Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

Home > Explore Content > All Issues > Article List

2006, Vol.11, No.5

  • 1.

    A New Algorithm Based on ASH in Local Modes Detection of Pathrate

    황월 , Yong-Soo Kim | 2006, 11(5) | pp.1~7 | number of Cited : 0
    Abstract PDF
    Network measurement is a vital part of network traffic engineering. In a network, the metric “capacity” characterizes the maximum throughput the path can provide when there is no traffic load, or the minimum transmission rate among all links in a path. Pathrate is one of the most widely used network capacity measurement tools nowadays. It’s famous for its accurate estimation result and nonrestriction of the temporal network traffic condition. After several years of development, its performance becomes more stable and reliable. Extant local modes detection algorithm in pathrate is based on statistic methodology histogram. This paper suggests a new algorithm for local modes detection based on ASH (Averaged Shifted Histogram). We have implemented this algorithm and will prove it can accomplish the same task as the original one with a better result.
  • 2.

    The Study for NHPP Software Reliability Growth Model based on Exponentiated Exponential Distribution

    Kim Hee Chul | 2006, 11(5) | pp.8~18 | number of Cited : 16
    Abstract PDF
    Finite failure NHPP models presented in the literature exhibit either constant, monotonic increasing or monotonic decreasing failure occurrence rates per fault. In this paper, Goel- Okumoto and Yamada-Ohba-Osaki model was reviewed, proposes the exponentiated exponential distribution reliability model, which maked out efficiency substituted for gamma and Weibull model(2 parameter shape illustrated by Gupta and Kundu(2001) Algorithm to estimate the parameters used to maximum likelihood estimator and bisection method, model selection based on SSE, AIC statistics and Kolmogorov distance, for the sake of efficient model, was employed. Analysis of failure using NTDS data set for the sake of proposing shape parameter of the exponentiated exponential distribution was employed. This analysis of failure data compared with the exponentiated exponential distribution model and the existing model(using arithmetic and Laplace trend tests, bias tests) is presented.
  • 3.

    An XML Query Processing Model based on XML View Tree

    Chaiyoung Jung , HyunJu Kim | 2006, 11(5) | pp.19~28 | number of Cited : 0
    Abstract PDF
    This paper presents a query processing model in a wrapper based on the XML view tree. The query processing in a wrapper requires view composition, query translation into local sources, and generation of XML documents from local query results. We present a query processing model based on the view tree, where the XML views and the XML query is represented by the view tree. Since the view tree keeps the structure of a virtual XML document, it is easy to navigate the path expression. The view tree is also used as a template for schema generation and XML document generation as a query result. Moreover this conceptual uniform abstraction for the XML view and the user query makes it easy to support a multi-level XML view and to implement our composition mechanism.
  • 4.

    An Effective P2P Search Algorithm based on Distributed Processing of Multiple Peers

    Boonhee Kim | 2006, 11(5) | pp.29~38 | number of Cited : 2
    Abstract PDF
    The distributed system is used that it's features of the fault tolerance and good performances. One of the distributed systems, a peer-to-peer tech. has high availability to share resources. However when peers wanna share resources, it isn't online like the peer using resources of the search time. Therefore we usually use the re-transmission method to download all resources. It's not good at the performance of the peer-to-peer system so we need to good solution. In this study, we wanna use the peer-to-peer system with the partner peer that works same download method simultaneously. We wanna have the effective performance to reduce the search stage additionally.
  • 5.

    A construction method for IP-based Fixed and Personalized A/V Mosaic EPG service

    송치양 , 최락권 | 2006, 11(5) | pp.39~52 | number of Cited : 2
    Abstract PDF
    As accelerates the technical evolution of high-speed network and progresses the digitalization of broadcasting network, TV channel service through satellite/cable/terrestrial networks becomes more stable and mature. However, TV channel service using IP network such as IPTV is recently emerging. Especially, when it comes to current mosaic EPG(Electronic Program Guide) as a channel guide, the implementation of EPG via IP network is under developing. Furthermore, the personal target mosaic EPG is not provided at all in the IPTV.This paper proposes a construction method of mosaic system which can support fixed and personalized mosaic EPG using IP network for viewers. The fixed mosaic EPG is made several steps as follows; First, H/E generates several mosaic A/V streams. Then, which are transmitted to the STB in terms of multicasting via IP network. Finally, mosaic EPG is displayed on TV through STB. In addition, this paper describes a construction model of the personalized A/V mosaic EPG that represents each person’s favorite channels according to their tastes and interests. As for the contributions, The TV channel guide using IP network enable viewer to select channel more easily with practical adaptation of multi-channel expansibility and sufficient usability. In addition, through personal mosaic EPG, a number of viewers can compose their own mosaic EPG and enjoy a variety of channel easily in accordance with their preferences. Finally, the personal mosaic EPG can prohibit non-adult users from connecting adult-only contents more efficiently.
  • 6.

