Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

Home > Explore Content > All Issues > Article List

2005, Vol.10, No.5

  • 1.

    A Multiple Sequence Alignment Algorithm using Clustering Divergence

    이병일 , Lee, Jong Yun , Soon Key Jung | 2005, 10(5) | pp.1~9 | number of Cited : 1
    Abstract PDF
    Multiple sequence alignment(MSA) is a fundamental technique of DNA and protein sequence analysis. Biological sequences are aligned vertically in order to show the similarities and differences among them. In this paper, we propose an efficient group alignment method, which is based on clustering divergency, to perform the alignment between two groups of sequences. The proposed algorithm is a clustering divergence(CDMS)-based multiple sequence alignment and a top-down approach. The algorithm builds the tree topology for merging. It is also based on the concept that two sequences having the longest distance should be spilt into two clusters. We expect that our sequence alignment algorithm improves its quality and speeds up better than traditional algorithm Clustal-W.
  • 2.

    Fuzzy Single Layer Perceptron using Dynamic Adjustment of Threshold

    Jaehyun Cho , 김창백 | 2005, 10(5) | pp.11~16 | number of Cited : 0
    Abstract PDF
    Recently, there are a lot of endeavor to implement a fuzzy theory to artificial neural network. Goh proposed the fuzzy single layer perceptron algorithm and advanced fuzzy perceptron based on the generalized delta rule to solve the XOR problem and the classical problem. However, it causes an increased amount of computation and some difficulties in application of the complicated image recognition. In this paper, we propose an enhanced fuzzy single layer perceptron using the dynamic adjustment of threshold. This method is applied to the XOR problem, which used as the benchmark in the field of pattern recognition. The method is also applied to the recognition of digital image for image application. In a result of experiment, it does not always guarantee the convergence. However, the network show improved the learning time and has the high convergence rate.
  • 3.

    Ontology based Retrieval System for Cultural Assets Using Hybrid Text-Sketch Queries

    천현재 , SeungJae Baek , LEE, Hong Chul | 2005, 10(5) | pp.17~26 | number of Cited : 1
    Abstract PDF
    With the rapidly growing information, the research on the efficient information retrieval is increasing. Most of the retrieval systems for domestic cultural assets on the web have adopted a keyword-based search method. Those systems have required users to know the exact information about cultural assets such as name, keyword, etc. However, it is not easy to search the cultural assets with little information or only a remembrance of the shape. In this paper, we propose the retrieval system for cultural assets using both ontology-based and sketch-based search method to solve the problems of existing systems. Our retrieval system allows users to use both text and sketch for a query regardless of the type of information about cultural assets and to search in results using the ontology.
  • 4.

    Using Text Mining Techniques for Intrusion Detection Problem in Computer Network

    Seung-Joon Oh , Won minkwan | 2005, 10(5) | pp.27~32 | number of Cited : 2
    Abstract PDF
    Recently there has been much interest in applying data mining to computer network intrusion detection. A new approach, based on the k-Nearest Neighbour(kNN) classifier, is used to classify program behaviour as normal or intrusive. Each system call is treated as a word and the collection of system calls over each program execution as a document. These documents are then classified using kNN classifier, a popular method in text mining. A simple example illustrates the proposed procedure.
  • 5.

    A Study on the Implementation of Small Capacity Dictionary for Mobile Equipments Using a CBDS tree

    정규철 , Jinkwan Lee , 정혜숙 and 1 other persons | 2005, 10(5) | pp.33~40 | number of Cited : 2
    Abstract PDF
    Recently So far Many low-cost mobile machinery have been produced. Those are being used for study and business. But those are some weak points which are small-capacity storage and quite low-speed system. If we use general database programs or key-searching algorithm, It could decrease in performance of system. To solve those problems, we applied CBDS(Compact Binary Digital Search) trie to mobile environment. As a result we could accomplish our goal which are quick searching and low-capacity indexing. We compared with some Java classes such as TreeSet to evaluation. As a result, the velocity of searching was a little slow than B-tree based TreeSet. But the storage space have been decreased by 29 percent. So I think that it would be practical use.
  • 6.

