Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2011, Vol.16, No.2

  • 1.

    The Instruction Flash memory system with the high performance dual buffer system

    JUNG BOSUNG | Lee Jung Hoon | 2011, 16(2) | pp.1~8 | number of Cited : 0
    Abstract PDF
    NAND type Flash memory has performing much researches for a hard disk substitution due to its low power consumption, cheap prices and a large storage. Especially, the NAND type flash memory is using general buffer systems of a cache memory for improving overall system performance, but this has shown a tendency to emphasize in terms of data. So, our research is to design a high performance instruction NAND type flash memory structure by using a buffer system. The proposed buffer system in a NAND flash memory consists of two parts, i.e., a fully associative temporal buffer for branch instruction and a fully associative spatial buffer for spatial locality. The spatial buffer with a large fetching size turns out to be effective serial instructions, and the temporal buffer with a small fetching size can achieve effective branch instructions. According to the simulation results, we can reduce average miss ratios by around 77% and the average memory access time can achieve a similar performance compared with the 2-way , victim and fully associative buffer with two or four sizes.
  • 2.

    Implementation of Efficient Power Method on CUDA GPU

    Junghwan Kim | Jinsoo Kim | 2011, 16(2) | pp.9~16 | number of Cited : 6
    Abstract PDF
    GPU computing is emerging in high performance application area since it can easily exploit massive parallelism in a way of cost-effective computing. The power method which finds the eigen vector of a given matrix is widely used in various applications such as PageRank for calculating importance of web pages. In this research we made the power method efficiently parallelized on GPU and also suggested how it can be improved to enhance its performance. The power method mainly consists of matrix-vector product and it can be easily parallelized. However, it should decide the convergence of the eigen vector and need scaling of the vector subsequently. Such operations incur several calls to GPU kernels and data movement between host and GPU memories. We improved the performance of the power method by means of reduced calls to GPU kernels, optimized thread allocation and enhanced decision operation for the convergence.
  • 3.

    A Study on the assessment of stress using Wireless ECG

    임채영 | KIM Kyungho | 2011, 16(2) | pp.17~24 | number of Cited : 3
    Abstract PDF
    In this paper, daily life stress monitoring system is proposed. The proposed wireless ECG module, reducing the noise and increasing the size of signal, amplification circuit was designed for. Using HRV(Heart Rate Variability), extracted by measuring R-wave, stress diagnostic algorithms to assess the stress of human emotion were developed. For monitoring the activities, the proposed system is consist of small rectangular size for portable and by simple measurement it is possible to measure at any time. Through experiments, the proposed approach to represent user's stress level can be confirmed. Through that, it can see appropriate structure to obtain R-wave for stress assess as well as high resemblance to the clinical electrocardiogram. In this paper, performed experiments was developed nonrestraint measuring and wearable wireless biometric scanner that is able to monitor the heart's electrical activity of everyday life.Using this, the algorithm system, that is able to assess stress index through time-domain and frequency-domain analysis of the front and the rear of performing stress load protocol, was developed,
  • 4.

    A Variant of Improved Robust Fuzzy PCA

    김성훈 | 허경용 | Woo, Young Woon | 2011, 16(2) | pp.25~32 | number of Cited : 0
    Abstract PDF
    Principal component analysis (PCA) is a well-known method for dimensionality reduction and feature extraction. Although PCA has been applied in many areas successfully, it is sensitive to outliers due to the use of sum-square-error. Several variants of PCA have been proposed to resolve the noise sensitivity and, among the variants, improved robust fuzzy PCA (RF-PCA2) demonstrated promising results. RF-PCA2, however, still can fall into a local optimum due to equal initial membership values for all data points. Another reason comes from the fact that RF-PCA2 is based on sum-square-error although fuzzy memberships are incorporated. In this paper, a variant of RF-PCA2 called RF-PCA3 is proposed. The proposed algorithm is based on the objective function of RF-PCA2. RF-PCA3 augments RF-PCA2 with the objective function of PCA and initial membership calculation using data distribution, which make RF-PCA3 to have more chance to converge on a better solution than that of RF-PCA2. RF-PCA3 outperforms RF-PCA2, which is demonstrated by experimental results.
  • 5.

