Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2005, Vol.10, No.6

  • 1.

    Robust Extraction of Facial Features under IIIumination Variations

    Jung, Sung-Tae | 2005, 10(6) | pp.1~8 | number of Cited : 5
    Abstract PDF
    Facial analysis is used in many applications like face recognition systems, human-computer interface through head movements or facial expressions, model based coding, or virtual reality. In all these applications a very precise extraction of facial feature points are necessary. In this paper, we presents a method for automatic extraction of the facial features points such as mouth corners, eye corners, eyebrow corners. First, face region is detected by AdaBoost-based object detection algorithm. Then a combination of three kinds of feature energy for facial features are computed; valley energy, intensity energy and edge energy. After feature area are detected by searching horizontal rectangles which has high feature energy. Finally, a corner detection algorithm is applied on the end region of each feature area. Because we integrate three feature energy and the suggested estimation method for valley energy and intensity energy are adaptive to the illumination change, the proposed feature extraction method is robust under various conditions.
  • 2.

    Anomaly Detection Mechanism based on the Session Patterns and Fuzzy Cognitive Maps

    Ryu Dae Hee | Se-Yul Lee | Kim, Hyeock-Jin and 1other persons | 2005, 10(6) | pp.9~16 | number of Cited : 2
    Abstract PDF
    Recently, since the number of internet users is increasing rapidly and, by using the public hacking tools, general network users can intrude computer systems easily, the hacking problem is getting more serious. In order to prevent the intrusion, it is needed to detect the sign in advance of intrusion in a positive prevention by detecting the various forms of hackers intrusion trials to know the vulnerability of systems. The existing network-based anomaly detection algorithms that cope with port-scanning and the network vulnerability scans have some weakness in intrusion detection. they can not detect slow scans and coordinated scans. therefore, the new concept of algorithm is needed to detect effectively the various. In this paper, we propose a detection algorithm for session patterns and FCM.
  • 3.

    Comparison of Edge Detection using Linear Rank Tests in Images

    Lim Dong Hoon | 2005, 10(6) | pp.17~26 | number of Cited : 1
    Abstract PDF
    In this paper we propose three nonparametric tests such as Wilcoxon test, Median test and Van der Waerden test, based on linear rank statistics for detecting edges in images. The methods used herein are based on detecting changes in gray-levels obtained using an edge-height parameter between two sub-regions in a window. We compare and analysis the performance of three statistical edge detectors in terms of qualitative measures with the edge maps and objective, quantitative measures.
  • 4.

    NHPP Software Reli8ability Model based on Generalized Gamma Distribution

    Kim Hee Chul | 2005, 10(6) | pp.27~36 | number of Cited : 14
    Abstract PDF
    Finite failure NHPP models presented in the literature exhibit either constant, monotonic increasing or monotonic decreasing failure occurrence rates per fault. This paper proposes reliability model using the generalized gamma distribution, which can capture the monotonic increasing(or, monotonic decreasing) nature of the failure occurrence rate per fault. Equations to estimate the parameters of the generalized gamma finite failure NHPP model based on failure data collected in the form of interfailure times are developed. For the sake of proposing shape parameter of the generalized gamma distribution, used to the special pattern. Data set, where the underlying failure process could not be adequately described by the knowing models, which motivated the development of the gamma or Weibull model. Analysis of failure data set for the generalized gamma modell, using arithmetic and Laplace trend tests, goodness-of-fit test, bias tests is presented.
  • 5.

    An Effective Push Fault Management Algorithm for Distributed Object Replica based on

    Boonhee Kim | 2005, 10(6) | pp.37~46 | number of Cited : 1
    Abstract PDF
    In processing many operations based on distributed environment, it is very important to support the reliability of resources. Providers of resources generally adapt the structure of server-replication to support the reliability of services. In server side, it maintains replicas, duplicated server objects. In the structure of this replication, service of stable replica is very important. Therefore the structure to diagnosis the fault of such replica is required. In this paper, we suggested an effective PUSH fault management algorithm based on PUSH monitoring style of CORBAto overcome weak points of the PULL monitoring style of the replication management system in the distributed object system. Outcomes of the suggested PUSH fault monitoring style were better than other system. We confirmed valuable result in the workloads and timeout-rates.
  • 6.

