Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

Home > Explore Content > All Issues > Article List

2008, Vol.13, No.6

  • 1.

    Moving Object Detection with Rotating Camera Based on Edge Segment Matching

    이준형 , Oksam Chae | 2008, 13(6) | pp.1~12 | number of Cited : 0
    Abstract PDF
    This paper presents automatic moving object detection method using the rotating camera covering larger area with a single camera. The proposed method is based on the edge segment matching which robust to the dynamic environment with illumination change and background movement. The proposed algorithm presents an edge segment based background panorama image generation method minimizing the distortion due to image stitching, the background image generation method using Generalized Hough Transformation which can reliably register the current image to the panorama image overcoming the stitching distortions, the moving edge segment extraction method that overcome viewpoint difference and distortion. The experimental results show that the proposed method can detect correctly moving object under illumination change and camera vibration
  • 2.

    A RFID-Based Multi-Robot Management System Available in Indoor Environments

    Sang-Sun An , 신성욱 , Jeong Oog Lee and 1 other persons | 2008, 13(6) | pp.13~24 | number of Cited : 1
    Abstract PDF
    The multi robot operation technique has emerged as one of the most important research subjects that focus on minimizing redundancy in space exploration and maximizing the efficiency of operation. For an efficient operation of the multi robot systems, the movement of each Single robot in the multi robot systems should be properly observed and controlled. This paper suggests Multi Robot Management System to minimize redundancy in space exploration by assigning exploration space to each robot efficiently to take advantage of the RFID. Also, this paper has suggested fault tolerance technique that detects disable Single robot and substitute it by activated Single robot in order to ensure overall exploration and improve efficiency of exploration. Proposed system overcomes previous fault that it is difficult for central server to detect exact position of robot by using RFID system and Home Robot. Designated Home robot manages each Single robot efficiently and assigns the best suited space to Single robot by using RFID Tag Information. Proposed multi robot management system uses RFID for space assignment, Localization and Mapping efficiently and not only maximizes the efficiency of operation, but also ensures reliability by supporting fault-tolerance, compared with Single robot system. Also, through simulation, this paper proves efficiency of spending time and redundancy rates between multi robot management applied by proposed system and not applied by proposed system
  • 3.

    Coarse‐grained Simulation Model for Web Application Performance Analysis

    Yong-Soo Kim | 2008, 13(6) | pp.25~32 | number of Cited : 2
    Abstract PDF
    The web has been evolving as an indispensable part of our lives since Berners‐Lee introduced the first web sever and browser in 1990. From the web end‐user’s point of view, the response time is a matter of concern. Moreover the throughput is an important factor to consider for the system manager’s point as well. It’s not easy to estimate the performance of a web application because it depends on various elements comprising the whole operational environment of the Internet from networking, client and server computing powers, DBMS and OS capabilities, to application itself. This paper suggests a coarse‐grained simulation model for web application performance estimation based on the data measured by Buch and Pentkowski [1] and the analytical model proposed by Gunther [2]. The result of the simulation model almost coincides with the measured data and estimates the performance of a new environment.
  • 4.

    Energy-aware Instruction Cache Design using Backward Branch Information for Embedded Processors

    양나라 , Jong Myon Kim , 김철홍 | 2008, 13(6) | pp.33~40 | number of Cited : 3
    Abstract PDF
    Energy efficiency should be considered together with performance when designing embedded processors. This paper proposes a new energy-aware instruction cache design using backward branch information to reduce the energy consumption in an embedded processor, since instruction caches consume a significant fraction of the on-chip energy. Proposed instruction cache is composed of two caches: a large main instruction cache and a small loop instruction cache. Proposed technique enables the selective access between the main instruction cache and the loop instruction cache to reduce the number of accesses to the main instruction cache, leading to good energy efficiency. Analysis results show that the proposed instruction cache reduces the energy consumption by 20% on the average, compared to the traditional instruction cache.
  • 5.

