Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2007, Vol.12, No.1

  • 1.

    Copy Propagation in CTOC

    김기태 | 김제민 | Weon Hee Yoo | 2007, 12(1) | pp.1~8 | number of Cited : 0
    Abstract PDF
    Although the Java bytecode has numerous advantages, there are also shortcomings such as slow execution speed and difficulty in analysis. Therefore, in order for the Java class file to be effectively executed under the execution environment such as the network, it is necessary to convert it into optimized code. We implements CTOC. CTOC generated CFG using the existing bytecode then created the SSA Form for analysis and optimization. However, due to insertion of the -function in the process of conversion into the SSA Form, the number of nodes increased. As a means of reducing the number of nodes, we performed copy propagation, which is an optimization method applicable to the SSA form. Copy propagation is the process of a value of a variable being copied to another variable. There are cases where conversion due to copy propagation alone does not yield significant effects. However, when variables are not used in the later optimization stages, copy propagation provides a means for eliminating the copy statement for the corresponding variable, making it an important step. This paper shows the copy propagation to obtain a more optimized code in SSA Form.
  • 2.

    Schema management skills for semantic web construction

    Byung-Gon Kim | OH Sung-Kyun | 2007, 12(1) | pp.9~16 | number of Cited : 3
    Abstract PDF
    As the information of the Internet increased, importance of sematic web for collecting and integration of these informations to support decision making of some group or ordinary people are growing as well. Basis structure that composes semantic web is ontology and languages like XML, RDF/RDF schema and OWL are basis means that compose ontology schema. When composes and manages Ontology schema, one of the important consideration point is that schema is changed as times go by. Therefore, change of domain of schema, change of data concept or change of relation between resource etc. are reflected in the ontology system. In this study, we suggest semantic web schema management skill in terms of version management. We categorized version change forms and created version graph for checking of version transition. With created version graph, we define transitivity rule and propose schema tag for detail application which enables extending of applicable version schema.
  • 3.

    Ontology based Educational Systems using Discrete Probability Techniques

    이윤수 | 2007, 12(1) | pp.17~24 | number of Cited : 1
    Abstract PDF
    Critical practicality problems are cause to search the presentation and contents according to user request and purpose in previous internet system. Recently, there are a lot of researches about dynamic adaptable ontology based system. We designed ontology based educational system which uses discrete probability and user profile. This system provided advanced usability of contents by ontology and dynamic adaptive model based on discrete probability distribution function and user profile in ontology educational systems. This models represents application domain to weighted direction graph of dynamic adaptive objects and modeling user actions using dynamically approach method structured on discrete probability function. Proposed probability analysis can use that presenting potential attribute to user actions that are tracing search actions of user in ontology structure. This approach methods can allocate dynamically appropriate profiles to user.
  • 4.

    The Design of Abstract Layer for Motion Capture System

    Heeman Lee | 2007, 12(1) | pp.25~34 | number of Cited : 0
    Abstract PDF
    In this paper, the abstract layer for motion capture system is designed and implemented to meet the various hardware and different capturing method. The abstract layer can offer the unified programming by providing device independent API(Application Programming Interface). The device drivers of the optical system and mechanical system are emulated to verify the designed abstract layer. The optical system employs the AOA file while the mechanical system uses BVH file. An application program is written to call the abstract layer functions to drive both optical and mechanical drivers and receive the frame data, simulated motion data, that are displayed sequentially on the computer screen by utilizing Direct3D.
  • 5.

    Advanced Stability Distributed Weighted Clustering Algorithm in the MANET

    황윤철 | Lee, Sang-ho | Kim Jin-Il | 2007, 12(1) | pp.35~44 | number of Cited : 3
    Abstract PDF
    Mobile ad-hoc network(MANET) can increase independence and flexibility of network because it consists of mobile node without the aid of fixed infrastructure. But, Because of unrestriction for the participation and breakaway of node, it has the difficulty in management and stability which is a basic function of network operation. Therefore, to solve those problems, we suggest a distributed weighted clustering algorithm from a manageable and stable point of view. The suggested algorithm uses distributed weighted clustering algorithm when it initially forms the cluster and uses a concept which is distributed gateway and sub-cluster head to reduce the re-clustering to the minimum which occurs mobile nodes after forming the cluster. For performance evaluation, We compare DCA and WCA with the suggested algorithm on the basis of initial overhead, resubscriber rate and a number of cluster.
  • 6.

