Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

Home > Explore Content > All Issues > Article List

2009, Vol.14, No.10

  • 1.

    Branch Prediction Latency Hiding Scheme using Branch Pre-Prediction and Modified BTB

    김주환 , Kwak, Jong Wook , Jhon Chu Shik | 2009, 14(10) | pp.1~10 | number of Cited : 0
    Abstract PDF
    Precise branch predictor has a profound impact on system performance in modern processor architectures. Recent works show that prediction latency as well as prediction accuracy has a critical impact on overall system performance as well. However, prediction latency tends to be overlooked. In this paper, we propose Branch Pre-Prediction policy to tolerate branch prediction latency. The proposed solution allows that branch predictor can proceed its prediction without any information from the fetch engine, separating the prediction engine from fetch stage. In addition, we propose newly modified BTB structure to support our solution. The simulation result shows that proposed solution can hide most prediction latency with still providing the same level of prediction accuracy. Furthermore, the proposed solution shows even better performance than the ideal case, that is the predictor which always takes a single cycle prediction latency. In our experiments, IPC improvement is up to 11.92% and 5.15% in average, compared to conventional predictor system.
  • 2.

    Topic Similarity-based Event Routing Algorithm for Wireless Ad-Hoc Publish/Subscribe Systems

    웬중휴 , Sangyoon Oh | 2009, 14(10) | pp.11~22 | number of Cited : 1
    Abstract PDF
    For a wireless ad-hoc network, event routing algorithm of the publish/subscribe system is especially important for the performance of the system because of the dynamic characteristic and constraint network of its own. In this paper, we propose a new hybrid event routing algorithm, TopSim for efficient publish/subscribe system on the wireless ad-hoc network by extending the ShopParent algorithm by considering not only network overheads to choose a Parent of the publish/subscribe tree, but also topic similarity which is closeness of subscriptions. Our evaluation shows our proposed TopSim performs better for the case where a new joining node subscribed to the multiple topics and there is a node among Parent candidate nodes who subscribe to the ones in the list of multiple topics (related topics).
  • 3.

    Design and Implementation of Educational Embedded Network System

    김대희 , CHUNG, JOONG SOO , 박희정 and 1 other persons | 2009, 14(10) | pp.23~29 | number of Cited : 4
    Abstract PDF
    This paper presents the development of embedded network educational system. This is an educational equipment which enables user to have training over Network Configuration and Embedded network programming practice on Internet environment. The network education system is developed on embedded environment, based on using ethernet interface. On the development environment, PAX255 VLSI chip is used for the processor, the ADSv1.2 for debugging, uC/OS276 for RTOS. The system software was developed using C language. The ping program provided an educational environment for the student to compile and load it to run after doing practice of demonstration behavior. Afterwards programming procedure starts the step-by-step training just like the demonstration function. In other words, programming method how to design the procedure of ARP operation and ICMP operation is explained.
  • 4.

    The Scheme for Path-based Query Processing on the Semantic Data

    김연희 , 김지현 | 2009, 14(10) | pp.31~41 | number of Cited : 4
    Abstract PDF
    In the Semantic Web, it is possible to provide intelligent information retrieval and automated web services by defining a concept of information resource and representing a semantic relation between resources with metadata and ontology. It is very important to manage semantic data such as ontology and metadata efficiently for implementing essential functions of the Semantic Web. Thus we propose an index structure to support more accurate search results and efficient query processing by considering semantic and structural features of the semantic data. Especially we use a graph data model to express semantic and structural features of the semantic data and process various type of queries by using graph model based path expressions. In this paper the proposed index aims to distinguish our approach from earlier studies and involve the concept of the Semantic Web in its entirety by querying on primarily extracted structural path information and secondary extracted one through semantic inferences with ontology. In the experiments, we show that our approach is more accurate and efficient than the previous approaches and can be applicable to various applications in the Semantic Web.
  • 5.

