Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2007, Vol.12, No.6

  • 1.

    Scalable Distributed Scheduling in Grid Computing Environment

    이준동 | Choi Eui In | Moohun Lee | 2007, 12(6) | pp.1~10 | number of Cited : 1
    Abstract PDF
    We propose a novel framework for distributed resource management. The framework has the following novel features. First, the resource management system is distributed using resource content information that is characterized by system properties. We argue that a distributed system based on resource content is sufficient to satisfy specific scheduling requests for Quality of Service(QoS) considering workload balance across a grid. Second, the distributed system constructs a hierarchical peer-to-peer network. This peered network provides an efficient message routing mechanism. The simulation results demonstrate that the proposed framework is proficient to satisfy QoS in distributed environment.
  • 2.

    A Method of Recommending Buy Points Based on Price Patterns

    장은실 | YONG KYU LEE | 2007, 12(6) | pp.11~20 | number of Cited : 1
    Abstract PDF
    Even though much research has been performed to recommend favorite items to the buyers in the internet shopping mall, to the best of our knowledge, it is hard to find previous research on the recommendation of buy points. In this paper, we propose a method which can be used to recommend buy points of an item to the buyers. To do this, a database containing normalized price patterns is constructed from the archive of past prices. Then, the future price pattern is retrieved from the database based on the similarity. Here, regression analysis is used to find and analyze the elements that affect the price. We also present performance results showing that the proposed method can be useful for shopping malls.
  • 3.

    A Development of Intelligent Simulation Tools based on Multi-agent

    Woo Chong Woo | 김대령 | 2007, 12(6) | pp.21~30 | number of Cited : 3
    Abstract PDF
    Simulation means modeling structures or behaviors of the various objects, and experimenting them on the computer system. And the major approaches are DEVS(Discrete Event Systems Specification), Petri-net or Automata and so on, But, the simulation problems are getting more complex or complicated thesedays, so that an intelligent agent-based is being studied. In this paper, we are describing an intelligent agent-based simulation tool, which can supports the simulation experiment more efficiently. The significances of our system can be described as follows. First, the system can provide some AI algorithms through the system libraries. Second, the system supports simple method of designing the simulation model, since it's been built under the Finite State Machine (FSM) structure. And finally, the system acts as a simulation framework by supporting user not only the simulation engine, but also user-friendly tools, such as modeler, scriptor and simulator. The system mainly consists of main simulation engine, utility tools, and some other assist tools, and it is tested and showed some efficient results in the three different problems.
  • 4.

    An Efficient Load Balancing Policy in P2P Contents Delivery System for Cyber Education

    Kim Jin-Il | 황윤철 | 2007, 12(6) | pp.31~40 | number of Cited : 1
    Abstract PDF
    To perform on-line cyber education, it is indispensable to delivery contents file to participant users. When users' requests occur simultaneously in a shot period, server falls into overload phase. A common to avoid overload is a software solution based on P2P, which does no cost any additional expense. But, in this solution, it yields many problems such as service delay and system failure because of peer self-control. In this paper, we propose an efficient load balancing policy based on P2P system. which is the contents delivery system for cyber education system using idle computing power. In the proposed solution, we present server selection scheme called P2P-Pattern method, which results in minimum service delay. we can see that our scheme outperforms previous scheme.
  • 5.

    Design and Implementation of a CASE Tool with Compound Document Support

    조장우 | Taegyun Kim | 2007, 12(6) | pp.41~48 | number of Cited : 0
    Abstract PDF
    Since the advent of object-oriented(OO) technology, research and development projects have turned out that OO technology could importantly contribute in productivity and reusability improvement. There are various research areas related to OO technology. And two of major research fields in this areas are concerned in issues for CASE tools and component-based technologies. This paper discusses a trial of applying component-based technology to a CASE tool. This paper proposes the design and implementation issues obtained while we have incrementally developed OODesigner, an OO CASE tool, with compound document support functionality based on COM/OLE technology. As OODesigner with OLE container/server functionality has interoperability with other application programs of Windows system, it can provide more powerful documentation environment than other CASE tools. OODesigner can be used not only to design UML diagrams, but also enables us to make more expressive documentation cooperatively with various kinds of OLE-enabled software like Recorder and Excel. Therefore powerful and consistent documentation activity can be achieved with the tool.
  • 6.

