Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2006, Vol.11, No.2

  • 1.

    A RTL Binding Technique and Low Power Technology Mapping consider CPLD

    Jaejin Kim | Kwan Hyeong, Lee | 2006, 11(2) | pp.1~6 | number of Cited : 0
    Abstract PDF
    In this paper, a RTL binding technique and low power technology mapping consider CPLD is proposed. Allocation processing selected module consider the module calculation after scheduling process for circuit by HDL. Select CPLD for constrain after allocation. A Boolean equation is partitioned for CLB by allocated modules. The proposed binding algorithm is description using optimum CLB within a CPLD consider low power. The proposed algorithm is examined by using 16 bit FIR filter. In the case that applicate the algorithm, the experiments results show reduction in the power consumption by 43% comparing with that of non application algorithm.攀제1저자 : 김재진교신저자 : 이관형접수일 : 2006.2.3, 심사완료일 : 2006.5.18*극동정보대학 컴퓨터정보과 교수, **청주대학교 전자정보공학부 전임강사攀攀
  • 2.

    Efficient Ontology Object Model for Semantic Web

    Bo-Hyun Yun | ChangHo Seo | 2006, 11(2) | pp.7~14 | number of Cited : 5
    Abstract PDF
    The advent of Semantic Web has generated several methods that can access the data on the web. Thus, it is necessary to handle the data by accessing the current web ontology as well as the existing knowledge base system. Web ontology languages are RDF(Resource Description Framework), DAML-OIL, OWL(Web Ontology Language), and so on. This paper presents the creation and the method of the ontology object model that can access, represent, and process the web ontology and the existing knowledge base. Unlike the existing access approach of web ontology using the model on memory constructed by each parser, we divide the model of web ontology into three layers such as frame-based ontology layer, generic ontology layer, and functional ontology layer. Generic ontology layer represents the common vocabulary among several domains and functional ontology layer contains the dependent vocabulary to each ontology respectively. Our model gets rid of the redundancy of the representation and enhances the reusability. Moreover, it can provide the easy representation of knowledge and the fast access of the model in the application.
  • 3.

    Classification Techniques for XML Document Using Text Mining

    Cheonshik Kim | Hong you sik | 2006, 11(2) | pp.15~24 | number of Cited : 5
    Abstract PDF
    Millions of documents are already on the Internet, and new documents are being formed all the time. This poses a very important problem in the management and querying of documents to classify them on the Internet by the most suitable means. However, most users have been using the document classification method based on a keyword. This method does not classify documents efficiently, and there is a weakness in the category of document that includes meaning. Document classification by a person can be very correct sometimes and often times is required. Therefore, in this paper, We wish to classify documents by using a neural network algorithm and C4.5 algorithms. We used resume data forming by XML for a document classification experiment. The result showed excellent possibilities in the document category. Therefore, We expect an applicable solution for various document classification problems.
  • 4.

    Object/Non-object Image Classification Based on the Detection of Objects of Interest

    SungYoung Kim | 2006, 11(2) | pp.25~34 | number of Cited : 1
    Abstract PDF
    We propose a method that automatically classifies the images into the object and non-object images. An object image is the image with object(s). An object in an image is defined as a set of regions that lie around center of the image and have significant color distribution against the other surround (or background) regions. We define four measures based on the characteristics of an object to classify the images. The center significance is calculated from the difference in color distribution between the center area and its surrounding region. Second measure is the variance of significantly correlated colors in the image plane. Significantly correlated colors are first defined as the colors of two adjacent pixels that appear more frequently around center of an image rather than at the background of the image. Third one is edge strength at the boundary of candidate for the object. By the way, it is computationally expensive to extract third value because central objects are extracted. So, we define fourth measure which is similar with third measure in characteristic. Fourth one can be calculated more fast but show less accuracy than third one. To classify the images we combine each measure by training the neural network and SVM. We compare classification accuracies of these two classifiers.
  • 5.

