Earticle

현재 위치 Home 검색결과

결과 내 검색

발행연도

-

학문분야

자료유형

간행물

검색결과

검색조건
검색결과 : 387
No
1

거문고와 일렉트로닉의 만남

허윤정

서울대학교 동양음악연구소 동양음악(구 민족음악학) 제40집 2016.12 pp.133-158

※ 기관로그인 시 무료 이용이 가능합니다.

6,400원

전통음악에서 중요한 역할과 지위를 가졌던 거문고는 20세기에도 여전히 전통음악의 계승과 창작음악의 발전 속에서 그 존재감을 발휘해 왔다. 21세기 들어 거문고의 실험은 다양한 방식으로 진행되어 왔는데 창작곡에서 많은 연주기법이 개발되었고, 전통음악 내에서도 그 쓰임새를 확장 해 왔다. 또한 최상의 음질 구현, 음량의 확대, 음역을 확장하기 위하여 악기구조와 재료의 개량을 다각도로 시도하여 왔다. 이러한 시도들 가운데 거문고와 컴퓨터를 비롯한 전자기기, 전자음향과 의 접목이 눈에 띄는데 결합의 형태와 방법은 각각 독립적이지만 활동배경과 음악적 효과에 있어 서 하나의 흐름으로 연결되고 있는 점이 주목된다. 거문고는 독주악기로서 세계적인 경쟁력을 가지고 있다. 저음과 고음의 조화로 반주와 독주가 가능하며, 타악적인 특성이 강하고 다양한 음색으로 인한 주법 개발의 가능성이 높고, 무대에서 연주 시 화려한 퍼포먼스가 가능한 악기이다. 이것은 다른 악기와의 협업에도 매우 효과적이며, 거문고 음악의 활동 영역을 확장시키는데 매우 중요하다. 이러한 장점에도 불구하고, 마이크 사용 시 발생하는 역효과로 인해 상대적으로 불리한 조건에 놓여있던 거문고는 21세기 들어 오히려 더욱 적극적으로 악기에 맞는 amplifier 시스템을 개발하고 이를 이용한 음악을 만들어서 거문고 의 경쟁력을 높이는 또 다른 대안으로 발전시켜 나가고 있다. 본고에서 거문고와 일렉트로닉의 만남을 시도하고 있는 연주자와 단체의 활동에 대한 연구를 진행하였다. 그 결과 새로운 창작곡과 주법들을 만들어내어 거문고의 원형성과 전자 시스템(마이 크, 컴퓨터 시스템 및 다양한 이펙터 등)의 조화로운 작업을 통하여 좋은 음악적 컨텐츠들을 만들 어 내고 있음을 알 수 있었다. 이를 통해 거문고가 가진 장점을 부각시키고, 독주악기로서, 앙상블 악기로서, 협업에 강한 악기로서 국내는 물론 해외시장에서 거문고의 경쟁력을 키워나가는데 긍 정적인 결과를 만들어 내고 있다. 21세기 들어 본격적으로 국제교류의 플랫폼들이 열리고 세계무 대의 최전방에서 소규모 국악앙상블과 독주자들이 활약하면서 개성이 강한 거문고가 그 경쟁력을 인정받기 시작한 시점에서 이러한 일렉트로닉과의 결합은 의미 있는 작업일 것이다.