    A Study of Deferred Commitment for Transaction Management in Multidatabase Systems

    LEE, Sang-Hee | 2005, 10(5) | pp.41~48 | number of Cited : 0
    Abstract PDF
    In this thesis, we propose a concurrency control scheme which schedules global transactions in multidatabase systems. Unlike other scheme which commit global transactions as soon as they have finished their execution, this scheme has attempted to delay them if their exist another global transactions that should be preceeded. Owing to the deferred commitment, the number of global restarts could be greatly reduced. This scheme‘s performance gain increased through simulations in case more than one LDBS employ timestamp ordering(TO) as a local concurrency control scheme.
  • 7.

    Retesting Method of Classes in Associated Relation using Message Path

    BANG, Jung Won | 2005, 10(5) | pp.49~56 | number of Cited : 0
    Abstract PDF
    Reuse of software is the process of developing software system which does not develop all modules newly but construct system by using existing software modules. Object oriented concept introduces dynamic binding and polymorphism, which increases number of executable paths. In this case static analysis of source code is not useful to find executable path. These concepts occur new problems in retesting. Traditional testing method can not cover complex relations such as inheritance, message passing and instance of and can not apply on object oriented retesting. we propose the method to reduce the number of methods and classes to be retested in associated class relation.
  • 8.

    Transactions Ordering based Secure Concurrency Control Scheme

    이원섭 , LEE, Sang-Hee | 2005, 10(5) | pp.57~64 | number of Cited : 0
    Abstract PDF
    While the secure concurrency control schemes in multilevel secure database management systems synchronize transactions cleared at different security level they must consider the problem covert channel. although previous works achieve the confidentiality successfully, they overlook the integrity or the availability. For being evaluated as highly secure database systems , the multilevel secure database management systems must achieve the confidentiality, integrity, and the availability that are the well-known major security aspects. By use of verified transactions ordering relationship, in this paper, we propose a new secure concurrency control scheme that is capable of increasing the degree of fairness among transactions cleared at different security levels.
  • 9.

    Creation of Soccer Video Highlights Using Caption Information

    Seong-Yoon Shin , Rhee Yang Weon , 강일고 | 2005, 10(5) | pp.65~76 | number of Cited : 1
    Abstract PDF
    A digital video is a very long data that requires large-capacity storage space. As such, prior to watching a long original video, video watchers want to watch a summarized version of the video. In the field of sports, in particular, highlights videos are frequently watched. In short, a highlights video allows a video watcher to determine whether the highlights video is well worth watching. This paper proposes a scheme for creating soccer video highlights using the structural features of captions in terms of time and space. Such structural features are used to extract caption frame intervals and caption keyframes. A highlights video is created through resetting shots for caption keyframes, by means of logical indexing, and through the use of the rule for creating highlights. Finally, highlights videos and video segments can be searched and browsed in a way that allows the video watcher to select his/her desired items from the browser.
  • 10.

    Learning Networks for Learning the Pattern Vectors causing Classification Error

    Lee Yong Gu , CHOI , WOO SEUNG | 2005, 10(5) | pp.77~86 | number of Cited : 4
    Abstract PDF
    In this paper, we designed a learning algorithm of LVQ that extracts classification errors and learns ones and improves classification performance. The proposed LVQ learning algorithm is the learning Networks which is use SOM to learn initial reference vectors and out-star learning algorithm to determine the class of the output neurons of LVQ. To extract pattern vectors which cause classification errors, we proposed the error-cause condition, which uses that condition and constructed the pattern vector space which consists of the input pattern vectors that cause the classification errors and learned these pattern vectors, and improved performance of the pattern classification.To prove the performance of the proposed learning algorithm, the simulation is performed by using training vectors and test vectors that are Fisher'Iris data and EMG data, and classification performance of the proposed learning method is compared with ones of the conventional LVQ, and it was a confirmation that the proposed learning method is more successful classification than the conventional classification.
  • 11.

