Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

Home > Explore Content > All Issues > Article List

2007, Vol.12, No.2

  • 1.

    Implementation of Dead Code Elimination in CTOC

    김기태 , 김제민 , Weon Hee Yoo | 2007, 12(2) | pp.1~8 | number of Cited : 1
    Abstract PDF
    Although the Java bytecode has numerous advantages, there are also shortcomings such as slow execution speed and difficulty in analysis. Therefore, in order for the Java class file to be effectively executed under the execution environment such as the network, it is necessary to convert it into optimized code. We implements CTOC. In order to statically determine the value and type, CTOC uses the SSA Form which separates the variable according to assignment. Also, it uses a Tree Form for statements. But, due to insertion of the -function in the process of conversion into the SSA Form, the number of nodes increased. This paper shows the dead code elimination to obtain a more optimized code in SSA Form. We add new live field in each node and achieve dead code elimination in tree structures. We can confirm after dead code elimination though test results that nodes decreases.
  • 2.

    MPEG-7 Scheme Based Embedded Multimedia Database Management System in Mobile Environment

    안병태 , 강영신 | 2007, 12(2) | pp.9~20 | number of Cited : 4
    Abstract PDF
    In recent, development of wireless internet technology gradually has increased multimedia application in mobile device. Specially, application of grand capacity multimedia contents has increased in mobile environment gradually. MPEG-7 can search multimedia data using various type. But in restricted grand capacity of multimedia, MPEG-7 is used to be limited in desktop computer system mostly. Therefore, management of grand capacity multimedia data has become very important researching topic in mobile environment, and so embedded DBMS based on MPEG-7 for multimedia data management in client-server environment is needed. The system supports restricted hardware resource for multimedia application in mobile device. In this paper, we propose a method for MPEG-7 data clustering that included MPEG-7 data property. On the base of the clustering result, we also develop the embedded multimedia database management system based on MPEG-7 scheme(EMDS:MPEG-7 Scheme Based Embedded Multimedia Database Management System) in mobile device such as PDA.
  • 3.

    A Study on Creation of 3D Facial Model Using Facial Image

    이혜정 , Joung Suck-Tae | 2007, 12(2) | pp.21~28 | number of Cited : 4
    Abstract PDF
    The facial modeling and animation technology had been studied in computer graphics field. The facial modeling technology is utilized much in virtual reality, research purpose of MPEG-4 and so on and movie, advertisement, industry field of game and so on. Therefore, the development of 3D facial model that can do interaction with human is essential to little more realistic interface. We developed realistic and convenient 3D facial modeling system that using a optional facial image only. This system allows easily fitting to optional facial image by using the Korean standard facial model (generic model). So it generates intuitively 3D facial model as controling control points elastically after fitting control points on the generic model wire to the optional facial image. We can confirm and modify the 3D facial model by movement, magnify, reduce and turning. We experimented with 30 facial images of 630×630 sizes to verify usefulness of system that developed.
  • 4.

    A Technique to Analyze Heap Usage of Java Programs Using Code Inserting

    주성용 , 조장우 | 2007, 12(2) | pp.29~36 | number of Cited : 0
    Abstract PDF
    In the Java a profiler interface such as JVM TI is provided for communication between a Java virtual machine and a profiler. The JVM specification, however, does not require an implementation of a profiler interface. Consequently the JVM without an implementation of a profiler interface cannot use a profiler with the JVM TI. For solving the problem, we propose a technique which analyzes heap usage without a profiler interface. This technique inserts codes to extract heap usage into source files in the Java. We implemented a code inserter to verify the proposed technique. We experimented with Java programs that are frequently used and opened, the experimental result presents the number of created objects, the maximum number of allocated objects, and the used pattern of the objects.
  • 5.