    An Effective Backtracking Search Algorithm for the P2P Resources

    Boonhee Kim | 2007, 12(6) | pp.49~58 | number of Cited : 2
    Abstract PDF
    The P2P distributed systems are proceeded various studies lively to use the idleness computing resources under the network connected computing environments. It's a general mean to communication from the peer of the shortest downloaded time among same target files to be searched. The P2P search algorithms are very important primary factor to decide a real downloaded time in the criteria to select the peer of a shortest downloaded time. However the peer to give resources could be changed into offline status because the P2P distributed systems have very weakness connection. In these cases, we have a choice to retransmit resources mainly. In this study, we suggested an effective backtracking search algorithm to improve the performance about the request to retransmit the resource.
  • 7.

    Quality Evaluation for Usability of Internet Shopping Mall

    이명숙 | LEE KEUM SUK | 2007, 12(6) | pp.59~68 | number of Cited : 10
    Abstract PDF
    The purpose of this paper is to evaluate usability quality through investigating the factors of usability for internet shopping mall websites. For this study, previous studies were investigated and experts’ discussions were held. In result, six characters of usability were chosen such as content satisfaction, customer attraction satisfaction, price information satisfaction, public security satisfaction, user interface satisfaction, and process of transaction satisfaction that affect usability of shopping mall websites and the evaluation models of 72 detailed measure factors were established. Since these 72 sub-factors include the key words of HTML, XML, JSP, and ASP from the target websites, 33 measurable sub-factors in the information were measured through usability evaluation experiment. In addition, a questionnaire about usability measure factors was executed after preferable websites and not preferable websites are selected. After that, we verified the reasonability of usability measure model factors comparing the results of the evaluation experiment with the result of the questionnaire. The time it takes to measure the usability of shopping mall websites can be reduced by using this measurement supporting tool. Also, this tool may be used to estimate the usability during the development of a shopping mall website.
  • 8.

    Error Minimized Laser Beam Point Detection Using Mono-Camera

    Hyun Chang Lee | 이왕헌 | 2007, 12(6) | pp.69~76 | number of Cited : 1
    Abstract PDF
    The main stream of presentation is interrupted because of the direct manipulation of their PC frequently so as to control the screen and file open and so on. A variety of products have been developed to solve these inconveniences of the conventional laser beam pointer [LBP] by simply adding a mouse function to the previous LBP. However, the LBPs fully supporting a mouse function are not yet appeared. In this paper, we developed the LBP fully fulfilling a mouse function using mono-camera as well as a robust image processing and analyzed the position detection accuracy. Finally we verified the developed LBP does not only fulfill a mouse function but also solve the defects of the current laser pointer such as inconvenient installation and position detection errors due to the illumination and viewing direction changes
  • 9.

    A RFID Contents Middleware for Intelligent Outdoor Advertising System

    Han Kwang Rok | 조상연 | 김광렬 | 2007, 12(6) | pp.77~88 | number of Cited : 0
    Abstract PDF
    This paper sets a goal at developing an intelligent advertising system that displays only an advertisement in which interests passers by collecting their RFID information and analysing it in order to improve the defect of outdoor advertising boards which unilaterally advertise regardless of people's interest. For this purpose, we propose a RFID contents middleware which generates a meaningful event and streams an advertising content corresponding with the passers' interest after filtering and analysing the recognized RFID data. We implemented the RFID middleware with Sun Java RFID software and made an experiment by designing a RFID emulator. As a result of the experiment. we found that this system displays the advertisement according to the passers' information.
  • 10.

