Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2006, Vol.11, No.4

  • 1.

    Region-Based Image Retrieval System using Spatial Location Information as Weights for Relevance Feedback

    Jaewon Song | JUHONG LEE | KIM DEOKHWAN | 2006, 11(4) | pp.1~8 | number of Cited : 3
    Abstract PDF
    Recently, studies of relevance feedback to increase the performance of image retrieval has been activated. In this paper, a new region weighting method in region based image retrieval with relevance feedback is proposed to reduce the semantic gap between the low level feature representation and the high level concept in a given query image. The new weighting method determines the importance of regions according to the spatial locations of regions in an image. Experimental results demonstrate that the retrieval quality of our method is about 18% in recall better than that of area percentage approach, and about 11% in recall better than that of region frequency weighted by inverse image frequency approach and the retrieval time of our method is a tenth of that of region frequency approach.
  • 2.

    Two-sample Linear Rank Tests for Efficient Edge Detection in Noisy Images

    Lim Dong Hoon | 2006, 11(4) | pp.9~16 | number of Cited : 0
    Abstract PDF
    In this paper we propose Wilcoxon test, Median test and Van der Waerden test such as linear rank tests in two-sample location problem for detecting edges effectively in noisy images. These methods are based on detecting image intensity changes between two pixel neighborhoods using an edge-height model to perform effectively on noisy images. The neighborhood size used here is small and its shape is varied adaptively according to edge orientations. We compare and analysis the performance of these statistical edge detectors on both natural images and synthetic images with and without noise.
  • 3.

    A Study on the Intelligent Game based on Reinforcement Learning

    Woo Chong Woo | Donghun Lee | 2006, 11(4) | pp.17~26 | number of Cited : 0
    Abstract PDF
    An intelligent game has been studied for some time, and the main purpose of the study was to win against human by enhancing game skills. But some commercial games rather focused on adaptation of the user's behavior in order to bring interests on the games. In this study, we are suggesting an adaptive reinforcement learning algorithm, which focuses on the adaptation of user behavior. We have designed and developed the Othello game, which provides large state spaces. The evaluation of the experiment was done by playing two reinforcement learning algorithms against Min-Max algorithm individually. And the results show that our approach is playing more improved learning rate, than the previous reinforcement learning algorithm.
  • 4.

    Design of Classroom Framework for u-Learning on Ubiquitous Environment

    엄남경 | Lee, Sang-ho | 오병진 | 2006, 11(4) | pp.27~34 | number of Cited : 7
    Abstract PDF
    In the near future, we can access information which we want, whenever we want, wherever we use. Because almost devices in ubiquitous environment are connected by either wired or wireless network. Especially, u-Learning emphasizing on pedagogical property is enable to improve learning abilities. As researches of the previous u-Learning, there have been learning by mobile devices such like PDAs as well as the smart classroom, which makes the remote students participate in the existing class. However, these researches have not satisfied pedagogical, cooperative and ubiquitous properties yet. Thus we suggest the framework for both local and mobile classroom, which can make the properties easy to satisfy.
  • 5.

    Real-time Parallel Processing Simulator for Modeling Portable Missile System and Performance Analysis

    깁병문 | Soon Key Jung | 2006, 11(4) | pp.35~46 | number of Cited : 0
    Abstract PDF
    RIn this paper, we describe real-time parallel processing simulator developed for the use of performance analysis of rolling missiles. The real-time parallel processing simulator developed here consists of seeker emulator generating infrared image signal on aircraft, real-time computer, host computer, system unit, and actual equipments such as auto-pilot processor and seeker processor. Software is developed according to the design requirements of mathematic model, 6 degree-of-freedom module, aerodynamic module which are resided in real-time computer, and graphic user interface program resided in host computer. The real-time computer consists of six TI C-40 processors connected in parallel. The seeker emulator is designed by using analog circuits coupled with mechanical equipments. The system unit provides interface function to match impedance between the components and processes very small electrical signals. Also real launch unit of missiles is interfaced to simulator through system unit. In order to use the real-time parallel processing simulator developed here as a performance analysis equipment for rolling missiles, we perform verification test through experimental results in the field.
  • 6.

