Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2008, Vol.13, No.7

  • 1.

    The Comparative Study of Software Optimal Release Time Based on Log-Logistic Distribution

    Kim Hee Chul | 2008, 13(7) | pp.1~9 | number of Cited : 7
    Abstract PDF
    In this paper, make a study decision problem called an optimal release policies after testing a software system in development phase and transfer it to the user. When correcting or modifying the software, because of the possibility of introducing new faults when correcting or modifying the software, infinite failure non-homogeneous Poisson process models presented and propose an optimal release policies of the life distribution applied log-logistic distribution which can capture the increasing/decreasing nature of the failure occurrence rate per fault. In this paper, discuss optimal software release policies which minimize a total average software cost of development and maintenance under the constraint of satisfying a software reliability requirement. In a numerical example, after trend test applied and estimated the parameters using maximum likelihood estimation of inter-failure time data, make out estimating software optimal release time.
  • 2.

    A Corpus-based Hybrid Model for Morphological Analysis and Part-of-Speech Tagging

    Seung-Wook Lee | 이도길 | 임해창 | 2008, 13(7) | pp.11~18 | number of Cited : 4
    Abstract PDF
    Korean morphological analyzer generally generates multiple candidates, and then selects the most likely one among multiple candidates. As the number of candidates increases, the chance that the correctly analyzed candidate is included in the candidate list also grows. This process, however, increases ambiguity and then deteriorates the performance. In this paper, we propose a new rule-based model that produces one best analysis. The analysis rules are automatically extracted from large amount of Part-of-Speech tagged corpus, and the proposed model does not require any manual construction cost of analysis rules, and has shown high success rate of analysis. Futhermore, the proposed model can reduce the ambiguities and computational complexities in the candidate selection phase because the model produces one analysis when it can successfully analyze the given word. By combining the conventional probability-based model, the model can also improve the performance of analysis when it does not produce a successful analysis.
  • 3.

    Design and Implementation of a Performance Evaluation Tool for Embedded Softwares on Collaborative Development Environment

    Iksu Kim | 조용운 | 2008, 13(7) | pp.19~27 | number of Cited : 0
    Abstract PDF
    A performance evaluation tool makes an important role in order to improve performance of an embedded software which has restricted computing resources. However, existing performance evaluation tools for embedded softwares cannot be used in collaborative development environment because they support only one developer with performance evaluation work under cross development environment. In this paper, we propose a performance evaluation tool for embedded softwares on collaborative development environment. A proposed tool is based on server and client model. It can have flexibility in offering and integrating the result information for the items. Through the suggested tool, developers can intuitively understand and analysis performance evaluation results each other.
  • 4.

    An Image Management System of Frame Unit on a Hand-held Device Environments

    Choi.Jun-Hyeog | KyungBae Yoon | SeungJin Han | 2008, 13(7) | pp.30~36 | number of Cited : 0
    Abstract PDF
    This paper proposes algorithm for the system that can search for an image of a frame unit, and we implement it. A system already inserts in images after generating the cord that mechanical decoding and identification are possible. We are independent of an external noise in a frame unit, and a system to propose at these papers can search for an image recorded by search condition to include recording date, recording time, a recording place or filming course etc. This system is composed by image insertion wealth to insert data to an image to data image code generation wealth, a frame generating data image code you apply a code generation rule to be fixed in order to express to a price to have continued like data entry wealth, GPS locator values and direction price receiving an image signal, image decoding signals and an image search signal to include search condition, and to have continuity from users each of an image. Also, image decoding we decipher about the noise that was already added from the outsides in a telerecording process, a copy process or storage processes inserted in images by real time, and searching image information by search condition. Consequently we implement decoder, and provide the early system that you use, and we easily insert data code among images, and we can search, and maximization can get precision regarding an image search and use satisfaction as we use algorithm to propose at these papers.
  • 5.