    Feature Extraction for Automatic Golf Swing Analysis by Image Processing

    Kim,Pyeoung-Kee | 2006, 11(5) | pp.53~58 | number of Cited : 4
    Abstract PDF
    In this paper, I propose an image based feature extraction method for an automatic golf swing analysis. While most swing analysis systems require an expert like teaching professional, the proposed method enables an automatic swing analysis without a professional. The extracted features for swing analysis include not only key frames such as addressing, backward swing, top, forward swing, impact, and follow-through swing but also important positions of golfer's body parts such as hands, shoulders, club head, feet, knee. To see the effectiveness of the proposed method, I tested it for several swing pictures. Experimental results show that the proposed method is effective for extracting important swing features. Further research is under going to develop an automatic swing analysis system using the proposed features.
  • 7.

    A Forecasting Method for Court Auction Information System using Exponential Smoothing

    Oh Kab Suk | 2006, 11(5) | pp.59~68 | number of Cited : 0
    Abstract PDF
    This paper proposes a forecasting method for court auction information system using exponential smoothing. The system forecast a highest bid price for claim analysis, and it is designed to offer an quota information by the bid price. For this realization, we implemented input interface of object data and web interface of information support. Input interface can be input, update and delete function and web interface is support some information of court auction object. We propose a forecasting method using exponential smoothing of a highest bid price for auto-claim analysis with real time information support and the results are verified the feasibility of the proposed method by experiment.
  • 8.

    Musician Search in Time-Series Pattern Index Files using Features of Audio

    Kim young in | 2006, 11(5) | pp.69~74 | number of Cited : 0
    Abstract PDF
    The recent development of multimedia content-based retrieval technologies brings great attention of musician retrieval using features of a digital audio data among music information retrieval technologies. But the indexing techniques for music databases have not been studied completely. In this paper, we present a musician retrieval technique for audio features using the space split methods in the time-series pattern index file. We use features of audio to retrieve the musician and a time-series pattern index file to search the candidate musicians. Experimental results show that the time-series pattern index file using the rotational split method is efficient for musician retrievals in the time-series pattern files.
  • 9.

    Target Word Selection for English-Korean Machine Translation System using Multiple Knowledge

    이기영 , KIM HAN WOO | 2006, 11(5) | pp.75~86 | number of Cited : 2
    Abstract PDF
    Target word selection is one of the most important and difficult tasks in English-Korean Machine Translation. It effects on the translation accuracy of machine translation systems. In this paper, we present a new approach to select Korean target word for an English noun with translation ambiguities using multiple knowledge such as verb frame patterns, sense vectors based on collocations, statistical Korean local context information and co-occurring POS information. Verb frame patterns constructed with dictionary and corpus play an important role in resolving the sparseness problem of collocation data. Sense vectors are a set of collocation data when an English word having target selection ambiguities is to be translated to specific Korean target word. Statistical Korean local context Information is an N-gram information generated using Korean corpus. The co-occurring POS information is a statistically significant POS clue which appears with ambiguous word. The experiment showed promising results for diverse sentences from web documents.
  • 10.

    Grid Scheduling Model with Resource Performance Measurement in Computational Grid Computing

    박다혜 , Lee, Jongsik | 2006, 11(5) | pp.87~94 | number of Cited : 4
    Abstract PDF
    Grid computing has been developed for resolving large-scaled computing problems through geographically distributed heterogeneous resources. In order to guarantee effective and reliable job processing, grid computing needs resource scheduling model. So, we propose a resource performance measurement scheduling model which allocates job to resources with resource performance measurement. We assess resources using resource performance measurement formula, and implement the resource performance measurement scheduling model in DEVS simulation modeling.
  • 11.

