Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2008, Vol.13, No.5

  • 1.

    A Study on Development of an Integrated HMI System based on Embedded OPC Server

    Hoongoo Lyeo | Rim,Seong-Rak | Han Kwang Rok | 2008, 13(5) | pp.1~10 | number of Cited : 1
    Abstract PDF
    In this paper, we discuss the development of an integrated HMI system based on OPC(OLE for Process Control) to control and monitor an automation equipment in the diverse environment. We implement an embedded OPC server according to the OPC standard which is proposed as the communication standard mechanism in the process control field, and design the interface module in which the output data of the OPC server can be connected to various HMI environment such as the local application, intranet client and Web page. This paper will be contributed in the HMI system implementation for the ubiquitous environment because it is possible to make remote control on the network and Web monitoring as well as the connection and data exchange of heterogeneous equipments by applying to various control systems.
  • 2.

    Creation and Retrieval Method of Semantic Annotation Objects in 3D Virtual Worlds

    sujin kim | Seokjong Yu | 2008, 13(5) | pp.11~18 | number of Cited : 0
    Abstract PDF
    One of important issues in computer graphics field is to communicate among users in virtual world like secondlife. However, in 3D virtual world, users' needs to wish to build their own contents in 3D virtual space are rising, similarly, users produce own homepage and animation, and leave writing in notice board. In this paper, we tried to achieve this by introducing semantic annotation object concept, which is a kind of annotation method in 3D virtual world. User can retrieve an 3D object by searching corresponding annotation data. This method can build semantic 3D virtual world and enable users to search 3D objects by integrating 3D object and 2D semantic multimedia information. Also, through a comparison experiment with proposal system and general 3D virtual world, the performance of proposed system is evaluated
  • 3.

    Real-time Face Detection System using YCbCr Information and AdaBoost Algorithm

    김형균 | 정기봉 | 2008, 13(5) | pp.19~26 | number of Cited : 7
    Abstract PDF
    In this paper, we converted an RGB into an YCbCr image input from CCD camera and then after compute difference two consecutive images, conduct Glassfire Labeling. We extract an image become ware of motion-change, if the difference between most broad(area) and Area critical value more than critical value. We enforce the detection of facial characteristics to an extracted motion-change images by using AdaBoost algorithm to extract an characteristics.
  • 4.

    Implementation of Loop Peeling in CTOC

    Kim Ki Tae | 김제민 | Weon Hee Yoo | 2008, 13(5) | pp.27~36 | number of Cited : 1
    Abstract PDF
    The CTOC framework was implemented to efficiently perform analysis and optimization of the Java bytecode that is often being used lately. In order to analyze and optimize the bytecode from the CTOC, the eCFG was first generated. Due to the bytecode characteristics of difficult analysis, the existing bytecode was expanded to be suitable for control flow analysis, and the control flow graph was drawn. We called eCFG(extended Control Flow Graph). Furthermore, the eCFG was converted into the SSA Form for a static analysis. Many loops were found in the conversion program. The previous CTOC performed conversion directly into the SSA Form without processing the loops. However, processing the loops prior to the SSA Form conversion allows more efficient generation of the SSA Form. This paper examines the process of finding the loops prior to converting the eCFG into the SSA Form in order to efficiently process the loops, and exhibits the procedures for generating the loop tree.
  • 5.

    An Implementation of Web-based E-portfolio Management System

    한성현 | 2008, 13(5) | pp.37~44 | number of Cited : 9
    Abstract PDF
    In recent years, e-portfolios and webfolios have been highly vaunted as the next great innovation in education. Hundreds of academic institutions are variously studying, using, or innovating e-portfolio systems. Despite the presumed goodness of e-portfolios, some problems remain. In this paper we review the existing e-portfolio management systems, and propose and implement a novel system to overcome the limits of the existing e-portfolio management systems. The propose e-portfolio management system has a structure of competition with others. All of the student's activities are accomplished and preserved within the same personal web space like a blog with mutual engagements and recommendations.
  • 6.