    A Study on the Implementation of Information Extraction Agency for Ship Sale and Purchase using Content Based Retrieval

    Ha Chang Seung | 정이상 | 2007, 12(1) | pp.45~52 | number of Cited : 3
    Abstract PDF
    Delay in the process of Information Extraction, IE, is largely due to inability to correctly recognize the user's information requirement of particular search factors. Especially if the wrapper rules are used in a search engine, the search generally fails to classify internet documents properly and efficiently since the application of the same wrapper rules lacks extensibility throughout various types of existing internet document. In case of buying or selling a ship, if the price range, type, place of delivery, inspection site and other information relevant to the sales would be available through the internet for proper retrieval, the sales could more readily succeed by using Ontology relating to sales or purchase information and by selectively searching for the desired information through the content based retrieval system. This system proposes to improve various wrapper systems existing throughout different internet sites and to eliminate unnecessary information tagged on the existing internet documents in order to create a more advanced information retrieval system.
  • 7.

    Detection of the Optimum Spectral Roll-off Point using Violin as a Sound Source

    김재천 | 2007, 12(1) | pp.53~58 | number of Cited : 0
    Abstract PDF
    Feature functions were used for the classification of music. The spectral roll-off, variance, average peak level, and class were chosen to make up a feature function vector. Among these, it is the spectral roll-off function that has a low-frequency to high-frequency ratio. To find the optimal roll-off point, the roll-off points from 0.05 to 0.95 were swept. The classification success rate was monitored as the roll-off point was being changed. The data that were used for the experiments were taken from the sounds made by a modern violin and a baroque one. Their shapes and sounds are similar, but they differ slightly in sound texture. As such, the data obtained from the sounds of these two kinds of violin can be useful in finding an adequate roll-off point. The optimal roll-off point, as determined through the experiment, was 0.85. At this point, the classification success rate was 85%, which was the highest.
  • 8.

    A Flat Hexagon-based Search Algorithm for Fast Block Matching Motion Estimation

    HyeonWoo NAM | 2007, 12(1) | pp.59~68 | number of Cited : 1
    Abstract PDF
    In the fast block matching algorithm, search patterns of different shapes or sizes and the distribution of motion vectors have a large impact on both the searching speed and the image quality. In this paper, we propose a new fast block matching algorithm using the flat-hexagon search pattern that are solved disadvantages of the diamond pattern search algorithm(DS) and the hexagon-based search algorithm(HEXBS). Our proposed algorithm finds mainly the motion vectors that not close to the center of search window using the flat-hexagon search pattern. Through experiments, compared with the DS and HEXBS, the proposed flat-hexagon search algorithm(FHS) improves about 0.4~21.3 % in terms of average number of search point per motion vector estimation and improves about 0.009~0.531 dB in terms of PSNR(Peak Signal to Noise Ratio).
  • 9.

    Construction of Panoramic Image for Efficient Video Browsing

    SeongYoon Shin | Kihong Park | Pyo,Sung-Bae | 2007, 12(1) | pp.69~74 | number of Cited : 1
    Abstract PDF
    In this paper, we present a construction method using perspective model which allows for the representation of the motion of a planar surface under perspective projection. The motion parameters are obtained by minimizing a disparity measure between the region in the current frame and the mapped region in the previous frame. The frames are constructed with dynamic panoramic image using a fixed reference or a time varying reference. By experiment, panoramic image proposed in this paper represents contents more efficiently than static image or video, and has a high volume reduction ratio.
  • 10.

    An Energy-Efficient Data Aggregation using Hierarchical Filtering in Sensor Network

    김진수 | 박찬흠 | ChongGun Kim and 1other persons | 2007, 12(1) | pp.75~84 | number of Cited : 10
    Abstract PDF
    This paper proposes how to reduce the amount of data transmitted in each sensor and cluster head in order to lengthen the lifetime of sensor network by data aggregation of the continuous queries. The most important factor of reducing the sensor's energy dissipation is to reduce the amount of messages transmitted. The method proposed is basically to combine clustering, in-network data aggregation and hierarchical filtering. Hierarchical filtering is to divide sensor network by two tiers when filtering it. First tier performs filtering when transmitting the data from cluster member to cluster head, and second tier performs filtering when transmitting the data from cluster head to base station. This method is much more efficient and effective than the previous work. We show through various experiments that our scheme reduces the network traffic significantly and increases the network's lifetime than existing methods.
  • 11.

