Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2005, Vol.10, No.3

  • 1.

    Concept and Attribute based Answer Retrieval

    Bo-Hyun Yun | ChangHo Seo | 2005, 10(3) | pp.1~10 | number of Cited : 0
    Abstract PDF
    This paper presents the information retrieval system which can retrieve the most appropriate answer sentence for user queries by using the concept and the attribute for the knowledge retrieval. The system analyzes the user query into the Boolean queries with the concept and the attribute and then retrieve the relevant documents in the indexing set of answer documents. Users can retrieve the relevant answer sentences from the relevant documents. For this, the answer documents indexed by the concept and the attribute are segmented by each sentence respectively. Thus, the segmented sentences are analyzed into the concept and the attribute of which the relevance degree with indexing units of documents is evaluated. Then, the system indexes the location of answer sentences. In the experiment, we evaluate the performance of our answer retrieval system against 100 user queries and show the experimental results.
  • 2.

    An Efficient CPLD Technology Mapping considering Area and the Time Constraint

    Jaejin Kim | Kwan Hyeong, Lee | 2005, 10(3) | pp.11~18 | number of Cited : 6
    Abstract PDF
    In this paper, we propose a new technology mapping algorithm for CPLD consider area under time constraint. This algorithm detect feedbacks from boolean networks, then variables that have feedback are replaced to temporary variables. Creating the temporary variables transform sequential circuit to combinational circuit. The transformed circuits are represented to DAG. After traversing all nodes in DAG, the nodes that have output edges more than two are replicated and reconstructed to fanout free tree. Using time constraints and delay time of device, the number of graph partitionable multi-level is decided. Several nodes in partitioned clusters are merged by collapsing, and are fitted to the number of OR-terms in a given CLB by bin packing.Proposed algorithm have been applied to MCNC logic synthesis benchmark circuits, and have reduced the number of CLBs by 62.2% than those of DDMAP. And reduced the number of CLBs by 17.6% than those of TEMPLA.
  • 3.

    A study of generic programming method for source code reuse in image processing algorithm implementation

    Lee JUNG HUN | 이준형 | 2005, 10(3) | pp.19~34 | number of Cited : 1
    Abstract PDF
    The difficulties in implementing of image processing algorithms are a major reason for the lack of research into algorithm comparison. This fact makes an image processing research with difficult. We conclude that it is important to represent algorithms in form of reusable code. Since current image processing systems do not fulfill all requirements we must pose on reusable implementations, we propose to solve the reuse problem by applying generic programming. We define two dimensional iterators, which mediate between image processing algorithms and their underlying data structures, so that the same algorithm implementation can be applied to any number of different image formats. The elegance and efficiency of this approach is illustrated by a number of useful examples and demonstrated by porting in existing image processing algorithm IDE(Integrated Development Environment).
  • 4.

    An Implementation of the Report View Generator using Program Performance Log Information

    Cho Yong Yun | Yoo,Jae-Woo | 2005, 10(3) | pp.35~44 | number of Cited : 1
    Abstract PDF
    A software developer can use a performance evaluation tool to elevate development speed and improve quality of softwares. But, evaluation results that most performance evaluation tools offer are complicated strings. Therefore, a developer cannot intuitively understand the meanings of the results and must make much times and efforts in analysing the result. In this paper, we propose a report view generator that can transform and provide the text-based performance evaluation results for softwares with various graphic-based views. Our proposed generator consists of a screen generator that creates a structural XML document about the text-based performance evaluation results and a log analyzer that makes various report view through the created XML evaluation document. Because the XML evaluation result document can express the result information structured according to performance evaluation items for resources of softwares, it can have flexibility in offering and integrating the result information for the items. Through the suggested report view generator, developers can intuitively understand and analysis performance evaluation results of embedded software. And they can easily and quickly improve software quality and improve development efficiency of softwares.
  • 5.

