Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2005, Vol.10, No.2

  • 1.

    Estimating Motion Information Using Multiple Features

    SeokWoo Jang | 2005, 10(2) | pp.1~10 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a new block matching algorithm that extracts motion vectors from consecutive range data. The proposed method defines a matching metric that integrates intensity, hue, and range. Our algorithm begins matching with a small matching template. If the matching degree is not good enough, we slightly expand the size of a matching template and then repeat the matching process until our matching criterion is satisfied or the predetermined maximum size has been reached. As the iteration proceeds, we adaptively adjust weights of the matching metric by considering the importance of each feature. In the experiments, we show that our block matching approach can work as a promising solution by comparing the proposed method with previously known method in terms of performance.
  • 2.

    Analysis of Security Overhead in Secure Operating System

    KO YOUNG WOONG | 2005, 10(2) | pp.11~19 | number of Cited : 2
    Abstract PDF
    The importance of this paper is to develop a standard performance evaluation model and scenario for the secure OS. According to the scenario that was conducted for performance evaluation, benchmarking was performed. All the benchmarking result was thoroughly analyzed. Our result contribute to evaluating Secure OS that contains various security policy affecting system performance. In this paper, it is expected to provide guidelines of secure operating system for the consumer, developer and evaluator. It will also contribute to the systematic basis for evaluation of security OS and the promotion of domestic information security industry by retaining basic technology for international trends.
  • 3.

    An Adaptive M-estimators Robust Estimation Algorithm

    SeokWoo Jang | Kim,Jin-Uk | 2005, 10(2) | pp.20~30 | number of Cited : 0
    Abstract PDF
    In general, the robust estimation method is well known for a good statistical estimator that is insensitive to small departures from the idealized assumptions for which the estimation is optimized. While there are many existing robust estimation techniques that have been proposed in the literature, two main techniques used in computer vision are M-estimators and least-median of squares (LMS). Among these, we utilized the M-estimators since they are known to provide an optimal estimation of affine motion parameters. The M-estimators have higher statistical efficiency but tolerate much lower percentages of outliers unless properly initialized. To resolve these problems, we proposed an adaptive M-estimators algorithm that effectively separates outliers from non-outliers and estimate affine model parameters, using a continuous sigmoid weight function. The experimental results show the superiority of our method.
  • 4.

    WBI Courseware Design and Implementation for Learning of Problem Solving on the Subject of Social Science in the Elementary School

    서승희 | Lee,Young-Wook | 2005, 10(2) | pp.31~38 | number of Cited : 1
    Abstract PDF
    The web is expected to cause the lot of its utilizing as a means of computer instructed learning and recently the applying instance on the web is more increasing in the education. From educational perspectives, the web-based instruction is much superior to any other medium in the view of interaction and greater to the amount of transmitted information. The various learning contents of WBI program can make students feel more excited and interested in learning activities. Also the creative talent and application abilities of the learner are able to be developed by mixing various sorts of multimedia materials up such as moving pictures, graphics and sounds. In this study, a WBI courseware learning program for the problem solving was designed and proposed on the base of the theory of constructivism for the subject of social science in the 6th grade of elementary school. The experimental results showed that the learning accomplishment of an experimental class was much better than that of an existent class.
  • 5.

    Security Analysis of MAC Algorithm using Block Cipher

    ChangHo Seo | Bo-Hyun Yun | MAENG SEUNG RYOL | 2005, 10(2) | pp.39~48 | number of Cited : 0
    Abstract PDF
    This paper proposes and analyzes the MAC(Message Authentication Code) algorithm that is used for the transition integrity and the entity authentication of message. The MAC algorithm uses the DES algorithm which has 64-bit block and 56-bit key and we compare the security according to 64-bit and 32-bit length of MAC value. Moreover, we use the SEED algorithm which has 128-bit block and 128-bit key and compare the security according to 128-bit and 64-bit length of MAC value. We analyze the security the forgery attack according to length of message and length of MAC value.this paper, a coarse-to-fine optical flow detection method is proposed. Provided that optical flow gives reliable approximation to two-dimensional image motion, it can be used to recover the three-dimensional motion, but usually to get the reliable optical flows are difficult. The proposed algorithm uses Horn's algorithm for detecting initial optical flow, then Thin Plate Spline is introduced to warp a image frame of the initial optical flow to the next image frame. The optical flow for the warped image frame is again used iteratively until the mean square error between two image sequence frames is lowered. The proposed method is experimented for the real moving picture image sequence. The proposed algorithm gives dense optical flow vectors.
  • 6.