    An Efficient Dynamic Workload Balancing Strategy for High-Performance Computing System

    Lee, Won Joo | 박말순 | 2008, 13(5) | pp.45~52 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an efficient dynamic workload balancing strategy which improves the performance of high-performance computing system. The key idea of this dynamic workload balancing strategy is to minimize execution time of each job and to maximize the system throughput by effectively using system resource such as CPU, memory. Also, this strategy dynamically allocates job by considering demanded memory size of executing job and workload status of each node. If an overload node occurs due to allocated job, the proposed scheme migrates job, executing in overload nodes, to another free nodes and reduces the waiting time and execution time of job by balancing workload of each node. Through simulation, we show that the proposed dynamic workload balancing strategy based on CPU, memory improves the performance of high-performance computing system compared to previous strategies.
  • 7.

    An Ontology - based Transformation Method from Feature Model to Class Model

    김동리 | Chee-Yang Song | Dongsu Kang and 1other persons | 2008, 13(5) | pp.53~67 | number of Cited : 2
    Abstract PDF
    At present, for reuse of similar domains between feature model and class model, researches of transformation at the model level and of transformation using ontology between two models are being made, but consistent transformation through metamodel is not made. And the factors of modeling transformation targets are not sufficient, and especially, automatic transformation algorithm and supporting tools are not provided so reuse of domains between models is not activated. This paper proposes a method of transformation from feature model to class model using ontology on the metamodel. For this, it re-establishes the metamodel of feature model, class model, and ontology, and it defines the properties of modelling factors for each metamodel. Based on the properties, it defines the profiles of transformation rules between feature model and ontology, and between ontology and class model, using set theory and propositional calculus. For automation of the transformation, it creates transformation algorithm and supporting tools. Using the proposed transformation rules and tools, real application is made through Electronic Approval System. Through this, it is possible to transform from the existing constructed feature model to the class model and to use it again for a different development method. Especially, it is possible to remove ambiguity of semantic transformation using ontology, and automation of transformation maintains consistence between models.
  • 8.

    Class Code Generation method for Component model construction

    임근 | 이기영 | 2008, 13(5) | pp.69~76 | number of Cited : 1
    Abstract PDF
    In this thesis, we implemented the prototype system for the class code generator based on consistent code generation process and standard type, the class to be component unit. Particularly, we proposed relationship rule to solve the difficult problem by the object-oriented language to association and aggregation between classes based on component, through this method we can make to consistent code generation standard. Also it is adopted to component model construction which is generated code using code generation, and it can be basic assembly and deployment of business components to reusable target in developing application system.
  • 9.

    A Study on Localization of Text in Natural Scene Images

    최미영 | Gyeyoung Kim | HYUNG IL CHOI | 2008, 13(5) | pp.77~84 | number of Cited : 1
    Abstract PDF
    This paper proposes a new approach to eliminate the reflectance component for the localization of text in natural scene images. Natural scene images normally have an illumination component as well as a reflectance component. It is well known that a reflectance component usually obstructs the task of detecting and recognizing objects like texts in the scene, since it blurs out an overall image. We have developed an approach that efficiently removes reflectance components while preserving illumination components. We decided whether an input image hits Normal or Polarized for determining the light environment, using the histogram which consisted of a red component. In the normal image, we acquired the text region without additional processing. Otherwise we removed light reflecting from the object using homomorphic filtering in the polarized image. And then this decided the each text region based on the color merging technique and the Saliency Map. Finally, we localized text region on these two candidate regions.
  • 10.