    A Feature-based Method to Identify Services in Ubiquitous Environment

    신현석 | Chee-Yang Song | Dongsu Kang and 1other persons | 2008, 13(7) | pp.37~49 | number of Cited : 4
    Abstract PDF
    Services are reusable units in business level. Ubiquitous computing provides computing services anytime and anywhere. The combination of both is becoming an important paradigm of computing environment. Fundamentals of services require flexibility and interoperability, and key elements of ubiquitous modeling require interoperability and context-awareness. There are two kinds of methods to identify services. The top-down approach is based on business process, and the bottom-up approach is based on components. The first approach depends on experts' intuitions, while the second approach suffers the incapability of expressing non-functional expression through components. Although a feature-based approach is capable of expressing non-functional expression and identifying services in ubiquitous environment, the research on this issue is not adequately addressed by far. To promote this research, this paper proposes a feature-based method to identify services in ubiquitous computing. The method extracts initial-candidate-services from a feature model. Then, the ultimate services are identified through optimizing and analyzing the candidate-services. The proposed method is expected to enhance the service reusability by effectively analyzing ubiquitous domain based on feature, and varying reusable service units.
  • 6.

    Study of Methodology for Recognizing Multiple Objects

    Lee Hyun Chang | 고진광 | 2008, 13(7) | pp.51~57 | number of Cited : 1
    Abstract PDF
    In recent computer vision or robotics fields, the research area of object recognition from image using low cost web camera or other video device is performed actively. As study for this, there are various methodologies suggested to retrieve objects in robotics and vision research areas. Also, robotics is designed and manufactured to aim at doing like human being. For instance, a person perceives apples as one see apples because of previously knowing the fact that it is apple in one's mind. Like this, robotics need to store the information of any object of what the robotics see. Therefore, in this paper, we propose an methodology that we can rapidly recognize objects which is stored in object database by using SIFT (scale invariant feature transform) algorithm to get information about the object. And then we implement the methodology to enable to recognize simultaneously multiple objects in an image.
  • 7.

    Topic and Topic Change Detection in Instance Messaging

    최윤정 | 신욱현 | 정윤재 and 2other persons | 2008, 13(7) | pp.59~66 | number of Cited : 0
    Abstract PDF
    This paper describes a novel method for identifying the main topic and detecting topic changes in a text-based dialogue as in Instant Messaging (IM). Compared to other forms of text, dialogues are uniquely characterized with the short length of text with small number of words, two or more participants, and existence of a history that affects the current utterance. Noting the characteristics, our method detects the main topic of a dialogue by considering the keywords not only the utterances of the user but also the dialogue system's responses. Dialogue histories are also considered in the detection process to increase accuracy. For topic change detection, the similarity between the former utterance's topic and the current utterance's topic is calculated. If the similarity is smaller than a certain threshold, our system judges that the topic has been changed from the current utterance. We obtained 88.2% and 87.4% accuracy in topic detection and topic change detection, respectively.
  • 8.

    RSSI-based Indoor Location Tracking System using Wireless Sensor Networks

    정경권 | 박현식 | 최우승 | 2008, 13(7) | pp.67~73 | number of Cited : 2
    Abstract PDF
    This paper describes a system for location tracking wireless sensor nodes in an indoor environment. The sensor reading used for the location estimation is the received signal strength indication (RSSI) as given by an RF interface. By tagging users with a mobile node and deploying a number of reference nodes at fixed position in the room, the received signal strength indicator can be used to determine the position of tagged users. The system combines Euclidean distance technique with signal strength obtained by measurement driven log-normal path loss model of 2.4 GHz wireless channel. The experimental results demonstrated the ability of this system to estimate the location with a error less than 1.3m.
  • 9.

    Controlling of Dam Gates with Outflow Control by Dynamic Fuzzy Inference

    Woo, Young Woon | 이수종 | Kim, Kwang-baek | 2008, 13(7) | pp.75~82 | number of Cited : 3
    Abstract PDF
    Control of dam gates is a complex, nonlinear, and non-stationary control process and is significantly affected by hydrological conditions which are not predictable beforehand. In this paper, we proposed control methods based on a fuzzy inference method for the operation of dam gates. The proposed methods are not only suitable for controlling gates but also able to maintain target water level in order to prepare a draught, and able to control the amount of the outfow from a reservoir in order to prevent floods in lower areas of a river. In the proposed methods, we used the dynamic fuzzy inference method that membership functions can be varied by changing environment conditions for keeping up the target water level instead of conventional static fuzzy inference methods, and used additional fuzzy rules and membership functions for restricting the amount of the outflow. Simulation results demonstrated that the proposed methods produce an efficient solution for both of maintaining target water level defined beforehand and controlling the amount of the outflow.
  • 10.