    Performance Analysis of a Multiprocessor System Using Simulator Based on Parsec

    Lee, Won Joo | KimHyeongRae | Sun-Wook Kim | 2006, 11(2) | pp.35~42 | number of Cited : 0
    Abstract PDF
    In this paper, we implement a new simulator for performance analysis of a parallel digital signal processing distributed shared memory multiprocessor systems, using Parsec. The key idea of this simulator is suitable in simulation of system that uses DMA function of TMS320C6701 DSP chip and local memory which have fast access time. Also, because correction of performance parameter and reconfiguration for hardware components are easy, we can analyze performance of system in various execution environments. In the simulation, FFT, 2D FFT, Matrix Multiplication, and Fir Filter, which are widely used DSP algorithms, have been employed. Using our simulator, the result has been recorded according to different the number of processor, data sizes, and a change of hardware element. The performance of our simulator has been verified by comparing those recorded results.
  • 6.

    Design and Implementation of Spatial Characterization System using Density-Based Clustering

    Jaehyun Yoo | JUHONG LEE | JUNSIK HONG and 3other persons | 2006, 11(2) | pp.43~52 | number of Cited : 0
    Abstract PDF
    LRecently, with increasing interest in ubiquitous computing, knowledge discovery method is needed with consideration of the efficiency and the effectiveness of wide range and various forms of data. Spatial Characterization which extends former characterization method with consideration of spatial and non-spatial property enables to find various form of knowledge in spatial region. The previous spatial characterization methods have the problems as follows. Firstly, former study shows the problem that the result of searched knowledge is unable to perform the multiple spatial analysis. Secondly, it is unable to secure the useful knowledge search since it searches the limited spatial region which is allocated by the user. Thus, this study suggests spatial characterization which applies to density based clustering.
  • 7.

    A Wavelet-based Adaptive Image Watermarking Using Edge Table

    Rhee, Jay Hyuk | Hoseok Moon | Park Sangsung and 1other persons | 2006, 11(2) | pp.53~64 | number of Cited : 5
    Abstract PDF
    A discrete wavelet transform(DWT)-based image watermarking algoritmm is proposed in this paper. the proposed method decompose the original image into four subsampled images. Subsampled images are transformed by 2 level DWT, respectivelty. The proposed method embeds the watermark into one of the subsampled DWT images using edge table that represents dege chracteristics of the original image. Without an original image, a watermark is extracted through comparison one subsampled DWT image inserted the watermark with the rest of the submapled DWT images. many exiting methodes do not adequately estimate edge regions where intensities are changed abruptly. The proposed method address with an edge table. Also, even if the watermark is embedded into a low frequency area, our method preserves the image quality. The vality of the proposed method is demonstrated through the PSNR test and subjective image quality that human eyes feel.
  • 8.

    A Study on the Virtual University using Full Duplex Method

    Hong you sik | 2006, 11(2) | pp.65~74 | number of Cited : 0
    Abstract PDF
    It is very difficult for the teacher to know who understands the lecture or not in the classroom. Therefore, in this paper, it proposed the algorithm of student score evaluation algorithm using full duplex method. Moreover, it confirms that full duplex method using fuzzy rules and neural network can tell where misunderstanding of the problems in the test. The computer simulation results shows that the full duplex virtual learning system has been proven to be much more efficient than one way traditional method which unfortunately does not consider the students understanding.
  • 9.

    Design of Enterprise Security Management System for Intrusion Prevention in Distributed Environment

    이창우 | Kim,Seok-Hoon | Jung Gil Song | 2006, 11(2) | pp.75~82 | number of Cited : 2
    Abstract PDF
    The service use management for keeping up stable and effective environment is hard little by little by according to increase of internet user and being complicated network environment of the Internet little by little, being various of the requirements of the service which is provided and the user demand. And the beginning flag security was limited in IDS, But recently the integrated civil management is coming to be considered seriously according to adventting IDS, Firewall, Security of system. The development of integrated security civil management system to analyze widely through observation and detection at Network or host base, the judgment of attack, and integrated analysis of infiltration information is necessary because of detecting the various type attack.
  • 10.