    CLB-Based CPLD Low Power Technology Mapping Algorithm for Trade-off

    Jaejin Kim | Kwan Hyeong, Lee | 2005, 10(2) | pp.49~58 | number of Cited : 6
    Abstract PDF
    In this paper, a CLB-based CPLD low power technology mapping algorithm for trade-off is proposed. To perform low power technology mapping for CPLD, a given Boolean network has to be represented to DAG. The proposed algorithm consists of three step. In the first step, TD(Transition Density) calculation have to be performed. Total power consumption is obtained by calculating switching activity of each nodes in a DAG. In the second step, the feasible clusters are generated by considering the following conditions: the number of output, the number of input and the number of OR-terms for CLB within a CPLD. The common node cluster merging method, the node separation method, and the node duplication method are used to produce the feasible clusters. The proposed algorithm is examined by using benchmarks in SIS. In the case that the number of OR-terms is 5, the experiments results show reduction in the power consumption by 30.73% comparing with that of TEMPLA, and 17.11% comparing with that of PLAmap respectively
  • 7.

    Realtime Object Extraction and Tracking System for Moving Object Monitoring

    Hyun-Joong Kang | Lee Kwang Hyoung | 2005, 10(2) | pp.59~68 | number of Cited : 3
    Abstract PDF
    Object tracking in a real time image is one of interesting subjects in computer vision and many practical application fields past couple of years. But sometimes existing systems cannot find object by recognize background noise as object. This paper proposes a method of object detection and tracking using adaptive background image in real time. To detect object which does not influenced by illumination and remove noise in background image, this system generates adaptive background image by real time background image updating. This system detects object using the difference between background image and input image from camera. After setting up MBR(minimum bounding rectangle) using the internal point of detected object, the system tracks object through this MBR. In addition, this paper evaluates the test result about performance of proposed method as compared with existing tracking algorithm.
  • 8.

    An Effective P2P Searching Algorithm Based on Leveled OK Mechanism

    Boonhee Kim | Lee Jun Yeon | 2005, 10(2) | pp.69~78 | number of Cited : 0
    Abstract PDF
    As the study and use of P2P systems are diversified, the effect of excessive amount of traffic, which occurs in searching peers' resource and is considered as a network bandwidth problem, cannot let the matter pass without making a protest. In case P2P application doesn't reduce network traffic, it can be much effected to use bandwidth smoothly in the internet environment where various network applications lie scattered and there will be inconvenience when many network users makes use of related applications. In this paper, we propose a pure P2P model based-broadcasting technique for producing successful hit ratio and traffic amount in the weakly connected environment based-P2P system where situation of peers' connection and exit is ambiguous. The proposed searching technique is designed/implemented to improve a resident problem in the related system and we have estimated the performance of the proposed searching technique comparing our technique with the existing broadcasting based-searching technique.
  • 9.

    a study of information system acquisition administration process modelling

    Tae-Dal Kim | 2005, 10(2) | pp.79~86 | number of Cited : 1
    Abstract PDF
    Acquisition management is important even if there is always to OFFSET between outside visible trade person concerned. When achieve the large project, it is field to be studied continuously so that can be executed according to regulation that is normalized indeed according to formality that is planned in the advance so as to be square and level. relevant project may be achieved successfully in this paper, project manager of courses by being that achieve development project and expresses schematizing relation with acquisition administration process and supply plan process, put study purpose and necessity to do so that can be utilized by communication means and control between member of the teams that take part in project.
  • 10.