Geomungo (6-string zither) is the representative Korean string instrument along with Gayageum (12-string zither). It had played an important role and had a special status in the traditional music realm, and it contributed to transmitting traditional music and developing new music in the 20th century. It has been experimenting in various ways throughout the 21st century, developing diverse playing techniques in new music and extending its usage in traditional music. In addition, the instrument itself has been modified in various respects; its structure has been complemented to maximize sound quality and its volume has been expanded. Among many experimental attempts, it is remarkable that Geomungo has been working with electronic devices including computer and electronic sound. It is also notable that the activity background and musical effect of collaborative works is connected by one flow even if its forms and methods are independent. Geomungo has world-class competitiveness as a solo instrument; the harmony of high and low range makes it possible to play as both an accompaniment and solo; its strong percussive character and various timbres allow it to easily develop playing techniques; in addition, it can present colorful performance on stage. These aspects are very effective in collaborating with other musical instruments and also very important in expanding the activity area of Geomungo music. Geomungo, which, despite these advantages, was in a relatively unfavorable condition due to the adverse effects caused by the use of microphones, has developed as the alternative of improving its competitiveness since the amplification system more suitable for Geomungo was developed at the beginning of the 21st century. This paper illustrates that the performers and groups involved in creating new music and playing techniques through working on Geomungo with the electronics have been producing good musical contents actively utilizing the electronic system such as microphones, computers, and various effecters while preserving the "originality" of Geomungo. This collaborative work creates a positive result for enhancing the competitiveness of Geomungo as a solo, for an ensemble, or for collaboration in domestic as well as international market, by emphasizing and diversifying the advantages of Geomungo. It seems to be very meaningful that Geomungo encounters with the electronic devices in the early 21st century when small traditional Korean music ensembles and soloists are active at the forefront of the world stage since the platform of international exchange has been opened, and thus Geomungo with strong personality has begun to be recognized for its competitiveness. However, it is likely that the application of the electronics remains empty as long as Geomungo players are not backed by legitimate playing techniques, deep playing skills, creativity, and the diversity of musical contents. After all, music can be bright enough to move audiences when the unique identity of its instrument, the high level of the performance, and the authenticity of the performers are alive.

2

「학교 아이들 속에서」에 대한 융(C. G. Jung)적 접근 :‘태모’와 영웅신화 KCI 등재후보

이규명

한국예이츠학회 한국 예이츠 저널 제23권 2005.06 pp.117-139

※ 기관로그인 시 무료 이용이 가능합니다.

6,000원

This paper is an attempt to practice Jungian ways into a great poem of Yeats’s, “Among School Children,” over which home and foreign academic societies concerned have been under much controversy till now. But it is very regrettable that I have no belief if the views issued from some noted scholars in the societies have been plausible or appropriate. In the sense, as suggested by the title, the encounter between Great psychologist C. G. Jung and Great poet W. B. Yeat is very significant in that they both had pursued the same ultimate subject as a supreme state of humanity respectively represented as archetype of ‘Self’ and ‘Unity of Being.’ For Jungian ways applied to the poem, first symbols, images and psychological situations lurking in it can be useful as the interpretative clues. These representations can function as faithful agents helping us to reach the gate of the poetic truth, urging us to mobilize Jungian esoteric terms corresponded to several kinds of psychological situations people must go through. ‘Great Mother,’ maternal archetype, who stands for earth and womb and takes two characteristics, construction and destruction, possessing opposite qualities of Witch Kali and Virgin Mary, exercises serious effect upon a male child as an earthly hero. Some ideal aim or mission that the hero strives to grasp is just equivalent to hurriedly return to the womb as his biological origin, namely secular realization of the principle of ‘entrophy’ meaning the second principle of thermodynamics; does mean the hero’s life whatever else? It can be associated with the biblical situation, Pieta, the holy picture describing Mary’s lamenting in bitter grief with embracing his dead son, Jesus Christ. In fact, the hero is determined to death resulting from energetic emission of burning libido, which can be embellished with either establishment of duty or sacrifice to community. Thus, ‘Great mother’ longing for the runaway baby from her womb, in turn, is expecting his death to suffice emptiness of womb and heal her chronic complex, hysteria. In conclusion, in the poem, we can find that the destiny that after “children” in the “school” go through a initial step of ‘individuation,’ the perfect state which further can be indivisible, they, absurd beings, are cast into the tough world with each secular mission is just to aid the scheme of ‘Great Mother.’ “school” is a temple teaching “dance” and “children” in it dancers learning “dance.” Accordingly, the enigmatic relation of “dancer” and “dance” in the eighth stanza would be unraveled: The former can come under an archetypal pattern and the latter can correspond to its practitioner. Thus, “dance,” playing a role of ‘complex’ as compelling force and driving us to imitate it, tires us, dancers, finally to death, as an erotic dancer Salome’s dance murdered a spiritual dancer John the Baptist. After all, we can never get to the core of “dance” only to hang around its brink, which Yeats should know. As usual, getting captivated by “dance,” we continually shout hoarse to others: Shall we dance?