    Extended GTRBAG Model for Access Control Enforcement in Ubiquitous Environments

    황유동 | Park Dong Gue | 2005, 10(3) | pp.45~54 | number of Cited : 3
    Abstract PDF
    The existing access control models have the demerits that do not provide the limit function of using resources by time constraint, the restricted inheritance function as a superior role in role hierarchy, the delicate delegation policy and the limit function of using resources by the location information about a user for the access control in ubiquitous environment. This paper proposes an Extended-GTRBAC model is suited to the access control in ubiquitous environment by applying to sub-role concept of GTRBAC model that the application of resources can be restricted by the period and time and PBDM and considering the location information about a user on temporal constraint. The proposal model can restrict the inheritance of permission in role hierarchy by using sub-role, provide the delicate delegation policy such as user-to-user delegation, role to role delegation, multi-level delegation, multi-step delegation, and apply diverse and delicate access control policy which is suited the characteristic of ubiquitous environment by considering the location information about a user on temporal constraint.
  • 6.

    A Generation Methodology of Facial Expressions for Avatar Communications

    Kim,Jin-Yong | 유재휘 | 2005, 10(3) | pp.55~64 | number of Cited : 6
    Abstract PDF
    The avatar can be used as an auxiliary methodology of text and image communications in cyber space. An intelligent communication method can also be utilized to achieve real-time communication, where intelligently coded data (joint angles for arm gestures and action units for facial emotions) are transmitted instead of real or compressed pictures. In this paper, for supporting the action of arm and leg gestures, a method of generating the facial expressions that can represent sender's emotions is provided. The facial expression can be represented by Action Unit(AU), in this paper we suggest the methodology of finding appropriate AUs in avatar models that have various shape and structure. And, to maximize the efficiency of emotional expressions, a comic-style facial model having only eyebrows, eyes, nose, and mouth is employed. Then generation of facial emotion animation with the parameters is also investigated.
  • 7.

    study of Game Development scenario using Web Based Thinking System

    정승호 | kyungDon Han | 황영섭 | 2005, 10(3) | pp.65~74 | number of Cited : 3
    Abstract PDF
    The success or failure of a game depends on its creativity. Especially during the first period of the process. For this reason, requesting CGTS(Creative Group Thinking System) - previously developed system based on web- in the scenario process of the game designing development. In accordance, this study is to program the thinking performance in result of increasing creativity obect to shortening working hours.
  • 8.

    Ensuring Securityllable Real-Time Systems by Static Program Analysis

    Sung-Soo Lim | Kihwal Lee | 2005, 10(3) | pp.75~88 | number of Cited : 1
    Abstract PDF
    This paper proposes a method to ensure security attacks caused by insertion of malicious codes in a real-time control system that can be accessed through networks. The proposed technique is for dynamically upgradable real-time software through networks and based on a static program analysis technique to detect the malicious uses of memory access statements. Validation results are shown using a remotely upgradable real-time control system equipped with a modified compiler where the proposed security technique is applied.
  • 9.

    Design of Sotfware Testing Automation Framework sharing Test Information based on XML

    정창신 | 이계임 | Soon Key Jung and 1other persons | 2005, 10(3) | pp.89~100 | number of Cited : 2
    Abstract PDF
    The testing time and cost of developed software can be reduced by automation of the whole or part of testing process. Since the testing automation tools to be used currently have been developed without their interoperability, test case information such as test procedures, test data, and expectation of test results generated at the stage of test execution cannot be shared and reused in other testing automation tools. In order to reduce testing time and cost, in this thesis, we have proposed a software testing automation framework which makes it possible to share and reuse the test case information generated in testing process. To prove the availability and effectiveness of proposed testing automation framework, three testing automation tools that are available in current market were experimented by the test scenario. As a result of experiment, the testing time and cost could be reduced by sharing and reusing the test case information in software testing automation framework.
  • 10.

    Personalization Using Member Properties in the Physical Locator

    이덕근 | CHOI IN SOO | Han-Ju Yoo | 2005, 10(3) | pp.101~110 | number of Cited : 1
    Abstract PDF
    A virtual locator is a logical locator based on the contents of a physical locator. These contents can be existing member properties in the physical locator. Using virtual locator, we can accomplish personalization which is the technology area associated most often with CRM. In this study, however, what are called virtual locators in many OLAP models would be treated as physical locators for many unique aggregation levels. By using physical locators, we can bring a successful e-business.
  • 11.