    The Comparative Study for ENHPP Software Reliability Growth Model based on Modified Coverage Function

    Kim Hee Chul | 김평구 | 2007, 12(6) | pp.89~96 | number of Cited : 0
    Abstract PDF
    Finite failure NHPP models presented in the literature exhibit either constant, monotonic increasing or monotonic decreasing failure occurrence rates per fault. Accurate predictions of software release times, and estimation of the reliability and availability of a software product require quality of a critical element of the software testing process : test coverage. This model called Enhanced non-homogeneous Poission process(ENHPP). In this paper, exponential coverage and S-type model was reviewed, proposes modified(the superposition and mixture) model, which make out efficiency application for software reliability. Algorithm to estimate the parameters used to maximum likelihood estimator and bisection method, model selection based on SSE statistics for the sake of efficient model, was employed.
  • 11.

    Pretreatment For The Problem Solution Of Contents-Based Music Retrieval

    MyoungBeom Chung | Bokyung Sung | Il Ju Ko | 2007, 12(6) | pp.97~104 | number of Cited : 3
    Abstract PDF
    This paper presents the problem of the feature extraction techniques that has been used a content-based analysis, classification and retrieval in audio data and proposes a course of the preprocessing for a new contents-based retrieval methods. Because the feature vector according to sampling value changes, the existing audio data analysis is problem that same music is appraised by other music. Therefore, we propose waveform information extraction method of PCM data for retrieval audio data of various format to contents-based. If this method is used, we can find that audio datas that get into sampling in various format are same data. And it may be applied in contents-based music retrieval system. To verity the performance of the method, an experiment was done feature extraction using STFT and waveform information extraction using PCM data. As a result, we could know that the method to propose is effective more.
  • 12.

    Constructing Gene Regulatory Networks using Knock-out Data

    홍성룡 | 손기락 | 2007, 12(6) | pp.105~114 | number of Cited : 0
    Abstract PDF
    A gene regulatory network is a network of genes representing how genes influence the activities of other genes. Nowadays from microarray experiments, a large number of measurements on the expression levels of genes are available. One of typical data is the so-called "steady-state model" data measuring the expression levels of other genes after knocking out a particular gene. This paper shows how to reverse engineer a parsimonious gene regulatory network, using these measurement data. Our model considers auto-regulation, which forms a cycle in a genetic network. We also model repressor and enhancer roles of genes, which are not considered in previous known methods.
  • 13.

    Design of a Location Management System in the Ubiquitous Computing Environments

    이기영 | 김동오 | 2007, 12(6) | pp.115~122 | number of Cited : 9
    Abstract PDF
    Recently, Location Based Service including tracking and way-finding services has been activated rapidly in the ubiquitous computing environment. According as the ubiquitous computing environment is developed, various types of sensor to acquire various data including location of the moving object are used widely, and acquired sensor data becomes abundant. However, the existing location management system based on a single location sensor is difficult to support LBS efficiently in the ubiquitous computing environment. In this paper, therefore, we propose the location management system in the ubiquitous computing environment that can manage the location data and the various sensor data efficiently. In addition, the location management system adopts the core technology for efficiently storing and transferring a large-volume of various data such as location data and for efficiently processing the various requests from a variety of servers and sensors. Especially, our architecture that is presented in this paper can support context-aware services and autonomous services efficiently in the ubiquitous computing environment.
  • 14.

    Verification method and Simulation of Object model Converted to Formal Specification

    임근 | 2007, 12(6) | pp.123~130 | number of Cited : 1
    Abstract PDF
    In this paper, We define convert rules from objects and relation presented in object model to the state and operation domain in formal specification. Namely, object and relation in information model conveted to state domain in formal specification. State, event and behavior converted to operation domain. And that way informal object model change to formal language, it can be verify through formal method. Verification process make an offer convenience and confidence in software development early phase. And we implement simulation tool in order to verification method of formal specification and to consistency verified model between user's requirement. It is possible to select the suitable model and reduce the costs and efforts on software development.
  • 15.

