Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2009, Vol.14, No.11

  • 1.

    Mobbing Value Algorithm for Improvement Victims Management - based on Social Network in Military -

    김국진 | 이상훈 | 박건우 | 2009, 14(11) | pp.1~12 | number of Cited : 2
    Abstract PDF
    Mobbing is going the rounds through a society rapidly and Military is not exception. Because mobbing of military is expressed not only psychology exclusion that is mobbing pattern of adult society but also sometimes psychologic and physical mobbing, is possible to join serious military discipline like a suicide and outrageous behavior. Specially military try to protect occurrence of victims that is public service through various rules and management plan but victims is going on happen. It means importance of grasp not only current mobbing victims but also potential mobbing victims better than preparation of various rules and management plans. Therefore this paper extracts seven factors and fifty attributes that are related to this matter mobbing. Next, by using Gunwoo's Social Network Service that is made for oneself and expressing extracting factors as '1' if they are related me or not '0'. And apply similarity function(Dice's coefficient) to attributes summation included in factors to calculate similarity between the users. Third, calculate optimizing weight choosing factors included attributes by applying neural network algorithm of SPSS Clementine and propose Mobbing Value(MV) Algorithm through this total summation. Finally through this algorithm which will contribute to efficient personnel management, we can grasp mobbing victims and tentative mobbing victims.
  • 2.

    Design and Implementation of a XHTML to VoiceXML Converter based on EXI in Pervasive Environments

    신경희 | 곽동규 | Yoo,Jae-Woo | 2009, 14(11) | pp.13~20 | number of Cited : 3
    Abstract PDF
    In a pervasive environment, there are various applications as much as connections of various devices. In this computing environment, XML is the most suitable data representation method. XML is able to transform data for other application areas using XSLT. XML is text-based, the file size of XML document is bigger than binary data file. Therefore, XML has a disadvantage that it is hard to deal with XML in a pervasive environment. In this paper, we survey encoding methods of XML documents, and then we propose a transform method that transforms an encoded EXI format XML document into an EXI format XML document suited for other applications. Among various applications, we present a system that transforms an EXI format XHTML document into an VoiceXML document. This system can improve reusability of EXI format XML documents in a pervasive environment and it is expected to contributes utilization of EXI format XML documents.
  • 3.

    SPARQL Query Tool for Using OWL Ontology

    조대웅 | Myung Ho Kim | 최지웅 | 2009, 14(11) | pp.21~30 | number of Cited : 5
    Abstract PDF
    Semantic web uses ontology languages such as RDF, RDFS, and OWL to define the metadata on the web. There have been many researching efforts in the semantic web technologies based on an agent for extracting triple and relation about concept of ontology. But the extraction of relation and triple about the concept of ontology based on an agent ends up writing a limited query statement as characteristics of an agent. As for this, there is the less of flexibility when extracting triple and relation about the other concept of ontology. We are need a query tool for flexible information retrieval of ontology that is can access the standard ontology and can be used standard query language. In this paper, we propose a SPARQL query tool that is can access the OWL ontology via HTTP protocol and it can be used to make a query. Query result can be output to the soap message. These operations can be support the web service.
  • 4.

    Path Planning for Cleaning Robots Using Virtual Map

    Hyungil Kim | 2009, 14(11) | pp.31~40 | number of Cited : 3
    Abstract PDF
    The most common cleaning methods of cleaning robot can be divided into two categories: the random and the boustrophedon method. A cleaning robot using the random method moves straight until it bumps into an obstacle. If it collides with an obstacle, the cleaning robot turns a specific angle and continues moving straight. Therefore, the random method often tends to clean the already clean area repeatedly. In addition, it takes a long time to complete cleaning. A cleaning robot using the boustrophedon method moves straight until it collides with an obstacle. If it meets an obstacle, the cleaning robot moves to the next uncleaned space through turning and moving ahead. when resuming cleaning from the new region, a cleaning robot moves in the direction opposite to the direction of the previous cleaning. Because the boustrophedon method cleans a cleaning space more densely, its performance is excellent in an obstacle-free space or a small space. However, In a space with obstacles or a complex structure, it takes a long time to complete the cleaning work. Cleaning should be systematically approached with a good understanding of the work area. The virtual map-based cleaning robot proposed in this paper cleaned a work space efficiently. The efficiency of the proposed method was measured through simulation.
  • 5.