    A Framework for Multiple Wireless Services in Heterogeneous Wireless Networks

    Choongyong Shin | Cho Jinsung | 2008, 13(5) | pp.85~94 | number of Cited : 0
    Abstract PDF
    As a variety of wireless network services, such as WLAN, WiBro, cdma2000, and HSDPA, are provided and the range of users' choices for the wireless services are broaden, MCoA (Multiple Care-of Address) concepts that enable users to use wireless interfaces simultaneously have been presented in IETF MONAMI6 WG. Through this scheme, users can access several networks simultaneously by using multiple wireless interfaces. Such various wireless connection technologies continue to advance as they are connected and integrated to All-IP-based core network, and at the same time, heterogeneous networks are being managed overlaid according to the coverage of the wireless connection technologies. Under such circumstances, needs for an integrated architecture have arisen, and thus wireless service framework is required that effectively manages heterogeneous networks which coexist with next generation's networks for 4G. In this paper, a wireless service framework is suggested in the consideration of current wireless service environment, and the framework covers the schemes to minimize the packet loss caused by handover, and also modified Multiple Care-of Address that helps to select most effective network by considering characteristics of various interfaces as well as users' preferences.
  • 11.

    A Study of the Next Generation STOCK-NETWORK and Design

    하성용 | Dea-woo Park | 2008, 13(5) | pp.95~102 | number of Cited : 1
    Abstract PDF
    The next generation network preparation of stock computer network designated to facilities and goal facilities-based national main information communication certainly necessary for 'national competitiveness enhancement and national economic strength elevations'. This paper studies current government policy and network, security and securities computer network, and substitute for securities computer network-based the existing SONET/SDH, and next generation securities computer network designs so as to provide ALL-IP service-based MPLS for international GMG service. Set up stability, standardization, security, a basis of expansibility, and compare is current next generation securities computer network by each bases in case of designs. Analyze an expected effect to have been improved at next generation stockc omputer network characteristics and merits and substitution width and QoS, communication instrument liquor, an information protection system etc. too. Result of research of this paper will contribute to national competitiveness enhancement and a national economic strength elevation to accomplish u-Korea.
  • 12.

    Sensitive Personal Information Protection Model for RBAC System

    Hyung Jin Moon | 서정석 | 2008, 13(5) | pp.103~110 | number of Cited : 6
    Abstract PDF
    Due to the development of the e-commerce, the shopping mall such as auction collects and manages the personal information of the customers for efficient service. However, because of the leakage of the personal information in auction, the image of the companies as well as the information subjects is damaged. Even though the organizations and the companies store the personal information as common sentences and protect using role based access control technique, the personal information can be leaked easily in case of getting the authority of the database administrator. And also the role based access control technique is not appropriate for protecting the sensitive information of the information subject. In this paper, we encrypted the sensitive information assigned by the information subject and then stored them into the database. We propose the personal policy based access control technique which controls the access to the information strictly according to the personal policy of the information subject. Through the proposed method we complemented the problems that the role based access control has and also we constructed the database safe from the database administrator. Finally, we get the control authority about the information of the information subject
  • 13.

    A Study on the Target Position Estimation Algorithm to Radar System

    이관형 | Woo-Young Song | 2008, 13(5) | pp.111~116 | number of Cited : 3
    Abstract PDF
    Radar system must estimate exactly quickness and target in interference channel. Because interference of radio channel is multipath channel by artificial structure and nature structure, signal estimation is difficult. As long as, get rid of interference signal have been study digital beamforming , adaptive array antenna and so on. In this paper, proposed SPT-SALCMV beamforming algorithm get rid of coherent interference algorithm and adaptive array antenna. Adaptive array forms null pattern and reduces gains for direction of interference signal. And estimate signal that want by keeping gains of beam pattern changelessly to target signal direction. In this paper, proposed SPT-SALCMV algorithm was exactly received position of target. But general SPT-LCMV algorithm resulted beam error about 30degrees. Therefore, proved that SPT-SALCMV algorithm that propose in this paper is more excellent than genaral SPT-LCMV algorithm.
  • 14.