    Image Disparity Estimation through Type-based Stereo Matching

    Gyeyoung Kim | SeokWoo Jang | 2006, 11(2) | pp.83~92 | number of Cited : 1
    Abstract PDF
    This paper describes an image disparity estimation method using region-based stereo matching. Region-based disparity estimation yields a disparity map as the unit of segmented region. However, it estimates disparity imprecisely because it not only has matching errors but also applies an identical way to disparity estimation, which does not consider each type of matched regions. To solve this problem, we proposes a disparity estimation method which considers the type of matched regions. That is, the proposed method classifies whole matched regions into a similar-matched region, a dissimilar-matched region, a false-matched region and a miss-matched region. We then performs proper disparity estimation for each type of matched regions. This method minimizes the error in estimating disparity which is caused by inaccurate matching and also improves the accuracy of disparity of the well-matched regions. The experimental results show the improved accuracy of the proposed method.
  • 11.

    A Study on the Relation between Taxonomy of Nominal Expressions and OWL Ontologies

    Dogyu Song | 2006, 11(2) | pp.93~100 | number of Cited : 0
    Abstract PDF
    Ontology is an indispensable component in intelligent and semantic processing of knowledge and information, such as in semantic web. Ontology is considered to be constructed generally on the basis of taxonomy of human concepts about the world. However, as human concepts are unstructured and obscure, ontology construction based on the taxonomy of human concepts cannot be realized systematically furthermore automatically. So, we try to do this from the relation among linguistic symbols regarded representing human concepts, in short, words. We show the similarity between taxonomy of human concepts and relation among words. And we propose a methodology to construct and generate automatically ontologies from these relations among words and a series of algorithm to convert these relations into ontologies. This paper presents the process and concrete application of this methodology.
  • 12.

    Vehicle Location Data Generator based on a User

    Youngjin Jung | RYU KEUN HO | Eun-Sun Cho | 2006, 11(2) | pp.101~110 | number of Cited : 0
    Abstract PDF
    ADevelopment of various geographic observations, GPS, and Wireless Communication technologies make it easy to control many moving objects and to build an intelligent transport system and transport vehicle management system. However it is difficult to make a suitable system in the real world with a variety of tests to evaluate the performance fairly because real vehicle data are not enough as evaluating and testing the transport plan in the system. Therefore some moving object data generator would be used in most researches. However they can not generate vehicle trajectory according to a user scenario defined to be applied to transport plan, because the existing data generators consider only a gauss distribution, road network. In this paper we design and implement a vehicle data generator for creating vehicle trajectory data based on the user-defined scenario. The designed data generator could make the vehicle location depending on user's transport plan. Besides we store the scenario as patterns and reutilize the used scenario.
  • 13.

    Video Abstracting Using Scene Change Detection and Shot Clustering for Construction of Efficient Video Database

    SeongYoon Shin | Pyo,Sung-Bae | 2006, 11(2) | pp.111~120 | number of Cited : 1
    Abstract PDF
    Video viewers can not understand enough entire video contents because most video is long length data of large capacity. This paper propose efficient scene change detection and video abstracting using new shot clustering to solve this problem. Scene change detection is extracted by method that was merged color histogram with χ2 histogram. Clustering is performed by similarity measure using difference of local histogram and new shot merge algorithm. Furthermore, experimental result is represented by using Real TV broadcast program.
  • 14.

    The Study for Traffic Signal Control Expert System using Case-based system and Rule-based system

    서정훈 | 2006, 11(2) | pp.121~130 | number of Cited : 2
    Abstract PDF
    Rule-based Expert system using Fuzzy technique inferences various rules by user's input condition and the most proper control signal. This system can lose objectivity by input condition which depends on user's decision. This paper can solve those problems by adding case-based system's technique. The traffic signal control expert system is proposed to store the cases based on the statistics, days, seasons and various circumstances and use them.
  • 15.