    An Influence Value Algorithm based on Social Network in Knowledge Retrieval Service

    최창현 , 박건우 , 이상훈 | 2009, 14(10) | pp.43~53 | number of Cited : 5
    Abstract PDF
    Knowledge retrieval service that uses collective intelligence which has special quality of open structure and can share the accumulative data is gaining popularity. However, acquiring the right needs for users from massive public knowledge is getting harder. Recently, search results from Google which is known for it's exquisite algorism, shows results for collective intelligence such as Wikipedia, Yahoo Q/A at the highest rank. Objective of this paper is to show that most answers come from human and to find the most influential people in on-line knowledge retrieval service. Hereupon, this paper suggest the influence value calculation algorism by analyzing user relation as centrality which social network is based on user activeness and reliance in Naver 지식iN. The influence value calculated by the suggested algorism will be an important index in distinguishing reliable and the right user for the question by ranking users with troubleshooting solutions in the knowledge retrieval service. This will contribute in search satisfaction by acquiring the right information and knowledge for the users which is the most important objective for knowledge retrieval service.
  • 6.

    A Point of Production System for Semiconductor Wafer Dicing Process

    Inho Kim | 2009, 14(10) | pp.55~61 | number of Cited : 0
    Abstract PDF
    This paper describes a point of production(POP) system which collects and manages real-time shop floor machining information in a wafer dicing process. The system are composed of POP terminal, line controller and network. In the configuration of the system, LAN and RS485 network are used for connection with the upper management system and down stratum respectively. As a bridge between POP terminal and server, a line controller is used. The real-time information which is the base of production management are collected from information resources such as machine, product and worker. The collected information are used for the calculation of optimal cutting condition. The collection of the information includes cutting speed, spout of pure water, accumulated count of cut in process for blade and wafer defect. In order to manage machining information in wafer dicing process, production planning information is delivered to the shop floor, and production result information is collected from the shop floor, delivered to the server and used for managing production plan. From the result of the system application, production progress status, work and non-working hour analysis for each machine, and wafer defect analysis are available, and they are used for quality and productivity improvements in wafer dicing process. A case study is implemented to evaluate the performance of the system.
  • 7.

    A Revised Dynamic ROI Coding Method Based On The Automatic ROI Extraction For Low Depth-of-Field JPEG2000 Images

    PARK JAE HEUNG , 심종채 , Yoo Chang-Yeul and 3 other persons | 2009, 14(10) | pp.63~71 | number of Cited : 0
    Abstract PDF
    In this study, we propose a revised dynamic ROI (Region-of-Interest) coding method in which the focused ROI is automatically extracted without help from users during the recovery process of low DOF (Depth-of-Field) JPEG2000 image. The proposed method creates edge mask information using high frequency sub-band data on a specific level in DWT (Discrete Wavelet Transform), and then identifies the edge code block for a high-speed ROI extraction. The algorithm scans the edge mask data in four directions by the unit of code block and identifies the edge code block simply and fastly using a edge threshold. As the results of experimentation applying for Implicit method, the proposed method showed the superiority in the side of speed and quality comparing to the existing methods.
  • 8.

    Variance Recovery in Text Detection using Color Variance Feature

    YeongWoo Choi , 조은숙 | 2009, 14(10) | pp.73~82 | number of Cited : 1
    Abstract PDF
    This paper proposes a variance recovery method for character strokes that can be missed in applying the previously proposed color variance approach in text detection of natural scene images. The previous method has a shortcoming of missing the color variance due to the fixed length of horizontal and vertical windows of variance detection when the character strokes are thick or long. Thus, this paper proposes a variance recovery method by using geometric information of bounding boxes of connected components and heuristic knowledge. We have tested the proposed method using various kinds of document-style and natural scene images such as billboards, signboards, etc captured by digital cameras and mobile-phone cameras. And we showed the improved text detection accuracy even in the images of containing large characters.
  • 9.