    A proper folder recommendation technique using frequent itemsets for efficient e-mail classification

    문종필 | 이원석 | 장중혁 | 2011, 16(2) | pp.33~46 | number of Cited : 3
    Abstract PDF
    Since an e-mail has been an important mean of communication and information sharing, there have been much effort to classify e-mails efficiently by their contents. An e-mail has various forms in length and style, and words used in an e-mail are usually irregular. In addition, the criteria of an e-mail classification are subjective. As a result, it is quite difficult for the conventional text classification technique to be adapted to an e-mail classification efficiently. An e-mail classification technique in a commercial e-mail program uses a simple text filtering technique in an e-mail client. In the previous studies on automatic classification of an e-mail, the Naive Bayesian technique based on the probability has been used to improve the classification accuracy, and most of them are on an e-mail in English. This paper proposes the personalized recommendation technique of an email in Korean using a data mining technique of frequent patterns. The proposed technique consists of two phases such as the pre-processing of e-mails in an e-mail folder and the generating a profile for the e-mail folder. The generated profile is used for an e-mail to be classified into the most appropriate e-mail folder by the subjective criteria. The e-mail classification system is also implemented, which adapts the proposed technique.
  • 6.

    An Implementation of the Fault Detection System in the RFID Tag Manufacturing Automation

    정민포 | CHO HYUK GYU | Jung Deok Gil | 2011, 16(2) | pp.47~54 | number of Cited : 0
    Abstract PDF
    The detection process of defective tags in most of Korean domestic RFID manufacturing companies is treated by on-hand processing after the job of chip bonding, so it has been requested to reduce the time and cost for manufacturing of RFID tags. Therefore, in this paper, we implement the system to perform the detection of defective tags after the process of chip bonding, and so provide the basis of software to establish the foundation of automation system for the detection of defected RFID tags which is requested in the related Korean domestic industrial field. We have developed the system by using UML in modeling phase and JAVA in implementation phase to reduce the cost of development of program and make it easy to maintain. The developed system in this paper shows the very enhanced performance in processing speed and perfect detection rate of defective tags, comparing to the method of on-hand processing.
  • 7.

    Extraction of Lumbar Multifidus Muscle using Ultrasound Imaging

    Kim, Kwang-baek | 신상호 | 2011, 16(2) | pp.55~60 | number of Cited : 2
    Abstract PDF
    In this paper, we propose a new method for extracting muscles from lumbar images. The proposed method sets areas without distortions with field expert's assistance as areas of measuring interest and removing noises from initial ultrasonic videos. Then, the method emphasizes the brightness contrast with Ends-in search stretching algorithm and separate thoracic vertebra from subcutaneous fat area using morphological characteristics. 4-directions contour tracing algorithm is applied to extract the bottom of subcutaneous fat area. Extracting thoracic vertebra area requires noise removal and morphological characteristics as well among candidate areas obtained by controlling min-max brightness. The thickness of muscles is then defined as the length between subcutaneous fat area and extracted thoracic vertebra. The experiment which consists of 368 image analysis verifies that the proposed method is more effective in measuring the thickness of muscles than before.
  • 8.

    Efficient Dynamic Time Warping Using 2nd Derivative Operator

    SEHOON KIM | HYUNG IL CHOI | Rhee Yang Weon and 1other persons | 2011, 16(2) | pp.61~70 | number of Cited : 0
    Abstract PDF
    Dynamic Time Warping based on Dynamic Programming is the one of the most widely been used to compare the similarity of two patterns. DTW algorithm has two known problems. The one is singularities. And the another problem is the accuracy of the warping path with patterns. Therefore, this paper suggest the solution for DTW algorithm to use a 2nd derivative operator. Laplacian of Gaussian is a kind of a 2nd derivative operator. Consequently. our suggestion method to apply to this operator, more efficient to solve the singularities problems and to secure a accuracy of the warping path. And the result shows a superior ability of this suggested method.
  • 9.

    A Instructional Contents Creator using Wavelet for Lossless Image Compression

    SangYeob Lee | 박성원 | 2011, 16(2) | pp.71~82 | number of Cited : 1
    Abstract PDF
    In order to easily create video tutorials, the algorithm is needed that video camera recording, white board images, video attachments, and document data are combined in real-time. In this study, we implemented the video lecture content creation system using wavelet-based lossless compression to composite multimedia objects in real-time and reproduce the images. Using commercially available PC can be useful when lecturers want to make video institutional contents, it can be operated easily and fastly. Therefore, it can be very efficient system for e-Learning and m-Learning. In addition, the proposed system including multimedia synthesis technology and real-time lossless compression technology can be applied to various fields, different kinds of multimedia creation, remote conferencing, and e-commerce so there are highly significant.
  • 10.

