผ ๋Œ€ํ•™๊ฐ„ ์ด๋™ โ…ค. ๊ต์ˆ˜์˜ ๋Œ€ํ•™ ๊ฐ„ ์ด๋™์— ์˜ํ–ฅ์„ ์ฃผ๋Š” ์š”์ธ ๋ถ„์„: Cox ๋น„๋ก€ํ•ด์ €๋“œ๋ชจํ˜• โ…ฅ. ๋งบ์Œ

    ๋Œ€ํ•™ ์กธ์—…์ƒ์˜ ๋…ธ๋™์‹œ์žฅ ์ •์ฐฉ ๊ณผ์ •๊ณผ ์ „๊ณตยท์„ฑ๋ณ„ ์ฐจ์ด

    Get PDF
    4๋…„์ œ ๋Œ€ํ•™ ์กธ์—…์ž(2002๋…„)์˜ ์ƒ์•  ์ดˆ๊ธฐ ์ง์—…๊ฒฝ๋ ฅ(7๋…„ 3๊ฐœ์›”)์„ ๋ณด๋‹ˆ 43.4%๋งŒ์ด โ€˜์ฃผ์š” ์ผ์ž๋ฆฌ(3๋…„ ์ด์ƒ ๊ทผ์†ํ•œ ์ง์žฅ)โ€™ ๋ฅผ ์žก๋Š” ๋ฐ ์„ฑ๊ณตํ•จ. ์ง์—…์„ธ๊ณ„์™€์˜ ์—ฐ๊ณ„์„ฑ์ด ๋†’์€ ์ „๊ณต์ผ์ˆ˜๋ก ์ฃผ์š” ์ผ์ž๋ฆฌ๋ฅผ ์ทจ๋“ํ•  ํ™•๋ฅ ์ด ๋” ๋†’์Œ. ๊ณตํ•™๊ณ„, ์˜์•ฝ๊ณ„์˜ ์ˆœ ๋Œ€์กธ ์ฒญ๋…„์ธต ์ง์žฅ ์ด๋™์ž์˜ ์•ฝ 36%๊ฐ€ ์ด์ง ์‹œ ์‚ฐ์—…๊ณผ ์ง์—…์ด ๋ชจ๋‘ ๋ฐ”๋€Œ๋Š” โ€˜๊ฒฝ๋ ฅ๋ณ€๋™โ€™ ์„ ๊ฒฝํ—˜ํ–ˆ์œผ๋ฉฐ, ์ดํ•™ยท๊ณตํ•™๊ณ„์™€ ์ธ๋ฌธยท์‚ฌํšŒ๊ณ„์—์„œ ์ด ๋น„์œจ์ด ๋†’์Œ. ์—ฌ์ž๋Š” ์ฃผ์š” ์ผ์ž๋ฆฌ ์ทจ๋“์ž ๋น„์œจ์ด ๋‚จ์ž๋ณด๋‹ค ๋‚ฎ์œผ๋ฉฐ, ์ฃผ์š” ์ผ์ž๋ฆฌ ์ทจ๋“์ด ์ƒ๋Œ€์ ์œผ๋กœ ์šฉ์ดํ•œ ์ „๊ณต์ด๋ผ ํ•˜๋”๋ผ๋„ ๋‚จ์ž๋ณด๋‹ค ๊ทธ ๋น„์œจ์ด ํฌ๊ฒŒ ๋‚ฎ์Œ.Among four-year university graduates, the proportion of those who paid their tuition with student loan varies among different income group: the lower the family income, the higher the dependency on student loan, as indicated by the figures, with 4.6% for the high income group, 8.1% for the middle income group, and 14.3% for the low income group. Students who were dependent on parents scored 773.0 on TOEIC, while those who took out a loan scored 754.0 which is 2.46% (or 19 points in test score) lower. Average monthly income of those who paid their tuition with a student loan is 8% (159,000 Korean Won) lower than that of those who were dependent on their parents

    ํ•ด์™ธ ๋™ํ–ฅ] ํ•€๋ž€๋“œ Veto ํ”„๋กœ๊ทธ๋žจ : ๊ณ ๋ น์ž ๋ฐ ์ฒญ๋…„์ธต์˜ ์ธ๋ ฅํ™œ์šฉ ์ œ๊ณ  ๋ฐฉ์•ˆ