    A study on the robust speaker recognition algorithm in noise surroundings

    Jung Jong Soon | 2005, 10(6) | pp.47~54 | number of Cited : 0
    Abstract PDF
    In the most of speaker recognition system, speaker's characteristics is extracted from acoustic parameter by speech analysis and we make speaker's reference pattern. Parameters used in speaker recognition system are desirable expressing speaker's characteristics fully and being a few difference whenever it is spoken. Therefore we suggest following to solve this problem. This paper is proposed to use strong spectrum characteristic in non-noise circumstance and prosodic information in noise circumstance. In a stage of making code book, we make the number of data we need to combine spectrum characteristic and prosodic information. We decide acceptance or rejection comparing test pattern and each model distance. As a result, we obtained more improved recognition rate than we use spectrum and prosodic information especially we obtained stational recognition rate in noise circumstance.
  • 7.

    A Study on the Design for Contents System of Real Estate based on Web Engineering

    kimyoungsun | 2005, 10(6) | pp.55~64 | number of Cited : 1
    Abstract PDF
    The design for an real estate system offer reliability information at once which of the information to extensive data collection of real estate and an real estate price decision Real estate policy make reflect to the appear and apply. The taste of an real estate buyer is various today that We have been changed into a buyer center in the market of the while of a salesman center. Real estate area range of which brokerage business have been reduced gradually which are charging the task of an real estate intermediation. We take the influence to implementation of an real estate information system which real estate field range of brokerage business with real estate mediation business take charge have been reduced gradually. An Real estate circulation market are leading the change of the environment to be brings the change of the method of an real estate transaction.This paper has the purpose that lead new internet age to the design for contents system of real estate based on Web engineering, accomplish revitalization of real estate information system that offer Web service information.
  • 8.

    Video Segmentation using the Automated Threshold Decision Algorithm

    고경철 | 이양원 | 2005, 10(6) | pp.65~74 | number of Cited : 3
    Abstract PDF
    This paper propose a robust scene change detection technique that use the weighted chi-square test and the automated threshold-decision algorithm. The weighted chi-test can subdivide the difference values of individual color channels by calculating the color intensities according to NTSC standard, and it can detect the scene change by joining the weighted color intensities to the predefined chi-test which emphasize the comparative color difference values. The automated decision algorithm uses the difference values of frame-to-frame that was obtained by the weighted chi-test. In the first step, The average of total difference value and standard deviation value is calculated and then, subtract the mean value from the each difference values. In the next step, the same process is performed on the remained difference value. The propose method is tested on various sources and in the experimental results, it is shown that the proposed method is efficiently estimates the thresholds and reliably detects scene changes.
  • 9.

    A Multimedia Bulletin Board System Providing Semantic-based Searching

    Eui-Hyun Jung | 2005, 10(6) | pp.75~84 | number of Cited : 1
    Abstract PDF
    Bulletin board systems have evolved to support diverse multimedia data as well as text. However, current board systems have an weakness; it takes much time and efforts for users to figure out contents of articles. Most board systems provide a searching function with lexical level data access for solving that problem, however it fails to serve users' intented searching results. Moreover, it is nearly impossible to search proper articles if they contain multimedia data. This paper proposed a bulletin board system adopting the Semantic Web to solve this issue. The proposed system provides users with new ontology which is used for describing articles' domain knowledge and multimedia features. Users can describe their own board ontology using the proposed ontology. To support semantic-based searching for diverse domain knowledge without modification of the system, the system dynamically generated input/query interface and RDF data access module according to the board ontology written by administrators. The proposed board system shows that semantic-based searching is feasible and effective for users to find their intended articles.
  • 10.