    Implementation of a pervasive health care system for cardiac patient on mobile environment

    Kim Jeong-won | 2008, 13(5) | pp.117~124 | number of Cited : 5
    Abstract PDF
    It improves human being's life quality that all people can have more convenient medical service under pervasive computing environment. For a pervasive health care application for cardiac patient, we've implemented a health care system, which is composed of three parts. Various sensors monitor outer as well as inner environment of human such as temperature, humidity, light and electrocardiogram, etc. These sensors form a network based on Zigbee. And medical information server accumulates sensing values and performs back-end processing, To simply transfer these sensing values to a medical team is a simple level's medical service. So, we've designed a new service model based on back propagation neural network for more improved medical service. Our experiments show that a proposed healthcare system can give high level's medical service because it can recognize human's context more concretely.
  • 15.

    Simply Separation of Head and Face Region and Extraction of Facial Features for Image Security

    전영철 | 이건익 | 김강 | 2008, 13(5) | pp.125~134 | number of Cited : 1
    Abstract PDF
    As society develops, the importance of safety for individuals and facilities in public places is getting higher. Not only the areas such as the existing parking lot, bank and factory which require security or crime prevention but also individual houses as well as general institutions have the trend to increase investment in guard and security. This study suggests face feature extract and the method to simply divide face region and head region that are import for face recognition by using color transform. First of all, it is to divide face region by using color transform of Y image of YIQ image and head image after dividing head region with K image among CMYK image about input image. Then, it is to extract features of face by using labeling after Log calculation to head image. The clearly divided head and face region can easily classify the shape of head and face and simply find features. When the algorism of the suggested method is utilized, it is expected that security related facilities that require importance can use it effectively to guard or recognize people.
  • 16.

    Mobile Web Server Performance Improvement with Enhancing SOAP Message Transaction and NBTM

    김용태 | Jeong Yoon Su | Gil-Cheol Park and 1other persons | 2008, 13(5) | pp.135~142 | number of Cited : 1
    Abstract PDF
    Recently, the mobile Internet is rapidly changing environment in a user’s web server performance requires frequent connection is difficult because the proper response is needed to improve the performance of web services engine. Therefore, the goal of this paper is to improve the performance of web services for the installation of additional access to users regardless of tomcat servlet container and process the request and to shorten processing time of SOAP (Simple Object Access Protocol) message of the server structure to offer web mobile services. The web-sever structure is consists of user demand receiver, web document processor, SOAP protocol processor, NBTM(Non-Blocking and Thread Manager) manager, session manager. The system fully supports a standard web-service protocol, reduces the message processing time and communication overhead of mobile web-service system in Web 2.0 and overhead of server, and confirms the improvement of capability by comparing and evaluating Web 2.0 standard mobile web-service system through delaying achievement evaluation by the experiment of realization in Web 2.0 environment.
  • 17.

    A WebDAV-based Collaborative System Supporting Individualized Services

    이홍창 | Lee, Myung Joon | 2008, 13(5) | pp.143~154 | number of Cited : 0
    Abstract PDF
    As internet users swiftly increased in number, both collaborations and communications on the Internet gradually increased. Accordingly, the importance of individualized service has been raised as user-centered service has been activated. As of now, there are many systems supporting collaboration based on the Web. Unfortunately, since the existing Web-based collaborative systems do not support individualized service, they do not provide effective collaboration for various kinds of users. In this paper, we describe the development of a collaboration portlet for the CoSlide collaborative system. The collaboration portlet provides various methods which control the resources of each workspace on the CoSlide server. As a component of a portal, the developed portlet provides effective collaborative environment satisfying various user requirements. Users can collaborate through the individualized interfaces which are composed by portlets on a portal for their own working environment.
  • 18.

    Chaos-based Image Encryption Scheme using Noise-induced Synchronization

    GEOSU YIM | HongSop Kim | 2008, 13(5) | pp.155~162 | number of Cited : 11
    Abstract PDF
    The security of digital image has become increasingly important with the development of the computing performance and internet. Therefore, the encryption algorithms exploiting chaos signal have recently attracted considerable attentions as a new method of image-encryption techniques. In this paper, it is demonstrated that two different chaotic systems are synchronized by the methods of noise-induced synchronization. Based on this synchronization method, an image-encryption system is implemented and an image of Seok-Ga-Tap is encrypted as a verification of the performance of our system. The method suggested in this paper in which the noise is used as the key of decryption is superior to the existing methods in the aspect of the degree of encryption. In this paper, we propose that the method is a new effective encryption algorithm as well as an easily applicable one.
  • 19.