    Development of the Poker Game Achievement Engine for Artificial Intelligence

    박종범 | 2009, 14(11) | pp.41~52 | number of Cited : 3
    Abstract PDF
    This thesis proposed the poker game achievement engine that makes it possible to execute a game against a gamer and embodied an engine clone that can perform a game on behalf of a gamer by cloning a gamer's game capability, disposition and habits by using the proposed engine. It could be a factor in making a game more intriguing if there would be a game achievement engine that is equipped with the game capability and disposition similar to a gamer. In addition, if a gamer's achievement robot were to be created by a gamer's game achievement capability, disposition for a game and habits, etc. through such a game achievement engine, it could be possible to use it for several sorts of game in a variety of forms.
  • 6.

    A Study of character and dungeon size correlation in MMORPG game

    김도경 | 2009, 14(11) | pp.53~60 | number of Cited : 1
    Abstract PDF
    This paper is focusing on the optimal size of internal space in which various functions are expressed by means of analogizing appropriate size of passage fitted to characters and reverse-calculating it in comparison with preexisting games , and thus increase the objectivity of data. To this end, the work of making the data objective was conducted in advance, and the experiment proceeded in the way that specially-designed Dungeon can make its way through the passage and in the situation where small-scale combats take place. In addition, the efforts were made to standardize the outcome of experiments by restricting the types of game graphics to MMO RPG. Further, the enhance the objectivity of size of the characters, the game types were limited to RPG games, and it is also adjusted to the character's face size based on the graphic designer's preference. The size of shoulders and arms of characters, inter alia, was selected as distinguishing points to be adjusted to the passage. By analyzing these data, the size of passage was re-organized according to the main characters in the MMO RPG games. Four experimental data was utilized by the 200 game experts in order to select the optimal size of passage in the game. As a consequence, the proportional correlation between character and passage movement was evaluated as successful in terms of emotional recognition.
  • 7.

    Robust Scheme of Segmenting Characters of License Plate on Irregular Illumination Condition

    김병현 | Youngjun Han | Hernsoo Hahn | 2009, 14(11) | pp.61~71 | number of Cited : 3
    Abstract PDF
    Vehicle license plate is the only way to check the registrated information of a vehicle. Many works have been devoted to the vision system of recognizing the license plate, which has been widely used to control an illegal parking. However, it is difficult to correctly segment characters on the license plate since an illumination is affected by a weather change and a neighboring obstacles. This paper proposes a robust method of segmenting the character of the license plate on irregular illumination condition. The proposed method enhance the contrast of license plate images using the Chi-Square probability density function. For segmenting characters on the license plate, binary images with the high quality are gained by applying the adaptive threshold. Preprocessing and labeling algorithm are used to eliminate noises existing during the whole segmentation process. Finally, profiling method is applied to segment characters on license plate from binary images.
  • 8.

    An Improved LBP-based Facial Expression Recognition through Optimization of Block Weights

    박성천 | KOO JA YOUNG | 2009, 14(11) | pp.73~79 | number of Cited : 3
    Abstract PDF
    In this paper, a method is proposed that enhances the performance of the facial expression recognition using template matching of Local Binary Pattern(LBP) histogram. In this method, the face image is segmented into blocks, and the LBP histogram is constructed to be used as the feature of the block. Block dissimilarity is calculated between a block of input image and the corresponding block of the model image. Image dissimilarity is defined as the weighted sum of the block dissimilarities. In conventional methods, the block weights are assigned by intuition. In this paper a new method is proposed that optimizes the weights from training samples. An experiment shows the recognition rate is enhanced by the proposed method.
  • 9.