    Hybrid Interpolation using Intra Prediction Information of H.264/AVC

    Yongkwang Kwon | 2008, 13(7) | pp.83~90 | number of Cited : 1
    Abstract PDF
    EThe digitalized image information has various resolution, and it has been developed for several technologies to resize image depending on user's requests and applications. Recently the algorithm using edge information for good image/video quality on up-sampling was introduced , and the pre-processing procedure is required for edge extraction. Than, the predicted direction in intra prediction used in H.264/AVC has the similarity up to 80% for the edge information, so I propose the image up-sampling method using edge information. In proposed method, the image quality is similar to result of adapting n'th kernel, and the method reduces the number of calculation by about 50%.
  • 11.

    Efficient Multiplex Audio Monitoring System in Digital Broadcasting

    Yoowon Kim | 손석원 | 조근식 | 2008, 13(7) | pp.91~98 | number of Cited : 2
    Abstract PDF
    In digital broadcasting, it is possible to multiplex maximum one hundred audio or music programs into MPEG-2 transport stream, which is suitable for transmitting through one channel. In order to check if multiplex music programs are transmitted well, we need a multiplex audio monitoring system that monitors the programs in real-time. In analog broadcasting, we have used hardware-based audio monitoring system for a small number music programs. However, the effectiveness of hardware-based audio monitoring system from the cost and function viewpoint is so low that a new system is needed for digital broadcasting. In this paper, we have designed and implemented a software-based audio monitoring system to satisfy these requirements. In this implementation, only one PC is used without other hardware facilities, and the system monitors digital broadcasting music programs effectively. Transmitted digital broadcasting streams are demultiplexed into many music programs and the realtime value of audio level and packet error information for these programs are displayed in the screen. Thus, the system detects and shows the abnormal transmitting programs automatically. Simulation results show that effective realtime multiplex audio monitoring is possible for digital broadcasting music programs.
  • 12.

    A Fast Block Matching Motion Estimation Algorithm by using an Enhanced Cross-Flat Hexagon Search Pattern

    HyeonWoo NAM | 2008, 13(7) | pp.99~108 | number of Cited : 1
    Abstract PDF
    For video compression, we have to consider two performance factors that are the search speed and coded video’s quality. In this paper, we propose an enhanced fast block matching algorithm using the spatial correlation of the video sequence and the center-biased characteristic of motion vectors(MV). The proposed algorithm first finds a predicted motion vector from the adjacent macro blocks of the current frame and determines an exact motion vector using the cross pattern and a flat hexagon search pattern. From the performance evaluations, we can see that our algorithm outperforms both the hexagon-based search(HEXBS) and the cross-hexagon search(CHS) algorithms in terms of the search speed and coded video’s quality. Using our algorithm, we can improve the search speed by up to 31%, and also increase the PSNR(Peak Signal Noise Ratio) by at most 0.5 dB, thereby improving the video quality.
  • 13.

    A Suggestion of P2P Search Algorithm for Multidirectional Processing

    Boonhee Kim | 2008, 13(7) | pp.109~115 | number of Cited : 1
    Abstract PDF
    In the P2P distributed system, such peers don't always keep on-line status. P2P systems are different from the ordinary systems that such peers are organically operated as the elements of system. In this case, users using P2P system are able to loss the reliability. At this point, many P2P studies are tried to resolve these problems. In this paper, we suggest a P2P search algorithm for multidirectional processing about the resources to be downloading. In existing studies, the loading rate is very high to select new resources supported peer, so we suggest new solution in this study.
  • 14.

    Large-Scale Ultrasound Volume Rendering using Bricking

    김주환 | KWON, KOOJOO | BYUNG SEOK SHIN | 2008, 13(7) | pp.117~126 | number of Cited : 3
    Abstract PDF
    Recent advances in medical imaging technologies have enabled the high-resolution data acquisition. Therefore visualization of such large data set on standard graphics hardware became a popular research theme. Among many visualization techniques, we focused on bricking method which divided the entire volume into smaller bricks and rendered them in order. Since it switches between bricks on main memory and bricks on GPU memory on the fly, to achieve better performance, the number of these memory swapping conditions has to be minimized. And, because the original bricking algorithm was designed for regular volume data such as CT and MR, when applying the algorithm to ultrasound volume data which is based on the toroidal coordinate space, it revealed some performance degradation. In some areas near bricks' boundaries, an orthogonal viewing ray intersects the same brick twice, and it consequently makes a single brick memory to be uploaded onto GPU twice in a single frame. To avoid this redundancy, we divided the volume into bricks allowing overlapping between the bricks. In this paper, we suggest the formula to determine an appropriate size of these shared area between the bricks. Using our formula, we could minimize the memory bandwidth, and, at the same time, we could achieve better rendering performance.
  • 15.