    Separation of Concerns Security Model of Component using Grey Box

    김영수 | Cho Sun-Gu | 2008, 13(5) | pp.163~170 | number of Cited : 1
    Abstract PDF
    As the degree of dependency and application of component increases, the need to strengthen security of component is also increased as well. The component gives an advantage to improve development productivity through its reusable software. Even with this advantage, vulnerability of component security limits its reuse. When the security level of a component is raised in order to improve this problem, the most problematic issue will be that it may extend its limitation on reusability. Therefore, a component model concerning its reusability and security at the same time should be supplied. We suggest a Separation of Concerns Security Model for Extension of Component Reuse which is integrated with a wrapper model and an aspect model and combined with a reuse model in order to extend its security and reusability by supplying information hiding and easy modification, and an appropriate application system to verify the model's compatibility is even constructed. This application model gives the extension of component function and easy modification through the separation of concerns, and it raise its security as well as extends its reusability.
  • 20.

    Mobile Development Process based on the UML Components

    박종모 | Kyungsan CHO | 2008, 13(5) | pp.171~178 | number of Cited : 0
    Abstract PDF
    CBD(Component-based Development), which refers to the method of treating software as parts of a larger whole and developing new information systems through the assembly and synthesis of existing software, has been popular among many methods for developing software. However, CBD has limitations in the mobile environment which requires frequent requirements change and flexible process. To overcome those limitations, we propose an improved mobile development process based on the UML(Unified Modeling Language) components. Our proposal is the simple development process implemented as three phase of component diagrams for the mobile system having quickly evolving technology and small-size project. Through the implementation of a mobile banking service with the proposed development process, we show that our proposal works e0fficiently for the requirements change and flexible development.
  • 21.

    Channel Analysis of Wireless Sensor Networks

    Kyung Kwon Jung | CHOI , WOO SEUNG | 2008, 13(5) | pp.179~186 | number of Cited : 2
    Abstract PDF
    In proportion as the growth of the wireless sensor network applications, we need for more accuracy wireless channel information. In the case of indoor or outdoor wireless sensor networks, multipath propagation causes severe problems in terms of fading. Therefore, a path-loss model for multipath environment is required to optimize communication systems. This paper deals with log-normal path loss modeling of the indoor 2.4 GHz channel. We measured variation of the received signal strength between the sender and receiver of which separation was increased from 1 to 30 m. The path-loss exponent and the standard deviation of wireless channel were determined by fitting of the measured data. By using the PRR(Packet Reception Rate) of this model, Wireless sensor channel is defined CR (Connect Region), DR(Disconnected Region). In order to verify the characteristics of wireless channel, we performed simulations and experiments. We demonstrated that connection ranges are 24 m in indoor, and 14 m in outdoor.
  • 22.

    User interface of Home-Automation for the physically handicapped person in wearable computing environment

    Kang Sun-Kyung | 김영운 | Dae-Kyung Han and 1other persons | 2008, 13(5) | pp.187~194 | number of Cited : 0
    Abstract PDF
    Interface technologies for a user to control home automation system in wearable computing environment has been studied recently. This paper proposes a new interface method for a disabled person to control home automation system in wearable computing environment by using EOG sensing circuit and marker recognition. In the proposed interface method, the operations of a home network device are represented with human readable markers and displayed around the device. A user wearing a HMD, a video camera, and a computer selects the desired operation by seeing the markers and selecting one of them with eye movement from the HMD display. The requested operation is executed by sending the control command for the selected marker to the home network control device. By using the EOG sensing circuit and the marker recognition system, a user having problem with moving hands and feet can manipulate a home automation system with only eye movement.
  • 23.