    A Design and Implementation of the User Customized e-Ring(Enterprise Ring Back Tone) System

    Jung-Sook, Kim , 양명연 , HongSop Kim | 2007, 12(2) | pp.37~46 | number of Cited : 0
    Abstract PDF
    In this paper, we proposed a new customized e-Ring(Enterprise Ring Back Tone) system which could be represented each user and organization feature. The e-Ring system provided the ring back tone and additional services to reduce the waiting time when the client called an organization. This system was for an appropriate organization public relations instead of the meaningless ring back tone which was used usual call, also was maximized the service availability and work efficiency which was obtained from the automatic response and service suppling to users who had needs and questions.
  • 6.

    A Method for the Region Segmentation for Satellite Images using Region Split and Merge

    Byung-Tae Chun , 장대근 | 2007, 12(2) | pp.47~52 | number of Cited : 0
    Abstract PDF
    Conventional pixel based region segmentation methods have problems of long processing time and incorrect region split on account of performing region split through comparison of neighboring pixels. In this paper, we propose the method which segments a large size of satellite image effectively using modified centroid linkage method. This method is a sort of region split and merge. The proposed method merges pixels and makes them as a new region through only two directional comparing the current positioning pixel with neighbor ones, if they are satisfied with given conditions. Therefore, this method has less comparing time than the cases of previous ones. The experimental result shows that the proposed method is very efficient because of having less processing time and more exact segmented regions than the previous ones.
  • 7.

    The Proposal of the Robust Fuzzy Wavelet Morphology Neural Networks Algorithm for Edge of Color Image

    변오성 | 2007, 12(2) | pp.53~62 | number of Cited : 1
    Abstract PDF
    In this paper, it can propose that Fuzzy Wavelet Morphology Neural Networks for the edge detection algorithm with being robustly a unclear boundary parts by brightness difference and being less sensitivity on direction to be detected the edges of images. This is applying the Fuzzy Wavelet Morphology Operator which can be simple the image robustly without the loss of data to DTCNN Structure for improving defect which carrys out a lot of operation complexly. Also, this color image can segment Y image with YCbCr space color model which has a lossless feature information of edge boundary sides effectively. This paper can offer the simulation of color images of 50ea for the performance verification of the proposal algorithm.
  • 8.

    A New Crossing Structure Based DB-DES Algorithmfor Enhancing Encryption Security

    Junyong Lee , 김대영 | 2007, 12(2) | pp.63~70 | number of Cited : 0
    Abstract PDF
    The Data Encryption Standard (DES) is a block cipher that encrypts a 64 bit block of plaintext into a 64 bit block of ciphertext. The DES has been a worldwide standard for 20 years since it was adopted in 1976. strong. But, due to the rapid development of hardware techniques and cryptanalysis, the DES with 64-bit key is considered to be not secure at the present time. Therefore it became necessary to increase the security of DES. The NG-DES(New Generation DES)[1] is an encryption system which upgrades the encryption security of DES by the key extension and the usage of non-linear f function. It extends not only the size of plaintext and ciphertext to 128 bit but also the Fiestel structure used in each round. This structure has a weak point that the change of each bit of plaintext does not affect all bits of ciphertext simultaneously. In this paper, we propose a modified Fiestel structure of DES and thus increased confusion and diffusion by effectively cross-connecting between outputs in a round and inputs in next round.
  • 9.

    An Improved Object Detection Methodusing Hausdorff Distance based on Elastic Deformation Energy

    원보환 , KOO JA YOUNG | 2007, 12(2) | pp.71~76 | number of Cited : 2
    Abstract PDF
    Object detection process which makes decision on the existence of meaningful objects in a given image is a crucial part of image recognition in computer vision system. Hausdorff distance metric has been used in object detection and shows good results in applications such as face recognition. It defines the dissimilarity between two sets of points and is used to find the object that is most similar to the given model. This paper proposes a Hausdorff distance based detection method that uses directional information of points to improve detection accuracy when the sets of points are derived from edge extraction as is in usual cases. In this method, elastic energy needed to make two directional points coincident is used as a measure of similarity.
  • 10.