    Extended Snake Algorithm Using Color Variance Energy

    Seung Tae Lee , Youngjun Han , Hernsoo Hahn | 2009, 14(10) | pp.83~92 | number of Cited : 5
    Abstract PDF
    In this paper, an extended snake algorithm using color variance energy is proposed for segmenting an interest object in color image. General snake algorithm makes use of energy in image to segment images into a interesting area and background. There are many kinds of energy that can be used by the snake algorithm. The efficiency of the snake algorithm is depend on what kind of energy is used. A general snake algorithm based on active contour model uses the intensity value as an image energy that can be implemented and analyzed easily. But it is sensitive to noises because the image gradient uses a differential operator to get its image energy. And it is difficult for the general snake algorithm to be applied on the complex image background. Therefore, the proposed snake algorithm efficiently segment an interest object on the color image by adding a color variance of the segmented area to the image energy. This paper executed various experiments to segment an interest object on color images with simple or complex background for verifying the performance of the proposed extended snake algorithm. It shows improved accuracy performance about 12.42 % .
  • 10.

    A Study on Speechreading about the Korean 8 Vowels

    SeongYoon Shin , Choi,Byung-Seok , Rhee Yang Weon | 2009, 14(10) | pp.93~99 | number of Cited : 3
    Abstract PDF
    The color harmony in video was no way to know for giving pleasure. By identifying these color harmony, it gives order, clarity, similarity, contrast, etc. Therefore, to identify the color balance is very important. Color Harmony identify the color is whether the harmony by color harmony theory of Munsell, Ostwald, Firren, Moon & Spenser, Itten, Chevreul, and Judd etc. One of these methods, we identify color harmonies of 2 colors, 3 colors, 4 colors, 5 colors and 6 colors using Itten's color balance. Identification is using by Canny edge extraction, labeling and clustering, and color extraction and harmony etc. By identifying this color harmonies, we have laid the foundation of emotional database construction and emotional recognition.
  • 11.

    A Secure 6LoWPAN Re-transmission Mechanism for Packet Fragmentation against Replay Attacks

    HYUNGON KIM | 2009, 14(10) | pp.101~110 | number of Cited : 1
    Abstract PDF
    The 6LoWPAN(IPv6 Low-power Wireless Personal Area Network) performs IPv6 header compression, TCP/UDP/ICMP header compression, packet fragmentation and re-assemble to transmit IPv6 packet over IEEE 802.15.4 MAC/PHY. However, from the point of view of security, It has the existing security threats issued by IP packet fragmenting and reassembling, and new security threats issued by 6LoWPAN packet fragmenting and reassembling would be introduced additionally. If fragmented packets are retransmitted by replay attacks frequently, sensor nodes will be confronted with the communication disruption. This paper analysis security threats introduced by 6LoWPAN fragmenting and reassembling, and proposes a re-transmission mechanism that could minimize re-transmission to be issued by replay attacks. Re-transmission procedure and fragmented packet structure based on the 6LoWPAN standard(RFC4944) are designed. We estimate also re-transmission delay of the proposed mechanism. The mechanism utilizes timestamp, nonce, and checksum to protect replay attacks. It could minimize reassemble buffer overflow, waste of computing resource, node rebooting etc., by removing packet fragmentation and reassemble unnecessary.
  • 12.

    RFID Ubiquitous Public Information Documental Administration System construction and Security research

    장영상 , Sungyoung Lee | 2009, 14(10) | pp.111~121 | number of Cited : 2
    Abstract PDF
    Public Information Documental of the administrative, legislative and judicial etc. is lastingness documental and need administration. Whenever the crime event happens, judicature's documental is lent frequently to reference data and is returned, event posting of documental, hysteresis inquiry, lending/return, conservation search, documental exhaust management must consist for administration of lastingness documental. RFID is utilized by the practical use plan of recent Ubiquitous information. Because attaching tag to lastingness documental that use RFID in this treatise, register and manage documental, and chase hysteresis, and design upkeep, present condition analysis of lastingness documental to search, S/W, H/W, network layout, Ubiquitous RFID lastingness recording administration system. Construct lastingness recording administration system after a performance experiment and a chase experiment that is applied in spot that attach 900MHz important duty's RFID tag. After construction practice, create link sex with connection system, security analysis and Forensic data and analyze improvement effect. Is going to contribute Ubiquitous information technology application and Forensic technology development in country documental administration through research of this treatise.
  • 13.