    A Concurrency Control Method using Optimistic Control in Mobile Computing DB Environment

    조성세 | 2006, 11(2) | pp.131~144 | number of Cited : 1
    Abstract PDF
    The rapid growth of mobile communication technology has provided the expansion of mobile internet services, particularly mobile realtime transaction takes much weight among mobile fields. Current mobile transaction service has serious problems which check its development, such as low bandwidths, hand over, expensive charge system, and low response time. but, There is an increasing demand for various mobile applications to process transactions in a mobile computing fields. In mobile computing environments, A mobile host computing system demands for new concurrency control method to use the bandwidth efficiently, to improve the bottleneck and the response time of transactions. This study suggests about an efficient concurrency control in a mobile computing environment. Concurrency control method in existing method uses two phases locking method. In this method, Many clients can't use the same segment simultaneously, and so useless waiting time increases. The characteristic of this proposed method unlike existing one, Enable the transaction approaching different data in the same segment to minimize the useless waiting time by permitting segments, and therefore improves the coexistence of system. Also, It shows the algorithm of the proposed concurrence control method.
  • 16.

    Study of an Accurate and Efficient Data Integration for Decision Making in Data Management of Ubiquitous

    Hyun Chang Lee | 2006, 11(2) | pp.145~152 | number of Cited : 1
    Abstract PDF
    In conjunction with the rapid progress of IT(information technology), an increasing amount of data are being generated. The amount of new data is so big and the type of new data generated from clients or sensor devices needed to be in ubiquitous environment is so various that it is hard to manage and control them. Especially, data to be occurred in ubiquitous environment are generated through PDA(personal digital assistant), smart phone, mobile device or sensor units etc. Therefore, to manage and control them generated from ubiquitous devices for decision making, we can use data warehouse as an integrated storage. A data warehouse integrates and aggregates data of several different DBMS into one DBMS. Also the updated data from source data have to be effectively propagated to the data warehouse. Therefore, in this paper, we proposed a model for an exact and efficient data management methodology in new IT paradigm environment, ubiquitous computing environment, to apply updated data on the warehouse to make decision. We also show brief result compared to conventional methodology.
  • 17.

    Real-Time Evaluation System Using User Profile for Acquisition of A Computer Certificate of Qualification

    김영례 | Rhee Yang Weon | 2006, 11(2) | pp.153~158 | number of Cited : 5
    Abstract PDF
    The effect of solving questions and learning via internet is getting more and more important these days. In this paper we propose an active learning method that makes a database for the information about certificates and practical examinations and accesses it easily. First of all, this method makes it possible to evaluate students individually, improves the motive of learning and gives students a sense of achievement by providing a user-specific question filtering technique using user profile information by weight. And, it elevates the acquisition rate of certificates by advising and managing for certificate-acquisition and it also draw more interest and understanding for future directions. The case using the method of this paper, the examination record of a certificate of qualification is elevated about 10 marks.
  • 18.

    Design of an Efficient VLSI Architecture and Verification using FPGA-implementation for HMM(Hidden Markov Model)-based Robust and Real-time Lip Reading

    이지근 | MyungHoonKim | Sang Seol. Lee and 1other persons | 2006, 11(2) | pp.159~168 | number of Cited : 2
    Abstract PDF
    Lipreading has been suggested as one of the methods to improve the performance of speech recognition in noisy environment. However, existing methods are developed and implemented only in software. This paper suggests a hardware design for real-time lipreading. For real-time processing and feasible implementation, we decompose the lipreading system into three parts; image acquisition module, feature vector extraction module, and recognition module. Image acquisition module capture input image by using CMOS image sensor. The feature vector extraction module extracts feature vector from the input image by using parallel block matching algorithm. The parallel block matching algorithm is coded and simulated for FPGA circuit. Recognition module uses HMM based recognition algorithm. The recognition algorithm is coded and simulated by using DSP chip. The simulation results show that a real-time lipreading system can be implemented in hardware.
  • 19.