    The Effect of Computer Game-Based Learning on Computer Education Achievements of Middle Schoolers

    홍일순 | Kim Sung Wan | Seo Jeong-Man | 2007, 12(1) | pp.85~90 | number of Cited : 11
    Abstract PDF
    The goal of this research was to investigate the effect the computer game-based learning has on learning achievement in computer education for middle school students. To achieve this goal, 74 middle schoolers were allocated into the experiment group(34 students) with the educational computer games class and the control group(34 students) with the traditional face-to-face class. After identifying the homogeneity of two groups through the pre-test, the experiment was carried out. As a result, the mean difference between the experiment group and the control group was statistically significant. That is, learning achievement of middle schoolers utilizing the computer games was higher than that of the face-to-face class. It is suggested that the game factors should be considered in designing the computer education.
  • 12.

    Design of Mobile Phone Middleware based on Integrated Context Provisioning Strategy

    정현진 | Yoo-Heon Won | 2007, 12(1) | pp.91~100 | number of Cited : 0
    Abstract PDF
    In these days, the use of context in application running on mobile devices such as PDAs and smart phone has become a crucial requirement for several research areas, including ubiquitous computing, mobile computing. Previous middlewares which support context provisioning uses single strategy. But, this paper proposed middleware integrated multiple strategies for context provisioning, namely internal sensors-based, external infrastructue-based, and distributed provisioning in ad hoc networks. Applications can query needed context items using SQL like context query language and require context information to use different provisioning mechanisms depending on resource availability and presence of external infrastructures.
  • 13.

    Through an effort to advance computer technology, studying aspects of developing formal and unformal education

    kyungDon Han | 최길동 | 2007, 12(1) | pp.101~108 | number of Cited : 4
    Abstract PDF
    In order to make new productions; first of all, a creative idea is necessary and significance. For developing new production, a creative thinking must be a first step. In other words, a creative thinking can be a solving a problem. Better education for the formal and unformal education, various information and using space are able to develop ability of problems. Group study can students can find their talents, capacity, gifts, and ability. Also, students help to develop ideas of an individual. Therefore, through an effort to advance computer technology, developing good models in creative ideas for formal and informal education. As a result, good efforts and aspects can be produced.
  • 14.

    The Authentication Model which Utilized Tokenless OTP

    김기환 | 박대우 | 2007, 12(1) | pp.109~118 | number of Cited : 3
    Abstract PDF
    Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware of Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache poisoning attack and confirm limitation by Snooping about user password .Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity.Do test for access control inflecting Tokenless OTP at Remote Access from outside, and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.
  • 15.

    A Study of Web Forensics Algorithm that used Log History Analysis

    정정기 | 박대우 | 2007, 12(1) | pp.119~128 | number of Cited : 2
    Abstract PDF
    Web Forensics algorithm used to an extraction of technical Web Forensics data to be adopted to proof data regarding a crime cyber a computer at data of a great number of log History is an essential element. Propose Web Forensics algorithm, and design at these papers, and try to implement in a Web server system of an actual company. And make the Web dispatch Loging system configuration experiment that applied integrity regarding Web log History information or authentication regarding an information source. Design Web Forensics algorithm and the Flow which used for Web log History analyses at server of e-mail, webmail, HTTP (Web BBS, Blog etc.), FTP, Telnet and messengers (MSN, NateOn, Yahoo, DaumTouch, BuddyBuddy, MsLee, AOL, SoftMe) of a company, and implement through coding. Therefore have a purpose of these paper to will contribute in scientific technical development regarding a crime cyber a computer through Web Forensics.
  • 16.

    A Fuzzy-based Network Intrusion Detection System Through sessionization

    박주기 | Choi Eun-Bok | 2007, 12(1) | pp.129~138 | number of Cited : 1
    Abstract PDF
    As the Internet is used widely, criminal offense that use computer is increasing, and an information security technology to remove this crime is becoming competitive power of the country. In this paper, we suggest network-based intrusion detection system that use fuzzy expert system. This system can decide quick intrusion decision from attack pattern applying fuzzy rule through the packet classification method that is done similarity of protocol and fixed time interval. Proposed system uses fuzzy logic to detect attack from network traffic, and gets analysis result that is automated through fuzzy reasoning. In present network environment that must handle mass traffic, this system can reduce time and expense of security
  • 17.