5

Titer Amplification of GALV (Gibbon Ape Leukemia Virus) Pseudotyped Retrovirus Vectors Produced from PG13 Cells

Kim, T. Y., Y. Y. Park, M. S. Kwon, H. C. Yom, K. H. Kim, Y. S. Park, S. P. Park

한국동물생명공학회(구 한국동물번식학회) Reproductive & developmental biology Volume 21 No 4 1997.12 pp.397-403

※ 기관로그인 시 무료 이용이 가능합니다.

4,000원

6

Cross-Specific Amplification of SSR Markers in Dalbergia latifolia and Dalbergia sissoo - A Case for Hybrid Seed Production KCI 등재

Asif Javed Muhammad, Izhar-Ul-Haq, Nauman Ghafoor, Fazal-Ur-Rehman, Atif Ali, Zia Bilal Muhammad

강원대학교 산림과학연구소 Journal of Forest and Environmental Science 제40권 제3호 2024.09 pp.259-264

※ 기관로그인 시 무료 이용이 가능합니다.

4,000원

Dalbergia sissoo and Dalbergia latifolia are the two most important timber wood species that are indigenous to the Indo-Pak subcontinent producing very high-quality timber. Its wood is used to produce high-quality furniture. Due to overexploitation and dieback disease, their production is seriously hampered and threatens their genetic diversity. Several ecotypes are tolerant to dieback thus offering an opportunity to develop a superior hybrid for the establishment of plantations for hybrid seed production. Hybrid evaluation can only be done by using DNA markers such as SSR markers. Cross-specific amplification of SSR markers is a cost-effective way of producing DNA markers for species lacking genetic information. Here, we report for the first-time successful cross-amplification of SSR markers in Dalbergia latifolia and added new SSR markers in D. sissoo. Cross-species amplification resulted in 13 successful SSR markers in D. latifolia and an addition of 14 markers in D. sissoo of expected sizes. Six SSR markers were further selected randomly to validate the breeding behavior of both species. A diverse DNA profile of seed progenies matched to different pollen donors deviated from the same mother suggested cross-pollination is the most likely mechanism of seed production in D. sissoo and D. latifolia. However, the results must be validated by using a large sample size and through controlled pollinations. SSR markers thus developed will be useful in the conservation and development of superior hybrids for sustainable development and production of commercial populations in Dalbergia sissoo and D. latifolia.

8

Verification of Primer Pairs and Optimization of Amplification Conditions for Forensic Mitochondria DNA Typing

Si Keun Lim, Ki Won Park, Sang Kyu Choi

한국법과학회 한국법과학회지 제4권 제3호 2003.09 pp.139-142

※ 기관로그인 시 무료 이용이 가능합니다.

4,000원

9

3,000원

The freemartinism is the most frequent form of intersexuality found in cattle, and females of heterosexual twins become sterile. With increase of twinning rates due to transfer of multiple embryos derived from in vitro fertilization, it is of great economic value to establish early diagnosis of freemartins to remove infertile individuals from breeding stock. In the present study polymerase chain reaction (PCR) of two different Y-chromosome specific segments (BRY.l and AMX/Y) was performed to identify freemartins from twins and less common single born freemartins in Korean Native Cattle (KNC). Two male-specific sequences were amplified in all heterosexual twins tested (n=5). In addition, Y-specific PCR products were detectable in one of the single born females (n=4) with visible genital abnormalities. These results suggest that the sensitivity of PCR-based assay may be sufficient to detect freemartinism in single born females as well as female partners of heterosexual twins in KNC.