    A Study on Web Services for Sequence Similarity search in the Workflow Environment

    정진영 | 2008, 13(6) | pp.41~50 | number of Cited : 0
    Abstract PDF
    In recent years, a life phenomenon using a workflow management tool in bioinformatics has been actively researched. Workflow management tool is the base which enables researchers to collaborate through the re-use and sharing of service, and a variety of workflow management tools including MyGrid project’s Taverna, Kepler and BioWMS have been developed and used as the open source. This workflow management tool can model and automate different services in spatially-distant area in one working space based on the web service technology. Many tools and databases used in the bioinformatics are provided in the web services form and are used in the workflow management tool. In such the situation, the web services development and stable service offering for a sequence similarity search which is basically used in the bioinformatics can be essential in the bioinformatics field. In this paper, the similarity retrieval speed of biology sequence data was improved based on a Linux cluster, and the sequence similarity retrieval could be done for a short time by linking with the workflow management tool through developing it in the web services.
  • 6.

    Object-Oriented Library System for Configuration Thread Control of the Component in Version Control

    OH, SANG YEOB , CHOI , WOO SEUNG | 2008, 13(6) | pp.51~58 | number of Cited : 3
    Abstract PDF
    A version control system is used in a rapidly changed environment or a program which developed in a complicated environment. it is a problem of configuration thread in supporting information that we, in this method, can't know a exactly well-defined configuration rule information and a predefined information. In this paper. Library system is suggested, modelled, and implemented so as to configuration thread control the components required by the user in many ways. As for the library used in the configuration thread control suggested in this paper, the components can be retrieved from the library regardless of the infrastructure, applying the extended facet classification. This retrieval framework is managed using TreeSearch class and the configuration thread control function. The library system of this paper can be used by the interface with other languages, and this system is to have a advantage to extend a facet by user.
  • 7.

    Earthquake-related Data Selection using Event Packets

    임인섭 , Soon Key Jung | 2008, 13(6) | pp.59~68 | number of Cited : 0
    Abstract PDF
    EIn this paper, we propose a method for selecting meaningful event packets from which can receive before anything else from seismograph according to allotted priority and estimate epicenter using selected packets. Event packets which received from each station will be evaluated with their onset time, signal period and SNR by statistical method and will be selected packets related with real earthquake's P-wave. And estimated epicenters using by 'Application of epicenter estimation using first P arrivals'. With local earthquakes occurred in 2007 were announced by KMA, collected event packets on earthquake happened date and selected p-wave related packets and estimated epicenter. After result of experiment, if an earthquake occurred within seismic networks, can estimate epicenter with small misfits just after event packets arrived from above 4 stations. Considering average distance of each station, in case of using all stations' data include other organization, can estimate and alert rapidly. It show this method is useful when construct a local earthquake early warning system later.
  • 8.

    An online learning system for evaluating learner's activities and study level

    김혜은 , Seok-Jong Yu | 2008, 13(6) | pp.69~76 | number of Cited : 5
    Abstract PDF
    The biggest strength of the Internet is to enable to access information without any limitation of time and space. As the Internet and IT technologies have been developed, various kinds of teaching ways in education field such as remote lectures, video lectures, and CAI(Computer Adapted Instruction) have emerged. In terms of education, evaluation can be a basic foundation to help teach students in the next learning stage according to each student’s level. In addition, it is able to give the information of students’abilities and provides proper learning programs to teach students on a case-by-case basis. The purpose of the paper is to establish evaluation system on the WWW(World Wide Web) that can reflect learning activities part of students in their evaluation scores based on the two important learning theories, Behaviorism and constructivism, which are mainly used in evaluation procedures to judge learning ability of students. This system will give information about learners, and analyze the learning interest of learners. The proposed system enables teachers to evaluate learning ability of students through various kinds of information of learners, and to execute level-based education.
  • 9.