    Input Pattern Vector Extraction and Pattern Recognition of EEG

    Lee Yong Gu , CHOI , WOO SEUNG , 이선엽 | 2006, 11(5) | pp.95~104 | number of Cited : 1
    Abstract PDF
    In this paper, the input pattern vectors are extracted and the learning algorithms is designed to recognize EEG pattern vectors. The frequency and amplitude of alpha rhythms and beta rhythms are used to compose the input pattern vectors. And the algorithm for EEG pattern recognition is used SOM to learn initial reference vectors and out-star learning algorithm to determine the class of the output neurons of the subclass layer. The weights of the proposed algorithm which is between the input layer and the subclass layer can be learned to determine initial reference vectors by using SOM algorithm and to learn reference vectors by using LVQ algorithm, and pattern vectors is classified into subclasses by neurons which is being in the subclass layer, and the weights between subclass layer and output layer is learned to classify the classified subclass, which is enclosed a class. To classify the pattern vectors of EEG, the proposed algorithm is simulated with ones of the conventional LVQ, and it was a confirmation that the proposed learning method is more successful classification than the conventional LVQ.
  • 12.

    Design and Implementation of Context-Aware Middleware for Distributed Ubiquitous Environments

    김은영 , 오동열 | 2006, 11(5) | pp.105~114 | number of Cited : 4
    Abstract PDF
    Context-Awareness is a important technology to support optimized services automatically by recognizing various context informations in ubiquitous environments. Previous middlewares which supports ubiquitous environments used a centralized storage and DBMS to store and manage context informations and service contents. Centralized management of context informations and service contents sometimes hinders the autonomy of moving node and interoperability between difference middlewares. In this paper, we design the systems which stores context informations in moving node by distributed form and shares service contents between middlewares in distributed ubiquitous environments. And it provides Context-Aware scripts to supports the definition of context informations , reasoning and execution of services. It verifies the usefulness of the designed systems by applying the scenario of music playing service based on context awareness
  • 13.

    Concept Hierarchy Creation Using Hypernym Relationship

    신명근 | 2006, 11(5) | pp.115~126 | number of Cited : 1
    Abstract PDF
    A concept hierarchy represents the knowledge with multi-level form, which is very useful to categorize, store and retrieve the data. Traditionally, a concept hierarchy has been built manually by domain experts. However, the manual construction of a concept hierarchy has caused many problems such as enormous development and maintenance costs and human errors such as inconsistency. This paper proposes the automatic creation of concept hierarchies using the predefined hypernym relation. To create the hierarchy automatically, we first eliminate the ambiguity of the senses of data values, and construct the hierarchy by grouping and leveling of the remaining senses. We use the WordNet explanations for multi-meaning word to eliminate the ambiguity and use the WordNet hypernym relations to create multi-level hierarchy structure.
  • 14.

    An Effective Query Rewriting Method in Secure XML Access Control

    Dong-Chan An , 변찬우 | 2006, 11(5) | pp.127~138 | number of Cited : 1
    Abstract PDF
    We propose two phase filtering scheme to develop an efficient mechanism for XML databases to control query-based access. An access control environment for XML documents and some techniques to deal with fine-grained authorization priorities and conflict resolution issues are proposed. Despite this, relatively little work has been done to enforce access controls particularly for XML databases in the case of query-based access. The basic idea utilized is that a user query interaction with only necessary access control rules is modified to an alternative form through a query optimization technique, which is guaranteed to have no access violations using tree-aware metadata of XML schemas. The scheme can be applied to any XML database management system and has several advantages such as small execution time overhead, fine-grained controls, and safe and correct query modification. The experimental results clearly demonstrate the efficiency of the approach.
  • 15.

    Quality Evaluation for the Usability of Multimedia Web Sites

    JangGeun Min , LEE KEUM SUK | 2006, 11(5) | pp.139~148 | number of Cited : 3
    Abstract PDF
    This study is intended to propose quality criteria and Web metrics for usability quality evaluation of multimedia Web sites. Recently, applications of the Web sites are not limited to the area of industry and operating as it integrates the new technology. Also as information super highway becomes common with development of network technology, multimedia Web site is on the rise due to various use of multimedia attributes. Therefore this study expands to apply HTML based Web site quality evaluation studied in Software engineering, HCI, Hypermedia to multimedia Web site, and suggests new metrics by integrating flash usability which is expanding its portion in multimedia Web site lately. The Web metrics proposed in this study are verified by heuristic evaluation from a group of expert. It analyses the results of quantitative and qualitative quality evaluation on Web Award Korea by comparing the award-winning, high-quality Web site with non-winning Web sites. This study can be used to establish guideline for high-quality multimedia Web site development in the future.
  • 16.