    Design and Implementation of Efficient Plate Number Region Detecting System in Vehicle Number Plate Image

    Hyun Chang Lee | 2005, 10(5) | pp.87~94 | number of Cited : 9
    Abstract PDF
    This paper describes the method of detecting the region of vehicle number plate in colored car image with number plate. Vehicle number plate region generally shows formula colors in accordance with type of car. According to this, we use the method to combine a color ingredient H of HSI color model and a color ingredient Q of YIQ color model. However, the defect which a total operation time takes much exists if it uses such method. Therefore, in this paper, the concurrent accomplishes a candidate area extraction operation as draw a color H and Q ingredient among steps of extracting a region of vehicle number plate. After the above step, as a next step in combination with color H and Q, we can accomplish an region extraction fast by comparing to candidate regions extracted from each steps not to do a comparison operation to all of image pixel information. We also show implementation results processed at each steps and compare with extraction time according to image resolutions.
  • 12.

    A Spatiotemporal Parallel Processing Model for the MLP Neural Network

    Sungoan Kim | 2005, 10(5) | pp.95~102 | number of Cited : 1
    Abstract PDF
    A parallel processing model by considering a spatiotemporal parallelism is presented for the training procedure of the MLP neural network. We tried to design the flexible parallel processing model by simultaneously applying both of the training-set decomposition for a temporal parallelism and the network decomposition for a spatial parallelism. The analytical performance evaluation model shows that when the problem size is extremely large, the speedup of each implementation depends, in the extreme, on whether the problem size is pattern-size intensive or pattern-quantity intensive.
  • 13.

    A Digital Watermarking Algorithm Using PIM and 2D Barcode

    Suyoung Han , LEE KEE HEE , Kim,Hong-Ryul | 2005, 10(5) | pp.103~108 | number of Cited : 0
    Abstract PDF
    In this paper, we proposed a novel robust watermarking technique using PIM and 2D barcode for the copyright of the digital images. Because human is impervious to the change in the complex area, the embedding watermark to the selected coefficients using PIM enhances invisibility. A 2D barcode image is used for watermark in this research. The 2D barcode contains more information than conventional 1D barcode and includes the error correction algorithm. Therefore the watermarking algorithm using 2D barcode enhances the robustness of watermark. From the experimental results, the proposed algorithm shows better invisibility and robustness performance in a general signal processing such as JPEG and SPIHT lossy compression.
  • 14.

    Design of Modified MDS Block for Performance Improvement of Twofish Cryptographic Algorithm

    정우열 , Lee, Seon-Keun | 2005, 10(5) | pp.109~114 | number of Cited : 1
    Abstract PDF
    Twofish cryptographic algorithm is concise algorithm itself than Rijndael cryptographic algorithm as AES, and easy of implementation is good, but the processing speed has slow shortcoming. Therefore this paper designed improved MDS block to improve Twofish cryptographic algorithm's speed. Problem of speed decline by a bottle-neck phenomenon of the processing speed existed as block that existing MDS block occupies Twofish cryptosystem's critical path. To reduce multiplication that is used by operator in MDS block this paper removed a bottle-neck phenomenon and low-speed about MDS itself using LUT operation and modulo-2 operation. Twofish cryptosystem including modified MDS block designed by these result confirmed that bring elevation of the processing speed about 10% than existing Twofish cryptosystem.
  • 15.

    Design of Context-Aware Middleware in Ubiquitous Computing Environment

    KIM, Hyo-Nam , Yong Park | 2005, 10(5) | pp.115~122 | number of Cited : 3
    Abstract PDF
    W These days, Ubiquitous is becoming a more popular tool in mass communications and in advanced countries ubiquitous computing is commercialized. In Korea, we have studied the business models of the ubiquitous computing generation as well. Ubiquitous computing is the environment in which humans and computers coexist and properly work together. I would like to present a service infrastructure for a more efficient context-awareness than computing home networking system in this monograph. In the mean time, they have focused the context-awareness system on identifying users in the designated space and recognition. But I would like to focus on the middleware system structure for more efficient recognition.
  • 16.