    A Study for Encouragement of Rublic System in Designing with Programming Classes

    Cho Mi Kyung | 박현석 | 2009, 14(11) | pp.81~89 | number of Cited : 0
    Abstract PDF
    It is inevitable for college students to be confused when they first face university education, which requires them to be self-reliant and responsible, after finishing their course of education, which is passive under control of period and environment, in primary, middle, and high schools. Introduction to college courses, which require students to be subjective and responsible, to be taken after chronically and environmentally controlled primary and secondary education, are but confusing. In this stage, college education should provide ground for educational system so that students can escape from repetitively enforced way of studying of fixed curriculums and study creatively and subjectively while befitting each individual’s aptitude. For instance, in programming classes in engineering school, students’ scholastic achievements are closely interrelated with the professor’s educational principles. A change in method of education, from one previously focused on theoretical contents to one centered on practices and experiments, can reap good results. Also, as the need arose for introduction of practice-focused evaluation system, from recognition-centered professor evaluating system to enablement of actively developing creative and self-reliant way of learning, we applied the Rublic System. It is a feedback system that all or most students become the evaluators, of which the indicators of evaluation such as category, standard, and score are public. We have looked into whether or not there has been an improvement in GPAs of students, and if there exists an improvement then what efforts should be made to solidify the system.
  • 10.

    An Efficient Mobility Support Scheme based Multi-hop ARP in Wireless Mesh Networks

    전승흡 | 조영복 | Lee, Sang-ho | 2009, 14(11) | pp.91~96 | number of Cited : 0
    Abstract PDF
    In this paper, interoperability in heterogeneous wireless mesh network, and mesh nodes for providing efficient IP mobility technique offers multi-hop ARP. Heterogeneous wireless mesh networks to MANETs based on a wireless mesh network backbone and non-MANET architecture is based on a client wireless mesh network and the two mobile networks, combined with a hybrid wireless mesh network are separate. In two different hybrid wireless mesh network routing protocols used to connect the two protocols in the protocol conversion at the gateway to parallel processing problems seriously overload occurs. All of the network reliability and stability are factors that reduce. Therefore, for efficient integration with L3 routing protocols, design techniques to build ARP multi-hop go through the experiment to increase the number of mesh nodes, the packet forwarding rate and an increased hop number of the node was to ensure reliability and stability.
  • 11.

    The Design and implementation of parallel processing system using the Nios® II embedded processor

    이시현 | 2009, 14(11) | pp.97~103 | number of Cited : 11
    Abstract PDF
    In this thesis, we discuss the implementation of parallel processing system which is able to get a high degree of efficiency(size, cost, performance and flexibility) by using Nios® II(32bit RISC(Reduced Instruction Set Computer) processor) embedded processor in DE2-70® reference board. The designed parallel processing system is master-slave, shared memory and MIMD(Multiple Instruction-Multiple Data stream) architecture with 4-processor. For performance test of system, N-point FFT is used. The result is represented speed-up as follow; in the case of using 2-processor(core), speed-up is shown as average 1.8 times as 1-processor's. When 4-processor, the speed-up is shown as average 2.4 times as it's.
  • 12.

    Clustering Technique of Intelligent Distance Estimation for Mobile Ad-hoc Network

    Kihong Park | Rhee Yang Weon | SeongYoon Shin and 3other persons | 2009, 14(11) | pp.105~111 | number of Cited : 2
    Abstract PDF
    The study aims to propose the intelligent clustering technique that calculates the distance by improving the problems of multi-hop clustering technique for inter-vehicular secure communications. After calculating the distance between vehicles with no connection for rapid transit and clustering it, the connection between nodes is created through a set distance vale. Header is selected by the distance value between nodes that become the identical members, and the information within a group is transmitted to the member nodes. After selecting the header, when the header is separated due to its mobility, the urgent situation may occur. At this time, the information transfer is prepared to select the new cluster header and transmit it through using the intelligent cluster provided from node by the execution of programs included in packet. The study proposes the cluster technique of the intelligent distance estimation for the mobile Ad-hoc network that calculates the cluster with the Store-Compute-Forward method that adds computing ability to the existing Store-and-Forward routing scheme. The cluster technique of intelligent distance estimation for the mobile Ad-hoc network suggested in the study is the active and intelligent multi-hop cluster routing protocol to make secure communications.
  • 13.