    Prevention System for Real Time Traffic Accident

    Hong you sik | 2006, 11(4) | pp.47~54 | number of Cited : 1
    Abstract PDF
    In order to reduce traffic accidents, many researchers studied a traffic accident model. The Cause of traffic accidents is usually the mis calculation of traffic signals or bad traffic intersection design. Therefore, to analyse the cause of traffic accidents, it takes effort. This paper, it calculates the optimal safe car speed considering intersection conditions and weather conditions. It will recommend calculation of 1/3 in vehicle speed when there are rainy days and snow days. But the problem is that it will always display the same speed limit when whether conditions change. In order to solve these problems, in this paper, it is proposed the calculation of optimal safety speed algorithm uses weather conditions and road conditions. Computer simulations is prove that it computes the traffic speed limit correctly, which proposed considering intelligent traffic accident prediction algorithms.
  • 7.

    A method for Character Segmentation using Frequence Characteristics and Back Propagation Neural Network

    Byung Tae Chun | Chee-Yang Song | 2006, 11(4) | pp.55~60 | number of Cited : 1
    Abstract PDF
    The proposed method uses FFT(Fast Fourier Transform) and neural networks in order to extract texts in real time. In general, text areas are found in the higher frequency domain, thus, can be characterized using FFT. The neural network are learned by character region(high frequency) and non character region(low frequency). The candidate text areas can be thus found by applying the higher frequency characteristics to neural network. Therefore, the final text area is extracted by verifying the candidate areas. Experimental results show a perfect candidate extraction rate and about 95% text extraction rate. The strength of the proposed algorithm is its simplicity, real-time processing by not processing the entire image.
  • 8.

    ealtime Adaptation Transcoding Service, supporting wireless mobile devices and RSS by using Web Structure Analysis

    DongYeop Ryu | Young-Hwan Lim | 한승현 | 2006, 11(4) | pp.61~68 | number of Cited : 3
    Abstract PDF
    As high speed Internet service technology develops, many people are accessing wireless internet service by using mobile devices. However, an HTLM web page for PC is not very compatible with wireless internet because of its unnecessary advertisements, high resolution, and various multimedia data. This is because the main focus when creating it was on high speed. As this research indicates with the RSS channel, converted from the main part of the HTLM web page, which users show interest in, a wireless compatibleinternet page can easily be created. Consequently, web administrators could create a wireless page easily and quickly, and wireless users would be able to find information in the same manner.
  • 9.

    A Peer Availability Period Prediction Strategy for Resource Allocation in Internet-based Distributed Computing Environment

    Kim Jin-Il | 2006, 11(4) | pp.69~76 | number of Cited : 0
    Abstract PDF
    Internet-based distributed computing environment have been developed for advanced science and engineering by sharing large-scale resources. Therefore efficient scheduling algorithms for allocating user job to resources in the Internet-based distributed computing environment are required. Many scheduling algorithms have been proposed, but these algorithms are not suitable for the Internet-based Distributed computing environment. That is the previous scheduling algorithm does not consider peer self-control. In this paper, we propose a Peer Availability Period Prediction Strategy for Internet-based distributed computing environment and show that our Strategy has better performance than other Strategy through extensive simulation.
  • 10.

    A Fast Block Matching Motion Estimation Algorithm by using the Enhanced Cross-Hexagonal Search Pattern

    HyeonWoo NAM | 2006, 11(4) | pp.77~86 | number of Cited : 4
    Abstract PDF
    There is the spatial correlation of the video sequence between the motion vector of current blocks. In this paper, we propose the enhanced fast block matching algorithm using the spatial correlation of the video sequence and the center-biased property of motion vectors. The proposed algorithm determines an exact motion vector using the predicted motion vector from the adjacent macro blocks of the current frame and the Cross-Hexagonal search pattern. From the experimental results, we can see that our proposed algorithm outperforms both the prediction search algorithm (NNS) and the fast block matching algorithm (CHS) in terms of the search speed and the coded video’s quality. Using our algorithm, we can improve the search speed by up to 0.1~38%, and also diminish the PSNR (Peak Signal Noise Ratio) by at most 0.05~2.5 dB, thereby improving the video quality.
  • 11.