  • 12.

    Role based access control of healthcare information system for Mobile environments

    이유리 | Park Dong Gue | 2005, 10(3) | pp.119~132 | number of Cited : 4
    Abstract PDF
    The health care system revolutionized by the use of information and communication technologies. Computer information processing and electronic communication technologies play an increasingly important role in the area of health care. We propose a new role based access control model for pervasive health care systems, which changed location, time, environment information. Also our model can be solved the occurrence of an reduction authority problem to pervasive health care system at emergency environment. We propose a new role based access control model for pervasive health care systems, which combines role-to-role delegations, negative permission, context concept and dynamic context aware access control. With out approach we aim to preserver the advantages of RBAC and offer great flexibility and fine-grained access control in pervasive healthcare information systems.
  • 13.

    Key Exchang Protocol using Password on CDN

    Seung-Soo Shin | HAN KUN-HEE | 2005, 10(3) | pp.133~142 | number of Cited : 0
    Abstract PDF
    Digital contents can be distributed via internet without quality defect and this will bring a great loss to the contents provider. Therefore, it is necessary to investigate on the key exchanging protocol to protect the digital contents effectively. In this study we propose the key exchanging protocol based on password to send the digital contents efficiently. The stability suggested here is based on the difficulty of the discrete algebra and Diffie-Hellman problem and also it provides a secure safety against various attacks such as a guess attack on the password.
  • 14.

    A Method for Thresholding and Correction of Skew in Camera Document Images

    장대근 | Byung Tae Chun | 2005, 10(3) | pp.143~150 | number of Cited : 3
    Abstract PDF
    Camera image is very sensitive to illumination that result in difficulties for recognizing character. Also Camera captured document images have not only skew but also vignetting effect and geometric distortion. Vignetting effect make it difficult to separate characters from the document images. Geometric distortion, occurred by the mismatch of angle and center position between the document image and the camera, make the shape of characters to be distorted, so that the character recognition is more difficult than the case of using scanner. In this paper, we propose a method that can increase the performance of character recognition by correcting the geometric distortion of document images using a linear approximation which changes the quadrilateral region to the rectangle one. The proposed method also determine the quadrilateral transform region automatically, using the alignment of character lines and the skewed angles of characters located in the edges of each character line. Proposed method, therefore, can correct the geometric distortion without getting positional information from camera.
  • 15.

    Asymmetric public-key watermarking based on correlation method

    이 덕 | Kim Jong Weon | Choi Jong Uk | 2005, 10(3) | pp.151~160 | number of Cited : 0
    Abstract PDF
    Traditional watermarking technologies are symmetric method which embedding and detection keys are same. Although the symmetric watermarking method is easy to detect the watermark, this method has weakness against to malicious attacks to remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched several researchers as a next generation watermarking technology.In this paper, we have expanded search space of secret key using the solution set of linear simultaneous equations. Secret key is generated by secure linear transformation method to prevent of guessing secret key from public key, and the correlation value between secret key and public key is high. At theresults, the multi bits information can be embedded and high correlation value was detected after JPEG compression.
  • 16.

    Objsct Modeling for SMIL documents Editor Development

    Chae,Won-Seok | 2005, 10(3) | pp.161~172 | number of Cited : 1
    Abstract PDF
    SMIL(Synchronized Multimedia Integration Language) allows multimedia objects into a synchronized multimedia presentation. In this paper, I propose modeling rules, formal models, modeling function and an algorithm for SMIL documents using use case diagram and sequence diagram of UML(Unified Modeling Language)to Develop for SMIL Documents Editor. It will be used the use case diagram and collaboration diagram for object-oriented visualizing tool to describe the temporal behavior of the presentation. The main contribution of this paper is that developers of SMIL documents editor easily generate them using this rules and algorithm. And, the formal models and modeling functions provide an environment for processing object-oriented. documents.
  • 17.