    Simplified projective transform for reconstruction of cylindrical panorama

    KangHo-Lee | 2006, 11(2) | pp.169~176 | number of Cited : 3
    Abstract PDF
    In this paper we propose a method of reconstruction of cylindrical panorama using simplified projective transform from the panning image on the fixed camera. For the practical construction of cylindrical panorama we consider the rotation of the camera on the Y-axis only, even though considering the rotation components on all of the X,Y,Z axis on three-dimensional space for projective transform between general panoramas. The restriction mentioned above simplifies projective transform with existing 8 degrees of freedom into the one with 4 degrees of freedom. In the results, overall computation for projective transform can be decreased to the great extents in quantity, because the number of corresponding points required for inducing the transforming formula is gone down by half. Proposed algorithm from the simulation carried out in this paper shows similar performance and decreased computational quantity compared with existing algorithm. Also, it shows the construction of cylindrical panorama using simplified projective transform.
  • 20.

    The Development of Authoring Tool for 3D Virtual Space Based on a Virtual Space Map

    Il-Hong Jung | 김은지 | 2006, 11(2) | pp.177~186 | number of Cited : 0
    Abstract PDF
    This paper presents the development of a certain highly efficient authoring tool for constructing realistic 3D virtual space using image-based rendering techniques based on a virtual space map. Unlike conventional techniques such as TIP, for constructing a small 3D virtual space using single image, the authoring tool developed herein produces a wide 3D virtual space using multiple images. This tool is designed for constructing each small 3D virtual space for each input image, and for interconnecting these 3D virtual spaces into a wide 3D virtual space using a virtual space map. The map consists of three elements such as specific room, link point and passageway, and three directions. It contains various information such as the connection structure, the navigation information and so on. Also, the tool contains a user interface that let users construct the wide 3D virtual space easily.
  • 21.

    Design and Implementation of user centric pavilion information guide system based on commercial mobile device

    윤현주 | Choi Yoo Joo | 부소영 | 2006, 11(2) | pp.187~200 | number of Cited : 2
    Abstract PDF
    This paper proposes the design of user centric pavilion information guide system based on mobile device such as PDA, which is composed of system interface factors as user wants. The suggested information guide system is convenient for user carrying because it is based on PDA mobile device and the used liquid browser system makes all data information displayed on a small screen in contrast with the other browser system. Indeed, factors of system interface can be dynamically re-composed by user interaction. And this system can effectively provide the detail information about the exhibited objects as various media data such as text, image, voice, music, video etc. The proposed system is made up of media database server, mobile system control server and mobile system interface which accepts user interaction and displays the information. Each system is networked based on TCP/IP and uses XML (eXtensible Markup Language) and JAVA 2 micro edition to be able to update data. This feature enhances a wide use to be able to load this system on the any mobile device.
  • 22.

    Performance Analysis of the Open Loop Transmitter and Receiver Diversity in the Wide Band CDMA network

    PARK SANGJO | 노용우 | 2006, 11(2) | pp.201~212 | number of Cited : 0
    Abstract PDF
    The standardization of third Generation Partnership Project(3GPP) has been performed in order to support interactive multimedia services under mobile environments. In this 3GPP, transmit diversity solutions are applied to increase the available diversity effectively using 2 or more antennas. In this paper, we analyzer the performances on STTD(Space Time Transmit Diversity) technique and its modified techniques such as STTD-OTD, CL-STTD, and 4TX-STTD out of open loop transmit diversities that the standardization of 3GPP has released. We also propose the open loop transmitter and receiver diversities to add the receiver diversity. We analyze and discuss the performance of the proposed techniques and using the Matlab simulation under the flat fading channel environment.
  • 23.