    A generation of Optimal Path Passing through Shadow Volume in Terrain

    IM,IN-SUN | KOO JA YOUNG | 2007, 12(6) | pp.131~138 | number of Cited : 0
    Abstract PDF
    I intend to seek the shortest path which an aircraft safely flies to its destination through the shadow volume of three dimensional terrain which propagation does not extend. Herein, I propose a method in which a relatively wide shadow volume is divided with a polygon type of block polygon, a path up to the intermediate destination is sought in the divided block polygons according to the weight, and then, the shortest path up to the final destination is sought by repeating courses for seeking a destination again from the adjacent polygon based on the starting point of the intermediate destination within the divided polygon. The shortest path was searched by using the revised algorithms which apply to a critical angle from graph growth algorithms on the shadow volume which propagation on the actual three dimensional terrain does not extend to. The experiment shows that a method proposed in this paper creates effective flying curves.
  • 16.

    Advanced Disk Block Caching Algorithm for Disk I/O sub-system

    정수목 | 노경택 | 2007, 12(6) | pp.139~146 | number of Cited : 1
    Abstract PDF
    A hard disk, which can be classified as an external storage is usually capacious and economical. In spite of the attractive characteristics and efforts on the performance improvement, however, the operation of the hard disk is apparently slower than a processor and the advancement has also been slowly conducted since it is based on mechanical process. On the other hand, the advancement of the processor has been drastically performed as semiconductor technology does. So, disk I/O sub-system becomes bottleneck of computer systems' performance. For this reason, the research on disk I/O sub-system is in progress to improve computer systems' performance. In this paper, we proposed multi-level LRU scheme and then apply it to the computer systems with buffer cache and disk cache. By applying the proposed scheme to computer systems, the average access time to disk blocks can be decreased. The efficiency of the proposed algorithm was verified by simulation results.
  • 17.

    An Improved Object Detection Method using Hausdorff Distance Modified by Local Pattern Similarity

    Kyoungsik Cho | KOO JA YOUNG | 2007, 12(6) | pp.147~152 | number of Cited : 2
    Abstract PDF
    Face detection is a crucial part of the face recognition system. It determines the performance of the whole recognition system. Hausdorff distance metric has been used in face detection and recognition with good results. It defines the distance metric based only on the geometric similarity between two sets of points. However, not only the geometry but also the local patterns around the points are available in most cases. In this paper a new Hausdorff distance measure is proposed that makes hybrid use of the similarity of the geometry and the local patterns around the points. Several experiments shows that the new method outperforms the conventional method.
  • 18.

    The ISO the research also the ISMS security maturity of 27001 regarding a measurement modeling (ISO 27004 information security management measurement and metric system)

    Tae-Dal Kim | 2007, 12(6) | pp.153~160 | number of Cited : 3
    Abstract PDF
    Recently the demand against the system risk analysis and security management from the enterprises or the agencies which operate a information system is increasing even from domestic. The international against the standardization trend of information protection management system it investigates from the dissertation which it sees. It analyzed and against information property information protection management system integrated it will be able to manage a danger modeling it did it proposed. Having analyzed as well as compared the matureness of security-measurement models in regard to the global standard of proposal system, the administrative presentation for various IT technology resources, which have been managed singly so far, is now well applied under the united control of the company itself, and enabled the automated management of authentication support and renewal for ISO 27001, ISO 9000, ISO 14000, resulting in much advanced operation for both material and human resources.
  • 19.

    Color Quantization Scheme Considering Interesting Area of Image

    이지수 | 임헌규 | Paik Doowon and 1other persons | 2007, 12(6) | pp.161~166 | number of Cited : 4
    Abstract PDF
    The process of selecting a small number of representative colors from an image of higher color resolutino is called color image quantization. In a color quantization process, it is very important to determine what colors should be preserve and the others not. In our study, by the idea of an image can be divided into interesting area and uninteresting area, we propose a color quantization method that preserves more colors in the interesting area of an image. We evaluated correctness of extracting interesting area and compared the quality of our method with the others.
  • 20.