    An Improvement of Speed for Wavelength Multiplex Optical Network using Optical Micro Electro Mechanical Switches

    LEE SANG HWA , HAESANG SONG | 2005, 10(5) | pp.123~132 | number of Cited : 0
    Abstract PDF
    In this paper, we present an improvement of switch node for wavelength multiplex optical network. Currently because of quick increase of internet traffic a big network capacity is demanded. Wavelength multiplex optical network provides the data transfer of high speed and the transparent characteristic of the data. Therefore optical network configuration is the most powerful technology in the future. It will be able to control the massive traffic from the optical network in order to transmit the multimedia information of very many quantity. Consequently the node where the traffic control is possible, is demanded. The optical switch node which manages efficiently the multiple wavelength was proposed. This switch is composed of a optical switch module for switching and a wavelength converter module for wavelength conversion. It will be able to compose the switch fabric without optical/electro or electro/optical conversion using optical MEMS(Micro Electro Mechanical Switches) module. Finally, we present the good test result regarding the operational quality of the switch fabric and the performance of optical signal from the switch node. The proposed switch node of the optical network will be able to control the massive traffic with all optical.
  • 17.

    A study on the classification algorithm in order to information explosion prevention in building security network

    김계국 , 서창옥 | 2005, 10(5) | pp.133~140 | number of Cited : 0
    Abstract PDF
    The whole network system is paralyzed due to excess event of security server once in a while. If that happens, We have to analyze the cause of events, the time will require when we deal with a matter. All the while, ACU(ACCESS CONTROL UNIT) and security server are off, We can not treat about information retrieval of people who come to building with real time. In this paper, we suggested classification algorithm in order to prevent of information explosion.
  • 18.

    A Sensing-aware Cluster Head Selection Algorithm for Wireless Sensor Networks

    Euihyun Jung | 2005, 10(5) | pp.141~150 | number of Cited : 0
    Abstract PDF
    Wireless Sensor Networks have been rapidly developed due to the advances of sensor technology and are expected to be applied to various applications in many fields. In Wireless Sensor Networks, schemes for managing the network energy-efficiently are most important. For this purpose, there have been a variety of researches to suggest routing protocols. However, existing researches have ideal assumption that all sensor nodes have sensing data to transmit. In this paper, we designed and implemented a sensing-aware cluster selection algorithm based on LEACH-C for the sensor network in which part of sensors have sensing data. We also simulated proposed algorithm on several network situation and analyzed which situation is suitable for the algorithm. By the simulation result, selecting cluster head among the sensing nodes is most energy-efficient and the result shows application of sensing-awareness in cluster head selection when not all sensors have sensing data.
  • 19.

    Implementation of Intelligent Web Service Access Management for Supporting High Availability and Business Continuity

    Hyun-Joong Kang , Lee Kwang Hyoung | 2005, 10(5) | pp.151~160 | number of Cited : 0
    Abstract PDF
    High availability and business continuity in the missioncritical enterprise environment have been a matter of primary concern. It is desirable to implement replicated servers, duplicated devices and disaster recovery sites so that these issues are accomplished. When that happens, web browser’s users may be accessed web server through a specific Uniform Resource Locator. A critical issue arises if web browser’s users recklessly change the URL and access into other site. In this case, data integrity between duplicated sites may not be guaranteed. In this paper, we introduce the method of integrating the technologies of user authentication, certificate authority and business continuity and propose the design and implementation of intelligent service access management.
  • 20.

    A Study of Wireless LAN Cryptosystem for Supporting Realtime Mutual Authentication

    Lee,Sang-Ryul | 2005, 10(5) | pp.161~170 | number of Cited : 1
    Abstract PDF
    The Certificate Revocation List(CRL) or the Online Certificate Status Protocol(OCSP) has been used to validate certificates. However, the CRL cannot validate certificates in realtime because of the Time-Gap problem and the OCSP server overloads in a large scale secure system. In addition, the client cannot access a wired LAN until the client has been authenticated by the authentication server on the IEEE 802.1x framework. Therefore, the client cannot validate the authentication server's certificate using a certificate validation server. Thus, the client cannot authenticate the authentication server in realtime. To solve these problems this paper designed a secure system that can protect the content of communications and authenticate users in realtime on a wireless LAN. The designed certificate validation protocol was proved that the stability and efficiency of the system was very high, the result of the validation had the presence, the speed of the validation was not affected by the system scale, the number of authorities user must trust was reduced to one, and the overload of the validation server was protected. And the designed user authentication and key exchange protocols were proved that the mutual authentication was possible in realtime and the fact of the authentication could be authorized by the CA because of using the authorized certificates.
  • 21.