    A Study on performance improvement of the Proportional Gain Adaptive MMSE Detector

    유동관 | 2006, 11(2) | pp.213~222 | number of Cited : 0
    Abstract PDF
    In this paper, an improved detection method is proposed by supplementing various types of Proportional gain for a MMSE detecter. This method is proposed to complement the shortcomings of the conventional detection method which is used for multiuser detection in STBC(Space-Time Block Code) CDMA system. We analyzed the improved method in bit error probability viewpoint and compared the result with that of the conventional method. In this result, we showed that the improved method obtains better performance of bit error probability than the conventional method when parameters such as delay, number of user and SNR are increased.
  • 24.

    Inter-domain Authentication Mechanism using MIPv6 in Portable Internet Environments

    Jeong Yoon Su | Sung-Hee, Woo | Lee, Sang-ho | 2006, 11(2) | pp.223~230 | number of Cited : 3
    Abstract PDF
    Portable Internet is a new service providing a high-speed wireless Internet service. The high-speed wireless Internet service guarantees terminal mobility. Portable Internet is expected to commercialize in 2006. Network expansion and terminal mobility should be guaranteed in order to efficiently introduce and distribute portable Internet service. Accordingly, the thesis suggests a mechanism which applies mobile IPv6 technology and supports inter-domain authorization In order to guarantee expansion and mobility of portable Internet. The suggested mechanism applies diameter protocol to the mobile IPv6 to improve securities. Also, The suggested mechanism safely transmits data at the minimal signal number, to guarantee the data secrecy.
  • 25.

    The Expanded XrML Model for Dynamic Digital License Management

    Youngjin Lee | Hyung Jin Moon | Lee, Sang-ho | 2006, 11(2) | pp.231~238 | number of Cited : 0
    Abstract PDF
    As digital contents circulation environment goes on-line by fast development of the latest Internet, contents demand is growing rapidly. However, XrML hard to change dynamically and has controversial point that hard to reflect user's request maximum after create license and issues to user. in this paper study of active digital license administration model who can reflect user request dynamically and support reusability of license XrML eXrML model who design extension design and suggested. Expect that this presents efficient administration plan in administration study of license base as well as study for digital contents administration.
  • 26.

    ID-based signcryption with improved security

    곽병옥 | Lee, Sang-ho | Jeong Yoon Su | 2006, 11(2) | pp.239~252 | number of Cited : 0
    Abstract PDF
    Zheng’s signcryption scheme is a new encryptical scheme of which can save more expense than those of the current signature encryption by using digital signature and symmetric key encryption logically. The current signcryption schemes have a problem that is to be exposed the secret key of the receiver in the case of checking repudiation of origin by the third party. To solve this problem, a solution suggested in this paper is to use multi-purpose ID-based signcryption scheme with anonymity and unlinkability. This solution is safe and more efficient than current signcryption schemes because the suggested scheme keeps the security of the random oracle model as using Weil-pairing in encryption, and follows a formal proof of semantic security of the decisional Diffie-Hellman problem.
  • 27.

    A P2P Multimedia Streaming Protocol Using Multiple-Peer Binding

    Eui-Hyun Jung | 2006, 11(2) | pp.253~262 | number of Cited : 4
    Abstract PDF
    In spite of the popularity of P2P technology, a multimedia streaming using the P2P technology has been neglected. The reason for this is that the P2P multimedia streaming has suffered from several inherent problems especially poor bandwidth and unreliable connection among peers. We suggest a Multi-Peer Binding Protocol (MPBP) in this paper that provides a virtual single channel composed of multiple connections to several peers to ease these problems. The protocol enables applications to download data from multiple peers simultaneously, so they can achieve throughput improvement and reliable streaming. For this, the MPBP splits media files into small chunks and provides a mechanism for identifying and transmitting each chunk. Implemented MPBP engine focuses on handling an abrupt disconnection from data sending peers and the evaluation result shows the MPBP is able to handle it gracefully. The MPBP is also designed to support various media types. To verify this, video and audio applications are implemented using the MPBP engine in this paper.
  • 28.