    Fuzzy-based Threshold Controlling Method for ART1 Clustering in GPCR Classification

    Cho Kyucheol | 마용범 | Jongsik Lee | 2007, 12(6) | pp.167~176 | number of Cited : 2
    Abstract PDF
    Fuzzy logic is used to represent qualitative knowledge and provides interpretability to a controlling system model in bioinformatics. This paper focuses on a bioinformatics data classification which is an important bioinformatics application. This paper reviews the two traditional controlling system models. The sequence-based threshold controller have problems of optimal range decision for threshold readjustment and long processing time for optimal threshold induction. And the binary-based threshold controller does not guarantee for early system stability in the GPCR data classification for optimal threshold induction. To solve these problems, we proposes a fuzzy-based threshold controller for ART1 clustering in GPCR classification. We implement the proposed method and measure processing time by changing an induction recognition success rate and a classification threshold value. And, we compares the proposed method with the sequence-based threshold controller and the binary-based threshold controller. The fuzzy-based threshold controller continuously readjusts threshold values with membership function of the previous recognition success rate. The fuzzy-based threshold controller keeps system stability and improves classification system efficiency in GPCR classification.
  • 21.

    A Study on Extraction of Mobile Forensic Data and Integrity Proof

    김기환 | 박대우 | 2007, 12(6) | pp.177~186 | number of Cited : 4
    Abstract PDF
    Lately, it is a trend that diffusion of Mobile Information Appliance that do various function by development of IT technology. There is function that do more convenient and efficient exchange information and business using mobile phone that is Mobile Information Appliance, but disfunction that is utilized by pointed end engineering data leakage, individual's privacy infringement, threat, etc. relationship means to use mobile phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage point is lacking about crime who use this portable phone. It is known that this Digital Forensic field is Mobile Forensic. In this paper, We are verify about acquisition way of digital evidence that can happen in this treatise through mobile phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.
  • 22.

    A Method of Efficient SIP Messages Processing for Conference Focus

    조현규 | 이기수 | 장춘서 | 2007, 12(6) | pp.187~192 | number of Cited : 5
    Abstract PDF
    Conference focus maintains and manages SIP(Session Initiation Protocol) signal connections with total conference participants, and it plays core functions of conference server. When the number of conference participants increases, conference focus restricts scalability of conference as increasing quantity of messages for processing. In this paper, to solve this problem, we propose a user system(conference information agent), which receives conference information from the conference focus and transfers them to the participants it manages. And we design and implement the total system including conference focus. When the conference information agent subscribe to the conference focus, it shows its possession of agent capability and capacity by using SIP SUBSCRIBE message. The conference focus informs to the other party by SIP response message that it was chosen as a conference information agent, and after that the conference focus sends all conference notification messages to it. So load of the conference focus can be reduced by this method. Finally, we have analyzed the performance of our system by experiments.
  • 23.

    Enhanced Authentication Protocol of RFID System

    Lee,Sang-Ryul | 2007, 12(6) | pp.193~200 | number of Cited : 5
    Abstract PDF
    There is an advantage that RFID system is better than previous bar code system in storage ability and noncontact property. But, everyone can easily receive the transmitting information by using RF signal. So, there is a problem that system security and personal privacy are threatened. In this paper, I propose RFID system that is secure against attacks like eavesdropping, replay, spoofing and location tracking and can efficiently provide mutual authentication services between reader and tag. The proposed RFID system can be used in various sections of ubiquitous computing environment.
  • 24.