    Design and Implementation of Component-based Configuration and Data Management System for Weapon System R&D Proesses

    김형준 | Yeong-Geon Seo | KimSangBok and 2other persons | 2008, 13(7) | pp.127~138 | number of Cited : 3
    Abstract PDF
    Configuration and data management system for weapon system research and development processes should assist concurrent engineering and collaboration activities for various documents, drawings, part informations and product structure informations. In this thesis we defined the system architecture using the CBD methodology and implemented the component based system development process. Most of the configuration and data management systems consist of three layered system architecture which use the general MVC models. In this thesis we defined four layered system architecture based on EJB structure under J2EE environments. Through the four layered system architecture, we break down the general model layer into two detailed business layers and the ordinary control layer into two system dependent layers. With these four layers, we proposed the methodology that detailed the characteristics of the components. Through the CBD approach and the component based development process, we can get the representation model and implement the actual system of the configuration and data management system for weapon system R&D.
  • 16.

    An Efficient Dynamic Prediction Clustering Algorithm Using Skyline Queries in Sensor Network Environment

    조영복 | 최재민 | Lee, Sang-ho | 2008, 13(7) | pp.139~148 | number of Cited : 4
    Abstract PDF
    The sensor network is applied from the field which is various. The sensor network nodes are exchanged with mobile environment and they construct they select cluster and cluster headers. In this paper, we propose the Dynamic Prediction Clustering Algorithm use to Skyline queries attributes in direction, angel and hop. This algorithm constructs cluster in base mobile sensor node after select cluster header. Propose algorithm is based made cluster header for mobile sensor node. It "Adv" reduced the waste of energy which mobile sensor node is unnecessary. Respects clustering where is efficient according to hop count of sensor node made dynamic cluster. To extend a network life time of 2.4 times to decrease average energy consuming of sensor node. Also maintains dynamic cluster to optimize the within hop count cluster, the average energy specific consumption of node decreased 14%.
  • 17.

    The Development of Exhibition Grounds Management System Using the Ubiquitous Computing

    Gabsig Sim | 장재혁 | 2008, 13(7) | pp.149~156 | number of Cited : 0
    Abstract PDF
    In this paper, we develope the Exhibition Grounds Management System utilizing the ubiqutous computing which integrates the RFID ubiqutous main technology, existing use technology Bar-code, the Mobile communication technology for IT main technology field. The developed system consists of the program for exhibition information, the visitor registration program, manager program and mobile program for the visitor's current location inquiry and the exhibition management. This system is realized and designed based on database, web program, mobile program, wireless telecommunication technology. The automation technology utilizing the developed RFID system and the Exhibition Grounds Management System integrated with the wireless packet telecommunication using the mobile telecommunication technology could have a ripple effect on whole information industrial application fields.
  • 18.

    PM-MAC : An Efficient MAC Protocol for Periodic Traffic Monitoring In Wireless Sensor Networks

    김동민 | Seong Cheol Kim | 2008, 13(7) | pp.157~164 | number of Cited : 4
    Abstract PDF
    In this paper we suggest a scheduling algorithm that transmits periodic traffics efficiently in tree-structured wireless sensor networks (WSNs). The related research[1] showed the problems such as increasing the energy consumption and decreasing the data throughput as the depth of tree increases. To solve these problems, we use idle time slots and avoid the redundancy at data transmission. Also we suggest the algorithm that transmits the control packet when it is similar to a previously measured data. And if emergency data is occurred, our proposed algorithm transits that data in EDP(Emergency Data Period) for reducing the wait time. The proposed algorithm shows more data throughput and less energy consumption than that of the related research.
  • 19.