    Performance Evaluation of Value Predictor in High Performance Microprocessors

    Byoung-Chan Jeon | Kim, Hyeock-Jin | Ryu Dae Hee | 2005, 10(2) | pp.87~96 | number of Cited : 0
    Abstract PDF
    value prediction in high performance micro processors is a technique that exploits Instruction Level Parallelism(ILP) by predicting the outcome of an instruction and by breaking and executing true data dependences. In this paper, the mean performance improvements by predictor according to a point of time for update of each table as well as prediction accuracy and prediction rate are measured and assessed by comparison and analysis of value predictor that issues in parallel and run by predicting value, which is for performance improvements of ILP in micro processor. For the verification of its validity the SPECint95 benchmark through the simulation is compared by making use of execution driven system.
  • 11.

    An Effective Method for Replacing Caption in Video Images

    Byung Tae Chun | Sook-Yeon Kim | 2005, 10(2) | pp.97~104 | number of Cited : 1
    Abstract PDF
    Caption texts frequently inserted in a manufactured video image for helping an understanding of the TV audience. In the movies, replacement of the caption texts can be achieved without any loss of an original image, because the caption texts have their own track in the films. To replace the caption texts in early methods, the new texts have been inserted the caption area in the video images, which is filled a certain color for removing established caption texts. However, the use of these methods could be lost the original images in the caption area, so it is a problematic method to the TV audience. In this paper, we propose a new method for replacing the caption text after recovering original image in the caption area. In the experiments, the results in the complex images show some distortion after recovering original images, but most results show a good caption text with the recovered image. As such, this new method is effectively demonstrated to replace the caption texts in video images.
  • 12.

    Implementation of File Security Module Using on Windows

    Sung Kyung | Yoon,Ho-Kun | 2005, 10(2) | pp.105~112 | number of Cited : 1
    Abstract PDF
    As the development of information telecommunication technology and thus the information sharing and opening is accelerated, IT system is exposed to various threatener and the avrious security incident is rasing its head with social problem. As countermeasure, to protect safely and prepare in the attack for a system from a be latent security threat, various security systems are been using such as IDS, Firewall, VPN etc.. But, expertise or expert is required to handle security system. The module, implemented in this paper, is based on Windows XP, like Linux and Unix, and has effect integrity and non-repudiation for a file.
  • 13.

    The Hybrid LVQ Learning Algorithm for EMG Pattern Recognition

    Lee Yong Gu | CHOI , WOO SEUNG | 2005, 10(2) | pp.113~122 | number of Cited : 0
    Abstract PDF
    In this paper, we design the hybrid learning algorithm of LVQ which is to perform EMG pattern recognition. The proposed hybrid LVQ learning algorithm is the modified Counter Propagation Networks(C.P. Net.) which is use SOM to learn initial reference vectors and out-star learning algorithm to determine the class of the output neurons of LVQ.The weights of the proposed C.P. Net. which is between input layer and subclass layer can be learned to determine initial reference vectors by using SOM algorithm and to learn reference vectors by using LVQ algorithm, and pattern vectors is classified into subclasses by neurons which is being in the subclass layer, and the weights which is between subclass layer and class layer of C.P. Net. is learned to classify the classified subclass, which is enclosed a class. To classify the pattern vectors of EMG, the proposed algorithm is simulated with ones of the conventional LVQ, and it was a confirmation that the proposed learning method is more successful classification than the conventional LVQ.
  • 14.

    Analysis for Authentication waiting time in Hand-over using Queueing model

    Seung-Soo Shin | DuckSool Kim | 2005, 10(2) | pp.123~132 | number of Cited : 0
    Abstract PDF
    In this paper, a conventional key exchange method simply performs the key exchange setup step based on discrete algebraic subjects. But the mutual-authentication procedure of wireless PKI for reducing authentication time uses an elliptical curve for a key exchange setup step. Proposed hand-over method shows reduced hand-over processing time than conventional method since it can reduce CRL retrieval time. Also, we compared proposed authentication structure and conventional algorithm, and simulation results show that proposed authentication method outperforms conventional algorithm in authentication waiting time.
  • 15.