    Intelligent Retrieval System for finding important travel information

    Unil Yun | 신현일 | RYU KEUN HO | 2009, 14(11) | pp.113~121 | number of Cited : 2
    Abstract PDF
    The increasing interest in leisure activities of a five-day work per week has been recently prevailed. Additionally, as internet and mobile infrastructures have been becoming widespread, the user can get specific information using a search engine. However, it is difficult for the user to get accurate information they really want as shared information has been rapidly increased and the information has been searched. For example, users can retrieve required travel information, but they also must see a huge number of travel advertisements. In this paper, we design and implement a retrieval system using travel information collecting agent. The information gathering agent regularly visits travel-related category pages of the portal sites and major media travel-article pages to collect information related to travel, and the agent stores the gathered information to a database. Then, users can search the travel information conveniently without the need to view advertisements.
  • 14.

    A Study on the Management System Design for Technical Information of the Weapon Embedded Software

    김세일 | 김효성 | Il Ro Lee | 2009, 14(11) | pp.123~134 | number of Cited : 0
    Abstract PDF
    As the embedded software for weapon system is embossed, the information management system is required to service and manage the technical information of embedded software systematically. But the technical information documents are managed by its own organization separately, it's hard to service the information and share it with anyone who need. In this paper, to manage the embedded software information systematically, we analyze the information management system built in 2004 and the defence law/rule. Also we distinguish the software information from defence laws to manage systematically and analyze the requirements of the information system. Based on these, we suggest implementing the management system to increase efficiency of managing the weapon embedded software information. Through this, we can improve the utilization and reusability of the weapon embedded software.
  • 15.

    A Study on Crime Prevention Risk Probability Map Generation Methodology by using the Object Interpretation Key

    Kim Dong Hyun | park koo rack | 2009, 14(11) | pp.135~144 | number of Cited : 1
    Abstract PDF
    In this paper, a methodology for the risk probability map generation of the crime prevention to be subject to the urban area in the group residential area is presented. The interpretation key is set up to the distinctive feature distinguishing with the unaided eye based on the object composing with the urban area information such as the topology, the facility, and the characteristic information of the corresponding area by analyzing the crime prevention case occurred by gone. This interpretation key is generated, and this information is applied to another area equally, and so, the risk probability map for the crime prevention and the disaster prevention is generated. At this time, the object interpretation key for the urban area information is divided into the various size cell by the crime prevention case, and the risk index according with this cell is set up. Also, the generated various risk probability map is unified, and the integration risk probability map is generated.
  • 16.

    Dynamic Web Service Composition Support for OSGi Environments

    고성훈 | 김은삼 | 이춘화 | 2009, 14(11) | pp.145~157 | number of Cited : 1
    Abstract PDF
    OSGi enables services to be dynamically discovered through its service registry for fostering interactions among themselves, positioning itself as one of the most prominent SOA technologies. Web Services also provide a mature technical base of open business services being employed over the Internet and allow more value-added applications to be built up from component services. In this paper, we propose a new architecture, built on the concept of dynamic service binding, to support interbred service compositions of OSGi and Web Services. Web Services are imported into OSGi domains, and the compositions are described in WS-BPEL language. The support for crossbred compositions of OSGi services and Web Services opens up a new opportunity of a wider range of applications beyond their respective traditional target domains of home gateways in LAN environments and business applications in global Internet environments.
  • 17.