    An Automatic Graphic Drawing System by Software Development Approach based on Reusable Units

    Lee, Mira | 2006, 11(5) | pp.149~156 | number of Cited : 0
    Abstract PDF
    The demands for the development of large scale software systems are being increased. Various software development methods have been introduced to meet these demands. The unit size of the codes that are reused is increasing in the development methods. These units reflect the concept of software reusability and can be identified as the object, component, and module. Recent trend in the development of a large scale software systems treats a commercial program as a unit to be reused. This approach lies along the same line as the identification of above three types of units. This paper shows how the above four types of units for enhancing the software reusability can be applied to the development of automatic graphic drawing System for a metal production.
  • 17.

    Threat Management System for Anomaly Intrusion Detection in Internet Environment

    KIM, Hyo-Nam | 2006, 11(5) | pp.157~164 | number of Cited : 0
    Abstract PDF
    The Recently, most of Internet attacks are zero-day types of the unknown attacks by Malware. Using already known Misuse Detection Technology is hard to cope with these attacks. Also, the existing information security technology reached the limits because of various attack's patterns over the Internet, as web based service became more affordable, web service exposed to the internet becomes main target of attack. This paper classifies the traffic type over the internet and suggests the Threat Management System (TMS) including the anomaly intrusion detection technologies which can detect and analyze the anomaly sign for each traffic type.
  • 18.

    HPR: Hierarchical Prefix Routing for Nested Mobile Networks

    Rho, KyungTaeg | 2006, 11(5) | pp.165~174 | number of Cited : 1
    Abstract PDF
    Network Mobility Basic Support protocol enables mobile network to change their point of attachment to the Internet, but causes some problems such as suboptimal routing and multiple encapsulations. The proposed scheme, combining Prefix Delegation protocol with HMIPv6 concept can provide more effective route optimization and reduce the amount of packet losses and the burden of location registration for handoff. It also uses hierarchical mobile network prefix (HMNP) assignment and provides tree-based routing mechanism to allocate the location address of mobile network nodes (MNNs) and support micro-mobility. In this scheme, Mobility Management Router (MMR) not only maintains the binding informations for all MNNs in nested mobile networks, but also supports binding procedures to reduce the volume of handoff signals over the mobile network. The performance is evaluated using NS-2.
  • 19.

    The Implementation of Spatial Database Transaction Model(FTMSD) supporting Mobile Host

    Lee, Young-Geol , 김성희 , 배영호 and 2 other persons | 2006, 11(5) | pp.175~182 | number of Cited : 0
    Abstract PDF
    AMobile-supported spatial database systems have been introduced with development of mobile computing technology, they offer an advantage that we can access the data wherever we are. However, the studies on database system in traditional distributed environments must be reconsidered again, because of characteristics of mobile database system such as mobility and instability of wireless network. A new transaction model should be required for considering the characteristics, since especially a mobile computing environment is location-dependent, compared with the location transparency in a distributed computing environment. In other aspect, normally mobile host may be moving not in all space, but in some limited path. That is, a host is moving along the roads or the geographical features adjacent to the roads. The transaction processing should be considered not on the spatial coordinate but on the geographical features. In this paper, the feature based transaction processing model is proposed to process location-dependent transaction efficiently.
  • 20.

    A Design of Intelligent Home Network Service using Wireless Sensor Network

    나선웅 , Lee Sang Jeong , 김동균 and 1 other persons | 2006, 11(5) | pp.183~194 | number of Cited : 9
    Abstract PDF
    This paper suggests a service model which uses a wireless sensor network in home network environment. The sensor network consists of fixed sensor nodes and user identification nodes which is attached to each user. With the input information of the user preference profile and the collected data from the sensor nodes, the database is constructed as a context information and analyzed by a home server to provide a service that establishes and controls automatically home appliances according to each user's preference. The proposed service model is implemented and tested on a Linux server with MySQL database and sensor nodes on TinyOS.
  • 21.