    A Simulation Method for Terminal Mobilities with Regularity in Mobile Networks

    Hyunjoon Cho | 2005, 10(2) | pp.133~142 | number of Cited : 1
    Abstract PDF
    We need to study on simulation method of user's mobility patterns for the performance analysis of the location management in wireless mobile networks. For this purpose ,this paper presents a user mobility model of wireless mobile networks with regular patterns. Sometimes mobile users randomly move, but they show the movement characteristics that regularly change their locations in some patterns in given time slots. So, we suggest the mobility model that can describe user's time related movement patterns. This model consists of some elements-positions, transitions, transition probabilities which are variable, and some geographical paths for each transitions. We describe the simulation method for users' mobilities with random movements and regular movements, too. The simulation results by the model show that the suggested model can generate movement scenarios having regular patterns related with location and time.
  • 16.

    Design of A Spammail Control Model Based on Hierarchical Policy

    Youngjin Lee | Lee, Sang-ho | 백승호 and 1other persons | 2005, 10(2) | pp.143~152 | number of Cited : 0
    Abstract PDF
    As the internet and E-commerce have been developing, a novel method for marketing is needed. A new advertisement using E-mail is becoming popular, because it has characteristics with low costs and relative efficiency. However, as the spam mails are increasing rapidly, mail service companies and users are deeply damaged in their mind and economically. In this paper, we design a hierarchical spam mail blocking policy through cooperation of all the participants-user, administrator, ISP to cut off the spam mail efficiently and propose an efficient model to block and manage the spam mails based on the policy. Also we prove the efficiencies and effectiveness of the proposed model through evaluation process.
  • 17.

    A Study on the performance improvement of Multi-Path Gain in a MMSE Detector

    유동관 | 2005, 10(2) | pp.153~158 | number of Cited : 0
    Abstract PDF
    In this paper, an improved detection method is proposed by supplementing multi-path gain for a MMSE detecter. This method is proposed to complement the shortcomings of the conventional detection method which is used for multiuser detection in STBC CDMA system. We analyzed the improved method in bit error probability viewpoint and compared the result with that of the conventional method. In this result, we showed that the improved method obtains better performance of bit error probability than the conventional method when parameters such as delay, number of user and SNR are increased.
  • 18.

    A Study on Efficient Group Communication in the Integrated Multicasting Environment

    김현주 | Kim, Seungjoo | Dongho Won and 1other persons | 2005, 10(2) | pp.159~168 | number of Cited : 2
    Abstract PDF
    Through the increment of group oriented application services, the multicast communication in wire/wireless network has become a widely discussed researching topic. However solution for security, efficiency and scaleability of a multicast communications are not enough to be satisfactory. In this paper, we propose a new secure, efficient and scalable multicasting protocols to provide a integrated multicast service. Our protocol is an authenticated key establishment protocol which has been designed specifically for use with low powered computationally weak equipment such as Cellular phone and PDA(Personal Digital Assistant).
  • 19.

    A Study the Control of Conditional Access to Pay-TV in Satellite digital Multimedia Broadcasting

    김현주 | Kim, Seungjoo | Dongho Won and 1other persons | 2005, 10(2) | pp.169~178 | number of Cited : 0
    Abstract PDF
    The Conditional Access System is a complete system for ensuring that broadcasting services be accessible to only those who are entitled to receive them. Secure key management and efficient delivery mechanism are very important design factors to this system. In this paper, we propose secure and efficient protocols which would be well fitted to a Pay TV system including the satellite DMB. Further, by applying our protocol to the existing conditional access system, we propose a new system that properly enables the control of conditional access to the Pay TV in satellite DMB environment..
  • 20.

    The Development of PDA_based Mapping System Using Survey Equipment

    Lee, Young-Geol | Bae Sang-Ho | Han Woo Chul and 1other persons | 2005, 10(2) | pp.179~186 | number of Cited : 1
    Abstract PDF
    This study is to develop PDA_based surveying mapping system. This object is achieved by developing wireless communication module of PDA which is adaptable to Total Station and GPS, and contents for its usage. This system will be efficiently used to surveying parts of spatial location information for real time mapping and improving the modification of survey data.
  • 21.