    Recognition of Concrete Surface Cracks Using Enhanced Max-Min Neural Networks

    Park, Hyun-Jung , Kim, Kwang-baek | 2007, 12(2) | pp.77~82 | number of Cited : 4
    Abstract PDF
    In this paper, we proposed the image processing techniques for extracting the cracks in a concrete surface crack image and the enhanced Max-Min neural network for recognizing the directions of the extracted cracks. The image processing techniques used are the closing operation of morphological techniques, the Sobel masking for extracting for edges of the cracks, and the iterated binarization for acquiring the binarized image from the crack image. The cracks are extracted from the concrete surface image after applying two times of noise reduction to the binarized image. We proposed the method for automatically recognizing the directions of the cracks with the enhanced Max-Min neural network. Also, we propose an enhanced Max-Min neural network by auto-tuning of learning rate using delta-bar-delta algorithm. The experiments using real concrete crack images showed that the cracks in the concrete crack images were effectively extracted and the enhanced Max-Min neural network was effective in the recognition of direction of the extracted cracks.
  • 11.

    Trilinear Isosurface Extraction Using Cell Decomposition

    손봉수 | 2007, 12(2) | pp.83~92 | number of Cited : 1
    Abstract PDF
    This paper describes an algorithm to compute and visualize a topologically accurate trilinear isosurface from three dimensional volumetric image via cubic cell decomposition. An isosurface is often used for visualizing a three dimensional volumetric image. An isosurface defined in each cubic cell of the volume is triangulated in order to be visualized in a computer. However, most isosurface extraction methods generate a triangulated isosurface which may not be topologically equivalent to the ideal trilinear isosurface. We propose a method to decide a correct connectivity of a trilinear isosurface in a cubic cell and perform appropriate cell decomposition according to the decision. Using the method, we can extract isosurface triangles from the cells generated by the decomposition. We prove that this method generates a triangulated isosurface which is topologically equivalent to the trilinear isosurface. We implemented our proposed algorithm and the result shows it can generate topologically accurate trilinear isosurface.
  • 12.

    A study on about a Exclusive Firewall for operation the efficient network security

    Jeong Hoon Jeon , 전상훈 | 2007, 12(2) | pp.93~102 | number of Cited : 4
    Abstract PDF
    Firewall system is a security system for protect the network and is needed for constructing the trusted network. However, these firewall systems deteriorate the performance of whole network in about 60% because of Inefficiency policy establishment and unnecessary traffic occurrence. Therefore, there is a strong needs to establish the network performance elevation, efficient operation and reassignment of the firewall system. In this dissertation, we will analyze how each functionalities of the firewall system affect to the network performance via using a simulation result according to functionality of the firewall system and propose a exclusive firewall system for the efficient network operation.
  • 13.

    New Shot Boundary Detection Using Local X2-Histogram and Normalization

    SeongYoon Shin | 2007, 12(2) | pp.103~110 | number of Cited : 3
    Abstract PDF
    In this paper, we detect shot boundaries using X2-histogram comparison method which have enough spatial information that is more robust to the camera or object motion and produce more precise results. Also, we present normalization method to change Log-Formula and constant that is used for contrast enhancement of image in image processing and apply in difference value. And, present shot boundary detection algorithm to detect shot boundary based on general shot and abrupt shot's characteristic.
  • 14.

    A Dynamic Scheduling Method for Mobile Broadcasting Using User Profiles

    MEE HWA PARK , Lee, Yong Kyu | 2007, 12(2) | pp.111~122 | number of Cited : 1
    Abstract PDF
    In mobile computing environments, data broadcasting is widely used to resolve the problem of limited power and bandwidth of mobile equipments. However, the previous broadcast scheduling methods can be inefficient in the environment where the user requests change dynamically since they are based on static data requests. Moreover, a high-priority user can wait long for infrequently requested data because they never consider the priority of listeners. In this paper, we propose a new broadcast scheduling method that reflects dynamic changes of user requests using user profiles. It also reflects user priorities to reduce the access time of high-priority users. We evaluate the performance of the proposed method through simulation.
  • 15.