    An Algorithm for Workspace of Human Model using the joint limit angle

    Seokhyun Yoon | 2005, 10(5) | pp.171~178 | number of Cited : 0
    Abstract PDF
    This paper describes the method of calculating coordinate using Forward Kinematics and expresses the recursive equation as the numerical formula using a homogeneous coordinate for creating workspace. This paper proposes an algorithm for the workspace of human model using the recursive equation and the joint limit angle of human model, and describes the results of workspace of the human model as computer graphics.
  • 22.

    A Genetic Algorithm using A Modified Order Exchange Crossover for Rural Postman Problem with Time Windows

    Kang, Myung-Ju | 2005, 10(5) | pp.179~186 | number of Cited : 0
    Abstract PDF
    This paper describes a genetic algorithm and compares three crossover operators for Rural Postman Problem with Time Windows (RPPTW). The RPPTW which is a multiobjective optimization problem, is an extension of Rural Postman Problem(RPP) in which some service places (located at edge) require service time windows that consist of earliest time and latest time. Hence, RPPTW is a multiobject optimization problem that has minimal routing cost being serviced within the given time at each service place.To solve the RPPTW which is a multiobjective optimization problem, we obtain a Pareto-optimal set that the superiority of each objective can not be compared. This paper performs experiments using three crossovers for 12 randomly generated test problems and compares the results. The crossovers using in this paper are Partially Matched Exchange(PMX), Order Exchange(OX), and Modified Order Exchange(MOX) which is proposed in this paper. For each test problem, the results show the efficacy of MOX method for RPPTW.
  • 23.

    Extended ROHC Compression Algorithm for The Efficient Data Traffic Transmission in the IPv6

    kyung shin, Kim , Kang Moon-Sik | 2005, 10(5) | pp.187~198 | number of Cited : 1
    Abstract PDF
    In this paper, we propose the enhanced header compression scheme for the efficient data traffic transmission in IPv6 networks. The bandwidth of wireless links and IP networks will probably be limited due to properties of the physical medium and regulatory limits on the use of frequencies for radio communications. That is major cause of user throughput reduction. Therefore, We discuss the IPHC(RFC2507) and ROHC(RFC3095) scheme. IPHC is simple header compression scheme and ROHC is enhanced header compression that have fast optimal recovery scheme. We have studied the enhanced header compression scheme in ROHC. We will show that indication of compression context values preventing from packet losses can provide the fast recovery of compression state. Computer simulations show that the proposed scheme has better performance than the previous one.
  • 24.

    Improved Resource Management Scheme for Multiclass Services in IP Networks

    김종겸 , 이계임 , Soon Key Jung and 1 other persons | 2005, 10(5) | pp.199~208 | number of Cited : 0
    Abstract PDF
    In this thesis, we have proposed an extended resource management mechanism that optimizes the QoS of multimedia service by complementing the existing resource management mechanism used in IP networks. The proposed resource management mechanism is composed of Traffic Scheduler which was designed based on statistic analysis of the distribution of user traffic occurrence, Traffic Monitor Unit, Bandwidth Allocation Unit, Queue Controller, and Traffic Classifier. In order to confirm the validity of the proposed resource management mechanism, its performance was analyzed by using computer simulation. As a result of performance analysis, its availability was proved.
  • 25.

    Distance Estimation Method between Two Nodes in Wireless Sensor Networks

    Oh-Heum Kwon , Sook-Yeon Kim | 2005, 10(5) | pp.209~216 | number of Cited : 1
    Abstract PDF
    In wireless sensor networks, an estimation method is proposed for distances between nodes within two hops. The method uses only proximity information of nodes without physical distance measurements. It drastically improves the performance of localization algorithms based on proximity information. In addition, it is the first method that estimates distances between nodes exactly in two hops. The distances are estimated from the number of common neighbors under an assumption that the number of common neighbors is proportional to the intersection of two unit disks centered at the two nodes. Simulation analysis shows that the estimation error is roughly from 10 to 20 percent of real distances. Meanwhile, the number of messages required by a distributed algorithm realizing this method is only two times the number of nodes.
  • 26.