    Security and Privacy Mechanism using TCG/TPM to various WSN

    이기만 | 조내현 | 권환우 and 1other persons | 2008, 13(5) | pp.195~202 | number of Cited : 1
    Abstract PDF
    In this paper, To improve the effectiveness of security enforcement, the first contribution in this work is that we present a clustered heterogeneous WSN(Wireless Sensor Network) architecture, composed of not only resource constrained sensor nodes, but also a number of more powerful high-end devices acting as cluster heads. Compared to sensor nodes, a high-end cluster head has higher computation capability, larger storage, longer power supply, and longer radio transmission range, and it thus does not suffer from the resource scarceness problem as much as a sensor node does. A distinct feature of our heterogeneous architecture is that cluster heads are equipped with TC(trusted computing) technology, and in particular a TCG(Trusted Computing Group) compliant TPM (Trusted Platform Module) is embedded into each cluster head. According the TCG specifications, TPM is a tamper-resistant, self-contained secure coprocessor, capable of performing cryptographic functions. A TPM attached to a host establishes a trusted computing platform that provides sealed storage, and measures and reports the integrity state of the platform.
  • 24.

    Integrated NEMO Route Optimization to Improve Security and Communication Path

    Kyungsan CHO | 신덕만 | 2008, 13(5) | pp.203~210 | number of Cited : 1
    Abstract PDF
    Because BSP(Basic Support Protocol) of NEMO(Network Mobility) has important limitation of not providing route optimization, several route optimization schemes have been proposed. By analyzing and improving the limitations of the existing schemes, we propose an advanced integrated route optimization scheme for the communication through both the internal and external routing of nested NEMO. Our proposal includes a secure route optimization protocol which connects TLMR directly to an external node CN without passing through any HAs, and allows TLMR to control the internal path without passing through the internet. Thus, our scheme can strengthen the security as well as improve the path and delay of NEMO communication.
  • 25.

    Quality Status Comparison and Analysis for the Service Development Direction of Domestic Job Information Site

    정경희 | 김형래 | 2008, 13(5) | pp.211~218 | number of Cited : 11
    Abstract PDF
    This paper studies the quality of the major domestic job information sites and compares the strong and weak points of them. The study was conducted with respect to the user satisfaction by asking job seekers and employers. Questionnaires consist of three factors: quality of information, quality of delivery, quality of environment, each factor of which contains several sub-questions. The results showed that the quality of information was the most important factor to both job seekers and job provider. The lower job providers' satisfaction than job seekers' indicated more various services should be developed for job providers. Specially, personal information is not protected well enough to satisfy job seekers, so improvement plan is required. Public job information site requires as much service level as private job information sites.
  • 26.

    Heuristic Backtrack Search Algorithm for Energy-efficient Clustering in Wireless Sensor Networks

    손석원 | 2008, 13(5) | pp.219~228 | number of Cited : 0
    Abstract PDF
    As found in research on constraint satisfaction problems, the choice of variable ordering heuristics is crucial for effective solving of constraint optimization problems. For the special problems such as energy-efficient clustering in heterogeneous wireless sensor networks, in which cluster heads have an inclination to be near a base station, we propose a new approach based on the static preferences variable orderings and provide a pnode heuristic algorithm for a specific application. The pnode algorithm selects the next variable with the highest preference. In our problem, the preference becomes higher when the cluster heads are closer to the optimal region, which can be obtained a priori due to the characteristic of the problem. Since cluster heads are the most dominant sources of power consumption in the cluster-based sensor networks, we seek to minimize energy consumption by minimizing the maximum energy dissipation at each cluster heads as well as sensor nodes. Simulation results indicate that the proposed approach is more efficient than other methods for solving constraint optimization problems with static preferences.
  • 27.