    Multimodality Image Registration and Fusion using Feature Extraction

    Sang-Keun Woo , Kim, JeeHyun | 2007, 12(2) | pp.123~130 | number of Cited : 0
    Abstract PDF
    The aim of this study was to propose a fusion and registration method with heterogeneous small animal acquisition system in small animal in-vivo study. After an intravenous injection of 18F-FDG through tail vain and 60 min delay for uptake, mouse was placed on an acryl plate with fiducial markers that were made for fusion between small animal PET (microPET R4, Concorde Microsystems, Knoxville TN) and Discovery LS CT images. The acquired emission list-mode data was sorted to temporally framed sinograms and reconstructed using FORE rebining and 2D-OSEM algorithms without correction of attenuation and scatter. After PET imaging, CT images were acquired by mean of a clinical PET/CT with high-resolution mode. The microPET and CT images were fusion and co-registered using the fiducial markers and segmented lung region in both data sets to perform a point-based rigid co-registration. This method improves the quantitative accuracy and interpretation of the tracer.
  • 16.

    High Speed Motion Match Utilizing A Multi-Resolution Algorithm

    주헌식 | 2007, 12(2) | pp.131~140 | number of Cited : 0
    Abstract PDF
    This paper proposed a multi-resolution algorithm. Its search point and complexity were compared with those of block match algorithm. Also the speed up comparison was made with the block match algorithm. The proposed multi-resolution NTSS-3 Level algorithm was compared again with its targets, TSS-3 Level algorithm and NTSS algorithm. The comparison results showed that the NTSS-3 Level algorithm was superior in search point and speed up. Accordingly, the proposed NTSS-3 Level algorithm was two to three times better in search point and two to four times better in complexity calculation than those of the compared object, the block match algorithm. In speed up, the proposed NTSS-3 Level algorithm was two times better. Accordingly, the proposed multi-resolution NTSS-3 Level algorithm showed PSNR ration portion excellency in search point and speed up.
  • 17.

    A Energy Saving method using Cluster State Transition in Sensor Networks

    김진수 | 2007, 12(2) | pp.141~150 | number of Cited : 4
    Abstract PDF
    This paper proposes how to reduce the amount of data transmitted in each sensor and cluster head in order to lengthen the lifetime of sensor network. The most important factor of reducing the sensor's energy dissipation is to reduce the amount of messages transmitted. This paper proposed is to classify the node's cluster state into 6 categories in order to reduce both the number and amount of data transmission; Initial, Cluster Head, Cluster Member, Non-transmission Cluster Head, Non-transmission Cluster Member, and Sleep. This should increase the efficiency of filtering and decrease the inaccuracy of the data compared to the methods which enlarge the filter width to do more filtering. This method is much more efficient and effective than the previous work. We show through various experiments that our scheme reduces the network traffic significantly and increases the network's lifetime than existing methods.
  • 18.

    Design of Software Architecture for Integrating of Messages between Semiconductor Equipments

    임용묵 , 황인수 , KIM WOO SUNG and 1 other persons | 2007, 12(2) | pp.151~160 | number of Cited : 2
    Abstract PDF
    It is very important to collect all production-related status values during the manufacturing process of semiconductor. The analysis results of the collected data can be used for the operation rate, fault diagnosis, process control and removal of predicted obstacles of equipments, eventually contributing to the improvement of production efficiency. For this purpose, many IC makers have adopted EES(Equipment Engineering System). As the use of web has become a daily life activity lately, it has been suggested to expand the scope of monitoring equipments using HTTP or SOAP protocols. To fulfill the web-based EES, EDA(Equipment Data Aquisition) should be facilitated first by integrating and standardizing various forms of messages generated from many different semiconductor equipments. In this paper, a method for integration between different types of information is suggested based on the analysis of various protocols used for the communication between semiconductor equipments. In addition, a software architecture to support the method is designed.
  • 19.