    A Study on the MRC and EGC in Nakagami-m Fading Channel

    Kwan Hyeong, Lee , LEE MYUNG HO | 2006, 11(5) | pp.195~202 | number of Cited : 1
    Abstract PDF
    In multicarrier code division multiple access(MC-CDMA), the total system bandwidth is divided into a number of sub-bands, where each subband may use direct-sequence(DS) spreading and each subband signal is transmitted using a subcarrier frequency. In this paper, the system performance analysis of MC-CDMA using to gain combining(EGC) and maximal ratio combining(MRC) method over frequency selective Nakagami- fading channel is analyzed. In the proposed system, a data sequence is serial-to-parallel converted, and MC-CDMA is used on each of the parallel data streams. The data streams are spread at both the symbol fraction level and at the chip level by the transmitter. In this paper, the compare to analysis ,two standard diversity combining techniques, EGC and MRC, The good performance of system using to MRC more than EGC
  • 22.

    Propose Diversity Algorithm for Mobile Communication System Performance Improve

    LEE MYUNG HO | 2006, 11(5) | pp.203~210 | number of Cited : 0
    Abstract PDF
    In this paper, proposed diversity algorithm that decrease fading. In the wireless channel, if fading occurs due to the multipaths the performance of the system is apparently reduced. This study applied tap-delay receiver. It applied QPSK and OQPSK modulation methods and applied the convolutional codes, where the code rate is 1/2 and 1/3 and the constraint length is 11 and the turbo code where the constraint length is 6. The diversity algorithm proposed in this paper could be compared and analyzed the average error probability of modulation method variable of fading factor to uplink and downlink channels.
  • 23.

    MES for the Product Tracking using RFID and Bayesian network

    김봉석 , LEE, Hong Chul , 천현재 | 2006, 11(5) | pp.211~222 | number of Cited : 3
    Abstract PDF
    Manufacturing Execution System(MES) immediately enables users to share the information of systems industrywide, efficiently manages synthetic information with data collection through treating the data in a fast way, and helps their decision-making. MES for real-time information processing requires certain conditions such as data modeling of RFID, which has recently attracted attentions, and monitoring of each product unit from manufacture to sales. However, in the middle of processing the unit with a RFID tag, transponders(readers) can't often read the tag due to reader's malfunctions, intentional damages, loss and the circumstantial effects; for that reason, users are unable to confirm the location of the product unit. In this case, users cannot avoid tracing the path of units with uncertain clues. In this paper, we suggest that the unique MES based on RFID and Bayesian Network can immediately track the product unit, and show how to evaluate it.
  • 24.

    A Research on Cool URI based on Internationalized Resource Identifier for Web 2.0

    Eui-Hyun Jung , 김원 , 송관호 and 1 other persons | 2006, 11(5) | pp.223~230 | number of Cited : 1
    Abstract PDF
    Web 2.0 and Semantic Web technology will be merged to be a next generation Web that leads presentation-oriented Web to data-centric Web. In the next generation Web, semantic processing, Web platform, and data fusion are most important technology factors. Among them, Cool URI used for data fusion can provide permanent and human readable URI and it has been already used in Blog system. However, Cool URI is not suitable to I18N environment such as Hangul and it is difficult to be adopted because several encodings are mingled in Korea Web society. In this paper, we discussed technology issues and Cool URI Web component to use Cool URI with Internationalized Resource Identifier (IRI). A proposed approach provides same function regardless of encoding type and supports both file system based and CGI based methods to be easily used from other applications. Results from several test environments show the implemented Web component satisfy the design purpose.
  • 25.

    An Implementation of the Host-based DBMS Simulator for Developing Switching System Software

    Park Young-Ho , Ho Lee | 2006, 11(5) | pp.231~240 | number of Cited : 0
    Abstract PDF
    For such large-scale software as for operating a switching system, the use of real-time databases is essential for data exchanges among various functions and their data processing. Under the environment of developing the DBMS software for a switching system, the application program including database manipulations is first developed on a host computer and then the developed program is loaded into a switching system for its tests. To make it possible for DBMS manipulation software to be developed on a host computer rather than a switching system itself, we developed a host-based DBMS simulation system(HDBMS). In this paper, we presented the roles and functions of HDBMS, its system structure, and the technical details for implementing HDBMS.
  • 26.