    A Design of Sensor Web service Framework for Wireless Sensor Networks Environment

    김용태 , Jeong Yoon Su , 박병주 and 1 other persons | 2009, 14(10) | pp.123~131 | number of Cited : 1
    Abstract PDF
    In this paper, we design ZigBee RF based framework for mobile web service on collected data by sensor node and transmitting data to data base by sensor network and remote sensing server through wireless connection. The proposed system is an integrated platform of sensor network for the sensor management and providing SOA based sensor web access. This paper combines SOA technology with sensor network, composes sensor node as web view, and provides high capability, extensiveness, reliability, and usability to the user who accesses to sensor web. The mobile message conversion module, SOAP message processing module, WSDL message generator, and mobile web service module is embodied for improving the capacity of the framework. The capacity evaluation of local wireless communication system which is proposed in this paper is analyzed through NS-2 simulation.
  • 14.

    Peer to Peer Search Algorithm based on Advanced Multidirectional Processing

    Boonhee Kim | 2009, 14(10) | pp.133~139 | number of Cited : 1
    Abstract PDF
    A P2P technology in distributed computing fields is presented various methods to share resources between network connected peers. This is very efficient that a degree of resources to good use as compared with peers by using centralized network by a few servers. However peers to compose P2P system is not always online status, therefore it is difficult to support high reliability to user. In our previous work of this paper, it is contributing to reduce the loading rates to select of new resource support peer but a selection method the peers to share works to download resources is very simple that it is just selected about peer to have lowest job. In this paper, we reduced frequency offline peers by estimate based on a average value of success rates for peers.
  • 15.

    A Study on the Relationship between Mobile Advertising Factors and Effects on User's Marketing Activities

    김철중 , Kim Hong-Jin , 강영창 | 2009, 14(10) | pp.141~148 | number of Cited : 3
    Abstract PDF
    This paper studies important factors of mobile phone marketing including experiences on entertainment, information, reliability and complaints by analyzing actual materials. The result shows that information, reliability, experiences are more significant than other factors. In case of information, the appropriate message is associated with marketing activities. Reliability and benefit on advertisement are significant. Also, experience has a positive effect on marketing activities. Therefore, this study suggests that mobile marketing should consider significant factors such as information, reliability, and experience.
  • 16.

    The analysis Influencing Mobile Channel Loyalty using a Transaction Cost Theory

    장성희 , 정희 | 2009, 14(10) | pp.149~157 | number of Cited : 1
    Abstract PDF
    This study aims to empirically examine the factors influencing mobile channel loyalty. This study has been reviewed various theoretical research relating to mobile channel loyalty and transaction cost theory. The model was tested Structural Equation Modeling(SEM) using AMOS 7.0 analysis on the sample collected from 240 respondents. The result of hypothesis testing is as follows. First, asset specificity, uncertainty and transaction frequency were influenced by chanel satisfaction. Second, asset specificity was influenced negatively by chanel preference. Third, chanel satisfaction was influenced positively by chanel preference. Finally, chanel satisfaction and chanel preference were influenced positively by chanel loyalty.
  • 17.