    Implementation of QoS-Measuring System for Voice over IP

    Hyun-Joong Kang | 남흥우 | 2007, 12(1) | pp.139~146 | number of Cited : 0
    Abstract PDF
    Advances in networking technology, digital media, and codecs have made it possible for the Internet evolves into a Broadband convergence Network (BcN) and provides various services including Voice over Internet Protocol (VoIP) and IPTV over their high-speed IP networks. In order for the Internet to make a profit as traditional Public Switched Telephone Network (PSTN), it must provide high quality VoIP services. Therefore, real time quality measurement framework is the most important requisite to provide VoIP service. For this, IETF (Internet Engineering Task Force) defined RTCP-Extended Reports (RTCP-XR) that extend RTCP (Real-Time Transport Protocol Control Protocol). However, procedure and method for actually VoIP quality measurement did not recommended nothing but defined item to measure voice quality. Our objective in this paper is to describes a practical measuring framework for end-to-end QoS of switched voice packet in an IP environment. It includes concepts as well as step-by-step procedures for measuring packetized voice streams. It also proposes new formats that extend RTCP-XR's concept.
  • 18.

    A Study on performance improvement of MMSE Multi-User Detector

    유동관 | 2007, 12(1) | pp.147~156 | number of Cited : 0
    Abstract PDF
    In this paper, an improved detection method is proposed by supplementing various types of Multi-Path gain for a MMSE Multi-User detecter. This method is proposed to complement the shortcomings of the conventional detection method which is used for multiuser detection in STBC(Space-Time Block Code) CDMA system. We analyzed the improved method in bit error probability viewpoint and compared the result with that of the conventional method. In this result, we showed that the improved method obtains better performance of bit error probability than the conventional method when parameters such as delay, number of user and SNR are changed.
  • 19.

    A Study on Binary CDMA System Correlator Design for High-Speed Acquisition Processing

    Lee, Seon-Keun | 정우열 | 2007, 12(1) | pp.157~162 | number of Cited : 0
    Abstract PDF
    Because output of multi-code CDMA system adapted high speed data transmission becoming multi-level system use linear amplifier in output stage and complex output signal. Therefore, Multi-Code CDMA system has shortcoming of high price, high complexity etc.. Binary CDMA technology that allow fetters in existing CDMA technology to supplement this shortcoming proposed. In binary CDMA system When correlator process high speed data, bottle-neck phenomenon is happened on synchronization acquisition process, it is very important parameter. Because existent correlator must there be advantage that power consumption is small but flow addition of several stages to receive correlation's value, the processing speed has disadvantage because the operation amount is much. Therefore in this paper, proposed correlator has characteristic such as data is able to high speed processing, chip area is independent and power consumption is constant in structure in binary CDMA system.
  • 20.

    A Study of Web Application Attack Detection extended ESM Agent

    kim,Sung-Rak | 2007, 12(1) | pp.163~170 | number of Cited : 4
    Abstract PDF
    Web attack uses structural, logical and coding error of web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.
  • 21.

    IT Industry Complex Scheme in Yongin City

    최종호 | 2007, 12(1) | pp.171~178 | number of Cited : 0
    Abstract PDF
    In this paper, we suggest the IT industry complex strategy based on previous study on the success factor and success strategy for the promotion of IT industry in Yongin city. The strategy factors are evaluated by the three groups(IT firms, local government official worker, professor) which have an influence on IT policy, and the priority and important rate of strategy analyzed by AHP. The results of this research extracted through expert inquiry and survey contribute to assist planners and policy-makers in supporting IT industry by providing useful information about the suggested strategy.
  • 22.