    Landmark Recognition Method based on Geometric Invariant Vectors

    Jeonghee Cha | 2005, 10(3) | pp.173~182 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a landmark recognition method which is irrelevant to the camera viewpoint on the navigation for localization. Features in previous research is variable to camera viewpoint, therefore due to the wealth of information, extraction of visual landmarks for positioning is not an easy task. The proposed method in this paper has the three following stages; first, extraction of features, second, learning and recognition, third, matching. In the feature extraction stage, we set the interest areas of the image, where we extract the corner points. And then, we extract features more accurate and resistant to noise through statistical analysis of a small eigenvalue. In learning and recognition stage, we form robust feature models by testing whether the feature model consisted of five corner points is an invariant feature irrelevant to viewpoint. In the matching stage, we reduce time complexity and find correspondence accurately by matching method using similarity evaluation function and Graham search method. In the experiments, we compare and analyse the proposed method with existing methods by using various indoor images to demonstrate the superiority of the proposed methods.
  • 18.

    Design of modified Feistel structure for high-capacity and high speed achievement

    Lee, Seon-Keun | 정우열 | 2005, 10(3) | pp.183~188 | number of Cited : 1
    Abstract PDF
    Parallel processing in block cryptographic algorithm is difficult, because Feistel structure that is basis structure of block cryptographic algorithm is sequential processing structure. Therefore this paper changes these sequential processing structure and Feistel structure made parallel processing to be possible. This paper that apply this modified structure designed DES that have parallel Feistel structure. Proposed parallel Feistel structure could prove greatly block cryptographic algorithm's performance such as DES and so on that could not but have trade-off relation the data processing speed and data security interval because block cryptographic algorithm can not use pipeline method because of itself structural problem. Therefore, modified Feistel structure is going to display more superior security function and processing ability of high speed than now in case apply way that is proposed to SEED, AES's Rijndael, Twofish etc. that apply Feistel structure.
  • 19.

    A User-based MicroPayment System Using Secret Key

    백승호 | Jeong Yoon Su | Won,Jong-Kwon and 1other persons | 2005, 10(3) | pp.189~200 | number of Cited : 0
    Abstract PDF
    Now it is increasing the necessity for micropayment system according to activation for trade on internet. Because of the reason, it is requesting safety for personal information as well as for payment cost. But current micropayment systems cannot support anonymity or have heavy overheads in payment process. This paper suggests a micropayment system to keep anonymity of users and also to keep payment cost safe. The proposed system is to use blind signature anonymous ID which is combined nonce with an encryption of personal information. It also keeps payment cost of users by reconfirmation payment cost and product from certification and increases the computational efficiency by using secret key and session key instead of public key.
  • 20.

    Architecture and Performance Analysis of An Event Notification Service

    Han, Young-Tae | Dugki Min | 2005, 10(3) | pp.201~208 | number of Cited : 0
    Abstract PDF
    Event notification service is a event-based messaging middleware service needed for various vertical domains, such as, business applications, distributed system management, and web service integration. In this paper, we investigate the architecture of an event notification service that includes a subject-based event dissemination service and a flexible message communication service. The event dissemination service is in charge of transferring events asynchronously but speedy according to the subjects of events and their environmental knowledge. It also includes content-based message filtering. The message communication service provides a common communication infrastructure supporting variety types of messages and variety of protocols. Depending on application domains and situation, we can re-configurate the communication infrastructure in order to optimize the efficiency and usability. This paper shows the performance analysis of our event notification service with various types of message formats and protocols.
  • 21.

    Hierarchical Inter-Domain based QoS Routing in a Wide Area of Network

    홍종준 | 2005, 10(3) | pp.209~218 | number of Cited : 1
    Abstract PDF
    In this paper, we propose hierarchical inter-domain load balanced QoS routing in a large scale of network. And a scheme of calculating resources’ costs for precomputation schemes in hierarchical routing is proposed, and a scheme for selecting a path among multiple precomputed paths is proposed. We also propose a QoS routing scheme for transit and intra traffic in a large scale of domain-based network. For a domain in the network, the routing scheme first precomputes K multiple paths between all pairs of ingress and egress border routers while considering balancing of the expected load then selects paths with the probability of path selection. The routing scheme combines inter and intra domain routings seamlessly and uses the same cost calculation scheme.
  • 22.