    A Robust Pair-wise Key Agreement Scheme without Trusted Third Party and Pre-distributing Keys for MANET Environments

    SeungJin Han | Choi.Jun-Hyeog | 2008, 13(5) | pp.229~236 | number of Cited : 2
    Abstract PDF
    In this paper, we proposed scheme that it safely exchange encrypted keys without Trust Third Party (TTP) and Pre-distributing keys in ubiquitous environments. Existing paper assume that exist a TTP or already pre-distributed encrypted keys between nodes. However, there methods are not sufficient for wireless environments without infrastructure. Some existing paper try to use the Diffie-Hellman algorithm for the problem, but it is vulnerable to Replay and Man-in-the-middle attack from the malicious nodes. Therefore, Authentication problem between nodes is solved by modified the Diffie-Hellman algorithm using TESLA. We propose safe, lightweight, and robust pair-wise agreement algorithm adding One Time Password (OTP) using timestamp to modified the Diffie-Hellman in ubiquitous environments, and verify a safety about proposed algorithm.
  • 28.

    The shelter course guidance system using a sensor network

    권정일 | 노영섭 | 2008, 13(5) | pp.237~246 | number of Cited : 4
    Abstract PDF
    When a fire occurs in a large-scale or complicated facility, there is a possibility of large-scale loss of life if there is no information on the location of fire and the location of emergency exits for people to take shelter. Consequently, the fire or disaster prevention system and the shelter course guidance system that optimally guides the shelter course are necessary to reduce the loss of life. This paper proposes a shelter course guidance system using a sensor network to reduce the loss of life in a building where a fire occurs. The experimental result of this research shows that the shelter course guidance system provides the optimum shelter course to people in infrastructure when a fire occurs.
  • 29.

    A Web Link Architecture Based on XRI Providing Persistent Link

    Eui-Hyun Jung | 김원 | 박찬기 | 2008, 13(5) | pp.247~254 | number of Cited : 0
    Abstract PDF
    Web 2.0 and Semantic Web technology will be merged to be a next generation Web that leads presentation-oriented Web to data-centric Web. In the next generation Web, semantic processing, Web platform, and data fusion are most important technology factors. Resolving the Link Rot is the one of the essential technologies to enable these features. The Link Rot causes not only simple annoyances to users but also more serious problems including data integrity, loss of knowledge, breach of service, and so forth. We have suggested a new XRI-based persistent Web link architecture to cure the Link Rot that has been considered as a deep-seated problem of the Web. The proposed architecture is based on the XRI suggested by OASIS and it is designed to support a persistent link by using URL rewriting. Since the architecture is designed as a server-side technology, it is superior to existing research especially in Interoperability, Transparency and Adoptability. In addition to this, the architecture provides a metadata identification to be used for context-aware link resolution.
  • 30.

    A Fast Tag Prediction Algorithm using Extra Bit in RFID System

    Baek,Deuk-Hwa | Kim Sung soo | 안광선 | 2008, 13(5) | pp.255~262 | number of Cited : 2
    Abstract PDF
    RFID(Radio Frequency IDentification) is a technology that automatically identifies objects containing the electronic tags by using radio frequency. In RFID system, the reader needs the anti collision algorithm for fast identifying all of the tags in the interrogation zone. This paper proposes the tree based TPAE(Tag Prediction Algorithm using Extra bit) algorithm to arbitrate the tag collision. The proposed algorithm can identify tags without identifying all the bits in the tag ID. The reader uses the extra bit which is added to the tag ID and if there are two collided bits or multiple collided bits, it checks the extra bit and grasps the tag IDs concurrently. In the experiment, the proposed algorithm had about 50% less query iterations than query tree algorithm and binary search algorithm regardless of the number of tags and tag ID lengths.
  • 31.

    The Authentication System in Real-Time using Face Recognition and RFID

    Jee, Jeong-Gyu | 2008, 13(5) | pp.263~272 | number of Cited : 2
    Abstract PDF
    The proposed system can achieve more safety of RFID system with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After it has authenticated RFID tag, additionally, the proposed system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In this paper, the system which was proposed more enforce the security of the automatic entrance and exit authentication system with the cognitive characters of RFID tag and the extracted characteristic information of the user image through the camera. The RFID system which use the active tag and reader with 2.4GHz bandwidth can recognize the tag of RFID in the various output manner. Additionally, when the RFID system have errors, the characteristic information of the user image is designed to replace the RFID system as it compare with the similarity of the color, outline and input image information which was recorded to the database previously. In the experimental result, the system can acquire more exact results as compared with the single authentication system when it using RFID tag and the information of color characteristics.
  • 32.