    A Nonunique Composite Foreign Key-Based Approach to Fact Table Modeling and MDX Query Composing

    Han-Ju Yoo | 이덕성 | CHOI IN SOO | 2007, 12(1) | pp.179~190 | number of Cited : 2
    Abstract PDF
    A star schema consists of a central fact table, which is surrounded by one or more dimension tables. Each row in the fact table contains a multi-part primary key(or a composite foreign key) along with one or more columns containing various facts about the data stored in the row. Each of the composit foreign key components is related to a dimensional table. The combination of keys in the fact table creates a composite foreign key that is unique to the fact table record. The composite foreign key, however, is rarely unique to the fact table record in real-world applications, particularly in financial applications. In order to make the composite foreign key be the determinant in real-world application, some precalculation might be performed in the SQL relational database, and cached in the OLAP database. However, there are many drawbacks to this approach. In some cases, this approach might give users the wrong results. In this paper, an approach to fact table modeling and related MDX query composing, which can be used in real-world applications without performing any precalculation and gives users the correct results, is proposed.
  • 23.

    Information Transfer Method of Dangerous Road Condition

    Soo Jin An | 김영욱 | Min-Hong Han | 2007, 12(1) | pp.191~200 | number of Cited : 0
    Abstract PDF
    Developed safety system which transfers danger information to rear cars for accident prevention when drivers detect a accident, a dropping or a freezing during driving on the high way. To prevent an accident, each vehicles mount OBU which is made up of a GPS unit and a transmitter-receiver and the trace of road is always renewed and saved in OBU per a regular past distance. When the driver see dangerous situation, transfer a danger pattern and a trace information by pressing button. All cars which receive information compare the received data with the original data. And then, only cars which are located at the rear in a regular distance respond and occur a warning. Performed a road test at the rate of 30~50 kilometer a hour using two test cars which saved about 120meter's space between them were mounted OBU which had 447Mhz transceiver. As a result of the experiment, communication between test cars had no problem. Accordingly, it can use a safety driving device because driver can notice a danger situation and get themselves ready for it using this system in advance.
  • 24.

    A Study on the Overseas Marketing Research

    이근영 | 2007, 12(1) | pp.201~206 | number of Cited : 6
    Abstract PDF
    The objective of this study is to interpret that at international business management, overseas marketing research is very important to enter the new market as well as competitive market in the wold. There are many distinct components of the environment which can affect the exporting company, so the exporting company must to find the opportunities and threats in foreign market after it researches the firms export potential for successful or survival themselves. Often the export marketing research is a more difficult and complex task than the domestic marketing research. As international marketing activities for exporting company, an investigator has to get abilities for understanding regional culture and to analyze the data for investigation and findings as skeptical mind.
  • 25.

    A Systematic Evaluation on the Management Efficiency of General Bank

    Heejin Jung | 2007, 12(1) | pp.207~220 | number of Cited : 11
    Abstract PDF
    The purpose of this paper is to measure and analyze the efficiency of management in general bank. Each bank was analyzed to find out the efficiency and classified as efficient and inefficient bank. To the inefficient bank, the inefficient part and the extent are found out, the improvement methods of efficiency are suggested, and the effects of scale of bank on management efficiency by BCC model are analyzed. And, the differences between commercial bank and local bank also are examined. Empirical main results are as follows: Frist, After 2000, both of commercial and local bank shows the continuous improvement of the management efficiency. Second, the relative efficiency of management of commercial bank is higher than local bank except 2004. Third, there are differences in variables except equity ratio and no differences appeared in the management efficiency between commercial bank and local bank. Fourth, there are no influences or negative influences by M&A and reconstruction among banks in the effect of scale to the management efficiency.
  • 26.

    A Study on the Performance of the M&A Firm in KOSDAQ

    김경식 | 2007, 12(1) | pp.221~232 | number of Cited : 3
    Abstract PDF
    The results of the research on M&A firms in the KOSDAQ market are as follows. First, the effect of the M&A disclosure at the time of disclosure was that the positive (+) cumulative abnormal return (CAR) can be interpreted as an increase in the value of the firm; however, in the long run, firms which used the KOSDAQ index and the control firm, which did not use the index were found to have conflicting results. Second, the findings show that the rise in value of general firms resulting from a M&A were higher that those of venture firms. Third, in testing the performance extrapolation hypothesis, it was shown that the performance of "value" firms (firms with a high B/M ratio but poor performance in the past) was better after a M&A than those of the "glamour" firms and that the performance extrapolation hypothesis was substantiated. Fourth, it can be construed that a size effect in a merger exists. The CAR of the small firms surpasses those of large firms. Fifth, in verifying operating performance, most variables showed a positive (+) value at the time of M&A but showed a negative (-) value after a M&A. These results show that because on the Korean KOSDAQ market, M&As are approached from a financial rather than an economic aspect, it can be inferred that it lowers the firm’s value.
  • 27.