    Fuzzy Theory and Bayesian Update-Based Traffic Prediction and Optimal Path Planning for Car Navigation System using Historical Driving Information

    정상준 | 허용관 | 조한무 and 2other persons | 2009, 14(11) | pp.159~167 | number of Cited : 2
    Abstract PDF
    The vehicles play a significant role in modern people's life as economy grows. The development of car navigation system(CNS) provides various convenience because it shows the driver where they are and how to get to the destination from the point of source. However, the existing map-based CNS does not consider any environments such as traffic congestion. Given the same starting point and destination, the system always provides the same route and the required time. This paper proposes a path planning method with traffic prediction by applying historical driving information to the Fuzzy theory and Bayesian update. Fuzzy theory classifies the historical driving information into groups of leaving time and speed rate, and the traffic condition of each time zone is calculated by Bayesian update. An ellipse area including starting and destination points is restricted in order to reduce the calculation time. The accuracy and practicality of the proposed scheme are verified by several experiments and comparisons with real navigation.
  • 18.

    Role Grades Classification and Community Clustering at Character-net

    PARK SEUNGBO | 조근식 | 2009, 14(11) | pp.169~178 | number of Cited : 6
    Abstract PDF
    There are various approaches that retrieve information from video. However, previous approaches have considered just object information and relationship between objects without story information to retrieve contents. To retrieve exact information at video, we need analyzing approach based on characters and community since these are body of story proceeding. Therefore, this paper describes video information retrieval methodology based on character information. Characters progress story to form relationship through conversations. We can analyze the relationship between characters in a story with the methods that classifies role grades and clusters communities of characters. In this paper, for these, we propose the Character-net and describe how to classify role grades and cluster communities at Character-net. And we show this method to be efficient.
  • 19.

    Head Detection based on Foreground Pixel Histogram Analysis

    Choi Yoo Joo | 손향경 | 박정민 and 1other persons | 2009, 14(11) | pp.179~186 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a head detection method based on vertical and horizontal pixel histogram analysis in order to overcome drawbacks of the previous head detection approach using Haar-like feature-based face detection. In the proposed method, we create the vertical and horizontal foreground pixel histogram images from the background subtraction image, which represent the number of foreground pixels in the same vertical or horizontal position. Then we extract feature points of a head region by applying Harris corner detection method to the foreground pixel histogram images and by analyzing corner points. The proposal method shows robust head detection results even in the face image covering forelock by hairs or the back view image in which the previous approaches cannot detect the head regions.
  • 20.

    Influence of Visitors Attachment Type to Attitude and Satisfaction for Theme Park -Based on Service Experience of EVERLAND-

    권순홍 | Yangwhan Lim | Dongwook Lee | 2009, 14(11) | pp.187~197 | number of Cited : 0
    Abstract PDF
    Visitors feel pleasure and delight with seeing and participation at the same time at theme park. Owing to participation characteristics of theme park, visitors are not able to satisfy their desire only with simple seeing, and influenced by the sense caused by participation and seeing. The study herein presumed that global attachment regarded as characteristic features determining individual relationship characteristics influences behavior and perception of visitors after visiting theme park, and speculated the process which attachment type of visitors influences to satisfaction and attitude. Moreover, in a point of view of 3 factors which form consumer attitude, recognition, feeling, behavioral desire, factors which enhances satisfaction and behavioral desire of visitors are organized and speculated. As a result of study herein, influence of stable attachment was not significant, while personal service and positive feeling shows importance.
  • 21.

    A Strategy for Inference Control of Official Statistics - Centering around the Patent Application Expense Support Project -

    이덕성 | CHOI IN SOO | 2009, 14(11) | pp.199~211 | number of Cited : 1
    Abstract PDF
    Official statistics which are collected for governments and the community can be used to assess the effectiveness of governments’ policies and programs. Thus, official statistics should be collected and presented based on correct findings. Erroneous official statistics will lead to lower quality results in assessing those policies and programs. Many statistical agencies, today, use on-line analytical processing (OLAP) data cubes which support OLAP tasks like aggregation and subtotals as a key part of their dissemination strategy of official statistics. Confidentiality protection in data cubes also should be made. However, sensitive parts of data cubes including micro data may be disclosed by malicious inferences. The authors have suggested an inference control process in OLAP data cubes which preventing erroneous cube creating and securing cubes against privacy breaches. The objective of this study is to establish a strategy for inference control of official statistics using the inference control process by taking the case of the Patent Application Expense Support Project.
  • 22.