    Design and Implementation of Learning Contents Using Interactive Genetic Algorithms with Modified Mutation

    Jung-Sook, Kim | 2005, 10(6) | pp.85~92 | number of Cited : 0
    Abstract PDF
    In this paper, we develope an effective web-based learning contents using interactive genetic algorithms with modified mutation operation. In the interactive genetic algorithm, reciprocal exchange mutation is used. But, we modify the mutation operator to improve the learning effects. The new web-based learning contents using interactive genetic algorithm provide the dynamic learning contents providing and real-time test system. Especially, learners can execute the interactive genetic algorithm according to the learners' characters and interests to select the efficient learning environments and contents sequences.
  • 11.

    Feature Extraction based FE-SONN for Signature Verification

    Koo Gun Seo | 2005, 10(6) | pp.93~102 | number of Cited : 3
    Abstract PDF
    This paper proposes an approach to verify signature using autonomous self-organized Neural Network Model, fused with fuzzy membership equation of fuzzy c-means algorithm, based on the features of the signature. To overcome limitations of the functional approach and parametric approach among the conventional on-line signature recognition approaches, this paper presents novel autonomous signature classification approach based on clustering features. Thirty-six global features and twelve local features were defined, so that a signature verifying system with FE-SONN that learns them was implemented. It was experimented for total 713 signatures that are composed of 155 original signatures and 180 forged signatures yet 378 original signatures written by oneself. The success rate of this test is more than 97.67%. But, a few forged signatures that could not be detected by human eyes could not be done by the system either.
  • 12.

    Design and Implementation Embedded XML Document DataBase Management System

    안병태 | Ick-Jin SEO | 2005, 10(6) | pp.103~116 | number of Cited : 1
    Abstract PDF
    With embedded computing technology makes progress, various applications have been developing in PDA. And information exchanging through XML document is underway actively between applications in internet environment. But most of the embedded system has poor hardware resource. And embedded system uses own file system for XML document management. For reason of, it occurs to many of difficulties of data share and information exchange among other systems. Therefore, an importance of the XML Document Database Management System is on the rise in the embedded system. In this paper, we design and implement Embedded XML Document Database Management System(EXDMS) for efficiently management of XML document and supporting data sharing and information exchanging through XML document in embedded system. As compared with file system, EXDMS shows results that more excellent performance about expandability and compatibility of application. Also, EXDMS has an excellent data processing performance in poor system environment.
  • 13.

    Context Awareness Using Wireless Biosignal Processing

    이상복 | Lee Samyol | Lee Jun Haeng and 1other persons | 2005, 10(6) | pp.117~126 | number of Cited : 3
    Abstract PDF
    In this paper, it was suggested method to recognize the motion of a person(lying, sitting, walking, running) using fuzzy inference and wireless biological signal processing system. These are to perceive the motion of the person. Furthermore, the information of motion is indispensable parameter for Context Awareness(CA). In the present study, ADXL 202JE accelerometer sensor was used to measure for checking the continuance motion, biological quantity of motion, and motion pattern of a person. The measured data was transmitted to CA server by Radio Frequency(RF). From the present result, we confirmed that it is difficult to decide the motion of walking and running with only the magnitude of the Longitudinal Accelerometer Average Value(LAAV) and moreover the covariance of LAAV in any block is very useful for CA of walking and running.
  • 14.

    A Development of Malware Detection Tool based on Signature Patterns

    Woo Chong Woo | 하경휘 | 2005, 10(6) | pp.127~136 | number of Cited : 4
    Abstract PDF
    Recently, the damages occurring from the malware are increasing rapidly, regardless of continuous development of commercial vaccines. Generally, the vaccine detects well-known malware effectively, but it becomes helpless without any information against the unknown ones. Also, the malware generates its variations fast enough, so that the vaccine always gets behind in its updates. In this paper, we are describing a design and development of malware detection tool, which can detect such malware effectively. We first analyze the general functionality of the malware, and then extracts specific signatures. Such that, we can actively cope with a malware, which may come in previous type, a new type, and any of its mutations also.
  • 15.

