Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2004, Vol.9, No.1

  • 1.

    A Method of XML Mapping Canonicalization for E-Busimess Integration

    Ahn Woo-Young | 홍창범 | 2004, 9(1) | pp.1~8 | number of Cited : 0
    Abstract PDF
    XML is becoming the standard of the new document exchanging. Due to the ablility expressing various types of document structure through XML, RosettaNet and BizTalk are using XML as a core technology in the part of e-Business. Framework is running Business process each other different standard. Internal documents in each company should be transformed differently without any loss to work with other companies. In this paper, transforming processor based on XML mapping information from XML document information.
  • 2.

    Reliability Evaluation of the WSW Device for Hot-carrier Immunity

    김현호 | 장인갑 | 2004, 9(1) | pp.9~15 | number of Cited : 0
    Abstract PDF
    New WSW(Wrap Side Wall) is proposed to decrease junction electric field in this paper. WSW process is fabricated after first gate etch, followed NM1 ion implantation and deposition & etch nitride layer. New WSW structure has buffer layer to decrease electric field. Also we compared the hot carrier characteristics of WSW and conventional. Also, we design a test pattern including pulse generator, level shifter and frequency divider, so that we can evaluate AC hot carrier degradation on-chip. It came to light that the universality of the hot carrier degradation between DC and AC stress condition exists, which indicates that the device degradation comes from the same physical mechanism for both AC and DC stress. From this universality, AC lifetime under circuit operation condition can be estimated from DC hot carrier degradation characteristics.
  • 3.

    Development Roadmap Analysis for Automatic Testing Tools of Software

    정창신 | Soon Key Jung | 2004, 9(1) | pp.17~23 | number of Cited : 0
    Abstract PDF
    Testing tools help software developers and test engineers to automate a part or the whole of test process and reduce the time and cost of software test. However, no automatic tools meet a variety of test requirements with various domains. In this paper, we suggest a categorical taxonomy of automatic testing tools and analyze numerous commercial testing tools on its basis. Then we propose a development roadmap of software automatic testing tools. As a result of those analysis, we try to understand the complementary relations of the testing tools and seek for the direction of further development of the testing tools.
  • 4.

    Recognition of conducting motion using HMM

    문형득 | KOO JA YOUNG | 2004, 9(1) | pp.25~30 | number of Cited : 1
    Abstract PDF
    In this paper, a beat recognition method from a sequence of images of conducting person was proposed. Hand position was detected using color discrimination, and symbolized by quantization. Then a motion of the conductor was represented as a sequence of symbols. HMM (Hidden Markov Model), which is excellent for recognition of sequence pattern with some level of variation, was used to recognize the sequence of symbols to be a motion for a beat.
  • 5.

    Design Techniques of Spatial Data Common Component Base on Web

    정규장 | 2004, 9(1) | pp.31~36 | number of Cited : 3
    Abstract PDF
    As internet technology has rapidly developed, there have been works for the strategic techniques of the geographic information system integration and component that meet the situation of the variable customer requirement in endless change of execute environment. So there needs a design techniques of spatial data common component that can support technology and query processing, and so on. In this thesis, design techniques is proposed to support user-friendly interface and query currently available every place to provide these local-based software development technology. This process was evaluated through an verification test with a widely used development methodology. The proposed methods is applied for computation and can reduce software development life cycle.
  • 6.

    Anomaly Intrusion Detection using Neuro-Fuzzy

    김도윤 | SEO JAE HYUN | 2004, 9(1) | pp.37~43 | number of Cited : 0
    Abstract PDF
    Expasion of computer network and rapid growth of Internet have made computer security very important. As one of the ways to deal with security risk, much research has been made on Intrusion Detection System(IDS). The paper, also, addresses the issue of intrusion detection, but especially with Neuro-Fuzzy model. By applying the fuzzy logic which is known to deal with uncertainty to Anomaly Intrusion, it not only overcomes the difficulty of Misuse Intrusion, but also ultimately aims to detect the intrusions yet to be known.
  • 7.

    Design and Implementation of 2D Fashion Design System based on Diagraming Piece

    김영운 | Jung, Sung-Tae | Joung Suck-Tae and 3other persons | 2004, 9(1) | pp.45~54 | number of Cited : 0
    Abstract PDF
    A CAD and diagraming program of clothing and fashion design field within the country variously exist, but this paper implements design CAD and diagraming system based on diagraming piece with database system. Proposal system can be used quickly and easily to designer because of providing various diagraming piece. intend to utilize the data to diagraming piece provide with various classification and key word. 2D fashion design system provide GUI, various drawing tool, vector type document, application data based on XML, diverse library and easy mapping capacity for user.
  • 8.

    Proposed of Intrusion detdction model using the Mobile agent

    황인선 | Park, Kyung Woo | 2004, 9(1) | pp.55~62 | number of Cited : 0
    Abstract PDF
    The computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of internet. Therefore, Intrusion detection system has been an active research area to reduce the risk from intruders. A number of advantages of using mobile agent computing paradigms have been proposed. These advantages include: overcoming network latency, reducing network load, executing asynchronously and autonomously, adapting dynamically, and operating in heterogeneous environments. Many information security models have been proposed to mitigate agent-to-agent, agent-to-platform, and platform-to-agent element risks. In these paper, We have an object which is that through intrusion detection system development, the mobile agent is managed and through the analysis of performance data, the best environment is served.
  • 9.