    Secure OTP Smart Card Authentication Protocol for Denial of Service

    shin kwang cheul | 2007, 12(6) | pp.201~206 | number of Cited : 5
    Abstract PDF
    Development of Information and Communication technology coming to activity of internet banking and electronic business, and smart card of medium is generalized prevailing for user authentication of electronic signature certificate management center with cyber cash, traffic card, exit and entrance card. In field that using public network, security of smart cart and privacy of card possessor's is very important. Point of smart card security is use safety for smart card by user authentication. Anonymous establishment for privacy protection and denial of service attack for availability is need to provision. In this paper, after analyze for Hwang-Li, Sun's, L-H-Y scheme, password identify element is a change of safety using one time password hash function. We proposed an efficient new smart card authentication protocol against anonymity and denial of service.
  • 25.

    A suggestion for Mobile Fashion Information using Ontology Technique based on Relation Database

    안후영 | Park Young-Ho | 2007, 12(6) | pp.207~212 | number of Cited : 3
    Abstract PDF
    Recently, requriements that people want to receive various information related with fashion are increasing. A lot of internet shopping malls and corporations provide information about fashion. However, those systems do not give enough information about fashion. To solve these problems, the paper provides the recommend technique for providing complex fashion information on mobile devices. The providing system implements fasion ontology by using XML. The XML ontology has dewey number as an attribute. The recommend technique uses this number and find LCA(Lowest Common Ancestor) on the fashion ontology. Then those child nodes under the LCA are recommended as related information. The results are displayed on the mobile browser. The system provides function for taking a picture or movie of fashion contents. Those movies and pictures are UCC(User Created Content)s. The system is a novel system that can recommend complex fasion information on moblie devices.
  • 26.

    A Design of Quad Band Internal Antenna for Hand-Held Mobile Phones

    강서 | Yeon-Man Jeong | Kim Kye Kook | 2007, 12(6) | pp.213~218 | number of Cited : 0
    Abstract PDF
    We propose a compact internal quard-band antenna with sufficient impedance bandwidths and gains for the GSM(Global Systems for Mobile), GPS(Global Positing System), DCS(Digital Codeless System), PCS(Personal Communication System) operation. The proposed antenna on a substrate, which is small enough to be installed in practical mobile phones, has heights of only 6mm from the substrate. In addition, the proposed antenna decreases the construction complex on the substrate. The GSM (880㎒ ~ 960㎒), GPS(1575㎒), DCS(1710㎒ ~ 1880㎒), PCS(1750㎒ ~ 1870㎒) bands. Details of the design and analysis of the proposed antenna are described and the experimental results of the constructed prototype are presented.
  • 27.

    An Energy Efficient Routing Protocol using MAC-layer resources in Mobile Ad Hoc Networks

    유대훈 | WoongChul Choi | 2007, 12(6) | pp.219~228 | number of Cited : 2
    Abstract PDF
    End-to-end path setup and maintenance are very important for mobile ad-hoc wireless communications, because of the mobility and the limited battery capacity of the nodes in the networks. the AODV routing protocol is the one of many proposed protocols. However, there are route failure problems with the proposed protocols between intermediate nodes due to such mobility and exhausted battery characteristics, and this is because only the shortest hop count is considered for the route setup. If route failure happens, problems such as th…e waste of bandwidth and the increment of the energy consumption occur because of the discarding data packets in the intermediate nodes and the path re-setup process required by the source node. In addition, it obviously causes the network lifetime to be shortened. This paper proposes a routing protocol based on the AODV routing protocol that it makes use of the remaining energy, signal strength and SNR of the MAC layer resources to setup a path.
  • 28.

    The IEEE 802.11 MAC Protocol to solve Unfairness Problem in Multihop Wireless Ad Hoc Networks

    Jaehyun Nam | 2007, 12(6) | pp.229~234 | number of Cited : 2
    Abstract PDF
    In the IEEE 802.11 Wireless Local Area Networks (WLANs), network nodes experiencing collisions on the shared channel need to backoff for a random period of time, which is uniformly selected from the Contention Window (CW). This contention window is dynamically controlled by the Binary Exponential Backoff (BEB) algorithm. The BEB scheme suffers from a unfairness problem and low throughput under high traffic load. In this paper, I propose a new backoff algorithm for use with the IEEE 802.11 Distributed Coordination Function.
  • 29.