    Implementation of Web Based Video Learning Evaluation System Using User Profiles

    SeongYoon Shin | Rhee Yang Weon | 강일고 | 2005, 10(6) | pp.137~152 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an efficient web-based video learning evaluation system that is tailored to individual student's characteristics through the use of user profile-based information filtering. As a means of giving video-based questions, keyframes are extracted based on the location, size, and color information, and question-making intervals are extracted by means of differences in gray-level histograms as well as time windows. In addition, through a combination of the category-based system and the keyword-based system, questions for examination are given in order to ensure efficient evaluation. Therefore, students can enhance school achievement by making up for weak areas while continuing to identify their areas of interest.
  • 16.

    Design of Push Agent Model Using Dual Cache for Increasing Hit-Ratio of Data Search

    김광종 | Young-Ja Kim | Yonsik Lee and 1other persons | 2005, 10(6) | pp.153~166 | number of Cited : 0
    Abstract PDF
    Existing single cache structure has shown difference of hit-ratio according to individually replacement strategy. However, It needs new improved cache structure for reducing network traffic and providing advanced hit-ratio. Therefore, this paper design push agent model using dual cache for increasing hit-ratio by reducing server overload and network traffic by repetition request of persistent and identical information. In this model proposes dual cache structure to do achievement replace gradual cache using by two caches storage space for reducing server overload and network traffic. Also, we show new cache replace techniques and algorithms which executes data update and delete based on replace strategy of Log(Size)+LRU, LFU and PLC for effectiveness of data search in cache. And through an experiment, it evaluates performance of dual cache push agent model
  • 17.

    A study on the Maturity Appraisal Model of Software Architecture

    Kim Kyung-Hee | 2005, 10(6) | pp.167~176 | number of Cited : 1
    Abstract PDF
    The software architecture is an essential part of a software-intensive system. In addition, the architecture evaluation is a very important process and a cheap way to avoid a software disaster. This article introduces a new method to evaluate architecture by maturity levels. Maturity Models which are about software and software process, have gained wide scale acceptance over the last decade. We are applying these techniques to the software architecture and propose SAMM(Software Architecture Maturity appraisal Model). SAMM consists of six-levels. We expect that our maturity model SAMM describe the requirements that any architecture must have in order to improve its software architecture design and constitute a proven architecture within which to manage the improvement efforts. We can reduce our effort to design architecture, have a guideline to construct the high quality architecture with SAMM, and evaluate architecture and make architecture level.
  • 18.

    Vision-based Camera Localization using DEM and Mountain Image

    Jeonghee Cha | 2005, 10(6) | pp.177~186 | number of Cited : 0
    Abstract PDF
    In this paper, we propose vision-based camera localization technique using 3D information which is created by mapping of DEM and mountain image. Typically, image features for localization have drawbacks, it is variable to camera viewpoint and after time information quantity increases. In this paper, we extract invariance features of geometry which is irrelevant to camera viewpoint and estimate camera extrinsic parameter through accurate corresponding points matching by proposed similarity evaluation function and Graham search method. we also propose 3D information creation method by using graphic theory and visual clues, The proposed method has the three following stages; point features invariance vector extraction, 3D information creation, camera extrinsic parameter estimation. In the experiments, we compare and analyse the proposed method with existing methods to demonstrate the superiority of the proposed methods.
  • 19.