    Remote Control Apparatus and Display Remote ControlSystem Comprising the Same

    윤여준 , 박대우 | 2007, 12(2) | pp.161~170 | number of Cited : 1
    Abstract PDF
    This paper is a matter of remote control apparatus and display remote control system comprising the same. The remote controller is a wireless remote pointing device that is included a function of mouse and a function of remote controller for VOD etc. It is assembled a sending signal part to communicate with display device, a image sensor part to capture a scene of front view and a main body. Also, it includes a control part that analyzes the captured image, calculates a relative moving factor that main body is moved by user, and then controls the mouse cursor on the display device. The remote control apparatus is able to capture a seen of front view, to analyze the captured image, and to move a mouse cursor point on the display device as much as it calculated relative moving factor. Therefor it brings down the cost of production by a product design that is increased user satisfaction. And it, using the patent and the new product design, will make an epoch in development of the remote control system for Ubiquitous broadcasting industry.
  • 20.

    A Study of Information Leakage Prevention through Certified Authentication in Phishing, Vishing, SMiShing Attacks

    박대우 , Seo Jeong-Man | 2007, 12(2) | pp.171~180 | number of Cited : 6
    Abstract PDF
    The financial crime that used morale anger Phishing, Pharming, Vishing, SMiSing etc. will gain during recent cyber crimes. We are study systematically whether or not leakage of information and infringement can how easily occur to Phishing, Vishing, SMiSing using a social engineering technique and VoIP at these papers through experiment. A hacker makes Phishing, Vishing site, and test an information infringement process of a user through PiSing mail and a virus, a nasty code, Vishing, a SMiSing character, disarmament of Keylogger prevention S/W etc. as establish server. Information by Phishing, Vishing, SMiSing is infringed with leakage in the experiment results, and confirm, and test certified certificate and White List and a certified authentication mark, plug-in program installation etc. to prevention, and security becomes, and demonstrate. Technical experiment and prevention regarding Phishing of this paper and Vishing attack reduce the damage of information infringement, and be education for Ubiquitous information security will contribute in technical development.
  • 21.

    A Decoding Algorithm Using Graph Transformation in A Genetic Algorithm for Undirected Rural Postman Problems

    Kang, Myung-Ju | 2007, 12(2) | pp.181~188 | number of Cited : 1
    Abstract PDF
    Undirected Rural Postman Problem(URPP) is a problem that finds a shortest tour traversing the given arcs at least once in a given network. The URPP is one of the basic network problems used in solving the various real-world problems. And it is known as NP-Complete. URPP is an arc-oriented problem that the direction of a tour in an arc has to be considered. Hence, in URPP, it is difficult to use the algorithm for Traveling Salesman Problem (TSP), which is a node-oriented problem, directly. This paper proposes the decoding algorithm using graph transformation in the genetic algorithm for URPP. That is, you can find the entire tour traversing without considering the direction of arcs by transforming the arc-oriented graph into the node-oriented graph. This paper compares the performances of the proposed algorithm with an existing algorithm. In the simulation results, the proposed algorithm obtained better than the existing algorithm
  • 22.

    Routing Protocol Supporting QoS in Mobile Ad-hoc Network

    강경인 , 박경배 | 2007, 12(2) | pp.189~196 | number of Cited : 4
    Abstract PDF
    In this paper, we proposed a mobile ad hoc routing protocol based on AODV(Ad hoc On demand Distance Vector) with QoS(Quality of Service) support and evaluated the performance through simulation. The waste of communication resources is reduced by establishing the shortest route suitable to QoS support, considering in advance the usable communication resources at each node. For performance evaluation, we analyzed the average data reception rate , considering the node mobility and the number of best effort/QoS data flows. We found that in the mobile Ad Hoc networks the QoS service for some specific data flows increased the average data reception rate for the QoS data flows.
  • 23.

    A Study of Interactive WOM Marketing Effect of Digital Media

    안경환 , kwak,bong-chul | 2007, 12(2) | pp.197~208 | number of Cited : 0
    Abstract PDF
    This thesis suggested that the 'customized' marketing would be a new strategy in terms of a marketing in the digital media age under the circumstances where a form of marketing was evolving in accordance with the convergence of digital media. Because of the media environment due to an 'individualization', the strategy would meet an individual demand of a consumer in a rapidly changing environment. The best marketing to capture a ‘customer's heart’ is not a brand that first entered the market, but the one that is first settled in a customer's heart. If a differentiated interactive marketing strategy is equipped, it is possible to capture a completely new market space ad create a profit over several years. In the aspect of an effect of a digital marketing, first, a concept relating to an interaction between a consumer and a producer is important. Secondly, the important one is an empathy marketing which is an emotional marketing through a brand image beyond a product. Thirdly, the author studied an orally transmitted marketing effect through digital media.
  • 24.