    ROHMIP : Route Optimization Employing HMIP Extension for Mobile Networks

    노경택 | 정수목 | 2007, 12(6) | pp.235~242 | number of Cited : 1
    Abstract PDF
    Network Mobility Basic Support protocol reduces location-update signaling by making network movements transparent to the mobile nodes (MNs) behind the mobile router (MR), but causes some problems such as sub-optimal routing and multiple encapsulations. This paper proposes an Route Optimization Employing HMIP Extension for Mobile Networks (ROHMIP) scheme for nested mobile networks support which introduces HMIP concept with relation information between MNNs behind a MR and the MR in order to localize handoff, to optimize routing and especially reduce handoff signal overhead. With ROHMIP, a mobile network node (MNN) behind a MR performs route optimization with a correspondent node (CN) as the MR sends a binding update message (BU) to mobility anchor point (MAP) via root-MR on behalf of all active MNNs when the mobile network moves. This paper describes the new mechanisms and provides simulation results which indicate that our proposal reduces transmission delay, handoff latency and signaling overhead.
  • 30.

    Improvement of Number of Sensors Simultaneously Connected to Optical Sensor Network Using Frequency domain Optical CDMA with Excess Noise Suppression

    박상조 | 2007, 12(6) | pp.243~250 | number of Cited : 0
    Abstract PDF
    I propose the excess noise suppressed optical sensor network using optical CDMA with gain saturated optical amplifier in order to increase number of sensors simultaneously connected to network. Simulation analyses confirm that the maximum number of sensors simultaneously connected to the optical sensor network can be largely increased by increasing the gain of gain saturated optical amplifier owing to the spression of access noises with the assignment of sweeping frequency of optical sensors within 10MHz. In the case of the requested SNR of 20dB and the sweeping frequency of 10KHz, the maximum number of sensors simultaneously connected to the optical sensor network can be increased four times as many as the conventional system.
  • 31.

    A Fast-Recovery Algorithm for Scatternet Reformation in Bluetooth Networks

    장범 | 구명모 | KimSangBok | 2007, 12(6) | pp.251~260 | number of Cited : 0
    Abstract PDF
    A Bluetooth ad hoc network can be formed by interconnecting piconets into scatternet. Many algorithms of scatternet formation have been proposed so far. However, these have a problem that takes a long time to reform scatternet, especially for the case of master moving out. In this paper, we propose a Fast-Recovery algorithm, which aims at reducing the time of scatternet reformation owing to master moving out. In the algorithm, we select a slave with the weigh similar to its master as Sub-Master from a piconet device table created by the master. When a master leaves its piconet is detected by its slaves, the Sub-Master becomes the new master of the piconet instead of the old and directly connect to other slaves and bridge(s) through piconet device table in page state.
  • 32.

    Extraction of Car Number Plate Based on Edge Projection

    김동욱 | 강정혁 | 2007, 12(6) | pp.261~268 | number of Cited : 4
    Abstract PDF
    In this paper, We propose a new technique extract efficiently a car number plate based on edge projection. In order to obtain the region of car number plate, we use a motive that the luminance differences between the number plate background and characters. And, we introduce a projection technique to obtain character parts based on edge image. In vertical direction, we propose a shape matching method. Specially, the new number plate standard has more characters than the old one in horizontal direction and, it is efficiently used to extract the number plate. Therefore, the proposed technique is useful to the new number plate standard. In simulation results, We have illustrated that our algorithm can recognize different number plates with a success ration of 90%.
  • 33.

    A Study on the Survey for efficient Management of the Information Resource in Pubic Sector

    Youngjin | Ra Jong-hei | 2007, 12(6) | pp.269~278 | number of Cited : 10
    Abstract PDF
    In this days, information resources are very important in the organization. So, firms and public department eager to management and use the information resources. Our country is surveyed on Information Resource status from 1997 in the public sector. Information Resource survey contributed to check the status. But, the survey has some weakness, thus we have to redesign the Information Resource survey. In this paper, we analyzed the IRM researches, checked the IR survey's weakness, and studied the improvement methods.
  • 34.