    An Improved Adaptive Background Mixture Model for Real-time Object Tracking based on Background Subtraction

    Kim, Young-Ju | 2005, 10(6) | pp.187~194 | number of Cited : 7
    Abstract PDF
    The background subtraction method is mainly used for the real-time extraction and tracking of moving objects from image sequences. In the outdoor environment, there are many changeable environment factors such as gradually changing illumination, swaying trees and suddenly moving objects, which are to be considered for an adaptive processing. Normally, GMM(Gaussian Mixture Model) is used to subtract the background by considering adaptively the various changes in the scenes, and the adaptive GMMs improving the real-time performance were proposed and worked. This paper, for on-line background subtraction, employed the improved adaptive GMM, which uses the small constant for learning rate α and is not able to speedily adapt the suddenly movement of objects. So, this paper proposed and evaluated the dynamic control method of α using the adaptive selection of the number of component distributions and the global variances of pixel values.
  • 20.

    CGRID construction based on Etherboot technology and its utilization to sequence analysis

    TaeKyung Kim | Cho, Wan-sup | 2005, 10(6) | pp.195~208 | number of Cited : 0
    Abstract PDF
    Recently, amount of the data such as sequences is being increased rapidly due to deploying computational technique and advance of experiment tools in the biological areas. In bioinformatics, it is very significant to extract the knowledge from such huge biological data. Sequence comparisons are most frequently used to predict the function of the genes or proteins. However, it takes so much time to process the persistently increasing data. In this paper, we propose hardware-based grid, CGRID(Chungbuk National University GRID), to improve performance and complement existing middleware-only approach and apply it in the sequence comparison. Hardware-based approach is easy to construct, maintain, and manage the grid as not requiring the software installation individually for every node. We reduce orthologous database construction time from 33 weeks to just a week. Furthermore, CGRID guarantees that the performance increases proportionally as adding the nodes.
  • 21.

    Characteristics of active optical ring network and performance evaluation in Bandwidth on Demand

    LEE SANG HWA | HAESANG SONG | 2005, 10(6) | pp.209~218 | number of Cited : 1
    Abstract PDF
    In this paper, we present an Active Optical Network(AON). The AON uses the Dense Wavelength Division Multiplexing(DWDM) from optical communication access network of ring type, and will be able to provide the smoothly service in the Bandwidth on Demand by using DWDM. It supports the connection of the multiple wavelength and the Sub-Carrier from the optical gigabit ethernet switch. The Wavelength Add Drop Multiplexer(WADM) extracts a specific wavelength, and composes a node of the ring network. The specific wavelength becomes demultiplexing in the Sub-Carrier and it is distributed in the user. The active connection of optical gigabit ethernet switch where the distribution of access network is started and access terminal connection equipment is possible. By the BoD from the AON it compares the buffer size which changes, and it analyzes. Also the Time delay of bit compares with the throughput of server. The limit of amount of time is decided. Consequently it will be able to realize the dynamic use protocol and an efficient algorithm of the network.
  • 22.

    The open API for reconfiguration in 4G network

    Hong Sung June | 이용수 | 2005, 10(6) | pp.219~226 | number of Cited : 1
    Abstract PDF
    This paper describes the open API with integration of semantic web service with PARLAY X based open API in 4G mobile network. It can be expected that the intelligence such as the context-awareness, adaptation and personalization in 4G mobile network will be deployed. But the existing PARLAY based network lacks in considering context-awareness, adaptation and personalization. Therefore, the object of this paper is to support the architecture and the Application Programming Interface (API) of the network service for the context-awareness, adaptation and personalization in 4G mobile network. The open API is to provide users with the adaptive network service to the changing context constraints as well as detecting the changing context and user's preference. For instance, the open API can provide users with QoS in network according to the detected context and user's preference, after detecting the context such as location and speed and user's preference.
  • 23.

    A Study on The UnSafe Packet Drop and Delay of Multimedia Traffics

    임청규 | 2005, 10(6) | pp.227~232 | number of Cited : 0
    Abstract PDF
    A network of Packet based switch Mode will be required to carry the traffics(CVR,VBR, UBR, ABR) generated by a wide range of services. Packet based Network services the Quality-of-Service (QoS) management of traffic sources and bandwidth. Besides efficiency and throughput services are achieved in the multimedia traffic sent in the network. In this paper, the scheduler transmits the safe packet, drop the unsafe packet and evaluate unsafe packet as the requirement of the delay avoiding the network congestion for improving the QoS of the multimedia network . In this paper, we propose the scheduling algorithm which evaluates and drops the packet . The suggested model performance of the switch is estimated and simulated in terms of the delay by computer.
  • 24.

