there needs a new Geographic information system development Technology of the abstraction, encapsulation, modulation and hierarchy using Graphic representation of object modeling Technique. The method is based on composite object of Graphic data with the hierarchy concepts and abstraction of Graphic information in order to improve data abstraction of the graphic data file and described concept of multiple inheritance and classification that supports a wide variety of graphic class such as mesh unit, layer, segment and so on. in simple case of software development using SPICE model and object modeling techniques. this thesis suggested object representation of Graphic data which can reduce software development life cycle and the cost of software maintenance.
According to development and diffusion of mobile communication device, the needs to use internet service with mobile communication device has increasing. so, new services has required for mobile communication device to use internet. therefore, internet accessing technologies are researched for many mobile communication device and the connection that utilize WML and WAP, between mobile communication device and internet is being researched. But, small display of mobile communication device has weak point to use internet. so, in this paper, we design the voice supported WML Browser to overcome the weak point.
In this paper, We would research and analysis for actual beauty information condition in Korea on the end of July 2004. We make an investigation into 3 beauty subject that Web service were operated by 100% regular school education, 15.5% private school in 363 teaching institutions, 8.74% of 767 material dealers, 0.38% of 77,546 beauty salons. There are 12 companies of client management program and 3 hair changing programs. It bring to be few of technical beauty information data and creature value added that lack of full-time lecturer. accordingly, KBMC and Ministry of Health & Welfare would constitute beauty information commit that make connection of each 3 beauty subjects and web database for technical beauty information data. As a result of unification and communization for beauty information system, It should be take synergy effect for Korean Beauty.
As software developing paradigm has been changing to complicate Web environment, study of complexity becomes vigorous. Yet still it seems that general agreement has not to be reached to architecture or complexity measure of Web application. And so traditional complexity metrics - program size(LOC) and Cyclomatic Complexity can be derived from the source code after implementation, it is not helpful to the early phase of software development life cycle - analysis and design phase. In this study 6 Web projects has been used for deriving applications with possible errors suited by Complexity Indicator. Using 61 programs derived, linear correlation between complexity, number of classes and number of methods has been proposed. As Web application complexity could be estimated before implementation, effort and cost management will be processed more effectively.
The management of network in TMN(Telecommunication Management Network) defines and manages the objects which are the operating system and communication equipments in network. The GDMO(Guideline Definition Managed Object) is used to describe those objects. GDMO is not directly used for managing network, but translated language into a language with object-oriented paradigm, then which is used. This paper presents design and implementation of the translator which automatically translates the specification of GDMO to the object-oriented language for generating MIB. And the system includes various graphic user interface to advance the developement environment of GDMO.
The fact that the end-user response time could become unacceptable in the 2-tier C/S system has been well known to C/S system developers. But inexperienced new developers who want to provide mobile solutions using PDA sometimes do not realize the ominous consequences of the 2-tier C/S systems. Except for the easy of development, the 2-tier C/S system has many weak points like in application deployment, security, scalability, application reuse, heterogeneous DBMS support, availability, and response time. This paper analyzes the response time in the 2-tier and 3-tier C/S systems through simulation. Although the problem space is confined to the 2 and 3 tiers, the result could be equally applied to any multi-tier systems.
In the modern integrated healthcare environment, digital technology plays a critical role in the success of its operation. For overcoming the deteriorated healthcare management environment is to improve business service ability, cost and management efficiency through information processing of the business service process and the decision support system. For a solution of these problems, the Hospital Information System(HIS) was introduced. In this paper we proposed HIS system through the HL7-based with legacy system that improves both the efficiencies of medical office and medical treatments. The implementation of HIS system enables combination of legacy systems including HL7 based OCS and PACS. And we proved the effective HIS development method provided by analysis of total module.
The purpose of this paper is to design a system model which is needed for integrating the secure role-based access control model into web-based application systems. For this purpose, firstly, the specific system architecture model using a user-pull method is presented. This model can be used as a design paradigm. Secondly, the practical system working model is proposed, which specifies the mechanism that performs role-based access control in the environment of web-based application systems. Finally, the comparison and analysis is shown in which the merits with the proposed system model is presented.
While doing games, units have to find goal. And according to algorism, there is great difference in time and distance. In this paper, the researcher compared and described characteristics of each of the improved algorism and A* algorism by giving depth-first search, breadth-first search and distance value and then argued algorism. In addition, by actually calculating the presumed value in A* algorism, the researcher finds the most improved value. Finally, by means of comparison between A* algorism and other one, the researcher verified its excellence and did simple path-finding using A* algorism.