    A Study of Interception for a Spam Attack of VoIP Service

    이인희 , Dae-Woo Park | 2006, 11(5) | pp.241~250 | number of Cited : 4
    Abstract PDF
    Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.
  • 27.

    A Study on New Treatment Way of a Malicious Code to Use a DLL Injection Technique

    박희환 , Dae-Woo Park | 2006, 11(5) | pp.251~258 | number of Cited : 2
    Abstract PDF
    A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs, or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are lsass.exe, winlogon.exe, csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment way that experimented on at these papers and a plan to solve will become a researcher of the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.
  • 28.

    An Implementation of Context Data Monitoring System based on Ubiquitous Sensor Network

    Kiwook Lee , 성창규 | 2006, 11(5) | pp.259~266 | number of Cited : 34
    Abstract PDF
    As a core area of the new computing paradigm, the Ubiquitous Sensor Network Technology utilizes a wireless sensor networking which can be applied to the Context Information Monitoring System. When the technology is used in a poor user-environment for monitoring purposes, it can cost-effectively gather the context data on real-time basis, analyze the information gathered, effectively response to the user situation, and execute orders to create environmental factors desired by the user. This study structures a system able to monitor information in regards to a user-environment based on wireless-node sensor technology coupled with the Ubiquitous Sensor Network Technology. The proposed system requires a minimal collection of data without continuous monitoring. Monitoring periodically, it can sense the user-environment more efficiently than the existing monitoring technologies based on the wire-communication technology.
  • 29.

    Integrated Transceiver Module development at Ka-Band

    Wansik Kim , Yeon-Man Jeong , Kim Kye Kook | 2006, 11(5) | pp.267~272 | number of Cited : 1
    Abstract PDF
    In this paper, an integrated and small Ka-band transceiver module has been developed for measuring distance at the radar systems. Oscillator of cavity type, The MMIC such as VCO, power amplifier, LNA, and mixer, and passive components are integrated on carriers and these are assembled in the transceiver module directly. The test result shows the output power of 21dBm and the noise figure of 5dB using developed transceiver module, Using developed FMCW transceiver module. We can measure the 60m range target by detecting the beat frequency and distinguish both earth and sky using radiometer signal. So we defined that the integrated module using MMIC had a good performance for the radar and radiometer at Ka-band.
  • 30.

    A Study on the Critical Success Factors of Electronic Commerce by Shopping Mall Awareness

    Kim,Jung-Yul | 2006, 11(5) | pp.273~280 | number of Cited : 2
    Abstract PDF
    The internet is not simply a new technology that businesses are adopting to reduce their costs of operations and increase revenues. This study reports a set of success factors for electronic commerce, specifically some important implications for managers of internet shopping mall area in Korea. In this study it is found that price and security are most critical to increase customer satisfaction. In addition, the result of this study shows that ① price and security, ② shopping mall interface and trust and ③ ease of use are very important to increase customer satisfaction. And the result of this study shows that shopping mall awareness are very important to increase customer satisfaction.
  • 31.

    A Study on the Proclivity for Entrepreneurship and Its Affect on the Venture Creation

    Lee, Sungjin | 2006, 11(5) | pp.281~290 | number of Cited : 14
    Abstract PDF
    Despite intensive inquiry, we still know relatively little about the entrepreneurship. The lack of progress in entrepreneurship may be due to the theories and methods used to identify those characteristics. But the appropriate approach for studying entrepreneurial behavior remains contentious. This study model used three themes(achievement motivation, risk-taking propensity, and preference for innovation) in order to measure a proclivity for entrepreneurship. In this study, there was a significant difference in the plan for venture creation and the confidence for venture creation between high-entrepreneurship group and low-entrepreneurship group. In addition, It is found that proclivity for entrepreneurship is significantly related to create new venture and to build up confidence regarding venture creation.
  • 32.

    A Study on enhancing Information Utilization Capability of the Elderly

    Kwangsik Han | 2006, 11(5) | pp.291~298 | number of Cited : 5
    Abstract PDF
    Enhancing Information Utilization Capability of the elderly is discussed in the level of nation due to the advent of information society and aging. Information divide of the elderly is wider compared with other age groups. It is necessary for the elderly to enhance information ability. Government was implementing the policy for narrowing information divide continually. Dual information divide is brought about by the character of the elderly such as status, economic factor, the level of education. Therefore not only continuous nation's policy but road map is needed for enhancing information utilization capability to computer and internet. Information divide of the elderly would be narrowed out of education, economy, earning, age through those ways.
  • 33.