    An Automatic Schema Generation System based on the Contents for Integrating Web Information Sources

    곽준영 , BAEJONGMIN | 2008, 13(6) | pp.77~86 | number of Cited : 0
    Abstract PDF
    The Web information sources can be regarded as the largest distributed database to the users. By virtually integrating the distributed information sources and regarding them as a single huge database, we can query the database to extract information. This capability is important to develop Web application programs. We have to infer a database schema from browsing-oriented Web documents in order to integrate databases. This paper presents a heuristic algorithm to infer the XML Schema fully automatically from semi-structured Web documents. The algorithm first extracts candidate pattern regions based on predefined structure-making tags, and determines a target pattern region using a few heuristic factors, and then derives XML Schema extraction rules from the target pattern region. The schema extraction rule is represented in XQuery, which makes development of various application systems possible using open standard XML tools. We also present the experimental results for several public web sources to show the effectiveness of the algorithm.
  • 10.

    An Iris Diagnosis System using Color Iris Images

    한성현 | 2008, 13(6) | pp.87~94 | number of Cited : 2
    Abstract PDF
    Iris diagnosis is an alternative medicine technique whose proponents believe that patterns, colors, and other characteristics of the iris can be examined to determine information about a patient's systemic health. However, because most of previous studies only find a sign pattern in a gray iris image, they are not enough to be used for a iris diagnosis system. In this paper, we developed an iris diagnosis system based on a color image processing and iris medical information stored in database. The system includes four modules : input module with an iris camera, iris signs extraction module, medical database, output module with printing. Based on a color image processing approach, this paper presents the extraction algorithms of 7 major iris signs and correction manually for improving the accuracy of analysis. We can use the iridology and patient's health DB in the stage of signs analysis. Compared with the existing system, the developed system can be applied to an iris diagnosis system since it provides various additional functions.
  • 11.

    The Embdedded Software of Development Process & Quality Evaluation Mathod

    김금옥 , HaeSool Yang | 2008, 13(6) | pp.95~106 | number of Cited : 2
    Abstract PDF
    Recently use of the embedded software has been increased to different areas.  The requirements and demands for the embedded software have also been altered. In the past, the embedded system was used in simple task and small portable devices but now, the usage of the embedded software has expanded to do much more complex and precise actions in a variety platform environment.  The embedded software enables multiple softwares to be integrated into one and at the same time, control it. Currently the biggest challenges embedded software is facing during its development process is the improvement in product production and quality assurance.  Our research team has developed an embedded software based on the component (technology or methodology) which both improves production capabilities as well as quality.  Additionally, we also established and constructed a reliability test system which can effectively test the quality of the developed embedded software to further increase its competiveness.
  • 12.

    Automatic Speechreading Feature Detection Using Color Information

    Lee, Kyung-Ho , 양룡 , Sang-Burm Rhee | 2008, 13(6) | pp.107~116 | number of Cited : 4
    Abstract PDF
    Face feature detection plays an important role in application such as automatic speechreading, human computer interface, face recognition, and face image database management. We proposed a automatic speechreading feature detection algorithm for color image using color information. Face feature pixels is represented for various value because of the luminance and chrominance in various color space. Face features are detected by amplifying, reducing the value and make a comparison between the represented image. The eye and nose position, inner boundary of lips and the outer line of the tooth is detected and show very encouraging result.
  • 13.

    Algorithm of Generating Adaptive Background Modeling for crackdown on Illegal Parking

    주성일 , 전영민 , HYUNG IL CHOI | 2008, 13(6) | pp.117~126 | number of Cited : 1
    Abstract PDF
    The Object tracking by real-time image analysis is one of the major concerns in computer vision and its application fields. The Object detection process of real-time images must be preceded before the object tracking process. To achieve the stable object detection performance in the exterior environment, adaptive background model generation methods are needed. The adaptive background model can accept the nature's phenomena changes and adapt the system to the changes such as light or shadow movements that are caused by changes of meridian altitudes of the sun. In this paper, we propose a robust background model generation method effective in an illegal parking auto-detection application area. We also provide a evaluation method that judges whether a moving vehicle stops or not. As the first step, an initial background model is generated. Then the differences between the initial model and the input image frame is used to trace the movement of object. The moving vehicle can be easily recognized from the object tracking process. After that, the model is updated by the background information except the moving object. These steps are repeated. The experiment results show that our background model is effective and adaptable in the variable exterior environment. The results also show our model can detect objects moving slowly. This paper includes the performance evaluation results of the proposed method on the real roads.
  • 14.