In this paper, an iterative algorithm for stereo registration is proposed. The proposed algorithm is used for reconstructing virtual environment in a virtual studio. The second order error function is employed for stereo registration. The disparity information is obtained by minimizing the error function in an iterative manner. The variable window sizes are used to cope with the projection error and occlusion problem in the stereo vision. The depth information obtained from two pairs of stereo images is used for creating virtual environment by Z-Mixing. The experiment results proves the possibility of applying the proposed algorithm to virtual studio.
In this paper we present a hybrid model that enables dynamic regrouping based on emotion in determining the behavioral pattern of crowds in order to enhance the reality of crowd simulation in virtual environments such as games. Emotion determination rules are defined and they are used for dynamic human regrouping to simulate the movement of characters through crowds realistically. Our experiments show more natural simulation of crowd behaviors as results of this research.
In this paper, we proposed multi-resolution search method based on edge information that can be search a partial input pattern and detect a difference of minute shape information in effectively. The proposed method utilizes the small shape differences among objects as much as possible to distinguish an object from similar shaped objects. It consists of the GHT based candidate generation and top-down candidate verfication. The test results show that it can retrieve the correct object even with a part of object in reasonable time.
Software Reuse have the advantages of increasing productivity and software reliability, reducing the period for software development and cost, sharing the information which is related to software. Vertical Reuse is the method which reuse is restricted to a specific area and can increase the reliability of software reuse due to high understanding of related area. Bottom-up approach of Vertical Reuse classifies the related information and abstracts the results. It allows the reuse of not only pure source code but also informal documents.
This paper is to investigate the efficiency of the process of data preparation for existing data mining tools, and present a design principle for a new efficient data preparation system . We compare the often used data mining tools based on the access method to local and remote databases, and on the exchange of information resources between different computers. The compared data mining tools are Answer Tree, Clementine, Enterprise Miner, and Weka. We propose a design principle for an efficient system for data preparation for data mining on the distributed networks.
As a part of working on development of the learning management system, a adaptive learning management system which is able to provide individual learner with different learning contents or paths customized to learner's learning behaviors by expanding SCORM was proposed in this dissertation. In terms of instructional technology interrelated with technology of CBI and ITS, new learning environments and learner preferences were analyzed. A related laboratory system was implemented by packaging a process on how to expand the meta data for contents and a process on how to utilize the web-based learning contents dynamically. In order to evaluate the usability of the implemented system, a sample content was provided to some selected learners and their learning achievement resulted from the new learning environment was analysed. A result of the experiment indicated that the adaptive learning management system proposed in this dissertation could provide every learner with the different content tailored to their individual learning preference and behavior, and it worked also to promote the learning performance of every learner.
In the most of recognizing systems of hand-written numbers, extraction of feature shape by using character elements shapes and a method of morphological analysis by using then extraction of feature shapes were usually used. In this paper, however, peculiar chain-code is used, and differential code which gets minimal value by differentiating the chain-code which is generated by the peculiar chain-code is made. We found this differential code is very successful in discriminating hand-written numbers according to the result of applying to most of the hand-written numbers. Testing recognition of hand-written numbers by HMM network. From the results, we can recognize of 96.1 percentage hand-written numbers but can not recognize extremely distorted hand-written numbers.
This study was carried out develope a temperature control system of temperature control by used K-thermocouple. This system was producted a stable voltage regulator, 22Bit of digital converter and 22Bit of resolution. It was producted a micro voltage of 25 times amplification and controlled a DC0.1V～DC4.7V within 0～1200℃. We designed block-diagram of hardware and software by PIC16C74 in a micro-controller, we are made up of a VFD function and can be used interface of a power block.
With the diversified and enlarged softwares, the issue of software maintenance became more complex and difficult and consequently, the cost of software maintenance took up the highest portion in the software life cycle. We design Reverse Engineering Tool for software restructuring environment to object-oriented system. We design Rule-Based Reverse-Engineering using Class Information. We allow the maintainer to use interactive query by using Prolog language. We use similarity formula, which is based on relationship between variables and functions, in class extraction and restructuring method in order to extract most appropriate class. The visibility of the extracted class can be identified automatically. Also, we allow the maintainer to use query by using logical language. So We can help the practical maintenance. Therefore, The purpose of this paper is to suggest reverse engineering tool and evaluation reverse engineering tool.
It is important the initial process during game development-the stage where creative idea expression is needed-decides the chance of success. CGTS(Creative Group Thinking System) is a web based system made for that particular-conceptual-step. As for this study is to show the conversion of ideas and the synergy effects of the tips given. Based on the facts, conceptual needs will be more strengthen during the initial stage. The intention of this study is to improve the game developing process.