10

Effects of Blood Mark Screening Reagents on the Process of Nucleic Acid Extraction and Amplification for Personal Identification KCI 등재

Subin Kim, Myeonggwan Kim, Heeung Choi, Sujin Heo, Jaewon Lim

한국법과학회 한국법과학회지 제26권 제1호 2025.05 pp.18-26

※ 기관로그인 시 무료 이용이 가능합니다.

4,000원

Biological evidence collected at crime scenes plays a crucial role in confirming the identities of individuals. Blood, particularly is a commonly encountered bodily fluid at such scenes, and fluids containing blood, such as saliva, semen, vaginal fluid, and urine, are excellent tools for personal identification. The accurate identification and collection of blood is essential for reconstructing crime scenes and subsequently identifying suspects. Blood is commonly found at crime scenes distributed across various surfaces and objects, serving as important evidence. The analysis of bloodstains provides valuable information about the events that occurred during a crime, and bloodstain analysis is a vital tool for reconstructing events at a crime scene. Initially, the presence of blood is confirmed based on factors such as time, conditions, and environment. Invisible bloodstains are identified by visually inspecting suspicious areas, followed by performing serological preliminary and confirmatory tests to determine the presence of blood. Notably, luminol and KM reagents are commonly used reagents at crime scenes. In cases where bloodstain analysis indicates a positive result, personal identification is conducted using nucleic acid (DNA) alongside confirmatory tests. Experimental results show that the luminol reagent exhibits higher sensitivity than the KM reagent. During DNA amplification, it is observed that factors such as time, conditions, and environment influence DNA amplification more than reagents. Furthermore, the STR marker D1S80 showed a more significant reduction compared to the TH01 marker. This experiment holds potential applicability in various crime scenes, offering foundational data regarding results based on sample types, temperature, environment, and time.

12

부분 신뢰성을 갖는 양자 키 분배 시스템의 보안성 증폭 KCI 등재후보

이선의, 김진영

한국위성정보통신학회 한국위성정보통신학회논문지 제12권 제4호 2017.12 pp.152-156

※ 기관로그인 시 무료 이용이 가능합니다.

4,000원

본 논문은 양자 키 분배 시스템에서의 보안성을 증폭시키기 위한 랜덤 보안성 증폭의 개념을 소개한다. 양자 오류 정정과 보안 사이의 관계를 이용하여 보안성 증폭을 제공하는 것을 보인다. 또한 보안성 증폭 측면에서 랜덤 보안성 증폭이 기존 유니버셜 해쉬 함수만을 이용한 것보다 나은 보안성을 제시한다는 것을 보인다. QKD의 대표적인 예인 BB84 프로토콜을 이용하여 유니버셜 해시 함수가 보안성을 강화하는 과정을 설명한다. 마지막으로 제안한 랜덤 보안성 증폭과 기존 방식이 양자 QKD 채널에서 키 생성률에 따른보안성을 비교한다.

This paper introduces the concept of random security amplification to amplify security in a quantum key distribution system. It seems to provide security amplification using the relationship between quantum error correction and security. In addition, we show that random security amplification in terms of security amplification offers better security than using existing universal hash function. We explain how the universal hash function enhances security using the BB84 protocol, which is a typical example of QKD. Finally, the proposed random security amplification and the conventional scheme compare the security according to the key generation rate in the quantum QKD

13

4,000원

초록 - 본 논문은 양자 키 분배 시스템에서의 보안성을 증폭시키기 위한 이중 해시 함수의 개념을 소개한다. 양자 오류 정정과 보안 사이의 관계를 이용하여 보안성 증폭을 제공하는 것을 보인다. 또한 보안성 증폭 측면에서 접근 방식이 위상 오차 보정 방식이 더 보다 나은 보안성을 제시한다는 것을 보인다. QKD의 대표적인 예인 BB84 프로토콜을 이용하여 유니버셜 해시 함수가 보안성을 강화하는 과정을 설명한다. 마지막으로 결정적인 유니버셜 해시 함수가 메시지의 길이에 의존하지 않고 양자 Pauli 채널에서 보안성 을 평가 받는 것을 유도한다.