    Static Type Inference Based on Static Single Assignment for Bytecode

    김지민 | Weon Hee Yoo | 김기태 and 1other persons | 2006, 11(4) | pp.87~96 | number of Cited : 3
    Abstract PDF
    Although bytecode has many good features, it has slow execution speed and it is not an ideal representation for program analysis or optimization. For analysises and optimizations, bytecode must be translated to a Static Single Assignment Form(SSA Form). But when bytecode is translated a SSA Form it has lost type informations of some variables. For resolving these problemㄴ in this paper, we create extended control flow graph on bytecode. Also we convert the control flow graph to SSA Form for static analysis. Calculation about many informations such as dominator, immediate dominator, dominance frontier, -Function, renaming are required to convert to SSA Form. To obtain appropriate type for generated SSA Form, we proceed the followings. First, we construct call graph and derivation graph of classes. And the we collect informationㄴ associated with each node. After finding equivalence nodes and constructing Strongly Connected Component based on the collected informations, we assign type to each node.
  • 12.

    Development of a Detection and Recognition System for Rectangular Marker

    Kang Sun-Kyung | Sang Seol. Lee | Jung, Sung-Tae | 2006, 11(4) | pp.97~108 | number of Cited : 6
    Abstract PDF
    In this paper, we present a method for the detection and recognition of rectangular markers from a camera image. It converts the camera image to a binary image and extracts contours of objects in the binary image. After that, it approximates the contours to a list of line segments. It finds rectangular markers by using geometrical features which are extracted from the approximated line segments. It normalizes the shape of extracted markers into exact squares by using the warping technique. It extracts feature vectors from marker image by using principal component analysis. It then calculates the distance between feature vector of input marker image and those of standard markers. Finally, it recognizes the marker by using minimum distance method. Experimental results show that the proposed method achieves 98% recognition rate at maximum for 50 markers and execution speed of 11.1 frames/sec for images which contains eleven markers.
  • 13.

    Efficient Assessment and Recommendations System using IRT and Data Mining

    Cheonshik Kim | Myunghee Jung | 2006, 11(4) | pp.109~118 | number of Cited : 3
    Abstract PDF
    E-learning method has many advantages that supplement the shortfalls of offline education. For this reason, today's offline educational institutions adopted the online education technique to improve learning effectiveness. Recently, general universities have partially adopted online learning. As a result, a study is searching for ways to improve the effectiveness of education by copying the merits of the existing offline education onto the online education. Thus a proper evaluation of learners and a feedback provision are considered necessary to improve the effectiveness of online learning. This study aims to suggest a model that will improve learning efficiency by adapting the advantages of offline education to online learning. To evaluate properly, this study conducted Item Response Test to examine the learners and finally ensure them an adequate level of education. Also, this study suggested a way to enhance learning efficiency by finding out each learner's study habits and to address the weaknesses of online learning. It is expected that the suggested method would be helpful in bettering learner's ability to study in school environment.
  • 14.

    Applying Distributed Agents to Parallel Genetic Algorithm on Dynamic Network Environments

    Jinwook Baek | BANG, Jung Won | 2006, 11(4) | pp.119~126 | number of Cited : 2
    Abstract PDF
    Distributed Systems can be defined as set of computing resources connected by computer network. One of the most significant techniques in optimization problem domains is parallel genetic algorithms, which are based on distributed systems. Since the status of dynamic network environments such as Internet and mobile computing, can be changed continually, it must not be efficient on the dynamic environments to solve an optimization problem using previous parallel genetic algorithms themselves. In this paper, we propose the effective technique, in which the parallel genetic algorithm can be used efficiently on the dynamic network environments.
  • 15.