    A Study of Security Method against Attack in TCP/IP

    Dae-Woo Park , Seo Jeong-Man | 2005, 10(5) | pp.217~226 | number of Cited : 19
    Abstract PDF
    In today’s cyberworld, network performance is affected not only by an increased demand for legitimate content request, but also by an increase in malicious activity. In this paper, we research that network performance was affected by an increase in malicious Hacker who make DoS Attack, DDoS Attack, SYN Flooding, IP Spoofing, etc. in using TCP/IP. We suggest that Packet filtering in Network Level, Gateway Level, Application Level against to protect by Hacker`s attack. Also, we suggest that content distribution in Web Server approaches to mitigate Hacker`s activity using Cache Sever, Mirror Sever, CDN. These suggests are going to use useful protection methode of Hacker`s attack.
  • 27.

    Improved Hierarchical Prefix Delegation Protocol for route optimization in nested NEMO

    Rho, KyungTaeg | 2005, 10(5) | pp.227~236 | number of Cited : 0
    Abstract PDF
    Hierarchical Prefix Delegation (HPD) protocol refers to a type of solution to problems inherent in non-optimal routing which occurs with Network Mobility (NEMO) basic solution. However, because HPD cannot improve the micro-mobility problems, problem surfaces each time Mobile Network Node (MNN) changes the attachment point; as happens also in a Mobile IPv6 (MIPv6) protocol in sending Binding Update (BU) messages to Home Agent (HA) / Correspondent Nodes(CNs). By applying Hierarchical Mobile IPv6 protocol concept to HPD, this study proposes an algorithm for effectively handling micro-mobility problems which occur with HPD in a nested NEMO environment. By sending BU only to nearby Mobility Anchor Point(MAP) during MNN location change within a MAP's domain, the proposed protocol will alleviate service disruption delays and signaling loads during the handover process, overcoming the limitations of HPD.
  • 28.

    A Study of VoIP Secure Gateway

    Dae-Woo Park | 2005, 10(5) | pp.237~242 | number of Cited : 1
    Abstract PDF
    IP-Internet Telephony Service has not yet been achieved that of operating an IP-PBX service and a consumer Internet telephone services using VoIP technologies. In this paper, i suggest that the technologies of the VoIP Secure Gateway have connecting and securing for IP-Internet Telephony Service which makes IP telephony protocols, firewall VPN tunneling, using Application Level Gateway, connection of the VoIP Secure Gateway. I suggest of telecommunication technologies that are enables an enterprise IP-PBX service to interoperate with a consumer IP telephony service through a firewall. Also, I have proposed the solutions of security problems which was the security for VoIP Secure Gateway.
  • 29.

    A Study on The UnSafe Packet Drop and Delay of Multimedia Traffics

    임청규 | 2005, 10(5) | pp.243~248 | number of Cited : 0
    Abstract PDF
    A network of Packet based switch Mode will be required to carry the traffics(CVR,VBR, UBR, ABR) generated by a wide range of services. Packet based Network services the Quality-of-Service (QoS) management of traffic sources and bandwidth. Besides efficiency and throughput services are achieved in the multimedia traffic sent in the network. In this paper, the scheduler transmits the safe packet, drop the unsafe packet and evaluate unsafe packet as the requirement of the delay avoiding the network congestion for improving the QoS of the multimedia network. In this paper, we propose the scheduling algorithm which evaluates and drops the packet . The suggested model performance of the switch is estimated and simulated in terms of the delay by computer.
  • 30.

    Sucess Strategy for IT Industry Promotion in Yongin Region

    Choi Chong-Ho , Jongsoo Yoon | 2005, 10(5) | pp.249~256 | number of Cited : 1
    Abstract PDF
    In this paper, we investigate the strategy for the promotion of IT industry in Yongin region and suggest some directions for operations strategy of them. we divide the strategy into centralization of supporting facilities, construction of supporting network, development of region based firm, and modernization of marketing/logistics based on the result of the previous study on the 19 critical success factors. The strategy foactors are analyzed by AHP and evaluated by the three groups(IT firms, local government official worker, professor) which have an influence on IT policy. This research contribute to assist planners and policy-makers in supporting IT industry by providing useful information about the suggested strategy, and by suggesting the effective means to assist the IT industry.
  • 31.