    Efficient Content Sharing in Ad Hoc Networks

    Seung-Seok Kang | 2007, 12(2) | pp.209~220 | number of Cited : 0
    Abstract PDF
    Mobile devices become a part of our daily life due to their versatility, such as the wireless phone calls, the wireless accessibility to Internet, the display of multimedia content, and the communication with nearby mobile devices. Third generation telecommunication service provides an easy access to the Internet for mobile devices. Mobile users pay a fee charged by the telecommunication provider based on the amount of data transferred. This paper introduces a special ad hoc network in which mobile devices cooperate each other to download an interesting content from the Internet in order to reduce the telecommunication cost. The mobile devices, called the peers, in the ad hoc network are assigned a portion of the target file, and are responsible for downloading the portion using their 3G connection. Then, the peers exchange their downloaded portion with other participating peers using their cost-free ad hoc connection in order to reconstruct the whole content. According to the simulation results, large number of participating peers saves the telecommunication cost up to 90% with as few as 10 peers, although it slightly increase the overall content reconstruction time.
  • 25.

    IHarmful Traffic Detection by Web Traffic Analysis

    신현준 , 최일준 , 추병균 and 1 other persons | 2007, 12(2) | pp.221~230 | number of Cited : 3
    Abstract PDF
    Security of the port TCP/80 has been demanded by reason that the others besides web services have been rapidly increasing use of the port. Existing traffic analysis approaches can't distinguish web services traffic from application services when traffic passes though the port. monitoring method based on protocol and port analysis were weak in analyzing harmful traffic using the web port on account of being unable to distinguish payload. In this paper, we propose a method of detecting harmful traffic by web traffic analysis. To begin, traffic Capture by real time and classify by web traffic. Classed web traffic sorts each application service details and apply weight and detect harmful traffic. Finally, method propose and implement through coding. Therefore have a purpose of these paper to classify existing traffic analysis approaches was difficult web traffic classified normal traffic and harmful traffic and improved performance.
  • 26.

    Location Generalization Method of Moving Objectusing R*-Tree and Grid

    Ko, Hyeon , 김광종 , Yonsik Lee | 2007, 12(2) | pp.231~242 | number of Cited : 4
    Abstract PDF
    The existing pattern mining methods[1,2,3,4,5,6,11,12,13] do not use location generalization method on the set of location history data of moving object, but even so they simply do extract only frequent patterns which have no spatio-temporal constraint in moving patterns on specific space. Therefore, it is difficult for those methods to apply to frequent pattern mining which has spatio-temporal constraint such as optimal moving or scheduling paths among the specific points, And also, those methods are required more large memory space due to using pattern tree on memory for reducing repeated scan database. Therefore, more effective pattern mining technique is required for solving these problems. In this paper, in order to develop more effective pattern mining technique, we propose new location generalization method that converts data of detailed level into meaningful spatial information for reducing the processing time for pattern mining of a massive history data set of moving object and space saving. The proposed method can lead the efficient spatial moving pattern mining of moving object using by creating moving sequences through generalizing the location attributes of moving object into 2D spatial area based on R*-Tree and Area Grid Hash Table(AGHT) in preprocessing stage of pattern mining.
  • 27.

    Design and Implementation of Extensible Agent System for Home Network Management

    왕종수 , 김대영 | 2007, 12(2) | pp.243~250 | number of Cited : 2
    Abstract PDF
    As today’s home-network market grows related researches had been increased and with different interfaces of these products of course there is lack of compatibility between these systems. So we need some extensionable managing system which integrates and manages these systems. In this paper, we designed framework that integrates and manages network system and also implemented Home Gateway using JMX on Sensor-network environment. It may manage each target with modulization and through the connection interface we make allowance compatibility and extensionability between existing systems. Through this researches, we implemented the Home-network integrated managing system which can manage and monitor with PDA or RDP(remote desktop PC).
  • 28.