    Design and Implementation of Education Globe System Based on Multimedia

    조수현 | Kim Young Hak | 이재호 | 2006, 11(4) | pp.127~136 | number of Cited : 3
    Abstract PDF
    In the existing education using the globe, teaching contents are very simple and the relationship among learning units lacks a little bit because teaching materials are composed individually with the globe. Therefore, in this study, we developed the education glove system based on multimedia that is closely connected with teaching materials and the globe. This system is composed of the globe device and the learning software based on computer control. The globe device rotates itself on its axis as the solar center, and provides more efficient and visual education environment to students through the link between computer and the globe. The learning software provides the multimedia contents such as parallax, climate, culture, and education information about each country, and this software also can simulate the revolution of the earth around the sun. The globe device can be operated in off-line without the computer link. This system was developed by the industry cooperation and was displayed in the principal exhibitions. We have obtained positive results through the exhibitions and will promote the product in the future.
  • 16.

    A Similarity Computation Algorithm for Music Retrieval System Based on Query By Humming

    오동열 | Hae-Seok Oh | 2006, 11(4) | pp.137~146 | number of Cited : 1
    Abstract PDF
    A user remembers a melody as not the combination of pitch and duration which is written in score but the contour which is composed of the relative pitch and duration. Because of the way of remembering a melody, the previous Music Information Retrieval Systems which uses keyboard playing or score as the main input melody are not easily acceptable in Query By Humming Systems. In this paper, we mention about the considerable checkpoints for Query By Humming System and previous researches. And we propose the feature extraction which is similar with the way of remembering a melody and similarity computation algorithms between melody in humming and melody in music. The proposed similarity computation algorithms solves the problem which can be happened when only uses the relative pitches by using relative durations.
  • 17.

    Video Browsing Using An Efficient Scene Change Detection in Telematics

    SeongYoon Shin | Pyo,Sung-Bae | 2006, 11(4) | pp.147~154 | number of Cited : 6
    Abstract PDF
    Effective and efficient representation of color features of multiple video frames is an important yet challenging task for visual information management systems. This paper proposes a Video Browsing Service(VBS) that provides both the video content retrieval and the video browsing by the real-time user interface on Web. For the scene segmentation and key frame extraction of video sequence, we proposes an efficient scene change detection method that combine the RGB color histogram with the X2(Chi Square) histogram. Resulting key frames are linked by both physical and logical indexing. This system involves the video editing and retrieval function of a VCR's. Three elements that are the date, the field and the subject are used for video browsing. A Video Browsing Service is implemented with MySQL, PHP and JMF under Apache Web Server.
  • 18.

    A Study about Wiretapping Attack and Security of VoIP Service

    Dae-Woo Park | Seokhyun Yoon | 2006, 11(4) | pp.155~164 | number of Cited : 10
    Abstract PDF
    VoIP technology is Eight New Services among Ubiquitous-IT839 strategies. This paper tested wiretapping of VoIP service in connected a soft phone and LAN and WAN sections, Internet telephones and a device, IP PBX, a banner operator network to have been connected to VoIP Internet network. As a result of having experimented on wiretapping of VoIP networks, Vulnerability was found, and a wiretapping by attacks of a hacker was succeeded in a terminal and Proxy and attachment points of a VoIP network like a hub to follow a CVE list. Currently applied a security plan of an each wiretapping section in viewpoints of 6 security function of Access Control, Confidentiality, Authentication, Availability, Integrity, Non-repudiation in VoIP networks named to 070. Prevented wiretapping of contents by the results, the AES encryption that executed wiretapping experiment about a packet after application of a security plan. Prevented wiretapping, and kept security and audit log, and were able to accomplish VoIP information protection to network monitoring and audit log by an access interception and qualification and message hash functions and use of an incoming refusal.
  • 19.