    Automatic Extraction and Preferred Processing of ROI in JPEG2000

    PARK JAE HEUNG , Yeong Geon Seo , KimSangBok and 2 other persons | 2008, 13(6) | pp.127~136 | number of Cited : 6
    Abstract PDF
    A digitized image passes by encoding, storing or transmitting to show it to users. In this process, may be users would want to see a specific region of the image. And depending on the system features or in the case that the resolution of the image is large, it will take a huge time that the image show to the users. In this time, it will be resonable that the part users want to see shows earlier and afterward the other parts show. For this, JPEG2000 standards provide ROI. Although ROI extraction that users specify ROI arbitrarily is the best, people not always participate in doing all the images. There needs an automatic ROI extracting and storing in some images. JPEG2000 should extract and send an ROI automatically when the images is encoded without ROI. This study proposes a method that automatically extracts an ROI, makes the ROI masks, transfers the masked image preferentially and the background. And the study compares and experiments the proposed method and the method not having ROI.
  • 15.

    Role-based Self-Organization Protocol of Clustering Hierarchy for Wireless Sensor Networks

    Sunghyun Go , Kim Hyoung Jin | 2008, 13(6) | pp.137~146 | number of Cited : 0
    Abstract PDF
    In general, a large-scale wireless sensor network(WSNs) is composed of hundreds of or thousands of sensor nodes. In this large-scale wireless sensor networks, it is required to maintain and manage the networks to lower management cost and obtain high energy efficiency. Users should be provided with sensing service at the level of quality for users through an efficient system. In evaluating the result data quality provided from this network to users, the number of sensors related to event detection has an important role. Accordingly, the network protocol which can provide proper QoS at the level of users demanding quality should be designed in a way such that the overall system function has not to be influenced even if some sensor nodes are in error. The energy consumption is minimized at the same time. The protocol suggested in this article is based on the LEACH protocol and is a role-based self-Organization one that is appropriate for large-scale networks which need constant monitoring.
  • 16.

    Scene Change Detection with 3-Step Process

    SeongYoon Shin , Rhee Yang Weon | 2008, 13(6) | pp.147~154 | number of Cited : 2
    Abstract PDF
    First, this paper compute difference value between frames using the composed method of χ2 histogram and color histogram and the normalization. Next, cluster representative frame was decided by using the clustering for distance and the k-mean grouping. Finally, representative frame of group was decided by using the likelihood ratio. Proposed method can be known by experiment as outstanding of detection rather than other methods, due to computing of difference value, clustering and grouping, and detecting of representative frame.
  • 17.

    Developmemt of a low-cost fruite classification system based on Digital images

    Koo Min Jeong , 황동국 , 이우람 and 2 other persons | 2008, 13(6) | pp.155~162 | number of Cited : 3
    Abstract PDF
    The quality of the fruits is measured by a lot of parameters. The grader of the fruits to measure the size of them is using the rotation drum method. Therefore when we classify the size of the fruits, they will be damaged. Also the optical grader used for estimating the degree of the saccharinity will incur high cost for it. In the proposed system, to select the characteristics of the fruits, three cameras are used. Because the information such as the volume and the degree of the maturity is used to classify the fruits, the degree of the saccharinity can't be estimated itself, but the information such as the color and the damage of the fruits can be estimated. Therefore, because we don't need the digital image with high resolution, we can develop the grader system of the fruit with low cost. To evaluate the performance of the proposed system, we compared it with the sight estimation and then we classified the sample. The result shows the accuracy of 96.7%.
  • 18.

    An Image Interpolation by Adaptive Parametric Cubic Convolution

    Jea-Wook Yoo , 박대현 , Kim, yoon | 2008, 13(6) | pp.163~172 | number of Cited : 3
    Abstract PDF
    In this paper, we present an adaptive parametric cubic convolution technique in order to enlarge the low resolution image to the high resolution image. The proposed method consists of two steps. During the first interpolation step, we acquire adaptive parameters in introducing a new cost-function to reflect frequency properties. And, the second interpolation step performs cubic convolution by applying the parameters obtained from the first step. The enhanced interpolation kernel using adaptive parameters produces output image better than the conventional one using a fixed parameter. Experimental results show that the proposed method can not only provides the performances of 0.5∼4dB improvements in terms of PSNR, but also exhibit better edge preservation ability and original image similarity than conventional methods in the enlarged images.
  • 19.