    An Empirical Study on the Weight of Purchasing Factors?according the Purchasing Style Using the AHP

    Kim, Shin Joong | 2005, 10(5) | pp.257~268 | number of Cited : 5
    Abstract PDF
    The primary research objective of this study is to evaluate a weight of purchase decision making factors according to the purchasing style. In this study, the purchasing style is classified into two categories-online shopping and offline shopping group. This study adopts the AHP method to calculate a weight of factors. For this purpose, 22 purchasing factors which affect on consumer purchasing decision making are classified into four factors - a product related factor, a convenience related factor, a purchasing risk related factor and a shopping enjoyment related factor. In this study, the weights of purchasing factors are evaluated according to 1)the purchasing style-online and offline purchasing group, 2)the frequency of online shopping-high and low group, 3)the media used for online shopping-the TV home shopping and Internet home shopping group. The result shows that there are difference the weight of factors according to the purchasing style.
  • 32.

    A Study on the Database Marketing using Data Mining in the Traditional Medicine

    lee sang young , Lee Yun Seok | 2005, 10(5) | pp.269~278 | number of Cited : 1
    Abstract PDF
    This study is to elicit the factors affected on the medical examination in the traditional medicine using the technical method of the decision tree and characterize the patient subject by clustering analysis technique. And to draw results from the association analysis between the form of diseases in the re-hospitalized patient group. The obtained results were analyzed for their effect on the hospital profits. Thus, through application of the database marketing to the data mining technique in the traditional medicine, the characteristics of patient clients for the objective induction of factors affected on the hospital profits can be identified. Practical application of the database marketing as presented in this study will bring about a fundamental efficiency of hospital management and vitalization.
  • 33.

    The Appraisal and Political Suggestion of Korea⋅Chile FTA

    Lee Keun Young | 2005, 10(5) | pp.279~288 | number of Cited : 1
    Abstract PDF
    FTA is the key post in international trade policy together with WTO. This paper studies the appraisal of bilateral Free Trade Association among Korea and Chile which has been started from April of last year. After FTA our actual results of export to Chile has been increased as forecasted but import from Chile hasn't increased as anxiety. Also KoreaChile FTA gives us a political suggestion for propulsion of FTA with another countries hereafter.
  • 34.

    The Enhancement of Customer Royalty through Website Design

    김갑식 , Lee,Kwang-Jae | 2005, 10(5) | pp.289~298 | number of Cited : 2
    Abstract PDF
    Recently, e-Biz Companies are paying attention to e-CRM in an effort to utilize meaningful customers' information obtained using their websites. e-Biz companies try to increase the profit by collecting customers' data, serving customers better through interactive communications and differentiating customers' management using their websites. Although it is found that corporates' websites play a critical role in e-CRM, only a few researches have been conducted related to the effective website design. In this study, desirable website design factors were identified through literature review, and an empirical study was conducted to identify how these factors are related to customer's loyalty measured via customer's intention for continuous use and recommendation the website to others. Also this study was designed to suggest a benchmark for the companies which plan to build a website for e-CRM in the future.
  • 35.

    A Study on Regional Approaches in Seoul city & Bucheon city of the Culture Industry??

    전태석 | 2005, 10(5) | pp.299~310 | number of Cited : 0
    Abstract PDF
    In this paper, as the culture industry rises as the new scale of the nation's competivity, it is moving from the national standard to regional standard, and the demands of the regions and people for the culture industry, also known as the entertainment industry, are increasing. Also, the study executed an empirical analysis on regional approaches and efficiency of the approaches for the development of culture industry in Korea. The followings show the summarized results of the study. The culture is changed by the social and economical conditions, and the culture industry is changed by changes in culture consumers and introduction of cultural policies. Under the social conditions, the rise of mass culture in big cities appear as the influencive factors and the rise of mass culture in small towns also work as the influencive factors but the people of the small towns emphasize the culture lifestyles. The shows that the big cities emphasize the masses but on the other hand, the small towns emphasize the lifestyles. Under the economical conditions, the diversification of culture distributions, culture commercialization, and culture cluster show to be the influencive factors in the big cities. Even in the small towns, the diversification of culture distributions and culture commercialization work as the influencive factors but the culture cluster could not have any influences.
  • 36.