    Design of Dynamic Service Management Model for Context-Aware Service Applications

    정헌만 | 이정현 | 2006, 11(4) | pp.165~174 | number of Cited : 0
    Abstract PDF
    As context aware service supports a process of context acquisition and reasoning, there are many studies to facilitate the implementation of context aware service. However, these studies have not supported efficiently a user or service mobility that should be supported necessarily in ubiquitous computing environment. Therefore, this study proposes a dynamic context aware service model which supports a dynamic management of context information, service retrieval and composition for interactions between services, and service mobility. Then we design a middleware based on this model and implement the middleware. As the middleware is implemented on the OSGi framework, it can have an interoperability between the devices such as computers, PDA, home appliances, and sensors, because of using the standard interface technologies like UPnP, Jini and so on.
  • 20.

    For the development Computer Game, using the Creative Group Thinking System

    kyungDon Han | 2006, 11(4) | pp.175~180 | number of Cited : 2
    Abstract PDF
    The primary concern here is to discover the what and how of the computer game development. In other words, the goal of this research is help the evaluation of Creative Group Thinking System (CGTS), become aware of areas of need for the development computer game. For the development computer game, the creative thinking is one of the most important principles. The creative thinking is the first step of the development computer game of process. In order to save time, effective qualities, and achieve the goals, the researcher has studied the web programing on the Creative Group Thinking System (CGTS).
  • 21.

    Searching Similar Example-Sentences Using the Needleman-Wunsch Algorithm

    김동주 | KIM HAN WOO | 2006, 11(4) | pp.181~188 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a search algorithm for similar example-sentences in the computer-aided translation. The search for similar examples, which is a main part in the computer-aided translation, is to retrieve the most similar examples in the aspect of structural and semantical analogy for a given query from examples. The proposed algorithm is based on the Needleman-Wunsch algorithm, which is used to measure similarity between protein or nucleotide sequences in bioinformatics. If the original Needleman-Wunsch algorithm is applied to the search for similar sentences, it is likely to fail to find them since similarity is sensitive to word's inflectional components. Therefore, we use the lemma in addition to (typographical) surface information. In addition, we use the part-of-speech to capture the structural analogy. In other word, this paper proposes the similarity metric combining the surface, lemma, and part-of-speech information of a word. Finally, we present a search algorithm with the proposed metric and present pairs contributed to similarity between a query and a found example. Our algorithm shows good performance in the area of electricity and communication.
  • 22.

    ABS(Attribute Based Surface) Modeling based on the Chordlength Domain

    Jung Hwa Kim | Hwa Jin Park | 2006, 11(4) | pp.189~196 | number of Cited : 0
    Abstract PDF
    The ABS method which is modeling the shape-design helps designers concentrate upon the design intuitively, using the modeling method based on the geometrical characteristics, the property information (a point, a curve, slopes, etc.). For the multi-sided patches, the ABS Modeling attempts the modeling with the uniform domain like a right triangle and a regular square. The mentioned method can reduce the speed of modeling but it can cause the difference from a designer’s intention in the process of interpolation between the attributes for object modeling. Therefore, in this paper, we propose ABS modeling based on the Chordlength domain method to minimize such differences. The Chorldlength, one of the methods generating irregular domain, is the technique transforming the domain in accordance with the length and form of attributes which a shape consists of. The Chordlength domain method is performed using MEL.
  • 23.

    A Performance Evaluation of Factors Influencing the ROI Coding Quality in JPEG2000

    강기준 | HyunJu Kim | 이점숙 | 2006, 11(4) | pp.197~206 | number of Cited : 2
    Abstract PDF
    One of the most significant characteristics of JPEG2000, the emerging still image standards, is the ROI (Region of Interest) coding. JPEG2000 provides a number of ROI coding mechanisms and ROI parameters. To apply them to an application, it must select the applicable values. In this paper, we evaluate how the ROI coding mechanisms and the ROI parameters influencing JPEG2000 quality affect the ROI quality and the whole image quality. The ROI coding mechanisms are Maxshift and Implicit, and the parameters are tile size and ROI size, codeblock size, number of DWT decomposition levels and ROI importance. The bigger the tile size, the better the quality. The bigger the ROI size, the ROI importance and the number of DWT decomposition levels, the worse the quality. In code block 32X32 of Maxshift and Implicit, it has the best quality.
  • 24.