    The power consumption and performance comparison between Intel Pentium 4 and Core2 Duo

    공준호 | Jinhang Choi | 이종성 and 1other persons | 2008, 13(7) | pp.165~172 | number of Cited : 3
    Abstract PDF
    There are many metrics when designing microprocessors. Especially, energy, power consumption and performance are the most fundamental metrics. Since these metrics are contradictory, microprocessor designers give more weight to some metrics than the other metrics. In this paper, we compare Intel Pentium 4 and Core2 Duo both qualitatively and quantitatively. Furthermore, we provide detailed comparison between Pentium 4 and Core2 Duo when running real benchmarks. Through performance counter of real processors, we calculate energy and power consumption. Performance metric is execution time. In experimental result, Core2 Duo consumes less energy and power. Moreover, performance of Core2 Duo is also better than that of Pentium 4. However, in case of bzip2 which is optimized in Pentium 4, Pentium 4 shows much better performance and lower energy and power consumption than Core2 Duo.
  • 20.

    A Secure Asymmetric Watermarking to the Public Key Attack

    이덕 | Kim Jong Weon | Choi Jong Uk | 2008, 13(7) | pp.173~180 | number of Cited : 1
    Abstract PDF
    In this paper, we proposed an algorithm for an effective public key and private key generation to implement a secure asymmetric watermarking system against the public key attack. The public key and private key generation is based on the linear transformation using a special matrix and the keys are designed to be able to have high correlation value. We also proposed a counter plan of public key attack. This method uses a multiple public key generation and distribution. As the results, the correlation value between the public key and the private key is high in the watermarked image. After the public key attack, this can detect the correlation by using other public key.
  • 21.

    A Handover Mechanism for Authenticate Subscriber between inter-network in Mobile WiMAX Environment

    Jeong Yoon Su | 김용태 | 김재홍 and 1other persons | 2008, 13(7) | pp.181~188 | number of Cited : 0
    Abstract PDF
    Now a days, WiMAX which provides internet service with a middle and low speed serves more function and is wider than Wi-Fi. While they solve the security risks as subscribers do handover by subscriber's re-certification procedure as the Network range is getting wider, there are more security problems making the problems of electric-power consumption and delay. This paper suggests a handover mechanism which simplify the subscriber's re-certification procedure and prevents a security problem as doing handover for solving the problem of delay and the rate of processing. The mechanism can cooperate with PKI structure to increase flexibility and security and minimize network re-entry procedure or re-certification procedure by providing continual service. As a result, the mechanism's throughput as the number of subscribers is lower than IEEE 802.16e and the mechanism proves that it is secure from the attack of man-in-the-middle and reply as doing handover.
  • 22.

    Busy-tone PHY Module with IEEE 802.11 Design and Implementation in NS-2

    유대훈 | WoongChul Choi | 2008, 13(7) | pp.189~197 | number of Cited : 1
    Abstract PDF
    ENS-2 simulator is the most widely-used simulator in the research of wired/wireless communication. Since an IEEE 802.11 module has been implemented in NS-2, much research using this module has been done for various MAC layer functions. The most important problem in terms of performance is the hidden terminal problem. To solve this problem, the solutions using a busy-tone such as BTMA, DBTMA, etc. have been proposed. In order to be able to use a busy-tone, channels using the frequency bandwidth except the frequency bandwidth of the data channel is required for the collision prevention, and a MAC layer has to be able to menage such multiple channels. In this research, we implement a module that can use a busy-tone in NS-2, implement a modified RI-BTMA by applying the implemented module, and verify its performance.
  • 23.

    A Method of Efficient Conference Event Package Processing in Distributed Conference Environment

    장춘서 | 조현규 | Lee,Ki-Su | 2008, 13(7) | pp.199~205 | number of Cited : 3
    Abstract PDF
    The centralized conference model has advantage of conference management and control, however it's scalability has been limited as performance degrades largely with increasing number of conference users. So new distributed conference models which improve scalability of centralized conference model have been suggested recently. In the distributed conference model, as conference users exceed a predefined maximum number, a new conference server is added to the conference dynamically. In this paper, We have proposed a new method which increases efficiency of conference event package processing that primary conference server should charge in the distributed conference environment. The primary conference server exchanges informations with each secondary conference servers and conference users by using conference event package. And from the conference information database it selects SIP(Session Initiation Protocol) UA(User Agent) which will share notification to the conference users, and transfers lists to each conference servers. The conference servers make the selected UAs share processing of conference event package, so loads of SIP signal processing decrease, and improve scalability of distributed conference model. The performance of our proposed model is evaluated by experiments.
  • 24.