    A Factor Analysis on the Satisfaction of Administrative Service of Community

    Rack-In Choi | 2006, 11(5) | pp.299~310 | number of Cited : 1
    Abstract PDF
    The purpose of this study is to analyze an effect for the resident satisfaction and quality of life against public administrative service to provide for community residents by the rural-urban consolidation community in the case of 3 cities (Sunchon, Gwangyang, Naju) that have consolidated since January 1995 and Yeosu city that has consolidated in March 1998. This study attempted to empirical survey and analyzed 270 number of 4 cities residents samples in Jeollanamdo through SPSSWIN. As a result of this factor analysis, equality of public administrative service, counterplan of residents, efficiency and access of administrative organ are showed as factors are associated with the satisfying degree of public administrative services for community residents.
  • 34.

    Knowledge management strategy in the electronic payment domain: perspective on knowledge sharing

    PARK SEUNG BONG | 2006, 11(5) | pp.311~320 | number of Cited : 0
    Abstract PDF
    Knowledge management strategy has become a one of the most important factors creating and maintaining the business opportunities. In this paper, I present a KM-ePAY typology to investigate the role of knowledge sharing strategy in the electronic payment domain. Specifically, I examine the characteristics of four types of electronic payment systems based on the confidence and efficiency that characterize the feature of electronic payment media and identify appropriate knowledge sharing approaches for each component. In conclusion, my findings indicate that knowledge sharing approaches which are align with the characteristics of electronic payment give a way both to increase relationship commitment and to optimize process over electronic payment transactions.
  • 35.

    A Hierarchical Clustering Algorithm Using Extended Sequence Element-based Similarity Measure

    Seung-Joon Oh | 2006, 11(5) | pp.321~328 | number of Cited : 2
    Abstract PDF
    Recently, there has been enormous growth in the amount of commercial and scientific data. Such datasets consist of sequence data that have an inherent sequential nature. However, only a few of the existing clustering algorithms consider sequentiality. This study presents a similarity measure and a method for clustering such sequence datasets. Especially, we present an extended concept of the measure of similarity, which considers various conditions. Using a splice dataset, we show that the quality of clusters generated by our proposed clustering algorithm is better than that of clusters produced by traditional clustering algorithms.
  • 36.

    DDevelopment of a Vision-based Lane Change Assistance System for Safe Driving

    성준용 , Min-Hong Han , 노광현 | 2006, 11(5) | pp.329~336 | number of Cited : 7
    Abstract PDF
    This paper describes a lane change assistance system for the help of safe lane change, which detects vehicles approaching from the rear side by using a computer vision algorithm and notifies the possibility of safe lane change to a driver. In case a driver tries to lane change, the proposed system can detect vehicles and keep track of them. After detecting side lane lines, region of interest for vehicle detection is decided. For detection a vehicle, optical flow technique is applied. The experimental result of the proposed algorithm and system showed that the vehicle detection rate was 91% and the embedded system would have application to a lane change assistance system being commercialized in the near future.
  • 37.

    An Implementation of Search System based on Natural Language Index Incorporating considering Image Characteristics

    Jung-Yi Kim , Kiwook Lee , KangHo-Lee | 2006, 11(5) | pp.337~343 | number of Cited : 0
    Abstract PDF
    The number of digital camera users is increasing rapidly and countless number of photos floats about on the internet especially through wide-spreading Cyworld and blogs. Though portraits cover a large percentage of those photos, because of the property rights, near entirety of such photos are unavailable for use by web-page producers, advertising companies, web-designers, and so on, who need a variety of portraits with differing expressions and characteristics. This study offers a search engine that incorporates image characteristics based on natural language index, which can provide a fast and reliable search result. It will create an opportunity for the digital photographers to more easily sell their pictures and simultaneously provide the would-be users of the photos a better and easier way to find the pictures they are looking for. Once the search engine is realized, it will become possible to use not only the nouns as keywords and categories but also verbs in search of portraits revealing feelings, expressions, dressings, and other characteristics.