    System Design for the Safe store and Issue Service Assurance of the E-Document

    KyungSang Sung , 김정재 , Hae-Seok Oh | 2008, 13(6) | pp.173~180 | number of Cited : 3
    Abstract PDF
    Certified e-Document Authority keep it with protection legal as a system a guarantee and identifies originality of an e-Record, It presume to be authenticity e-Records and contents of an e-Record prove what was not changed. But, e-Records has high medium degree of dependence and loss danger of information has very high problems. In addition, Because correction(attachment and deletion) and a revision of information are easy, a problem for integrity and the originality of an e-Record is caused. Existing system show the following inefficient. For the originality guarantee, an existing e-Documents encryption method accomplishes a encrypted process of a whole document with a symmetric key, if the information revised midway, the whole documents content must accomplish re-scanning and re-encryption process again. To get over such inefficient, this paper maximize efficiency which occurred at the time of partial information revision request by encryption and managing using the link information based on the linkage characteristics of the each page on the registered requested e-Documents, It was able to increase security configuration by minimizing problems on an information exposure through increasing complicated of the key management.
  • 20.

    Extending VNC for Effective Collaboration

    이태호 , 이홍창 , 박양수 and 1 other persons | 2008, 13(6) | pp.181~194 | number of Cited : 1
    Abstract PDF
    VNC is one of popular thin client computing systems, which supports cross-platform remote control using the RFB protocol. Unfortunately, since VNC does not provide functions specially designed for collaboration, it is difficult to collaborate effectively through the remote control function of VNC. In this paper, we present the extension of the UltraVNC server and the JavaViewer client which are one of open-source VNC systems. For effective real-time collaboration, the extended VNC provides three kinds of access authorities to control the collaboration server: administrator, worker, and spectator. The administrator can control the access authorities of the users through the access control tool, newly provided in the extended JavaViewer. The workers can access the resources of the remote server, whereas the spectator cannot handle those remote resources, only monitoring the remote server. In addition, the extended VNC provides the one-click connection facility for easy connection to the collaboration server from many collaboration participants.
  • 21.

    A Study on MT-Serpent Cryptographic Algorithm Design for the Portable Security System

    이선근 , 정우열 | 2008, 13(6) | pp.195~202 | number of Cited : 2
    Abstract PDF
    We proposed that is suitable network environment and wire/wireless communication network, easy of implementation, security level preservation, scalable & reconfigurable to TCP/IP protocol architecture to implement suitable smart card MS-Serpent cryptographic algorithm for smart card by hardware base chip level that software base is not implement. Implemented MT-Serpent cryptosystem have 4,032 in gate counter and 406.2Mbps@2.44MHz in throughput. Implemented MS-Serpent cryptographic algorithm strengthens security vulnerability of TCP/IP protocol to do to rescue characteristic of smart card and though several kind of services are available and keep security about many user in wire/wireless environment, there is important purpose.
  • 22.

    A Web Services Delivery System for Mobile Environment

    Kim Jin-Il , 김용태 , Gil-Cheol Park | 2008, 13(6) | pp.203~210 | number of Cited : 0
    Abstract PDF
    Recently, as wireless communication are becoming more and more popular, Internet users is becoming increasingly demand HTTP-based web service in mobile computing environment. But, overall performance of web services may slow down, because mobile device are generally equipped with lower capability. Therefore, the most important factor to design wireless internet delivery system should be scalable to handle a large scale traffic due to rapidly growing users. But, in case of some preceding research, they not present a basic efficiency reform measure until currently. Therefore, In this paper, We propose a Web Sevice Delivery System for mobile environment that alleviates problems that occurred while executing web services in mobile environment and are helpful to overcome the above needs. The system composed of HTML/WML Converter, SOAP message processor. We compare the existing system with the proposed system.
  • 23.