    Development of Infrared Thermal Image Target Simulator System

    김병문 | Jangsup Shim | Soon Key Jung | 2004, 9(1) | pp.63~70 | number of Cited : 0
    Abstract PDF
    This paper describes modeling, design and performance test results of infrared thermal image target system which can generate infrared thermal image on aircraft. The system is designed to control image shape and intensity so that the infrared image shape and its emitting intensity are so similar to that of real aircraft. When applying the technique suggested in this paper, the system consumes only small electric power energy about 30[kw] to generate infrared thermal image which is equivalent to that of real aircraft under full power operation. After verifying performance test, the system developed here has been used as a target for korean potable surface to air missile(KPSAM) at the stage of evaluation test such as target adaptive guidance test and auto-pilot logic test.
  • 10.

    A study on a preventive measure of traffic congestion in building security system

    서창옥 | 김계국 | 2004, 9(1) | pp.71~77 | number of Cited : 0
    Abstract PDF
    In general, security server controls information of people who usually come to building. In order to exit and entrance, while they bring IDentification card into contact with card reader, server admits them into building after asks whether their informations are or not in database. However if many people want to exit and entrance in all direction, it may give rise to a serious traffic congestion. Therefore the delay is due to server's overload. In this paper, we suggested IZA(Identification Zone Algorithm) in order to prevent of traffic congestion.
  • 11.

    A design of Secure Audit / Trace Module to Support Computer Forensics

    고병수 | Choi,Yong-Rak | 박영신 | 2004, 9(1) | pp.79~86 | number of Cited : 2
    Abstract PDF
    In general, operating system is offering the security function of OS level to support several web services. However, it is true that security side of OS level is weak from many parts. Specially, it is needed to audit/trace function in security kernel level to satisfy security more than B2 level that define in TCSEC(Trusted Computer System Evaluation Criteria). So we need to create audit data at system call invocation for this, and do to create audit data of equal format about almost event and supply information to do traceback late. This paper proposes audit/trace system module that use LKM(Loadable Kernel Module) technique. It is applicable without alteration about existing linux kernel to ensure safe evidence. It offers interface that can utilize external audit data such as intrusion detection system, and also offers safe role based system that is divided system administrator and security administrator. These data will going to utilize to computer forensics' data that legal confrontation is possible.
  • 12.

    A study on Mobile Wireless Communication Network Optimization Using Global Search Algorithm

    김성곤 | 2004, 9(1) | pp.87~93 | number of Cited : 0
    Abstract PDF
    In the design of mobile wireless communication network, BSC(Base Station Location), BSC(Base Station Controller) and MSC(Mobile Switching Center) are the most important parameters. Designing base station location, the cost must be minimized by combining various, complex parameters. We can solve this problem by combining optimization algorithm, such as Simulated Annealing, Tabu Search, Genetic Algorithm, Random Walk Algorithm that have been used extensively for global optimization. This paper shows the 4 kinds of algorithm to be applied to the optimization of base station location for communication system and then compares, analyzes the results and shows optimization process of algorithm.
  • 13.

    A study on the ERP system introduction direction for Office Automation

    Nam,Tae-Hee | 2004, 9(1) | pp.95~102 | number of Cited : 1
    Abstract PDF
    This treatise is not sparing many efforts and investment for efficient improvement of business about limited office automation because the latest corporations apply various internet and ERP(Enterprise Resource Planning) system. Corporations as information-oriented society is made up information analysis and corporation new information creation, automation of business and productivity by purpose in ERP system induction gradual investment do. Embodied ERP system to invent corporation business automation and productive profit in treatise that see accordingly investigated existing system, web, gear relation with intranet and validity by present corporation business application, and investigated about effect that ERP system gets in corporation hereafter.
  • 14.

    A Study on the perceived characteristics of the mobile payment service using the technology acceptance model

    이석기 | KIM SOUNG HIE | 2004, 9(1) | pp.103~109 | number of Cited : 4
    Abstract PDF
    Mobile payment service is a new innovating technology in the micro payment industry. Although it emerged only one or two years ago in Korea, it is now highly used and prospered by many online companies. Traditional studies concerning the electronic payment system are usually about the payment process itself, so they stressed the security or the robustness of the process. The study from the angle of behavioral science seldom exists. This article describes the phenomenon of technology adoption with a particular focus on telephone payment service. The article identifies which characteristic of the telephone payment service affects to the user status (user, non-users). To do this, this article mainly used Roger's Technology Acceptance Model and some characteristics are added to the model. The most important perceptual characteristic that affects to the user status was not security, but ease of use-the telephone payment service had to enhance continuously for the competitive advantage over the other payment service. Observability and convenience are also noted as important.
  • 15.

    The Analysis on Evaluation Model for Efficiency of GDOC

    유은숙 | Kiwon Chong | 도경화 | 2004, 9(1) | pp.111~121 | number of Cited : 0
    Abstract PDF
    This paper presents the methods of evaluating validity and effectiveness of informatization budget investment for e-Government, through the preliminary evaluation, the progress evaluation and the post evaluation of the investment, and a quantitative evaluation model which improves conformance of IT ROI(Return On Investment) using the evaluation results. the right evaluation targets of informatization investment for the development project to GDOC(Government electronic Document Distribution Center), and KPIs(Key Performance Indexes) which is enable to evaluate objectively effectiveness in the preliminary and the post evaluation phases are developed, and according to using the quantitative evaluation model, improved effectiveness evaluation results for each index in the point of view of usage and innovation are come out.