    A Hybird Antibody Model Design using Genetic Algorithm Scheme

    신미예 , 전승흡 , Lee, Sang-ho | 2009, 14(10) | pp.159~166 | number of Cited : 1
    Abstract PDF
    A nature immunity system responds sensitively to an external invasion with various functions in a lot of bodies, besides it there is a function to remember information to have been currently infected. we propose a hybrid model similar to immune system which combine with the antibody which applied genetic algorithm as select antibody and the arbitrary abnormal system call sequence that applied negative selection of a nature immunity system. A proposed model uses an arbitrary abnormal system Kol sequence in order to reduce a positive defect and a negative defect. Data used to experiment are send mail data processed UNM (University of New Maxico). The negative defect that an experiment results proposal model judged system call more abnormal than the existing negative selection to normal system call appeared 0.55% low.
  • 18.

    A Design and Implementation for a Realtime Monitering and Controlling System in the Stockyard

    Kim Jeong Hong , Kim,Jae-Soo , 장영식 | 2009, 14(10) | pp.167~174 | number of Cited : 5
    Abstract PDF
    We have recently studied the application of Information Technology to agricultural industry for competitive power. Because the big stockyards are far away from the house, we need a realtime monitering and control system to manage it efficiently. This paper presented design and implementation for a realtime monitering and controlling system that we can use to watch an movement of an electronic devices in the stockyards. Compared to other systems, we have more trust in our system by confirming an operation of devices through a realtime video streaming.
  • 19.

    A Study on Web accessibility situation of Public Institution and Major IT Companies Institutions

    주헌식 | 2009, 14(10) | pp.175~187 | number of Cited : 9
    Abstract PDF
    This paper shows trends in domestic and foreign web accessibility. To disclose the web accessibility observance rate, seven central adminstration institutions and another seven north-eastern cities in Gyeong gi-Do and seven major IT companies were evaluated. KADO-WAH 2.0 was used for showing the observance rate. The evaluation criteria was that of Internet Web contents accessibility Guidelines 1.0. The evaluation was limited to Guideline 1 and Guideline 2 of non-text contents and the restricted frame usage and the keyboard-only operation. The average points for three items are as follows; 65.56% for North-Eastern cities in Gyeong gi-Do and 43.71% for Central adminstration institutions and the average 29.33% for major IT companies. The observance rate was highest by 99.3% in Human-rights committee among the central administration institutions. With the observance rate of 98%, Namyang-ju city came first in Gyeong gi-Do area. Samsung electronics was the highest with 63.66% in observance rate. The Central adminstration got lowered from the average 82.14% in 2006 to the average 54.28% in 2009, with the result of 27.86% down. Accordingly, the urgent improvement for Central adminstration and Local adminstration in web accessibility is asked for. The same is true with major IT companies in web accessibility.
  • 20.

    A Design of Policy-Based Composite Web Services QoS Monitoring System

    염귀덕 , Choong-Kyo Jeong | 2009, 14(10) | pp.189~197 | number of Cited : 3
    Abstract PDF
    As the web service technology matures, research is focused on the composite web services that combine individual web services within an enterprise or between enterprises. Quality of service is the critical competitiveness factor in this mature technology stage where there are many services with similar functionalities differing only in some non-functional properties. Monitoring is the key component for the service quality management of a web service. A service quality monitoring system design using a broker is presented in this paper. OWL-S is used to specify the composite service process and a service policy(inputs and outputs of each service, quality attributes and values, etc.) built by WS-Policy is applied to the composite service process. If there is any discrepancy between the service policy and the monitored data, the service provider and the user are notified of it so as to take necessary measures. We have implemented a travel reservation system as an example of the presented design and the experimental results are shown. Average response time was monitored and the timeout policy was applied in the experiment.
  • 21.

    A Study on Semantic Logic Platform of multimedia Sign Language Content

    정희준 , kyungDon Han , 박대우 | 2009, 14(10) | pp.199~206 | number of Cited : 0
    Abstract PDF
    The development of broadband multimedia content, a deaf sign language sign language is being used in education. Most of the content used in sign language training for Hangul word representation of sign language is sign language videos for the show. For the first time to learn sign language, sign language users are unfamiliar with the sign language characteristics difficult to understand, difficult to express the sign is displayed. In this paper, online, learning sign language to express the sign with reference to the attributes, Semantic Logic applying the sign language of multimedia content model for video-based platform is designed to study.
  • 22.