    Implementation of Quadrifilar Helical Antenna Using Phase Difference with PCB Feeding Line

    PARK SANGJO | 2008, 13(6) | pp.211~216 | number of Cited : 1
    Abstract PDF
    Gap fillar antennas are needed for serving the high quality of DMB through the cellular phone by eliminating the shadow regions among buildings or underground. We implement Quadrifilar Helical Antenna using phase difference with PCB feeding lines without coaxial cables and four impedance matching circuits. It is shown that the antenna characteristics is affected by the size and diameter through the simulation process using MicroWave Studio and it is applied for implementing QHA. Experiment results confirm that the performance can be gained as same as the simulation data by using the phase difference with PCB feeding lines without additional impedance matching circuits.
  • 24.

    A Study on N-IDS Detection and Packet Analysis regarding a DoS attack

    천우성 , Dea-woo Park | 2008, 13(6) | pp.217~224 | number of Cited : 6
    Abstract PDF
    EThis paper is study regarding banking institution and DoS attack regarding government organization which occurred in 2008. We used a tool aggressive actual DoS You install the N-IDS which used Snort in networks in order to detect a DoS attack. Storages of Winpcap and a packet to detect a packet and MySQL, HSC, to analyze. We install NET Framework etc. E-Watch etc. analyzes Packet regarding a DoS attack of a hacker and TCP, UDP etc. information, Port, MAC and IP information etc. through packet analysis tools. There is a meaning you analyze data regarding the cyber DoS, DDoS attack that is dysfunction of Ubiquitous Information Society, and it generates forensics data regarding an invader and back-tracking analysis data, and to ensure safe Internet information system through this paper study.
  • 25.

    Wireless Network Synchronization Algorithm based on IEEE 802.11 WLANs (Wireless Local Area Networks) for Multimedia Services

    윤종원 , Joung, Jinoo | 2008, 13(6) | pp.225~232 | number of Cited : 2
    Abstract PDF
    When a single source of multimedia contents is distributed to multiple reproduction devices, the audio and video contents require synchronous play for multi-channel stereo sound and lip-synchronization. The multimedia system in vehicle, especially, has researched to move to wireless environments from legacy wired environments. This paper proposes the advanced algorithm for providing synchronized services of real-time multimedia traffic in IEEE 802.11 WLANs [1]. For these, we implement the advanced IEEE 1588 Precision Time Protocol [2] and the environments for simulation. Also, we estimate and analysis performance of the algorithm, then we experiment and analysis after the porting of algorithm in wireless LAN devices (Linksys wrt-350n AP network device) to characterize timing synchronization accuracy.
  • 26.

    An Efficient Overlay Multicast Scheduling for Composite Stream in P2P Environment

    김종경 , 최성욱 | 2008, 13(6) | pp.233~242 | number of Cited : 3
    Abstract PDF
    The overlay multicast that has been recently presented as an alternative for the IP multicast needs scheduling method that can apply the system resource and the network bandwidth for the many users. We propose a efficient overlay multicasting network policy for multimedia services with composite stream service topology. And in order to evaluate the ability of the proposed scheme's performance, We test the performance of multi_casting nodes with RTT values, the bandwidth attrition rate for building the network topology and MOR effects with Overcast[5] The result of simulation shows improves about 8∼20% of performance.
  • 27.

    The Extraction of Fingerprint Corepoint And Region Separation using Labeling for Gate Security

    이건익 , 전영철 , 김강 | 2008, 13(6) | pp.243~252 | number of Cited : 0
    Abstract PDF
    This study is to suggest the extraction algorithms of fingerprint corepoint and region separation using the labeling for gate security in order that it might be applied to the fingerprint recognition effectively. The gate security technology is entrance control, attendance management, computer security, electronic commerce authentication, information protection and so on. This study is to extract the directional image by dividing the original image in 128×128 size into the size of 4×4 pixel. This study is to separate the region of directional smoothing image extracted by each directional by using the labeling, and extract the block that appeared more than three sorts of change in different directions to the corepoint. This researcher is to increase the recognition rate and matching rate by extracting the corepoint through the separation of region by direction using the maximum direction and labeling, not search the zone of feasibility of corepoint or candidate region of corepoint used in the existing method. According to the result of experimenting with 300 fingerprints, the poincare index method is 94.05%, the proposed method is 97.11%.
  • 28.