    Empirical Study on The Interaction Degree between Social Welfare Management Systems

    Jonghwan Kim | 2009, 14(11) | pp.213~219 | number of Cited : 1
    Abstract PDF
    This study is that internal members of social welfare are divided into the first organization directly controlling and managing subjects and the second organization supporting and assisting the first one, and both organizations are analyzed through the empirical study about cooperation degree on the basis of interaction degree related with cooperation relationship from interorganizational relationship theories. That is because organic cooperation between both sides is essential element to effectively approach the ultimate purpose which subjects and related people need because of the social welfare business. This result suggests that both sides broadly recognize the need about cooperation between management systems and that it must come first to establish values and behaviors about the cooperation among the persons in charge on the organizational internal level for organic cooperation between organizations.
  • 23.

    Utility Analysis on Activating Web-Based Course Support System by Faculty in Universities

    Kyungwoo Kim | 2009, 14(11) | pp.221~232 | number of Cited : 2
    Abstract PDF
    To purpose of the study was to analyze faculty utility of Web-Based course support system in Universities. Data were collected from log file in server computer, 5,023 faculties and 12,733 courses offered at spring semester of 2009 in the Metropolitan area S, K, D universities were analyzed. Specifically, frequency and percentile of faculties and courses using course management system were analyzed. In addition, the frequencies and percentiles of courses using sub-functions of course management system were analyzed and χ2 test used to examine the difference of frequencies of faculties and courses using course system at using announcement, providing instructional material, public bulletin board and free board. Results were as follows. The 62.28% of faculties and 50.3% of courses have used Web-Based course support system. The results of sub- function utility analysis showed the highest use as 80.4%. in providing instructional material, However, the use of announcement functions and online discussion was more or less low. Results imply that most of faculties and course are using course management system as supplementary system of off-line instruction.
  • 24.

    A Study on the Critical Success Factors of Wireless Broadband Service

    Jongsoo Yoon | 2009, 14(11) | pp.233~245 | number of Cited : 1
    Abstract PDF
    The number of subscribers and the level of service usage are moderately low though WiBro service, as a new mobile Internet service, has been provided to mobile Internet users since June 2006. Considering this situation, the study was to identify, in exploratory point of view, which critical success factors are considered by mobile Internet users as the most important one to facilitate WiBro service, and to examine the perception of critical success factors of WiBro service varies according to their demographic characteristics. The study also was to suggest a few of research propositions on the relationships between critical success factors of WiBro service and characteristics of mobile Internet users, based on various statistical analyses. To accomplish these research purposes, the study defined research variables such as demographic characteristic of mobile Internet users, types of user, and critical success factors of WiBro service based on the review of mobile Internet service related studies. And then, the study performed various statistical analyses using survey questionnaires on mobile Internet users. The analyses show that there are little differences in perception on critical success factors of WiBro service among the mobile Internet users grouped by job and residential region, and that only the relationship between occupation of mobile Internet users and critical success factors of WiBro service is moderated by the types of user. Finally, the study proposed some research propositions, based on these analysis results, that could be used in the future studies.
  • 25.

    The Comparison of the Impact of IQ and Social Intelligence on the Compliance with Administrative Regulatory Policies

    하옥현 | Sae-Yoon Oh | 2009, 14(11) | pp.247~256 | number of Cited : 1
    Abstract PDF
    The purpose of this study is to compare the impact of intellectual quotient and social intelligence on compliance with the administrative regulatory policies. This study found two things. The first one is the correlation between intellectual quotient and social intelligence is not so high. No matter how high is his or her intellectual quotient may be, it cannot be said that his or her social intelligence will be high in proportion to IQ. The second one is the influence of social intelligence on administrative regulatory policies is bigger than that of intellectual quotient. So to execute a policy efficiently, we cannot succeed without consideration to the factors of social intelligence. The result of analysis implies that policy authorities and the concerned citizens should try to get the social intelligence factors involved in all processes of administrative regulatory policies such as agenda setting, decision, implementation, evaluation and feedback.