    A Probability Modeling of the Crime Occurrence and Risk Probability Map Generation based on the Urban Spatial Information

    Kim Dong Hyun , park koo rack | 2009, 14(10) | pp.207~215 | number of Cited : 9
    Abstract PDF
    Recently, the research of the analysis of the crime spatial is increased by using the computer information technology and GIS (Geometric Information System) in order to prevent the urban crime so as to increase the urbanization rate. In this paper, a probability map formed by the raster is organized by the quantification of crime risk per the cell using the region property of the urban spatial information in the static environment. Also, a map of the risk probability is constructed based on the relative risk by the region property, the relative risk by the facility, the relative risk by the woody plant and the river, and so on. And, this integrated risk probability map is calculated by averaging the individual cell risk applied to the climatic influence and the seasonal factor. And, a probability map of the overall risk is generated by the interpretation key of the crime occurrence relative risk index, and so, this information is applied to the probability map quantifying the occurrence crime pattern. And so, in this paper, a methodology of the modeling and the simulation that this crime risk probability map is modified according to the passage of time are proposed.
  • 23.

    Vocabulary Recognition Retrieval Optimized System using MLHF Model

    안찬식 , OH, SANG YEOB | 2009, 14(10) | pp.217~223 | number of Cited : 19
    Abstract PDF
    Vocabulary recognition system of Mobile terminal is executed statistical method for vocabulary recognition and used statistical grammar recognition system using N-gram. If limit arithmetic processing capacity in memory of vocabulary to grow then vocabulary recognition algorithm complicated and need a large scale search space and many processing time on account of impossible to process. This study suggest vocabulary recognition optimize using MLHF System. MLHF separate acoustic search and lexical search system using FLaVoR. Acoustic search feature vector of speech signal extract using HMM, lexical search recognition execution using Levenshtein distance algorithm. System performance as a result of represent vocabulary dependence recognition rate of 98.63%, vocabulary independence recognition rate of 97.91%, represent recognition speed of 1.61 second.
  • 24.

    Isosurface Component Tracking and Visualization in Time-Varying Volumetric Data

    손봉수 | 2009, 14(10) | pp.225~231 | number of Cited : 1
    Abstract PDF
    This paper describes a new algorithm to compute and track the deformation of an isosurface component defined in a time-varying volumetric data. Isosurface visualization is one of the most common method for effective visualization of volumetric data. However, most isosurface visualization algorithms have been developed for static volumetric data. As imaging and simulation techniques are developed, large time-varying volumetric data are increasingly generated. Hence, development of time-varying isosurface visualization that utilizes dynamic properties of time-varying data becomes necessary. First, we define temporal correspondence between isosurface components of two consecutive timesteps. Based on the definition, we perform an algorithm that tracks the deformation of an isosurface component that can be selected using the Contour Tree. By repeating this process for entire timesteps, we can effectively visualize the time-varying data by displaying the dynamic deformation of the selected isosurface component.
  • 25.

    A Study on the Implementation of Serious Game Learning Multiplication Table using Back Propagation Neural Network on Divided Interconnection Weights Table

    이경호 | 2009, 14(10) | pp.233~240 | number of Cited : 2
    Abstract PDF
    In this paper we made the serious game learning multiplication table to be evolved. The serious game is to induce the interest of the learner. This program has an interaction form which reflects the intention of the user and using this program a learner to learn the multiplication table as teacher's location are training a program that are seen as the abata and came to be that learner is smart. A study ability to be evolved used an back propagation neural networks. But we improved a study speed using divided weight table concept. The engine is studied perfectly in 60~80 times training. The learning rate increase to various non-monotonic functional form not to do a mechanical rise. And the learning rate is similar with the study ability of the human.
  • 26.