    An Implementation and Verification of Performance Monitor for Parallel Signal Processing System

    Won Joo Lee , KIM, Hyo-Nam | 2005, 10(5) | pp.311~320 | number of Cited : 0
    Abstract PDF
    In this paper, we implement and verify performance monitor for parallel signal processing system, using DSP Starter Kit(DSK) of which the basic processor is TMS302C6711 chip. The key ideas of this performance monitor is, using Real Time Data Exchange(RTDX) for the purpose of real-time data transfer and function of DSP/BIOS, the ability to measure the performance measure like DSP workload, memory usage, and bridge traffic. In the simulation, FFT, 2D FFT, Matrix Multiplication, and Fir Filter, which are widely used DSP algorithms, have been employed. Using performance monitor and Code Composer Studio from Texas Instrument(TI), the result has been recorded according to different frequencies, data sizes, and buffer sizes for a single wave file. The accuracy of our performance monitor has been verified by comparing those recorded results.
  • 37.

    Design and Implementation of e-Learning System with Dynamic Learning Contents Provision and Real-Time Assignment Evaluation

    Jung-Sook, Kim , 이희영 | 2005, 10(5) | pp.321~330 | number of Cited : 0
    Abstract PDF
    In this paper, we design and implement an e-Learning system with dynamic learning contents providing and real-time assignment system. The learner can select the dynamic learning contents providing environments with test and Quiz phase according to the learners' characters and interest to improve the learning effects. Also, we develop the real-time assignment system which is composed of multiple choice and essay test and can provide the interaction between teacher and learner immediately.
  • 38.

    Design of Character-based Conversational Instruction-Learning System Design for Science Education of Elementary School

    Park, Hyun-Jung , Kwang Baek Kim | 2005, 10(5) | pp.331~340 | number of Cited : 0
    Abstract PDF
    This paper proposes a method, which recognizes student's identification card by using image processing and recognition technology and can manage student information on the web. The presented scheme sets up an average brightness as a threshold, based on the brightest pixel and the least bright one for the source image of the ID card. It is converting to binary image, applies a horizontal histogram, and extracts student number through its location. And, it removes the noise of the student number region by the mode smoothing with 33 mask. After removing noise from the student number region, each number is extracted using vertical histogram and normalized. Using the enhanced ART1 algorithm recognized the extracted student number region. In this study, we propose the enhanced ART1 algorithm different from the conventional ART1 algorithm by the dynamical establishment of the vigilance parameter, which shows a tolerance limit of unbalance between voluntary and stored patterns for clustering. The Experiment results showed that the recognition rate of the proposed ART1 algorithm was improved much more than that of the conventional ART1 algorithm. So, we develop an educational matters administration system by using the proposed recognition method of the student's identification card.
  • 39.

    Design of Character-based Conversational Instruction-Learning System Design for Science Education of Elementary School

    정상목 , Ki-Sang Song | 2005, 10(5) | pp.341~350 | number of Cited : 1
    Abstract PDF
    The existing CAI or web-based science learning system of elementary school has some disadvantages. For instance, it is composed of uniform courses designed by an instructor without considering the learner's characters, and the learner's opinions or questions raised during learning can not be delivered to the system. This structure has diminished the willingness or the motive of the learner and make an adverse effect on the learning efficiency. In this regards, Instruction-Learning System is needed to provide learning environment pertinent to the learner's individual character and motivate the learner's active attendance and learning. This study is to design a character-based conversational Instruction-Learning System. This may induce the learner's active attendance through the communications between instructor and learner and furnish various learning materials to motivate the learners and attract their consistent interests in learning.
  • 40.

    Design and Implementation of a Bimodal User Recognition System using Face and Audio

    MyungHoonKim , Jung, Sung-Tae , 이지근 and 1 other persons | 2005, 10(5) | pp.351~360 | number of Cited : 6
    Abstract PDF
    Recently, study of Bimodal recognition has become very active. In this paper, we propose a Bimodal user recognition system that uses face information and audio information. Face recognition consists of face detection step and face recognition step. Face detection uses AdaBoost to find face candidate area. After finding face candidates, PCA feature extraction is applied to decrease the dimension of feature vector. And then, SVM classifiers are used to detect and recognize face. Audio recognition uses MFCC for audio feature extraction and HMM is used for audio recognition. Experimental results show that the Bimodal recognition can improve the user recognition rate much more than audio only recognition, especially in the presence of noise.