    A Study on an Improvement of the Performance by Spectrum Analysis with Variable Window in CELP Vocoder

    Soyeon Min | Myung Jin Bae | 김은환 | 2005, 10(6) | pp.233~238 | number of Cited : 0
    Abstract PDF
    In general CELP(Code Excited Linear Prediction) type vocoders provide good speech quality around 4.8kbps. Among them, G.723.1 developed for Internet Phone and video-conferencing includes two vocoders, 5.3kbps ACELP(Algebraic-CELP) and 6.3kbps MP-MLQ(Multi-Pulse Maximum Likelihood Quantization). In order to improve the speech quality in CELP vocoder, in this paper, we proposed a new spectrum analysis algorithm with variable window. In CELP vocoder, the spectrum of the synthesised speech signal is distorted because the fixed size windows is used for spectrum analysis. So we have measured the spectral leakage and in order to minimize the spectral leakage have adjusted the window size. Applying this method G.723.1 ACELP, we can get SD(Spectral Distortion) reduction 0.084(dB), residual energy reduction 6.3% and MOS(Mean Opinion Score) improvement 0.1.
  • 25.

    Design of An Improved Trust Model for Mutual Authentication in USN

    KimHongSeop | Lee, Sang-ho | 2005, 10(6) | pp.239~252 | number of Cited : 0
    Abstract PDF
    Ubiquitous Sensor Network(USN), the core technology for the Ubiquitous environments, must be operated in the restrictive battery capacity and computing. From this cause, USN needs the lightweight design for low electric energy and the minimum computing. The previous mutual authentication, based on 's trust model, in USN has a character that makes the lightweight mutual authentication possible in conformity with minimum computing. But, it has an imperfection at the components of representing the trust from a lightweight point of view. In this paper, we improve on the 's trust model to apply a lightweight mutual authentication in USN. The proposed trust model in USN defines the trust information with the only degree of trust-entity()'s belief. The defined trust information has a superiority over the 's trust model from a computing point of view, because it computes information by probability and logic operation(AND).
  • 26.

    An Efficient Network Management System using The Smart Router

    PARK MOON HWA | 2005, 10(6) | pp.253~260 | number of Cited : 2
    Abstract PDF
    Active networks not only allows the network nodes, switches or routers, to perform routing and forwarding but also allows their users to inject customized programs into the nodes of the network or the packets, that may modify, store or redirect the user data flowing through the network. In this paper, we proposed a new network management system built using active network technology, that can solve problems inherent in most of existing legacy centralized network management systems. The main contribution is to present the Smart Router model that can reduce traffics due to managing networks by way of making control packets into simplified patterns. The disadvantages of the centralized network management are presented and the current solution for distributed network management are discussed. The performance improvements that our architecture offers are showed through a service example experiment.
  • 27.

    Design and Evaluation of Traffic Control Mechanism with QoS in FMIPv6

    Seokcheon Park | 2005, 10(6) | pp.261~268 | number of Cited : 2
    Abstract PDF
    Recently, Many people have studied in Mobile IPv6 to provide seamless service. FMIPv6 is designed to reduce the procedure of handover and will be used SIP, VoIP and Mobile Internet moving picture service. But, If mobile node moves fast, it will happen to packet loss and interruption problem in handover procedure. So, In this paper, designed and evaluated traffic control mechanism using WFQ scheduling to reduce the packet loss that occurred to handover procedure.
  • 28.