    Improvement of Character-net via Detection of Conversation Participant

    김원택 , PARK SEUNGBO , 조근식 | 2009, 14(10) | pp.241~249 | number of Cited : 2
    Abstract PDF
    Recently, a number of researches related to video annotation and representation have been proposed to analyze video for searching and abstraction. In this paper, we have presented a method to provide the picture elements of conversational participants in video and the enhanced representation of the characters using those elements, collectively called Character-net. Because conversational participants are decided as characters detected in a script holding time, the previous Character-net suffers serious limitation that some listeners could not be detected as the participants. The participants who complete the story in video are very important factor to understand the context of the conversation. The picture elements for detecting the conversational participants consist of six elements as follows: subtitle, scene, the order of appearance, characters’ eyes, patterns, and lip motion. In this paper, we present how to use those elements for detecting conversational participants and how to improve the representation of the Character-net. We can detect the conversational participants accurately when the proposed elements combine together and satisfy the special conditions. The experimental evaluation shows that the proposed method brings significant advantages in terms of both improving the detection of the conversational participants and enhancing the representation of Character-net.
  • 27.

    Improved approach of calculating the same shape in graph mining

    노영상 , Unil Yun , KIM MYUNG JUN | 2009, 14(10) | pp.251~258 | number of Cited : 0
    Abstract PDF
    Data mining is a method that extract useful knowledges from huge size of data. Recently, a focussing research part of data mining is to find interesting patterns in graph databases. More efficient methods have been proposed in graph mining. However, graph analysis methods are in NP-hard problem. Graph pattern mining based on pattern growth method is to find complete set of patterns satisfying certain property through extending graph pattern edge by edge with avoiding generation of duplicated patterns. This paper suggests an efficient approach of reducing computing time of pattern growth method through pattern growth's property that similar patterns cause similar tasks. we suggest pruning methods which reduce search space. Based on extensive performance study, we discuss the results and the future works.
  • 28.

    A Study on the Development of Intelligent Transport System Center for Integrated Road Transport Information Service System

    정성학 | 2009, 14(10) | pp.259~270 | number of Cited : 3
    Abstract PDF
    The objective of this study is to provide systematic design of the Korea's Integrated Road Transport System in intelligent transport systems. Integrated Road Transport System services support safety driving and traffic information for travellers, and rapid response of the system for emergency status not only dissemination of traffic for traffic but also flood, heavy snowfall, falling rocks, closed-road, collapse, accident and so on. Therefore, integrated road transport system service contributes national highway safety management system to the voice of the nation of integrated road transport system center service for user friendly.
  • 29.

    The Assessment Model of the Embedded Software Process Suitable for Korean Defense Industry

    권경용 , HaeSool Yang | 2009, 14(10) | pp.271~281 | number of Cited : 1
    Abstract PDF
    In this paper, we propose the enhanced Assessment Model of the Embedded Software Process(MND-ESPAM) which is suitable for the development work of weapons in Korea. In 2008, We developed the MND-ESPAM which is the assessment criteria of software process, but this model is inefficient to apply to Korean military area. Therefore, we elicit and analyze the problems of MND-ESPAM through tow methods. One is to research on the actual condition of the domestic defense industry about software process management. And the other is to apply MND-ESPAM to the defense companies acquiring CMMI level. In order to overcome these problems elicited above, we provide solutions to make MND-ESPAM linked with Software Development Process Guide of Defense Acquisition Program Administration(DAPA) and to systematically strengthen testing activities and to reduce the number of process areas. The proposed model was proved by two objective methods such as checking the coverage with CMMI and whether it is satisfied or not by modified requirements ISO/IEC 14598-3. At last, experts in the field of software process confirmed the effect of MND-ESPAM through applying MND-ESPAM to the defense industry company.