    An Empirical Study on the Relationship of Local Community Resident

    Rack-In Choi | 2006, 11(4) | pp.207~220 | number of Cited : 2
    Abstract PDF
    The purpose of this study is to provide to alternatives to improve the relationship of local community resident of the rural-urban consolidation districts in analyzing the case of Jeollanamdo Suncheon city that has consolidated for around 10 years since 1th January 1995. The method of this study is to survey 335 number of Suncheon residents. The evaluation criteria about relationship of local community resident, used in this study were the unity of residents, the reconciliation of residents, and the satisfying degree of public administrative services. According to this survey, aspect of reconciliation of residents, access of administrative organ, unity of residents, satisfying degree of residents and administrative information are showed a little the positive effect. But locational preference of disgust facilities are appeared ordinary and negative sight.
  • 25.

    A Study on the Development of Crime Prediction Program(CPP)

    Young Hwan Kim | Moon Jeong Min | 2006, 11(4) | pp.221~230 | number of Cited : 5
    Abstract PDF
    Changing drastically, the life in a modern city has forced citizens to gradually shorten their average period of settlement, which has weakened the identity of city habitation, thus causing serious crimes and damaging the security of city greatly. Having a highly composite structure with not only macro, but micro characteristics, city is grasped as a very composite phenomenon shown in the social, economic and spatial constitution relationships, including the personal motives of criminals. Accordingly, this study puts stress on the necessity of any crime prediction program to predict the occurrence of crimes by analyzing the occurrence patterns of sharply increasing intra-city crimes of violence on a typical, time and spatial basis and clarifying their structural dynamic relationships in a both macro and micro manner. Moreover, the deduction of various factors closely related to crime occurrence will contribute to elucidating the occurrence structure of city crimes.
  • 26.

    A Study on the Problems of Procedural Law Against Cyber Crimes in Korea

    임병락 | 오태곤 | 2006, 11(4) | pp.231~242 | number of Cited : 1
    Abstract PDF
    When current cyber attacks to information and communication facilities are examined, technologies such as chase evasion technology and defense deviation technology have been rapidly advanced and many weak systems worldwide are often used as passages. And when newly-developed cyber attack instruments are examined, technologies for prefect crimes such as weakness attack, chase evasion and evidence destruction have been developed and distributed in packages. Therefore, there is a limit to simple prevention technology and according to cases, special procedures such as real-time chase are required to overcome cyber crimes. Further, cyber crimes beyond national boundaries require to be treated in international cooperation and relevant procedural arrangements through which the world can fight against them together. However, in current laws, there are only regulations such as substantial laws including simple regulations on punishment against violation. In procedure, they are treated based on the same procedure as that of general criminal cases which are offline crimes. In respect to international cooperation system, international criminal private law cooperation is applied based on general criminals, which brings many problems. Therefore, this study speculates the procedural law on cyber crimes and presents actual problems of our country and its countermeasures.
  • 27.

    Design of a Hierarchical Dimension of the Bill of Materials Type

    장세현 | CHOI IN SOO | Han-Ju Yoo | 2006, 11(4) | pp.243~250 | number of Cited : 3
    Abstract PDF
    A recursive relationship is a relationship among entities of the same class. N : M recursive relationships can be used to represent bills of materials. A bill of materials is a special data structure that occurs frequently in manufacturing applications. This data structure is a hierarchy. Most business dimensions have a hierarchical structure. In this study, a design of a hierarchical dimension of the bill of materials type is carried out. As with other N : M relationships, an intersection table that shows pairs of related rows is created, and this table is transformed into a dimension in the OLAP(OnLine Analytical Processing) model. This transformation consists of two tasks: (1)replacing the first column of the intersection table with the lowest level of the dimension; and (2)replacing the second column of the table with the only upper level of the dimension. A case multidimensional information system using the hierarchical dimension is also developed.
  • 28.