    Economic Justification of the Internet Access Management

    김상균 | 2005, 10(6) | pp.269~278 | number of Cited : 0
    Abstract PDF
    To justify the economic impacts of the internet access management is a purpose of this paper. Previous researches on economic justification were reviewed and the internet access management system, sniffer, and firewall were implemented to monitor real-time sessions and to record blocked attempts. This paper suggests the impact factors and measurement methods to justify the economic values of the internet access management system. Finally, this paper proves that the overall impacts of the internet access management system have a positive value because filtering mechanisms cause users to lose a small number of URLs including useful information and to diminish refreshment but save users from various risk points and enhance labor productivity.
  • 29.

    A credit scoring model of a capital company's customers using genetic algorithm based ntegration of multiple classifiers

    김갑식 | 2005, 10(6) | pp.279~286 | number of Cited : 0
    Abstract PDF
    The objective of this study is to suggest a credit scoring model of a capital company's customers by integration of multiple classifiers using genetic algorithm. For this purpose, an integrated model is derived in two phases. In first phase, three types of classifiers - MLP (Multi-Layered Perceptron), RBF (Radial Basis Function) and linear models - are trained, in which each type has three ones respectively so htat we have nine classifiers totally. In second phase, genetic algorithm is applied twice for integration of classifiers. That is, after htree models are derived from each group, a final one is from these three, In result, our suggested model shows a superior accuracy to any single ones.
  • 30.

    A Study on Local Equalization Scheme for Preservation of Local Government Finance

    Rack-In Choi | 2005, 10(6) | pp.287~298 | number of Cited : 0
    Abstract PDF
    In this local self-government era, in order to achieve real local decentralization, it is guaranteed to establish self-finances of certain administration level. Nowadays Local equalization scheme is carried out for insuring regional equal development and efficiency and effectiveness of administration and for solving vertical, horizontal problem of unequal finance in local government. Local equalization scheme is the system to guarantee the financial source so that all local self-governing organizations can obtain national minimum standard while correcting the unbalance of finance and maldistribution of tax revenue source between regions. This paper presents the directions of improvement so that national subsidy and local tax can contribute to the finance balance of local self-governing organization in the uncertainties of future finance with weak financial ability. Consequently, it is required to operate the system according to balance principle by adjusting the operation form and distribution type such as national subsidy and local tax.
  • 31.

    An Implementation of Component-based Franchise Management System

    서정민 | Samkeun Kim | 2005, 10(6) | pp.299~308 | number of Cited : 1
    Abstract PDF
    Recently, the standardization and computerization of franchise management have been necessitated from the specialization of industrial areas and the diversification of customer requirements. The existing ERP(Enterprise Resource Planning) systems are commercially used, but usually are restrictive solutions about manufactured goods and inventory management, etc. In this paper, we propose an effective franchise management system Franchisor X1(FX1), which is a total component-based franchise management system for effectively supporting franchise management works, including the recruit of franchisees, the management of franchisees, consulting, education and A/S, bill collecting, and so on.
  • 32.

    A Study on the Method for Ethics Education of Information and Communication of the Undergraduate Students

    유지은 | Lee,Young-Wook | 2005, 10(6) | pp.309~320 | number of Cited : 8
    Abstract PDF
    The harm caused by the opposite function of information and communication has also done increasing with making use of internet more spread. Especially the information and communication are even used as new criminal methods in the society. The objective of this study is to find the orientation on the ethics education of information and communication through the opinion of the undergraduate students who lead the culture of internet for suggestion of the target to raise the upright and sound members of society as well as to solve the above such problems and to establish the desirable model of the ethics. From the questionnaire result by the undergraduate students of S University, students in the field of Humanities and Social Science need the education against the opposite function of information and communication and also the education of netiquette of conscience and moral. In case of opinions in the field of Science and Engineering, the result shows that the students have the opinion on the necessity of the professional education to deal with the opposite function to information and communication as well as the education for upgrade of ability to make use of expert knowledge of information and communication toward the positive side. Finally, the students in the field of Medicine show that they have also the opinion to deal with the opposite function of information and communication. In addition, such result shows that they have the opinion of necessity to the special education against various addicted symptom related to the computer.
  • 33.