    An Improved Handoff Technique for Multimedia Services in mobile environment

    Kim Jeong-won | 2005, 10(3) | pp.219~228 | number of Cited : 0
    Abstract PDF
    Since multicast in the mobile environments is based on packet transmission and independent addressing, this paper propose an improved scheme about how to manage the multicasting group and to set the communication path in the mobile environment by applying two-level addressing mode, which is similar to mobile IP, for location-independent address setting. And we propose the smooth handoff scheme that minimizes the handoff delay for mobile multimedia services. Performance analysis by the modified NS-2 network simulator has showed that the proposed scheme is better than other techniques in terms of handoff delay and transmitted packets' throughput.
  • 23.

    Ontology-Based Information Retrieval for Cultural Assets Information

    SeungJae Baek | 천현재 | LEE, Hong Chul | 2005, 10(3) | pp.229~236 | number of Cited : 2
    Abstract PDF
    The Semantic Web enables machines to achieve an effective retrieval, integration, and reuse of web resources. The keyword search method currently used has a limit to accurate search results because of a simple string matching method in web environment. This paper proposes an Ontology-Based Information Retrieval which can solve the problems and retrieve better search results through semantic relations. In this system, we implemented the Cultural Assets Ontology based on OWL with RDQL and Jena API. we also suggest a method to handle properties stored in a database.
  • 24.

    A Design of Lightweight Mutual Authentication Based on Trust Model

    KimHongSeop | Cho Jin Ki | Lee, Sang-ho | 2005, 10(3) | pp.237~248 | number of Cited : 0
    Abstract PDF
    Ubiquitous Sensor Network(USN) is the very core of a technology for the Ubiquitous environments. There is the weakness from various security attacks such that tapping of sensor informations, flowing of abnormal packets, data modification and Denial of Service(DoS) etc. And it's required counterplan with them. Especially, it's restricted by the capacity of battery and computing. By reasons of theses, positively, USN security technology needs the lightweighted design for the low electric energy and the minimum computing. In this paper, we propose lightweight USN mutual authentication methology based on trust model to solve above problems. The proposed authentication model can minimize the measure of computing because it authenticates the sensor nodes based on trust information represented by subjective logic model. So it can economize battery consumption and resultingly increse the lifetime of sensor nodes.
  • 25.

    Automatic Attack Reaction Tool Based on IPv6

    Hong Kyu Lee | Changsuk Oh | Koo Min Jeong and 2other persons | 2005, 10(3) | pp.249~258 | number of Cited : 0
    Abstract PDF
    In this paper proposed automated attack reaction tool based on IPv6. Currently, much researches are performing focused on application program and standardization for IPv6. But, It is not enough for future IPv6 security. The proposed method detect attacks on IPv6 and conventional IPv4, therefore it is possible to protect personal information using automated reaction method. Usually, IDS just perform detection, therefore damages may be repeated. However, this paper considered the problems described above, and suggested solution for this problems. The proposed algorithm suggested in this paper is simulated on IPv6 network based on Linux. As a simulation result, it is proved that proposed algorithm can detect attacks efficiently.
  • 26.

    Detection of Internal IIIegal Query Using Packet Analysis

    장경옥 | Changsuk Oh | Koo Min Jeong | 2005, 10(3) | pp.259~266 | number of Cited : 0
    Abstract PDF
    The purpose of this study is for designing a illegal query detection system using Winpcap library for unauthorized access by internal person. The illegal query detection can be possible detecting the data in out of access control or searching illegal data by plagiarizing other user ID. The system used in this paper collects packets and analyzes the data related to SQL phrase among them, and selects the user's basic information by comparing the dispatch of MAC address and user's hardware information constructed previously. If the extracted information and user's one are different, it is considered as an illegal query. It is expected that the results of this study can be applied to reducing the snaking off unprotected data, and also contributed to leaving the audit records using user's access log which can be applied to the pattern analysis.
  • 27.