    The Development of Content Management System for Culture & Tourism Based on Recursive Relation Object Mode

    Shin Dong Suk | 2006, 11(2) | pp.263~274 | number of Cited : 2
    Abstract PDF
    The remarkable development of the internet causes us to have too many homepages and content, to be specialized and subdivided, and to need 'CMS' (Content Management System). Currently, CMS have been developed by many solution providers and studied in many ways. However, it is hard to find a system which is able to construct the specified Culture & Tourism content rapidly and managed them efficiently. Step on these requirement, this paper focus on design and implementation of unified CMS based on recursive relation object model which can be satisfied the demand of the usual people's information service of Culture & Tourism and which can be installed and managed the standardized Culture & Tourism content easily.
  • 29.

    Design and Implementation of a Copyright Protection System base on the Program on-line Registration System

    장재혁 | 이종섭 | Choi,Yong-Rak | 2006, 11(2) | pp.275~284 | number of Cited : 0
    Abstract PDF
    Writers enroll their outcome to Program Deliberation & Mediation Committee and get the copyright preserved for the protection of IPR. The program registration is conducted through off-line and on-line methods, and especially on-line registration provides program registrants convenience along with the safety of property from external copyright invaders. However, it is a shortcoming that the integrity and confidentiality of the enrolled program cannot be guaranteed in case of internal factors such as system errors, administrator’s illegal access and revision. This paper proposes the reliable system, ensuring programs and offering convenience of Digital signature management from the system errors and intruding factors by internal administrator, using the security of confidentiality, integrity and Multi-Signature Scheme for program.
  • 30.

    Collaborative Work Applications Development Environment based on Hierarchical Coordination Model using Mobile Agent

    Youngmin Kim | Lee, Sang-ho | 2006, 11(2) | pp.285~294 | number of Cited : 0
    Abstract PDF
    The requirements of Computer Supported Cooperative Work supporting efficient cooperative or collaborative works between multi-users have been increasing in distributed environments. The various technical sections such as group communication technology and distributed processing technology should be provided in Cooperative Work. The replicated development of Cooperative Work applications of a number of common requirements increases development costs enormously and duplicated investment parts. Therefore, systematical development environments are required to develop these common requirements and applications efficiently in Cooperative Work applications development. In this study, we propose the hierarchical role-based coordination model that improves the coordination model of legacy mobile agent to be appropriate in Cooperative Work applications, and design the development environment for Cooperative Work applications based on mobile agent. The proposed hierarchical role-based coordination model provides multi-layered group concepts of mobile agent, and enables implementation of efficient coordination policy per group. Additionally, it supports efficient Cooperative Work application development by role assignment per group unit.
  • 31.

    A Study on the operation cost of physical distribution system with operation strategy of inventory control

    Kim Byeong-Chan | Yang,Dae-Yong | 2006, 11(2) | pp.295~202 | number of Cited : 3
    Abstract PDF
    An operational strategy for inventory control on finished goods in the distribution system has been given attention to many enterprises and many studies regarding this field have been done and is also on-going currently. It handling large scale of smallness type are so the requisition of customer which is various that over it continues more full scale merit. therefore, It is a tendency that many of enterprise is handling small scale of smallness type for environment change confrontation. but It is not easy for the enterprise to In customer demand diversification suiting because too need many cost. In addition, at enterprise charge extra weight because remainder inventory is causes of defective stock for a inefficient problem solution. this paper is rationalization of stock cost decrease for comparison evaluation of small scale quantity handling of singleness type and small scale quantity handling of largeness type.
  • 32.

    A case study on balanced customer segmentation

    Jongwook Yoon | Jongsoo Yoon | 2006, 11(2) | pp.303~318 | number of Cited : 3
    Abstract PDF
    The process of segmenting customers in CRM should take into equal consideration both the companies' and customers' expected value. However, most of the current studies on customer segmentation have focused only on the companies' view in terms of profitability. This study focuses on clarifying a problem and proposing a modified view in the customer segmentation step. The authors offer a proposition which is beneficial to both customers and companies, and thus makes the segmentation step more balanced. There is a two-pronged focus on customer segmentation in this study: first, this paper proposes a balanced view considering not only companies' expected value, but also that of the customers'. Secondly, such balanced segmentation will give a more accurate definition of loyal customers for a given company. This new approach can be expected to improve the level of satisfaction and the length of customer retention, and to increase effectiveness in corporate resource allocation for customer target marketing, as well as improve company insight into customer needs and preferences.
  • 33.