    A Low-Power Mutual Authentication Protocol in Ubiquitous Sensor Networks

    조영복 | Jeong Yoon Su | Lee, Sang-ho and 1other persons | 2005, 10(2) | pp.187~198 | number of Cited : 0
    Abstract PDF
    All sensors in Ubiquitous sensor network have to communicate with limited battery. If we adopt current authentication, there are difficulties to keep sensor network because heavy calculation in each sensor needs more power and lifetime of sensor could be short relatively because of the effect. This paper suggests network structure which is using and to solve power problem on authentication, and suggests mutual-authentication protocol with low power which supports a session key by mutual-authentication. and manage algorithm with fast calculation to keep the safety by doing key generation, encryption/decryption, authentication instead of each sensor node. Processing time to authenticate sensor node is 2.96% fast in the same subnet, and 12.91% fast in different subnet. Therefore, the suggested way provides expanded lifetime of censor node and is more effective as sensor network size is bigger and bigger.
  • 22.

    A Study on Purchasing Model of Internet Shopping Mall

    Lee, Sungjin | 2005, 10(2) | pp.199~204 | number of Cited : 5
    Abstract PDF
    Despite the growth of research interest into electronic commerce, there is still little information available on the ways in which an electronic commerce can be successfully developed. This study reports a set of success factors for electronic commerce, specifically some important implications for managers of internet shopping mall area in Korea. In this study it is found that trust on shopping mall and delivery are very important to increase purchase intention of customer. In addition, the result of this study shows that price and ease of use and loading time and error tolerance are very important to increase purchase intention.
  • 23.

    A Study on National Development & Balanced Development by Region

    Nam Il Kim | 2005, 10(2) | pp.205~214 | number of Cited : 2
    Abstract PDF
    A balanced regional development has a great meaning of economics in the fact that the people could enjoy the equal level of life everywhere in the country by reducing the income disparity and eco-nomic productivity between regions, however as the our country was given preponderance of economical power and development to the metropolitan area centering around Seoul due to a factor of politics, social structure as well as a national economic policy centering around a rapid economic growth, the unbalanced regional growth gave rise to great hindrance to a national development. Especially, the unbalanced growth between regions gave rise to a sense of alienation to a citizen in a special region as well as a distortion of an effective resources distribution. therefore it was deepen a social discord to hinder the unity of the people due to always coming to involve social, political affairs. The major contents of this study is to clarify relations between the economic growth and the balanced regional development to form a concept of a national development, and this thesis made disparities in population and convenient facilities between regions through change of convenient facilities of life, economic growth, and population between regions an analytic object to concrete the studies. Also, this thesis made a whole country land an analytic object of spatial sphere. and it made a unit of ten years when the five-year economic development plan was achieved from the year 1962 to 2001 an object of the time range of studies.
  • 24.

    A K-Nearest Neighbor Algorithm for Categorical Sequence Data

    Seung-Joon Oh | 2005, 10(2) | pp.215~222 | number of Cited : 4
    Abstract PDF
    TRecently, there has been enormous growth in the amount of commercial and scientific data, such as protein sequences, retail transactions, and web-logs. Such datasets consist of sequence data that have an inherent sequential nature. In this paper, we study how to classify these sequence datasets. There are several kinds techniques for data classification such as decision tree induction, Bayesian classification and K-NN etc. In our approach, we use a K-NN algorithm for classifying sequences. In addition, we propose a new similairty measure to compute the similarity between two sequences and an efficient method for measuring similarity.
  • 25.

    Analysis of Disaster Recovery System in Bank Industry

    Yong-Soo Kim | 백승문 | 2005, 10(2) | pp.223~229 | number of Cited : 7
    Abstract PDF
    DRS (Disaster Recovery System) that was invested on a large-scale becomes obsolete when it is neglected for a certain period of time. Also the DRS can not be accomplished through the duplicated computer systems. When a disaster happens, the normal operation is possible only if the processes that had been being done before the disaster recover without any loss. Therefore the DRS is not a IT project but needs an analysis of whole business processes and business continuity plans. This paper analyzes the present state of DRS of the domestic bank industry and suggests a remedy.