    A Study on the Advancement of Chinese Industry and the Strategy of Korean Companies in China

    RHO, HYUNG JIN | 2007, 12(2) | pp.251~264 | number of Cited : 1
    Abstract PDF
    A This study was conducted to identify the advancement of Chinese industry and the strategy of advancing Korean companies into China. According to the results of the study, it is very important for Korean companies to adapt themselves to Chinese circumstances. The development of Chinese industry can be a threat to Korean companies, but it can also be an opportunity to Korean companies. It's up to Korean companies' correspondence strategy. The best strategy of Korean companies on the advancement of Chinese industry is development a blue ocean strategy.
  • 29.

    A Study of the Relation between Functional and Technical Services and Customer's Satisfaction and Loyalty in Korea Feeding Industry

    Daesung Chang , 차상협 , 신충섭 | 2007, 12(2) | pp.265~280 | number of Cited : 1
    Abstract PDF
    The purpose of this study is to present SCM as an innovative alternative to domestic feed industry, which seems in urgent need of introducing SCM to get competitive advantages. To fulfill the purpose this study tried to find whether the supply services of Korean feed industry are high contact service or low contact service. The results of this study are summarized as follows. It appeared that the functional quality supply service quality influenced positively not only on customer satisfaction but also on customer loyalty. That is, it is necessary to improve the functional service quality of supply practices in order to increase customer satisfaction and loyalty. But this study showed that the customer satisfaction did not influence the customer loyalty. And technical quality supply service had a positive effect on customer loyalty but it didn't influence customer satisfaction bur customer loyalty. As the results of this study it is identified that the services of supply practices of the Korean feed industry are tend to be high contact services rather than low contact services. Thus, the Korean feeding firms have to plan the supply strategy for converting the supply service from low contact services to high contact services gradually to get competitive advantages.
  • 30.

    A Study on the Performance in Internet Shopping

    Lee,Chan | 2007, 12(2) | pp.281~290 | number of Cited : 3
    Abstract PDF
    Success in internet shopping is determined in partly by whether consumers trust sellers and products. This paper describes an integrated model for investigating the three main antecedent influence on consumer trust and the effect of trust on re-purchasing. The model was estimated with data from 247 consumers in internet shopping. The results revealed that price competitiveness, product difference, after services, and qualities of web-design were related with consumer trust. Also, the effect of trust on re-purchasing was observed.
  • 31.

    Design of SPMR using URN based UCI with RFID

    Docsung Jang | 2007, 12(2) | pp.291~298 | number of Cited : 1
    Abstract PDF
    Linking Patient's medical records throughout country is required to get patient's accurate information which is helpful for doctor to diagnosis patient's symptoms more exactly. With shortening of time and preventing of retest, patient can be survived or alleviate suffering. Purpose of this paper is to design combined identification system linking patient's RFID card with medical digitalized Chart to share patient's information between the hospitals. With research and review of pre-studied related identification system, standardization, and UCI-RFID linkage study, SPMR(sharing patient's medical record) has been designed for doctors to make a medical treatment properly at the right time and alleviate patient's pain. SPMR(sharing patient's medical record) which will take information needed and pay for information usage to related hospitals has been designed for doctors to make a medical treatment properly at the right time and alleviate patient's pain.
  • 32.

    Research about The Present Situation Relating Online Game Problems

    Young Hwan Kim | 2007, 12(2) | pp.299~306 | number of Cited : 1
    Abstract PDF
    This thesis will show the preparation of politic alternative plan about reaction through studying the domestic and overseas research trend and theories about online games analyzing the related problems. Online games have been already placed as the major culture trend in our society and produced the economic wealth as the major theme of 'Korean trend hot wind', including improvement of our foreign confidence. And the investments in online games and related industry are expected to be great Blue Ocean to us to have relatively deficient endowed resources. But with these beneficial effects, many unexpected reactions have happened and often published by medias, and they will be expected to be serious. So, it is to establish the united solution system of disputes related to online games which are spread in each law. Through this, we must draw prevention effects and use that as the evidence of rational judgements. And we must make the base to give online games the opportunity of upgrading to national strategic industry and try to conduct the research in various fields between academic organizations.
  • 33.