    Applied Implementation of J2ME 3D Mobile Based on WTK Development Environment

    주헌식 | 2008, 13(6) | pp.253~262 | number of Cited : 0
    Abstract PDF
    Mobile games will be one of independent industries on game areas and take the fourth standing in the important platform since PC Games, TV Games, and Palm Games. There are several reasons why mobile games will differ in their platform, behaviors, and habits. According to the data of market consultation about the figure of mobile-game players throughout the world, the Mobile game will increase steadily from 780 million in 2007 to 1860 million in 2010. Also, market income will mount up from $42,100 million to $87,000 million. 3D games have been playing important roles in our lives. Satisfying users' needs in high-quality games, they have been growing and attracting more people with their powerful visual effects and the three-dimensional design player. We cannot emphasize their tremendous visual impacts and animation effects too much. This paper displays how to design 3D application based on J2ME (Java 2 Micro Edition) and shows free movement of 3D objects receiving and responding to the keyboard of mobile devices with WTK (Wireless ToolKit) simulator on the 3D screen.[3] [6]
  • 29.

    A Korean Mobile Conversational Agent System

    홍금원 , 이연수 , 김민정 and 2 other persons | 2008, 13(6) | pp.263~272 | number of Cited : 12
    Abstract PDF
    This paper presents a Korean conversational agent system in a mobile environment using natural language processing techniques. The aim of a conversational agent in mobile environment is to provide natural language interface and enable more natural interaction between a human and an agent. Constructing such an agent, it is required to develop various natural language understanding components and effective utterance generation methods. To understand spoken style utterance, we perform morphosyntactic analysis, shallow semantic analysis including modality classification and predicate argument structure analysis, and to generate a system utterance, we perform example based search which considers lexical similarity, syntactic similarity and semantic similarity.
  • 30.

    A Study on Recognition of New Car License Plates Using Morphological Characteristics and a Fuzzy ART Algorithm

    Kim, Kwang-baek , Woo, Young Woon , Jaehyun Cho | 2008, 13(6) | pp.273~278 | number of Cited : 5
    Abstract PDF
    Cars attaching new license plates are increasing after introducing the new format of car license plate in Korea. Therefore, a car new license plate recognition system is required for various fields using automatic recognition of car license plates, automatic parking management systems and arrest of criminal or missing vehicles. In this paper, we proposed an intelligent new car license plate recognition method for the various fields. The proposed method is as follows. First of all, an acquired color image from a surveillance camera is converted to a gray level image and binarized by block binarization method. Second, noises of the binarized image removed by morphological characteristics of cars and then license plate area is extracted. Third, individual characters are extracted from the extracted license plate area using Grassfire algorithm. lastly, the extracted characters are learned and recognized by a fuzzy ART algorithm for final car license plate recognition. In the experiment using 100 car images, we could see that the proposed method is efficient.
  • 31.

    A Study on strengthening the global competitiveness of Korea's IT industry through exporting the IT package-type service

    김선배 | 2008, 13(6) | pp.279~286 | number of Cited : 1
    Abstract PDF
    The IT industry plays the engine role in Korean economy which reaches up to 17% of Korean GDP. However the current global economic depression which stems mainly from the US has caused insufficient demand in IT industry. The decreased demand leads to a drug in the market, to fierce price competitions and increasing fear on the world IT market depression. Considering the facts, there are strong demands for the diversification of the products of exports and the countries Korea exports to. These need differentiated strategies which can be summarized in various IT package-type overseas expansion model including the consideration in strategic items, countries, connecting large and small-medium size companies or businesses and related industries. The importance of IT industry in Korean economy will grow constantly and the IT package-type overseas expansion models will preside the movements.
  • 32.