    Study of Overseas Market Orientation and Business Performance in “Feel Korea” Industry

    전태석 | 2005, 10(6) | pp.321~336 | number of Cited : 2
    Abstract PDF
    The objective of this paper is to verify, based on the Jaworski & Kohli‘s previous study (1993), relationships among top management factor, interdepartmental cooperation, intra-organizational properties, marketing capability, environmental factor, and export performance as factors for enhancement of export marketing as pursued by Korean media production enterprises which target overseas market centered on the “‘Feel Korea” trend which is recently gaining popularity in Asian economies. This study based its theoretical framework on previous studies on market orientation. For day analysis, this study surveyed a total of 306 employees in 36 media & contents enterprises including KBS, MBC, SBS, etc. Of them, 106 subjects who were primarily engaged in marketing were utilized for final analysis. Based on the previous studies for each variables, a theoretical study model was developed. As a result, the study result was found to be consistent with the previous ones on market orientation by Jaworski & Kohli (1993).
  • 34.

    The Development of a Advanced Information Management System for PSA

    김승환 | 2005, 10(6) | pp.337~344 | number of Cited : 0
    Abstract PDF
    In order to perform a PSA, it requires a large number of data for various fields. Therefore, the effective management of the data is essential to perform and review a PSA and to maintain the quality of a PSA. Korea Atomic Energy Research Institute (KAERI) is developing a PSA information management system (AIMS: Advanced Information Management System for PSA) which enhances the accessibility to PSA information for all PSA related activities. The AIMS is a database system that stores all references and links to the information used for the PSA analysis. The AIMS consists of a database, information browsing modules and a PSA model manager. This paper describes how we implemented such a database centered application in the view of two areas, database design and data (document) service.
  • 35.

    Task Performance of a Mobile Manipulator using Cost Function and Vision Information

    KangJingu | Kwan Hyeong, Lee | 2005, 10(6) | pp.345~354 | number of Cited : 0
    Abstract PDF
    A mobile manipulator - a serial connection of a mobile robot and a task robot - is a very useful system to achieve various tasks in dangerous environment, because it has the higher performance than a fixed base manipulator in terms of its operational workspace size as well as efficiency. A method for estimating the position of an object in the Cartesian coordinate system based upon the geometrical relationship between the image captured by 2-DOF active camera mounted on mobile robot and the real object, is proposed. With this position estimation, a method of determining an optimal path for the mobile manipulator from the current position to the position of object estimated by the image information using homogeneous matrices. Finally, the corresponding joint parameters to make the desired displacement are calculated to capture the object through the control of a manipulator. The effectiveness of proposed method is demonstrated by the simulation and real experiments using the mobile manipulator.
  • 36.

    Development of Service Mobility Management Systembetween Service Gateways for Ubiquitous Environment

    Seungkeun Lee | 2005, 10(6) | pp.355~364 | number of Cited : 0
    Abstract PDF
    Ubiquitous environment can be supported by various service on networked appliance, sensors and devices. In home network and telematics, open service gateway is widely used for ubiquitous environment and present environment for service installation, deployment and execution. Service gateway is a middle layer which is located between service and various devices in ubiquitous environment and offers a unique opportunity for pervasive computing as a potential framework for achieving interoperability between various sensors, home appliances, and networked devices. In ubiquitous environments, these services must support the mobility among service gateway because users and devices has a mobility characteristic. However the OSGi framework supports only a remote installation of a bundle, which is a unit that installs and deploys services. This paper develops a system that can manage bundles for supporting this dynamic bundle’s mobility between service gateway. This system we are proposing implements a bundle form which can perform in an OSGi framework as well as manage the mobile services. As a result, mobility in a ubiquitous computing environment will be supported more efficiently.