    A Study on Critical Success Factors of Electronic Commerce

    Kim,Jung-Yul | 2005, 10(3) | pp.267~274 | number of Cited : 6
    Abstract PDF
    The internet is not simply a new technology that businesses are adopting to reduce their costs of operations and increase revenues. It is literally transforming the way business work. Electronic commerce refers generally to all forms of transactions relating to commercial activities. This research was conducted to identify the critical success factors of electronic commerce. In this study it is found that price and customer service are very important to increase customer satisfaction and intention to repurchase. In addition, the result of this study shows that ① ease of use, ② transaction efficiency and ③ quality assurance are very important to increase customer satisfaction. And, the result of this study shows that ① ease of use and ② security are very important to increase intention to repurchase.
  • 28.

    Successful Business Model of Mobile Solution Company

    Docsung Jang | 2005, 10(3) | pp.275~286 | number of Cited : 1
    Abstract PDF
    Interest of Business Model has been increased continuously in the enterprise ever since IT(Information Technology) is introduced in the Business sector. Though lots of company's effort to build Business Model which expected to give profit to company, there are no guarantee of Business Model's success. In the situation of shortest lifecycle of new technology, it's hard to guarantee Business Model based new technology will return profit with the result of excellent evaluation of technology. After find Timmers model, Julta model, Rappa model, Electronic Commerce Profit model, B2E Model and Affliation, Affliated B2E Business Frame, will propose advantage and disadvantage of these models. Comraded B2E Business Model will be extracted for Mobile Solution Company to achieve success in the market through analysis of relationship between Technology appraisal and business model.
  • 29.

    A Study on the Countermeasures against International Computer Crimes

    오태곤 | 2005, 10(3) | pp.287~296 | number of Cited : 1
    Abstract PDF
    A Study on the Countermeasures against International Computer Crime focusing on the Police Investigation Procedure. These days, much more intelligent, varied and advanced techniques for computer crimes have been used than for development of technology. In particular, it has been reported that the damages are enormous. Damages of some computer crimes can not be accurately reported. This study is to speculate specific types of computer crimes and obtain its prevention and countermeasures centering on the Police Investigation Procedure. In particular, it is to speculate international cooperation under the condition that global damages occur frequently due to preparation of advanced network environment.
  • 30.

    The characteristics of Pacioli's Bookkeeping

    Seokgon Yoon | 2005, 10(3) | pp.297~306 | number of Cited : 0
    Abstract PDF
    Compendium of arithmetic, geometry, and proportions and proportionality' that was published in Venice in 1494 has been recognized as the first bookkeeping data in the world. Major characteristics of Pacioli's bookkeeping rules were reviewed in this study as follows: All the necessary particulars for double entry bookkeeping were provided in Pacioli's bookkeeping rules;. List of property was described at the time of start of business; Three major books were used; Details of daily transactions were considered to be important; Strike through was lined at each description in journal books, details of daily transactions, and list of property after entry of ledger; Amount columns were provided and Arabic numerals were used; Annual settlement custom was being initiated; Profit and loss account was prepared at year-end; Trial balance sheet was inevitably described; Books were verified prior to closing accounts; Control account was not established; Financial statements were not prepared and business analysis was made, too; Finished goods inventory was not adjusted; Mark was assigned to books; Inter-office account was prepared; Branch accounts and branch ledgers were prepared; There was entries of trust; Current arrangement was described; The principle 'Cost or market price, whichever is lower basis' was promoted; Petty cash system is explained; Checks and bills of exchange are used in bank account. As mentioned, characteristics of Pacioli's bookkeeping rules were reviewed; the signs of necessity for preparation of profit and loss statement and balance sheet is found as well as preparation of trial balance sheet and the rules may be considered as a very excellent one in terms of the bookkeeping on initiating stage of double entry bookkeeping.
  • 31.