    No full text
    ์ด ์ž๋ฃŒ๋Š” 2004๋…„ 6์›” ํ•€๋ž€๋“œ ๋ณด๊ฑด๋ณต์ง€๋ถ€๋ฅผ ๋ฐฉ๋ฌธํ•˜์—ฌโ€˜๊ณ ๋ น์ž ์ธ๋ ฅํ™œ์šฉ์ œ๊ณ ๋ฐฉ์•ˆโ€™์— ๋Œ€ํ•ด ๋ฉด๋‹ดํ•œ ๊ฒฐ๊ณผ์ด๋‹ค1). ์šฐ๋ฆฌ๋‚˜๋ผ์—์„œ๋„ ๊ณ ๋ นํ™” ์ง„์ „์— ๋”ฐ๋ฅธ ์—ฌ๋Ÿฌ ๊ฐ€์ง€ ์ •์ฑ…๊ณผ์ œ๋“ค์ด ์ค€๋น„๋˜๊ณ  ์žˆ๋‹ค. ์—ฌ๊ธฐ์—์„œ๋Š”โ€˜๊ทผ๋กœํ™˜๊ฒฝ๊ฐœ์„ ์„ ํ†ตํ•œ ์ธ๋ ฅํ™œ์šฉ ํ”„๋กœ๊ทธ๋žจโ€™์œผ๋กœ ๋ฒˆ์—ญํ•  ์ˆ˜ ์žˆ๋Š”โ€˜ The Veto Programme 2003-2007 โ€™์„ ์ค‘์‹ฌ์œผ๋กœ ์ฃผ์š” ๋‚ด์šฉ๊ณผ ์ •์ฑ…์  ๋ฐฐ๊ฒฝ, ์ถ”์ง„์ฒด๊ณ„ ๋“ฑ์— ๋Œ€ํ•ด ์†Œ๊ฐœํ•œ๋‹ค. ์ด ํ”„๋กœ๊ทธ๋žจ์€ ๊ณ ๋ นํ™” ์ •์ฑ…๊ณผ ๊ด€๋ จํ•˜์—ฌ ์œ ๋Ÿฝ์—์„œ ๋Œ€ํ‘œ์  ์„ฑ๊ณต์‚ฌ๋ก€๋กœ ์•Œ๋ ค์ ธ ์žˆ๋‹ค. ๊ตญ๊ฐ€์  ์ฐจ์›์—์„œ ์‹ค์‹œ๋˜๋Š” Veto ํ”„๋กœ๊ทธ๋žจ Veto ํ”„๋กœ๊ทธ๋žจ์˜ ๋ชฉํ‘œ ํ”„๋กœ๊ทธ๋žจ ์ง‘ํ–‰๊ณผ์ • ์ฃผ์š” ์ง‘ํ–‰ ์ˆ˜๋‹จ ์ •์ฑ… ๊ตฌ์„ฑ ์ง‘ํ–‰์ ˆ์ฐจ ์ผ์ •๊ณผ ๊ตฌ์กฐ ํ‰๊ฐ€์™€ ์žฌ์› ์ง‘ํ–‰๊ณผ์ •์˜ ์ถ”์ง„์ฒด๊ณ„ ํ”„๋กœ๊ทธ๋žจ์˜ ์ •์ฑ…์  ๋ฐฐ๊ฒฝ ๊ทผ๋กœ์กฐ๊ฑด ๊ฑด๊ฐ•๊ณผ ์ผํ•  ๋Šฅ๋ ฅ, ๊ทธ๋ฆฌ๊ณ  ์žฌํ™œ ์ง์žฅ ๋‚ด ํ˜•ํ‰์„ฑ๊ณผ ๋‹ค์–‘์„ฑ ๊ณ ์šฉ๊ณผ ์ตœ์ €์ž„๊ธˆ์ œ ๋ณด์žฅ ์—ฐ๊ตฌ์™€ ๊ฐœ๋ฐœ ์ง‘ํ–‰๋ถ„์•ผ๋ณ„ ๊ตฌ์ฒด์  ๋ชฉํ‘œ Veto ํ”„๋กœ๊ทธ๋žจ์— ๋Œ€์‘ํ•œ ๊ต์œก๋ถ€์˜ ์ •์ฑ…์ˆ˜
    • โ€ฆ
    corecore