    Empirical study of Integrated IS for Mobile Service with University Performance

    Myung-Ha Bang | 2006, 11(4) | pp.251~260 | number of Cited : 1
    Abstract PDF
    Major telecommunication companies are leading on providing mobile contents service to customers. With changes in technology and social areas, most organizations are struggling to achieve the competitive edge over other organizations. Like others, university has the same problems to meet clients' needs to become being competitive. The research is to provide meaningful thoughts by analyzing empirical data and provide meaning information for University being competitive with IS and Mobile campus related decisions.
  • 29.

    A Design and Implementation of LBS-based Tour Guide System using Embedded Linux

    Jeong-won Kim | Bonggi Jun | 2006, 11(4) | pp.261~270 | number of Cited : 2
    Abstract PDF
    In this paper, we has implemented a tour guide terminal using the embedded linux. The implemented terminal can locate its position using GPS interface and display the sightseeing information of the current location. With view of this implementation results, we confirmed the possibility of embedded linux terminal as a tour guide PDA. The realtime update of sightseeing information using a mobile communication functionality will be included in our future works.
  • 30.

    An Interactive Search Agent based on DotQuery

    SunOk kim | 2006, 11(4) | pp.271~282 | number of Cited : 0
    Abstract PDF
    Due to the development of Internet, number of online documents and the amount of web services are increasing dramatically. However, there are several procedures required, before you actually find what you were looking for. These procedures are necessary to Internet users, but it takes time to search. As a method to systematize and simplify this repetitive job, this paper suggests a DotQuery based interactive search agent. This agent enables a user to search, from his computer, a plenty of information through the DotQuery service, which includes natural languages, and it executes several procedures required instead. This agent also functions as a plug-in service within general web browsers such as Internet Explorer and decodes the DotQuery service. Then it analyzes the DotQuery from a user through its own program and acquires service results through multiple browsers of its own.
  • 31.

    Semi-automation Image segmentation system development of using genetic algorithm

    임혁순 | Park Sangsung | JANG, Dong Sik | 2006, 11(4) | pp.283~290 | number of Cited : 2
    Abstract PDF
    This paper is for the on-line monitoring and controlling system in which remote central processor execute commands based on data transmitted via radio or cable captured from the industrial or marine environments. By executing the appropriate system commands, many mechanical parts in industrial environments and natural factors such as temperature and humidity are to be under control in the way of normal system condition. In this research, we control the temperature of a hydrochloric acid tank to be within the predetermined range by executing temperature controlling commands issued by remote central computer which decides the appropriate action for the total system based on the received sensor data transmitted via radio and cable media. This type of monitoring and controlling system has the various applications such as the disaster prevention system, ubiquitous embedded system, alarm system, and the USN systems.
  • 32.

    A Study on the Anti-copying method for hard copy documents using Human Visual System

    KangHo-Lee | 2006, 11(4) | pp.291~298 | number of Cited : 0
    Abstract PDF
    This paper presents a new anti-copying methode for hard copy documents. The approach protects the document and its content from unauthorized copying and forgeries, while using ordinary paper and ordinary printer. The paper copy is protected against copying as the photocopy version will appear differently when compared to the authorized printed original hard copy using Human Visual System . The anti-copying pattern created through pointillism with a halftone cell and a spot. The proposed method is useful for unauthorized copying and forgeries with high-resolution scanners and photocopiers.
  • 33.

    Development of on-line Monitoring and Controlling System

    Ahn dong soon | LEEKWANGHO | 박영만 | 2006, 11(4) | pp.299~304 | number of Cited : 0
    Abstract PDF
    This paper is for the on-line monitoring and controlling system in which remote central processor execute commands based on data transmitted via radio or cable captured from the industrial or marine environments. By executing the appropriate system commands, many mechanical parts in industrial environments and natural factors such as temperature and humidity are to be under control in the way of normal system condition. In this research, we control the temperature of a hydrochloric acid tank to be within the predetermined range by executing temperature controlling commands issued by remote central computer which decides the appropriate action for the total system based on the received sensor data transmitted via radio and cable media. This type of monitoring and controlling system has the various applications such as the disaster prevention system, ubiquitous embedded system, alarm system, and the USN systems.