This paper introduces the concept of a dual hash function to amplify security in a quantum key distribution system. We show the use of the relationship between quantum error correction and security to provide security amplification. Also, in terms of security amplification, the approach shows that phase error correction offers better security. We describe the process of enhancing security using the universal hash function using the BB84 protocol, which is a typical example of QKD. Finally, the deterministic universal hash function induces the security to be evaluated in the quantum Pauli channel without depending on the length of the message.

14

연속 변수를 이용한 양자 키 분배 시스템의 보안성 증폭 KCI 등재후보

이선의, 김진영

한국위성정보통신학회 한국위성정보통신학회논문지 제11권 제3호 2016.09 pp.1-5

※ 기관로그인 시 무료 이용이 가능합니다.

4,000원

연속 양자 변수를 이용한 QKD 시스템은 높은 키 생성률을 보장하는 실질적인 솔루션으로 고려되어져 왔다. 불연속 QKD 시스템과연속 변수 QKD 시스템의 차이를 설명한다. 연속 변수가 불확정성의 원리를 만족하는 이론을 설명하고 이를 검출하기 위한 호모다인검출기의 원리를 설명한다. 이를 이용하여 QKD시스템에서 비밀키의 길이가 변화는 과정을 설명하고 보안성 증폭을 위하여 노출되는 키의 정보량을 알아본다.

The continuous variable quantum key distribution has been considered to have practical solution to provide high key rate. This paper explains the difference between DV-QKD and CV-QKD schemes. It describes CV-QKD as a theory that satisfies the uncertainty principle using continuous variable and homodyne detector. We shows varying length of secret key in QKD systems and amount of the exposed information to amplify privacy.

15

Recently, quantum information management, quantum computing and quantum communication based on the quantum mechanics have been researching actively in many fields such as cryptology. Quantum cryptography is one of the most feasible fields using quantum mechanics. Therefore, quantum cryptography has consistently been researched, and a variety of cryptographic exchange method has been developed, such as BB84, etc. In this paper, we introduce quantum communication systems with information theory using privacy amplification.

16

최근 미국 금융위기에서의 시장악화기제 KCI 등재후보

최성섭

아시아유럽미래학회 유라시아연구 제7권 제2호 통권 제17호 2010.06 pp.29-48

※ 기관로그인 시 무료 이용이 가능합니다.