    Analysis of Error Types occurring on Elementary School Student's Programming Learning

    Wae-Shik Moon | 2006, 11(2) | pp.319~328 | number of Cited : 14
    Abstract PDF
    Higher grade elementary school students who have superior cognitive abilities need education of basic principles of computer or programming rather than computer in education. In this study, all the errors occurring while elementary school students wrote and executed programs were collected, in the method of predicting and dealing with possible-to-occur problems on programming education of the higher grades (4th, 5th and 6th grades) during their optionalspecial activities or during talentaptitude activities after school, classified by type and analyzed. If the errors analyzed are put to practical use, optimal programming curriculums could be written and such curriculums could be a great contribution to induction of learning effect and interest on teachinglearning. It was found by analyzing the errors collected for this study that the most of elementary school students during programming felt difficulties in simple errors by poor use of software and in simple coding by poor use of reserved words in English. In the next, students occurred errors by difficulties in understanding grammar. It was exposed that these error types were the opposite phenomena to those analyzed by commercial software developing companies, however, it is predicted that if teachinglearning is getting improved, the same phenomena could be found desirably.
  • 34.

    Analysis of the Behavioral Factor for Constructing Cooperative System of Local Administrators

    Young Hwan Kim | 2006, 11(2) | pp.329~340 | number of Cited : 0
    Abstract PDF
    This study did not only raise the necessity of inter-governmental cooperative relations, but explored the plans to induce the more desirable cooperative relations. Accordingly, the study aimed to explore the plans to induce the desirable inter-local governmental cooperative system for fostering and developing the sound local governmental system by the indexes of human cooperative capacity as policy means for establishing inter-governmental cooperative relations. The findings show that the behavioral factors of local administrators in the process of inter-local governmental cooperation are characterized by the fact that they belong to the necessary factors for inter-governmental cooperation, though different in extent. Based on this, the present study is expected to lay groundwork for the empirical studies of behavioral characteristics of local administrators in the future.
  • 35.

    Implementation of Internet Recruiting Negotiation System using Multi Agents

    Keunsoo Lee | 윤선희 | 2006, 11(2) | pp.341~350 | number of Cited : 1
    Abstract PDF
    These day, Internet Recruiting needs negotiation of recruiting items. So in this paper, Internet Recruiting Negotiation System(IRNS) proposes multilateral negotiation that substitutes applicants and employers. Previous NSS uses preference value of multi-attribute and sequential negotiation. But proposed IRNS uses parallel negotiation of multi-attribute. parallel negotiation supplies multi-attribute negotiation including single-attribute and results of parallel negotiation. This paper proposes effective negotiation using weight strategy of multi-attribute.
  • 36.

    A Study of the Intelligent Connection of Intrusion prevention System against Hacker Attack

    Dae-Woo Park | Seungin Lim | 2006, 11(2) | pp.351~360 | number of Cited : 17
    Abstract PDF
    Proposed security system attacks it, and detect it, and a filter generation, a business to be prompt of interception filtering dates at attack information public information, inner IPS to attack detour setting and a traffic band security, different connection security system, and be attack packet interceptions and service and port interception setting. Exchange new security rule and packet filtering for switch type implementation through dynamic reset memory by real time, and deal with a packet. The attack detection about DDoS, SQL Slammer, Bug bear, Opeserv worm etc. of the 2.5 Gbs which was an attack of a hacker consisted in network performance experiment by real time. Packet by attacks of a hacker was cut off, and ensured the normal inside and external network resources besides the packets which were normal by the results of active renewal.