    A Study on the Countermeasures of Cyber Crimes Among Nations -Focusing on the Global Governance-

    오태곤 | 2005, 10(3) | pp.307~318 | number of Cited : 3
    Abstract PDF
    Cyber crimes caused unpredictable damages by influencing targets with means such as hacking and virus in virtual space. In specific, they transcend time and space because of their anonymity and it is difficult to punish the people who are involved in crimes. To manage such cyber crimes, we need an international cooperative systems beyond difference in legal systems between countries and 'Global Governance' was prepared as a reasonable alternative. These days, governance has been presented as an important concept to explain changed social systems or changed roles of government. Itwas not just a concept to replace traditional government of a single nation, but to overcome new problems on social actions of humans. So it is expected that it can help prepare reasonable measures through cooperation both in individuals and systems, and public and civil sectors. To countermeasure cyber crimes in terms of global governance, we can prepare general investigation systems and professional human resources through civil and public assistance, and provide a base on which international cooperation systems can be established.
  • 32.

    A Study on the Selection IS Risk Elements under E-business

    주상호 | 2005, 10(3) | pp.319~330 | number of Cited : 0
    Abstract PDF
    Rapid business and technology changes drive many organizations to seek better solutions and many of them believe that Information Technology is an essential tool to cope with turbulent environment. Companies began to think ERP system as an effective alternative for IT-based process innovation and integrated information system. But each ERP system has a specific business model and technical structure, unlike in-house developed systems. Moreover implementation of ERP system accompanies transformation of business processes at company level including radical changes in information technology. Therefore, to implement ERP system successfully appropriate and careful selection of ERP system which is adequate for company's objectives and environment must be considered. In this research, four types of changes expected by ERP implementation were suggested. Each type of changes was determined by desired level of changes in business process and information technology.
  • 33.

    Conversion of Radiology Report into DICOM SR

    Yong-Soo Kim | 신승용 | 2005, 10(3) | pp.331~338 | number of Cited : 2
    Abstract PDF
    “Supplement 23:DICOM SR” announced on April 2000 made possible co-relations between the clinical reports and human body parts by standardizing the exchange of clinical information. DICOM SR uses its own coding schemes and values to represent information, which convey hierarchically structured content items. This paper analyzes radiology reports produced in HIS(Hospital Information System) and categorizes content structures into three parts such as, finding, conclusion, and recommendation, and implements a system which can be used by clinicians. Digital X-ray images and their reports have been managed separately. Since the report made by DICOM SR can refer to images, the integrated information of reports and images is possible.
  • 34.

    The Credit Card Settlement System using the Switching Agent

    안익수 | Hwang, Lak-hoon | 2005, 10(3) | pp.339~344 | number of Cited : 1
    Abstract PDF
    Currently the credit card settlement system which is used from off-line credit card joining point is composed of the credit card settlement terminal, the VAN company which do settlement relay service and the credit card company. When the credit card company occurs obstacle, the service VAN company executes as proxy an approval and it controls. When the service VAN company occurs obstacle, the credit card settlement service does not become accomplished in the normality. The dissertation which it sees when the service VAN company occurs obstacle, the possibility of doing a settlement relay service from the different VAN company in order to be, proposed the credit card settlement system which uses the Switching Agent.
  • 35.

    3D Game Rendering Engine using Empty space BSP tree

    Hakran Kim | Hwa Jin Park | 2005, 10(3) | pp.345~352 | number of Cited : 0
    Abstract PDF
    This paper aims to design Game Rendering Engine for real-time 3D online games. Previous, in order to raise rendering speed, BSP tree was used to partitioned space in Quake Game Engine. A game engine is required to develop for rapidly escalating of 3D online games in Korea, too. Currently rendering time is saved with the hardware accelerator which is working on the high-level computer system. On the other hand, a game engine is needed to save rendering time for users with low-level computer system.Therefore, a game rendering engine is which reduces rendering time by PVS look-up table using Empty space BSP tree designed and implemented in this paper