5,500원

시장폭락에는 반드시 시장악화기제가 존재한다. 최근 미국에서 발생한 금융위기의 시장폭락 에는 여러 복합적인 요인이 시장악화기제의 역할을 수행했다. 여기에는 증권화 현상과 신종 파생상품의 역할이 있고, 레버리지와 VaR 등의 잘못된 규제가 시장 폭락의 정도를 심화시켰다. 레버리지란 시장상황 이 좋을 때 자기자본수익률을 높이는 장점이 있어, 금융기관의 자산가치가 커질 때 레버리지도 같이 커 진다. 그러나 시장상황이 어려워지고 자산가치가 줄면, 그 반대의 상황에 직면한다. 즉, 부채상환 요구와 적정부채 수준의 유지를 위해 부채를 줄여야 하고, 이는 곧 헐값의 자산매각을 부추긴다. 그런데 이런 상황에서 시가평가제도를 실시하거나, 현행 건전성 제고 차원의 위험관리 규제는 추가적인 시장악화 기 제를 작동시켜 시장 폭락의 정도를 더욱 심화시킨다. 본 논문은 여러 종류의 시장악화기제를 최근 금융 위기 맥락에서 먼저 살펴본 후, 시장악화기제의 간단한 모형을 통해 최근 금융위기가 이론적으로 설명될 수 있는지 여부를 알아본다. 먼저 기본 모형은 Krugman(2008)의 국제무역승수(International Trade Multiplier)개념을 응용한 국제재무승수(International Finance Multiplier)의 아이디어에 기초하고 있으 며, 투자은행처럼 부채를 많이 사용하는 적극적 투자자와 위험회피 성향의 일반적 투자자인 소극적 투자 자의 두 종류가 있다고 가정한다. 이 경우 시장에서 형성되는 위험자산의 균형가격은 부채를 많이 사용 하는 적극적 투자자에 의해 자산 사이즈가 커질 때 부채를 키우면서 같이 올랐다가, 자산 사이즈가 작아 질 때 부채를 줄이는 과정(Deleveraging)을 통해 같이 떨어짐을 보인다. 동시에 투자은행과 같이 부채를 많이 사용하는 적극적 투자자가 경제를 대표하는 투자자(Representative Agent)라고 한다면, 최적 포트 폴리오 가중치 값이 대차대조표의 사이즈에 영향을 받는다는 점을 발견했고, 동시에 투자은행과 같은 적 극적 투자자가 위험중립적이라고 전제했음에도 VaR 관련 제약조건으로 인해, 포트폴리오 선택에 관한 식이 위험회피적 투자자의 포트폴리오 선택의 문제와 유사하게 나타난다는 점도 발견했다. 이 말은 투자 은행과 같은 적극적 투자자가 비록 위험중립적이라고 가정했음에도, VaR 제약조건으로 인해 마치 위험 회피 투자자가 포트폴리오 선택을 하는 것처럼 경기상황에 영향을 받는 선택을 하게 된다는 것을 뜻하 는데, 이는 투자은행과 같은 적극적 투자자가 경기상황이 좋을 때는 레버리지를 늘리지만, 경기가 어려 워지는 상황에는 레버리지가 줄어드는 선택을 함을 의미한다. 그런데 여기에는 중앙은행 입장에서 중요 한 시사점이 있다고 본다. 그것은 중앙은행이 금융안정을 추구하고자 한다면 금융기관의 대차대조표 크 기에도 관심을 기울여야 한다는 점이다. 물론 그 이유는 경기순환 주기를 따라 자산, 부채의 크기가 변 하고, 이에 따른 금융기관 대차대조표의 크기도 달라지기 때문이다. 최근 여러 중앙은행 들은 과거와 달 리 ‘인플레이션 타겟팅(Inflation Targeting)’을 통해 물가안정을 추구하고 있다. 여기에는 여러 이유가 있겠으나, 이번 금융위기는 ‘인플레이션 타겟팅’의 대안이라고 볼 수 있는‘통화량 타케팅(Monetary Targeting)’의 정책적 실효성을 다시한번 강조하는 계기가 되고 있다. 최근 금융위기로 새고전파 모형은 큰 도전을 받고 있다. 금융위기로 자본시장의 불완전한 모습이 분명하게 드러났음에도 완전 또는 완전에 가까운 자본시장을 가정하는 기존모형의 틀 안에서는 금융위기를 예측하는 것은 고사하고 설명하는 것 조차 큰 한계가 있기 때문이다. 한쪽에선 케인지안 경제학의 부활을 주장하고 있고, 다른 한쪽에선 시뮬 레이션 등의 방법을 통해 보다 현실적인 구체성이 모델에 반영될 것을 주문하고 있다. 물론 기존모형의 일정부분을 수정 보완할 경우 금융위기 내지는 시장폭락의 일부분이 설명될 수는 있다고 본다. 보다 큰 틀에서의 금융위기 및 시장폭락을 설명하기 위해 새고전파 모형의 틀을 벗어나야 하는 지에 대해선 아 직 대답을 하기 어렵다. 다만, 시장폭락에는 시장악화기제를 모델링 하는 것이 중요하고, 이를 위해선 시 장의 자동조절기능을 왜곡시키는 방향의 우상향(Upward) 기울기를 갖는 수요곡선이 만들어 질 필요가 있다고 본다. 본 논문에선 최근 금융위기를 통해 어떻게 우상향 수요곡선이 만들어졌고, 이의 시사점이 무엇인지를 간단히 살펴보았다.