    A Study on the Relation of Bottleneck and Satisfaction Factors in Korean Succession Companies

    RHO, HYUNG JIN | 한상도 | Docsung Jang | 2007, 12(1) | pp.233~244 | number of Cited : 4
    Abstract PDF
    This study was conducted to identify the relation of bottleneck and satisfaction factors in Korean succession companies. The final goal of this paper is finding some strategies and supporting system for Korean succession companies. According to the results of the study, we found four latent variables of the cause variables and two latent variables of the result variables. Three latent variables of the cause variables have an direct effect on two latent variables of the result variables.
  • 28.

    An Empirical Study on ERP Package in Korean SMEs

    KIMSheungKown | PARK SEUNG BONG | Jaeyoung Kim | 2007, 12(1) | pp.245~254 | number of Cited : 3
    Abstract PDF
    In recent years, there has been a growing concern about enterprise resource planning (ERP) implementation in small and medium-sized enterprises (SMEs). In this study, we investigate the relationship among ERP software quality, vendor support, user information satisfaction, and performance of ERP implementation. The empirical findings of this paper will allow SMEs to identify the importance of relationships with vendors and software itself for the successful implementation of ERP systems. The results provide a useful basis for the SMEs which have limited information capability to focus their attention on the software quality and vendor support in overcoming difficulties and obstacles facing the ERP implementation.
  • 29.

    A Method to create transcoding path of unit transcoder considering QoS

    DongYeop Ryu | Sungmi Chon | Young-Hwan Lim | 2007, 12(1) | pp.255~262 | number of Cited : 0
    Abstract PDF
    A multimedia converter is used to create media suitable for own environment. If the data complying with own demands can not be created, it may accompany with a problem that has to convert the data with another transcoder. In addition, conventional converters do not consider source QoS and target QoS sufficiently, meaning that users should have a significant knowledge base about various media in order to obtain desired results. These problems become limits on the UMA(Universal Multimedia Access) environment. In this paper, we create a suitable transcoding path before performing the Digital Item conversion in consideration of source QoS and target QoS. The created transcoding path performs the adaptive transcoding using unit exchanges featuring connectivity. The consideration of QoS allows users to use the multimedia easily. Since the proposed model, in addition, use the unit transcoder, it provides a excellent adaptive capability for new QoS.
  • 30.

    Development of Vehicle Detection System by Using Motion Vector of Corner Point

    SangHoon Han | 2007, 12(1) | pp.263~270 | number of Cited : 1
    Abstract PDF
    The research about Intelligence Transport Systems(ITS) is actively studied for the traffic problem solution recently. Also, the various methods to detect vehicles moving in the roads are studied. This research using image processing technology is to give the drivers the road information quickly by developing Vehicle Detection System that detects through traffics. Purpose of this research is developing efficient algorithm to facilitate hardware composition. We use morphology method to extract corner points in the images captured by CCD camera. Also, the proposed algorithm detects vehicle's moving area by using motion vectors between corner points. The experiments of the proposed algorithm whose processing time was shortened show good results in vehicle detection on the live road images.
  • 31.

    Research of a Development Plan on the Integrated Weapon System Database based on Integrated Operation and Management System for the Aircraft Development Management

    정준영 | 김천영 | 김종진 and 1other persons | 2007, 12(1) | pp.271~276 | number of Cited : 0
    Abstract PDF
    National defense research and development is trying to develop the weapon system to satisfy users' requirements at minimum cost, high quality and the shortest period. Under integrated database computer environments, development processes and tools have been developed to implement system engineering and concurrent engineering systematically. In the aerospace defense weapon system, the fixed wing development department has developed and operated the integrated operation and management information system based on web technology to manage efficiently the technical information generated by the R&D process. When this system was applied to the existing R&D project for the aircraft weapon system, it proved and verified its efficiency. In this paper, we describe the future development plan of an integrated R&D framework and an integrated weapon system database based on the integrated operation and management information system which are able to control the technical information of KF-X, UAV(Unmanned Aerial Vehicles) and UCAV(Unmanned Combat Aerial Vehicles) programs. We also describe an interoperability and integration plan with WISEMAN which will be operated soon in our research Institute.