    A EMC Certification Environment Management System using USN

    최종호 | 2008, 13(7) | pp.207~212 | number of Cited : 0
    Abstract PDF
    In EMC(electromagnetic compatibility) certification, the facilities and equipments have been considered as important qualification for registration of EMC certification business. In future, the certification environment is also supposed to be restricted Strictly. Many organizations have made on attempt to establish, certification environment as a international standard. Therefore, in order to enhance the competitive powers of domestic certification industry, a real-time system which can be measure automatically and remotely the temperature, humidity, illumination, CO/CO2, magnetic field, and human sensing is proposed in this paper. This system can also maintain the appropriate measurement environment by using USN(ubiquitous sensor network). The availabilities are confirmed through the experiment.
  • 25.

    Implementation and Evaluation of a Time Synchronization Protocol for USN

    양도 | Hyung-Bong Lee | 2008, 13(7) | pp.213~220 | number of Cited : 2
    Abstract PDF
    In a distributed processing environment composed of many independent systems connected by networks, it is very important and difficult to make time synchronization between the systems. Especially in the USN environment the time synchronization is still more difficult than in general distributed processing environment because energy is limited and communication function is feeble. Even though of these difficulties, the USN environment requires higher precision of time synchronization. One of the typical applications requesting very strict time synchronization in USN is TDMA MAC. This paper proposes and evaluates a new time synchronization protocol HTSP(Hierarchical Time Synchronization Protocol) which is an advanced version of the FTSP(Flooding Time Synchronization Protocol) published recently. The time synchronization precision of the HTSP is equal to that of the FTSP, but the energy consumption of the HTSP is lower than that of the FTSP owing to the reduced number of broadcast messages. The simulation results show that the energy consumption ot the HTSP is only 74% of that of the FTSP.
  • 26.

    A Study of the Adaptation of 2-Dimensional Hair-Style Computer Simulation and Prospects of the 3D System

    Yun Hwangbo | Kyu Soo Ha | 2008, 13(7) | pp.221~229 | number of Cited : 1
    Abstract PDF
    The development of computer and multimedia brought out new technology, that is, virtual reality. Computer simulation adaptation among the technologies of the virtual reality is spreaded into air service, motor vehicle, medical science, sports, education, even fashion industry. This study look into 2-dimensional hair-style computer simulation system which is started to common use nowadays and the 3-dimensional system which is under the development. And this study proposed several problems such as heavy 3D system booth and the low price but low qualified camera in order to commercialize the 3D system. This study also suggest several alternative, for instance, the change from object photography method to panoramic photography method, the substitute by middle or high end and high qualified camera.
  • 27.

    A Study on the Activation of Senior Welfare Facilities

    Cho Woo Hong | 2008, 13(7) | pp.231~237 | number of Cited : 2
    Abstract PDF
    As aged population has increased and family structures have changed in current industrialized society, weakened traditional family functions, increased economic activities of women, changed senses of value and changed status and role of senior people have caused may problems. So as it is getting harder to expect family support for the aged, more senior care facilities are needed. In this aspect, to activate senior welfare facilities, the following directions are required: First, facilities should be expanded in governmental level; Second, regional networks and various programs should be developed according to regional characteristics; Third, the environment of senior welfare facilities should be improved; Fourth, marketing strategies that are appropriate for characteristics of clients are needed through development of supporters; Fifth, treatment of senior welfare facility staff should be improved and the number of the professional staff should increase.
  • 28.

    An Integrated Model Using the Analytic Hierarchy Process and Linear Programming for the Supplier Selection

    Kim, Shin Joong | 2008, 13(7) | pp.239~246 | number of Cited : 3
    Abstract PDF
    The supplier selection has a direct effect on the organization's efficiency, effectiveness and competitiveness, so the right supplier selection is the most important decision of a company. In order to select the best suppliers, both qualitative and quantitative factors should be considered . To decide which suppliers are the best and how much should be purchased from each selected supplier, many models which considered a single objective and multiple objectives have been proposed. But they have problems in considering qualitative factors which are very important in supplier selection. So in this article an integration model of an analytical hierarchy process and linear programming is proposed to consider both qualitative and quantitative factors in choosing the best suppliers and placing the optimum order quantities among them. This integrated model can be applied effectively and easily any organization and management circumstances.
  • 29.