As portfolio insurance played a market amplification mechanism in 1987 Black Monday. leverage played a similar role in recent credit crisis that initiated from the United States of America. In addition, unsophisticated regulations as well as securitization made matters worse, since they also included ingredients of market amplification mechanisms. As far as leverage is concerned, it tends to magnify the return on equity. As a result, leverage moves together with the size of asset; when the asset size goes up, financial institutions such as investment banks use more leverage, but when the size of asset falls, they are forced to reduce leverage. In the falling market, regulations like marking to market and VaR would aggravate the market fall in terms of amplification mechanism. Based on Krugman's idea(2008), I propose the model where leverage plays a key role in amplifying the market in terms of the risky asset. In so doing, I assume that there are two players in the market, one is the aggressive investor who is willing to use leverage, and the other is the defensive investor who could be thought as a normal risk-averse investor. According to the model, the equilibrium price of risky assets rises with more leverage when the size of risky assets becomes larger, but falls with de-leveraging when the size of risky assets shrinks. I have also found two interesting portfolio implications when the aggressive investor becomes a representative agent; one, the optimal portfolio selection is influenced by the size of risky assets, and two, despite the fact that the aggressive investor is assumed to be risk-neutural, we end up having the optimal portfolio choice that is very similar to that of the mean-variance framework. The latter indicates that the aggressive investors, due to VaR constraint, make choices in such a way that they use more leverage in booming market, but follow the deleveraging process in falling market. Note that investment banks can be thought of as the aggressive investors. The statistics from 1992 to 2008 show that investment banks use leverage pro-cyclically, meaning that in booming market when the size of risky assets goes up, the investment banks use more leverage, but in falling market when the size of risky assets falls, they do deleveraging. This has an interesting implication from central banks' perspectives as well. If one of central banks' goals needs to pursue the stability of financial markets, they need to be concerned about the size of financial institutions' balance sheet. This is due to the fact that the size of risky assets tend to move together with business cycle, and so does leverage. Many central banks have recently changed their approaches of price stability from ‘Inflation Targeting' to ‘Monetary Targeting.' However, my study shows that ‘Monetary Targeting' appears a superior approach in the sense that it could better reflect the size of financial institutions' balance sheet. Recent credit crisis originated from the United States is challenging the modelling framework based on new classical economy. Although capital markets turn out not to be perfect unlike what we used to think before the crisis, the modelling framework based on the new classical economics won't be able to explain the crisis, not to mention predicting it. Some say that it is time to revive Keynesian economics, and others argue that we need a model which can incorporate more realistic features of economic realities thanks to the recent development of computer simulation. I think that it is still early to answer this question, though. By the model that I propose in the paper, I could explain a part of recent credit crisis, especially in terms of market amplification mechanism intrigued by leverage. It seems that in market crashes, we need to model market amplification mechanisms, more specifically upward sloping demand curve which in turn distorts the self-controlling market equilibrium mechanism. In the paper, I show that the risky asset demand curve becomes upward sloping when the aggressive investor plays a major role in determining the price of risky asset.