    A Study on the Effect of Information Quality on the usage of ERP system

    정한열 | 장명복 | 2007, 12(6) | pp.279~286 | number of Cited : 10
    Abstract PDF
    EThe competitiveness of a corporate has always been an endeavor factor in the field of Business Management and with introduction of computer, various system; Decision Support System, Executive Information System. Management Information System has dramatically improved the competitiveness. According to the environmental change, organizational complexity, rapid information technology development, it is accelerated to introduce the Enterprise Resource Planning(ERP) System. ERP System is considered as an important tool for management innovation. Korean enterprises have been adopting ERP to reinforce competitive power and to realize global standardization in recent years. This study on the performance of ERP Systems is designed to take a look at the importance, outcome factors of information system, the quality measurement of the information system, and breaking the quality of the information system into system quality, information quality.
  • 35.

    Prediction of KOSPI using Data Editing Techniques and Case-based Reasoning

    Kim, Kyoung Jae | 2007, 12(6) | pp.287~296 | number of Cited : 2
    Abstract PDF
    This paper proposes a novel data editing techniques with genetic algorithm (GA) in case-based reasoning (CBR) for the prediction of Korea Stock Price Index (KOSPI). CBR has been widely used in various areas because of its convenience and strength in complex problem solving. Nonetheless, compared to other machine learning techniques, CBR has been criticized because of its low prediction accuracy. Generally, in order to obtain successful results from CBR, effective retrieval of useful prior cases for the given problem is essential. However, designing a good matching and retrieval mechanism for CBR systems is still a controversial research issue. In this paper, the GA optimizes simultaneously feature weights and a selection task for relevant instances for achieving good matching and retrieval in a CBR system. This study applies the proposed model to stock market analysis. Experimental results show that the GA approach is a promising method for data editing in CBR.
  • 36.

    Design and Implementation of RFID-based Airway Logistics System for Ubiquitous Environments

    장성호 | 마용범 | 노창현 and 5other persons | 2007, 12(6) | pp.297~306 | number of Cited : 5
    Abstract PDF
    Bar-code based airway logistics systems have many problems like freight loss and data management error due to semiskilled air-cargo process and individual information system. To solve these problems, this paper analyzed how to process an air-cargo practically and designed and implemented the RFID-based airway logistics system. This system has an information service system which manages data from RFID systems in realtime and provides a communication interface for data sharing. And, this system processes data queries from capture applications and access applications to provide various services to users such as the freight track and trace service. Also, this system includes a H/H reader agent to integrate existing bar-cord systems. It allows us to realize automation and information-oriented air-cargo process and achieve improvement of air-cargo services with reduction of freight loss and management error.
  • 37.

    Implementation of Environmental Information Monitoring System using Multi-Query Indexing Technique and Wireless Sensor

    김정이 | 이강호 | 2007, 12(6) | pp.307~312 | number of Cited : 1
    Abstract PDF
    Wireless Sensor Network(WSN) is considered as a core technology necessary for Ubiquitous computing, with its numerous possible applications in many practical areas, is being researched and studied actively by many around the world. WSN utilizes wireless sensors spatially placed to gather information regarding temperature, light condition, motion and change in speed of the objects within their surrounding environment. This paper implements an environmental information monitoring and indexing system based on spatial indexing technique by constructing a WSN system. This Multi-Query Indexing Technique coupled with wireless sensors provides an output based on the pre-defined built-in data index and new input from the sensors. If environment data is occured, system have to perform a proper action after collecting and analyzing this data. This is the purpose of implementing environment data monitoring system. We constructed environmental application using TinyOS and built tested with MICAz sensor bords. We designed and implemented a monitoring system which detects and multi-indexing process environmental data from distributed sensors.