    A Study on the Development of Ontology based on the Jewelry Brand Information

    ki-young lee | 2008, 13(7) | pp.247~256 | number of Cited : 2
    Abstract PDF
    This research is to develop product retrieval system through simplified communication by applying intelligent agent technology based on automatically created domain ontology to present solution on problems with e-commerce system which searches in the web documents with a simple keyword. Ontology development extracts representative term based on classification information of international product classification code(UNSPSC) and jewelry websites that is applied to analogy relationship thesaurus to establish standardized ontology. The intelligent agent technology is applied to retrieval stage to support efficiency of information collection for users by designing and developing e-commerce system supported with semantic web. Moreover, it designs user profile to personalized search environment and provide personalized retrieval agent and retrieval environment with inference function to make available with fast information collection and accurate information search.
  • 30.

    The Relationship of Organizational Factors and e-Government Performance - Centered on the Services of A Governmental Agency -

    김재영 | Yoojung Kim | Jongsoo Yoon | 2008, 13(7) | pp.257~267 | number of Cited : 10
    Abstract PDF
    This study aimed at identifying the organizational factors that influence the performance of e-Government. For this purpose, we reviewed much research related to organizational and e-government performance. Also we surveyed from A governmental agency and performed the analysis. The findings show that all organizational factors(chief officer's commitment, information-oriented culture, and interpersonal/interdepartmental collaboration) have an significant and positive effects on the performance of e-Government: increase in customer service, improved work efficiency, cost reduction). Also, the results show that all organizational factors have much stronger relationship with the customer service than other organizational factors.
  • 31.

    A Study on the Values and Practices of the Extreme Programming for Its Adoption

    이상현 | Lee Sang Joon | 2008, 13(7) | pp.269~280 | number of Cited : 1
    Abstract PDF
    The choice of appropriate methodologies has always been a challenge. It is time to find obstacles when Extreme programming(XP) is adopted. In this paper, we invest status of adoption of XP methodology which is more popularized. We survey how the Values and the Practices of XP can be adopted to developer in terms of the usefulness and the easy of use of XP. As a result, it is regarded as a successful one in improving quality and timeliness through software development process. The Values and Practices, a basis of XP philosophy and its adoption, could be easily accomplished, but other elements - communication, feedback, collective ownership, pair programming, simple design and customer participation – which do not depend on technology could not be accomplished easily. To introduce XP easily in the creative and labor intensive software development fields, the managers and the educators have to make efforts to apply these Values and Practices based on humane characteristics as well as technical elements.
  • 32.

    Development of Discrete Event Simulation Model for Air Cargo Demand Management

    이광렬 | 홍기성 | Lee, Chul Ung | 2008, 13(7) | pp.281~289 | number of Cited : 0
    Abstract PDF
    In this study, a discrete-event simulation model is developed to estimate load factors and the corresponding revenues under different pricing and dispatching policies. The model has been employed to forecast the inbound and the outbound air cargo demands of the major Northeastern Chinese cities, and the simulation results were compared to the actual demands obtained from real-life airline operations. The statistical analysis confirms that the simulation model is able to provide accurate estimates for air cargo demands, and thus, the model may be employed to be a useful tool for air cargo demand management.
  • 33.

    Factors Affecting the Continuous Use of Mobile Music Contents

    양승규 | 박성원 | Choong Cheang Lee | 2008, 13(7) | pp.291~305 | number of Cited : 3
    Abstract PDF
    Previous study about Mobile Music Contents was mainly focused on Industry factors & enterprise factors like Technology. This study is not only focused on Technology factors, but also Customer & System factors like TAM of original. and also, this study first tried to find the Mobile Internet medium's customer purchase by each property's Mobile Music Contents from assorting the Mobile music Contents property and defining them. So to speak of this study have tried to concretely verify the factors of purchase. And also, I proposed an transformated model, and added independent variable factors, 'distinction', 'speed of system', 'speed of network', ' a career of use', 'amount of use', 'preservation', 'customization', 'information', 'confidence', 'omni presentation', 'potential possibility of reproduce'. By applying TAM this study has measured how the product property, user property, and system property causes effect to customer purchase of Mobile Music Contents. In results, First, success 8 factors were determined to be the purchase of 'Ringtone'. Second, 8 factors were determined to be the purchase of 'Ring-Back tone', but, 'The use of convenience' was not influenced 'Intention of Purchase'. Third, 6 factors were determined to be the purchase of 'Full Track Download of Music'. At the Conclusion this study presented a scheme that these study results could be applied in actual company and academic world.