19

5,200원

The laser amplifies the strong light by collecting and using the energy of electrons to generate high heat, and uses it to cut and polish. Laser technology is used throughout industries such as printers, clothing, medicine, and military, but we are also faced with laser-related fires around us. Especially in industries that use lasers, fires often occur in CNC processes that process iron, acrylic, or wood, which usually occur during lunchtime or when there are no people, causing initial suppression to fail. It also leads to large-scale fires, making it difficult for fire inspectors to determine the cause of the blaze. In this study, the characteristics of laser beams in the CNC process were investgated, and the probability of fire occurrence that may occur in the CNC process. The actual laser showed a similar working form to welding and cutting that it produces high-temperature light and heat. Although the analysis of the processed products, attached films, and adhesives, which were generally thought to be the initial ignition part, determined that they were both combustible material and dangerous substance under the Hazardous Substances Safety Control Act, the reenactment test was conducted under conditions similar to the actual fire in the CNC process. As a result, contrary to expectations, the film and adhesive were not burned, and the first to ignite in the residue, dust, and dust falling into the bottom of the CNC machine, starting combustion. Therefore, it is important to have safety facilities such as overheating sensors and fire extinguishers installed in the machine, but removing combustibles such as impurities and dust from the bottom of the CNC machine produced during the production process should be preceded first of all to prevent fire.

20

DRDoS 증폭 공격 대응 시스템 KCI 등재

김효종, 한군희, 신승수

중소기업융합학회 융합정보논문지(구 중소기업융합학회논문지) 제10권 제12호 2020.12 pp.22-30

※ 기관로그인 시 무료 이용이 가능합니다.

4,000원

정보통신기술의 발전에 따라 DDoS와 DRDoS은 지속적으로 보안상 이슈가 되고, 고도화된 기법으로 점차 발전하 고 있다. 최근에는 정상 서버의 프로토콜을 이용하여 반사 서버로 악용하는 DRDoS 기법으로 IT 기업들을 위협하고 있 다. 반사 트래픽은 정상적인 서버에서 발생되는 트래픽으로 보안장비에서 판별하기가 어렵고 실제 사례에서도 최대 Tbps 까지 증폭되었다. 본 논문에서는 DRDoS 공격에서 사용되는 DNS증폭과 Memcached증폭을 비교 분석한 뒤 공격의 효 과를 감소시킬 수 있는 대응방안을 제안한다. 반사 트래픽으로 사용되는 프로토콜은 TCP와 UDP, 그리고 NTP, DNS, Memcached등이 존재한다. 반사 트래픽으로 이용되는 프로토콜 중에서 반사 트래픽의 응답크기가 높은 DNS 프로토콜 과 Memcached 프로토콜을 비교분석결과, Memcached 프로토콜은 DNS 프로토콜보다 ±21% 증폭된다. 대응방안은 Memcached 프로토콜의 메모리 초기화 명령어를 사용하여 공격의 효과를 감소시킬 수 있다. 향후 연구에서는 보안에 취약한 다양한 서버들을 보안 네트워크를 통해 공유하여 원천적 차단효과를 전망할 수 있다.

With the development of information and communication technology, DDoS and DRDoS continue to become security issues, and gradually develop into advanced techniques. Recently, IT companies have been threatened with DRDoS technology, which uses protocols from normal servers to exploit as reflective servers. Reflective traffic is traffic from normal servers, making it difficult to distinguish from security equipment and amplified to a maximum of Tbps in real-life cases. In this paper, after comparing and analyzing the DNS amplification and Memcached amplification used in DRDoS attacks, a countermeasure that can reduce the effectiveness of the attack is proposed. Protocols used as reflective traffic include TCP and UDP, and NTP, DNS, and Memcached. Comparing and analyzing DNS protocols and Memcached protocols with higher response sizes of reflective traffic among the protocols used as reflective traffic, Memcached protocols amplify ±21% more than DNS protocols. The countermeasure can reduce the effectiveness of an attack by using the Memcached Protocol's memory initialization command. In future studies, various security-prone servers can be shared over security networks to predict the fundamental blocking effect.

 
1 2 3 4 5
페이지 저장