    A Study on the Crime Prevention of Residential Zone through the Application of CPTED

    Young Hwan Kim | 2008, 13(5) | pp.273~278 | number of Cited : 15
    Abstract PDF
    As the new management strategy of urban crime, The crime prevention through environmental design is the one of the crime control strategies for preparatory prevention. Therefore, The Purpose of this study is to find out the crime prevention strategy to encounter problems in reality concerning to the urban crime. In this purpose, We analyze how to form crime distribution through fieldwork about crime happened in the dong-gu residential zone of urban crimes happened in Gwang-Ju metropolitan city, 2004, And then, We examine the crime prevention strategy through CPTED(Crime Prevention Through Environmental Design).
  • 33.

    The Study about analyzing the Present Situation of Human Resource Outsourcing

    차성호 | Yang, Donghoon | 2008, 13(5) | pp.279~290 | number of Cited : 5
    Abstract PDF
    This study has the primary purpose to understanding the present situation through research on the actual condition about human resource outsourcing in the stocks and KOSDAQ enterprises, and would give the basic and useful data to develop human resource outsourcing. Data were collected from 1,500 charge of human resource management in the stocks and KOSDAQ enterprises which introduced or will be introduced human resource outsourcing. Frequencies, cross-tabs and independent-samples t-test were used to understanding the the actual condition. Research findings are summarized as follows. First, as the introduction area of human resource outsourcing following training and development on the list were personnel information system, recruitment and selection. Second, tasks that transfer outsourcing supply firms owing to human resource outsourcing were common and typical operation function than complex and specific planning function.
  • 34.

    The Study on the Emotional Labor, Emotional Exhaustion and Turnover Intention of Call Center Tele-Communicators

    이수연 | HaeSool Yang | 2008, 13(5) | pp.291~308 | number of Cited : 11
    Abstract PDF
    EThis study shows the factors which have an effect on the emotional exhaustion and turnover intention in call center tele-communicators who perform emotional labor using telephone without direct confronting with clients. This study empirically shows that emotional exhaustion decreases job satisfaction and increases turnover intention. Therefore the emotional exhaustion is the important managing factor for efficient management of call center. To weaken emotional exhaustion, it is necessary to decrease time pressure in call center work. To weaken turnover intention, it is important to strengthen superior support. This study makes a contribution in providing the fact that emotional exhaustion is an important managing factor in administration of call center tele-communicators.
  • 35.

    An Exploratory Study on the Relationship of Organizational Citizenship Behavior of Police Officer, Empowerment and Customer Orientation

    박창욱 | Munseung yang | 2008, 13(5) | pp.309~314 | number of Cited : 6
    Abstract PDF
    This paper examine Citizenship Behavior of Police officer, Empowerment and Customer Orientation in the police organization. and look for the method of the human resource management to draw behavior of local police. For that, this paper show the base of the basic study for empirical method. this study draws citizenship behavior toward police officer, influence factor of empowerment. and looks for the effective method of the human resource management to draw customer orientation of members
  • 36.

    A Study on the Influence of Customer Quality, Physical Quality and Service Provider Quality on Hotel Quality

    shin chul-ho | 2008, 13(5) | pp.315~321 | number of Cited : 2
    Abstract PDF
    This study aims to verify the effect in the estimation of hotel service quality by analyzing the influence and the interrelation of Customer Quality, Physical Quality and Service Provider Quality regarding Hotel Quality. The result of the research shows that with regard to the influence on hotel quality, service provider quality ranks most high, physical quality second, customer quality of manner third, and customer quality of appearance fourth in order. The physical factors in the interrelation among variables rank most high. This result derives from finding the fact that customer quality is an important influential factor in the constructional dimension of hotel service quality.