    An Efficient Franchise Distribution SystemUsing Card Checker

    서정민 , 문일환 , 이창훈 and 1 other persons | 2007, 12(2) | pp.307~314 | number of Cited : 0
    Abstract PDF
    FDS (Franchise Distributed System) which can efficiently control and manage the resources like food, liquid and services is required in many distributed system related areas like SCM (Supply Chaining Management) and ECR (Efficient Consumer Response). But, established system, such as used PC and Internet or CTI (Computer Telephony Integration) that need other equipment and expenses. And these have many problems, as voices record or recognition, not spreaded. To solve those problems, we design and implemented Web Card Checker for Franchise Distribution. Our system used card checker machine, not make additions, which can order raw materials like SCM as well as managed distributed processes.
  • 34.

    An Empirical Study on the Relationships between System Characteristics and Performance of Customer Relationship Management

    Jongsoo Yoon | 2007, 12(2) | pp.315~324 | number of Cited : 4
    Abstract PDF
    This study is to investigate the relationships between system characteristics and performance of customer relationship management, and also to examine the type of industry which organizations are involved in, financial or non-financial business, affects on those relationships. To accomplish these research purposes, this study obtained 230 questionnaires from domestic organizations which have implemented customer relationship management systems, and finally used 206 responses for statistical analyses. The results of the study can be summarized as followings. First, integration of system and ease of use of system among various system characteristics have a positive affect on the performance of customer relationship management in significant level. Second, the relationship between system characteristics and performance of customer relationship management, based on testing for parallelism, does not differ by the industry type of organizations.
  • 35.

    A Study on Active Suspension Control System in Vehicle Bouncing and Pitching Vibration for Improving Ride Comfort

    PARK,Jung-Hyen | 2007, 12(2) | pp.325~332 | number of Cited : 4
    Abstract PDF
    This paper proposed modelling and design method in suspension system design to analyze active suspension equipment by adopting active robust control theory. Recent in the field of suspension system design it is general to adopt active control scheme for stiffness and damping, and connection with other vehicle stability control equipment is also intricate, it is required for control system scheme to design more robust, higher response and precision control equipment. It is known that active suspension system is better than passive spring-damper system in designing suspension equipment. We analyze suspension system with considering location of front-rear wheel and driving velocity, then design control system. Numerical example is shown for validity of robust control system design in active suspension system.
  • 36.

    Design and implementation on Safety assesment system for security threat analyzing

    Kyoungsik Cho | 2007, 12(2) | pp.333~340 | number of Cited : 1
    Abstract PDF
    Risk of damage on information system being grow according to increasing its dependence rate on most of organization. On this work, make planed for a safety assessment system in which information protection management system and threat analyzing method. Also, during threat assesment, we have planned possible an equal-weight applied assesment and considering the characteristics of the organization, an assesment which security factor's weight is variably applied to, and respective organizations to examine its security by itself in order to support the easy findings of the vulnerabilities on the management point of view, and to show the advices to practice.
  • 37.

    Flow Experiences in Goal-Directed and Experiential Activities

    Phil-Sik Jang | 2007, 12(2) | pp.341~348 | number of Cited : 1
    Abstract PDF
    The focus of this study was to investigate whether flow occurs during both goal-directed and experiential activities, if experiential and goal-directed flow states differ in terms of various measures and dimensions. Fifty male and eighteen female subjects were participated in controlled, comparative experiment between goal-directed and experiential activities in problem-solving tasks. The findings indicate that subjects experience more curiosity and involvement (focus) in problem solving tasks with experiential activities. However, the results showed subjects experience more enjoyment in tasks with goal-directed activities. Findings of this study suggested that more sophisticated and quantitative measures in various dimensions should be constructed and verified in order to apply flow theory to human-computer interaction.