    A Statistical Approach about Documents of Women's recognition on the Date Rape

    박종렬 , Noe, Sang-Ouk | 2008, 13(6) | pp.287~294 | number of Cited : 2
    Abstract PDF
    As shown in many precedent studies of sex violation, many rapes are done by acquaintances rather than strangers. Among them specially many are the cases carried out by date partners and so it is necessary to study on the date rape systematically and academically which is the most common sex violation. A recent study on the date rape executed in the country shows the seriousness of the problem clearly. The survey reported that 20.5 percentages of women had experienced the harmfulness of date rape. However compared with the general injured women, the injured ones of date rape rarely report it to related organs. The reason is that in the case of date rape both the injured ones and offenders just think of the injured things or offending works as a little excessive sexual relation or sexual contact, but not recognize it as sex violation. Therefore this study will introduce the results of precedent studies on the date rape based on the contents of Michael Shively, Perceived Risks of Date Rape, Judith M. Sgarzi, Victimology, and also introduce the prevention of the injury its countermeasures.
  • 33.

    A Study on the Daily Sports Activities of Senior and Leisurely Satisfaction of Statistical Analysis Technique

    Cho Woo Hong | 2008, 13(6) | pp.295~300 | number of Cited : 1
    Abstract PDF
    This study identifies the effect of community sports activities of senior on leisurely satisfaction to present basic information for active participation of senior in daily sports activities for enhanced satisfaction of senior and heir families. As a result, this study found that there is a significant difference between senior who participated in the activities and those who did not, and participation in daily sports activities has partial effect on leisurely satisfaction. Based on the conclusion above, this study suggests that degree of participation as well as participation in daily sports activities enhances leisure satisfaction of senior and their families. Therefore, to enhance the living quality of senior people, we need a discussion on development of a model based on effective daily sports activation plan.
  • 34.

    A Study on Structural Relationships between Information Service Quality and Performance

    Seonjin Shin , IL RYU | 2008, 13(6) | pp.301~314 | number of Cited : 3
    Abstract PDF
    The purpose of this study is to examine the effect of information service quality on user satisfaction and individual performance in Outbound Callcenter. A survey was conducted and data were collected from 330 respondents of 1 company which adopted CMS. Validity and reliability of the research instrument were tested and research hypotheses were examined using PLS Graph 3.0. As a result of data analysis, 6 out of 8 hypotheses were supported. User satisfaction is significantly influenced by information quality factors such as accuracy, currency, and relevancy. 2) Also, User satisfaction is significantly affected by internal service quality factors such as training support and reward system. 3) Individual performance is significantly influenced by user satisfaction. Implications of these findings are discussed for researchers and practitioners.
  • 35.

    A Study on the Negative Oral Transmission of Visitors the Service Quality Factors in Local Culture

    Dong-su Lee , 이동순 | 2008, 13(6) | pp.315~324 | number of Cited : 1
    Abstract PDF
    This study purposes the research to present local government and theoretical implications by analyzing the dissatisfaction and the negative oral transmission with the service quality in local festival. For these purposes, authors summarized the current researches on the significance of the local festivals and dissatisfied attitude, dissatisfaction and negative oral transmission with the service quality in local festival. The following conclusions were derived Gangjin Celadon Festival. First, Gangjin Celadon Festival is affected directly by responsiveness and assurance of the service quality in local festival. Second, results of the summary of findings in hypothesis proves to be affected the most dissatisfaction. The analytic results of this study presented the theoretical implications and policy suggestions of the local festival.
  • 36.

    A Study of the Impact of Internet Information Quality on Job Satisfaction and Organizational Performance -Focusing on Hotel and Franchising Restaurant Business-

    채규진 , Daesung Chang , Kim MinSu | 2008, 13(6) | pp.325~332 | number of Cited : 1
    Abstract PDF
    Internet explosion has revolutionized the way the industries, including that of the hospitality industry have conducted their businesses. With any new technology, there is a need to explore, define, develop and refine practices in its usage. The main purpose of this study was to examine how internet information influence employees job satisfaction and organizational performance. Employees were asked through surveys to evaluate four specific factors: format, accuracy, content and timeliness (FACT) in terms of their importance when making a restaurant choice. The findings of this study were as follows: internet information quality influenced business performance and employees job satisfaction.