This paper describes the self-adaptive Content Service Network (CSN) on Application Level Active Network (ALAN). Web caching technology comprises Content Delivery Network (CDN) for content distribution as well as Content Service Network (CSN) for service distribution. The IETF working group on Open Pluggalble Edge Service (OPES) is the works closely related to CSN. But it can be expected that the self-adaptation in ubiquitous computing environment will be deployed. The existing content service on CSN lacks in considering self-adaptation. This results in inability of existing network to support the additional services. Therefore, in order to address the limitations of the existing networks, this paper suggests Self-adaptive Content Service Network (CSN) using the GME and the extended ALAN to insert intelligence into the existing network.
In this paper, we proposed LUC cryptosystem of the methods of decryption by reduced Lehmer totient fuction in Eisenstein field. it is more efficient than original LUC crytosystem. Futhermore, use of Chinese Reminder Theorem and ambiguity problem in decrypted message can be eliminate.
In this paper, a conventional key exchange method simply performs the key exchange setup step based on discrete algebraic subjects. But the mutual-authentication procedure of wireless PKI for reducing authentication time uses an elliptical curve for a key exchange setup step. Proposed handover method shows reduced handover processing time than conventional method since it can reduce CRL retrieval time. Also, we compared proposed authentication structure and conventional algorithm, and simulation results show that proposed authentication method outperforms conventional algorithm in all environment regardless of call arrival rate, queue service rate, queue size.
This paper proposes a seamless handoff scheme that enables a mobile node to continue a session when moving to an overlapping area. During handoff due to the weakness of signaling, mobile node makes new Care-of Addresses using signals received from access router when MN reaches the edge of its area in addition to its current CoA, and it sends temporary binding update messages to Mobility Anchor Point which manage the area covering MN. MAP receives that binding update messages from MN, and temporarily stores new binding informations from them to its binding cache besides existing binding information for MN. This scheme ensures a seamlessly handoff using multicasting until MN enter a new access router area and sends a confirmed binding update message to MAP.
The existing group key management architectures applied to a small scale routing protocols may have many overheads with key distribution. Therefore this paper proposes a group key management protocol in PIM-SM multicast group communication. This method divide multicast groups with RP, and subgroup key managers are established in each RP and can be transmitted groups keys. And this does not have needs of the data translation and the new key distribution for path change. This does not have needs of the data translation and the new key distribution for path change, so the data transmission time can be reduced.
In the course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies in private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is use of mobile agents. It also however, suffers from a major drawback, namely, the potential for malicious attacks, abuse of resources pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper proposed the design of strong and safe mobile agent gateway that split and merge the agent code with security policy database. This mechanism will promote the security in mobile agent systems and mobile agent itself.
This paper proposes a Simulated Annealing(SA) algorithm for cluster-based Multicast Routing problems. Multicasting, the transmission of data to a group, can be solved from constructing multicast tree, that is, the whole network is partitioned to some clusters and the clusters are constructed by multicast tree. Multicast tree can be constructed by minimum-cost Steiner tree. In this paper, an SA algorithm is used in the minimum-cost Steiner tree. Especially, in SA, the cooling schedule is an important factor for the algorithm. Hence, in this paper, a cooling schedule is proposed for SA for multicast routing problems and analyzed the simulation results.
The change of traffic by the CDV is entered in a condensed form in UPC/NPC, overflowing the buffer of the net and possibly causing its congestion. For this reason this paper proposes the Cell Spacing Scheme. As the Cell Shaping Scheme, two method is proposed ; RAT based on the time in which cells enter the spacer and RDT based on the time in which cells come out from the spacer. This paper proposes the improved spacing sheme in which the departure time of the present cell determines the departure time of the next one, by combining with Leaky Bucket and on the traffic characteristics of ATM network.
In this paper, You can design drawing to safekeep and manage equipments in order to utilize efficiently by making use of Visio, and can convert stored data into Office data after inputting user attributes of each equipment, that means that you can analyze each data by using functions of Excel after changing Visio safe attributes into Excel data and XML data, and control and utilize data effectively by converting XML data into DB ones. Additionally, you can use on deliveration of useful information on shopping mall. At last, we present how to share and utilize transformed equipments on the web by designing and making and transforming Data type for good management of equipments of computers existed in university.
It was amazing that efficiency of bureaucratic system, when Marx Weber presented theory of bureaucracy. Now, Government and Bureaucratic organization are confronted with a forked road of change. The purpose of this paper is not so much to force choices among the alternative visions of governance but rather to make the choices available to governments more evident. Any choice of paradigms for government and administration is unlikely to be Pareto optimal, but we should be clear about what we receive and what we sacrifice when we make these judgements about governance. Today, government and public bureaucracy must be changed. There are needed an innovation of government and public bureaucracy. It must be changed concepts from government to governance. Governance is a national management.