    An Ontology-Based Method for Calculating the Difficulty of a Learning Content

    박재욱 | Mee Hwa Park | YONG KYU LEE | 2011, 16(2) | pp.83~92 | number of Cited : 3
    Abstract PDF
    Much research has been conducted on the e-learning systems for recommending a learning content to a student based on the difficulty of it. The difficulty is one of the most important factors for selecting a learning content. In the existing learning content recommendation systems, the difficulty of a learning content is determined by the creator. Therefore, it is not easy to apply a standard rule to the difficulty as it is determined by a subjective method. In this paper, we propose an ontology-based method for determining the difficulty of a learning content in order to provide an objective measurement. Previously, ontologies and knowledge maps have been used to recommend a learning content. However, their methods have the same problem because the difficulty is also determined by the creator. In this research, we use an ontology representing the IS-A relationships between words. The difficulty of a learning content is the sum of the weighted path lengths of the words in the learning content. By using this kind of difficulty, we can provide an objective measurement and recommend the proper learning content most suitable for the student's current level.
  • 11.

    A Study of Adaptive QoS Routing scheme using Policy-gradient Reinforcement Learning

    한정수 | 2011, 16(2) | pp.93~100 | number of Cited : 3
    Abstract PDF
    In this paper, we propose a policy-gradient routing scheme under Reinforcement Learning that can be used adaptive QoS routing. A policy-gradient RL routing can provide fast learning of network environments as using optimal policy adapted average estimate rewards gradient values. This technique shows that fast of learning network environments results in high success rate of routing. For prove it, we simulate and compare with three different schemes.
  • 12.

    Cluster Based Multi-tier MAC Protocol for Dense Wireless Sensor Network

    문지환 | 장태무 | 2011, 16(2) | pp.101~112 | number of Cited : 0
    Abstract PDF
    A new MAC protocol, MT-MAC(Multi-Tier Medium Access Control) by name, is proposed for dense sensor networks. Depending on the density of nodes in a virtual cluster, the cluster header performs the splitting to several tiers in nodes of virtual cluster. MT-MAC split the tiers to use modfied-SYNC message after receiving the beacon message from the cluster header. Because only the sensor nodes in the same tier communicate each other, less power is consumed and longer network life time is guaranteed. By a simulation method with NS-2, we evaluated our protocol. In dense nodes environments, MT-MAC protocol shows better results than S-MAC in terms of packet delivery rates throughput and energy consumption.
  • 13.

    The Elevator Control System Integrated Wire and Wireless based on Information Technology

    김운용 | 2011, 16(2) | pp.113~120 | number of Cited : 3
    Abstract PDF
    The information of the IT convergence has extended through the whole business ares with supplying intelligence terminal such as smart phone and the technology of sensors and wireless networks. And also, the existed industry became to high technology and extended various parts. The industry of the elevator became the center of the life offering the diversification of the user environment access and high building control. In this paper, we suggest the elevator control system integrated wire and wireless based on Information technology. We suggest the service model of user friendly connected by internet. For this, we make the relation model of the elevator system and IT environments and then design the service model for wire service and wireless service using smart phone. It can make to supply efficient information with wire and wireless environments and also make improvement in accessability for the disabled peoples.
  • 14.

    An Energy-Efficient Mobile P2P Streaming Structure Using Agent Peers

    김상진 | 김은삼 | 2011, 16(2) | pp.121~130 | number of Cited : 3
    Abstract PDF
    With advances in wireless networks and advent of powerful mobile devices such as smart phones, the demand for mobile IPTV services has been increasing. It is essential to minimize the energy consumption of mobile devices because their battery capacity is limited. In this paper, we therefore propose a new streaming structure in P2P-based mobile IPTV systems to minimize the energy consumption of mobile peers using agent peers. Agent peers can decrease the energy consumption of mobile peers significantly by performing streaming functionality and exchanging control messages for joining and leaving overlay networks in place of corresponding mobile peers. Finally, by simulation experiments using an energy model, we show that our proposed streaming structure can increase the lifetime of mobile peers using agent peers.
  • 15.

    Enhanced Packet Transmission in Ad-hoc Networks using Unicast with Temporary Routing

    고성현 | 유성재 | Souhwan Jung | 2011, 16(2) | pp.131~140 | number of Cited : 0
    Abstract PDF
    Smart packet agent is an application that is proposed to provide routing protocol and service module in ubiquitous network environment. However, it uses multi-hop broadcast, thus it causes increasing network traffic, low-speed data transmission, and the unnecessary joining nodes. In this paper, a transmit technique that uses unicast-based multi-hop to have lower network traffic and faster transmission time than the multi-hop broadcast technique. In our scheme, u-Zone Master establishes temporary routing paths by calculating moving nodes’ hop-counter. Therefore, it reduces smart packet agent’s network traffic and retransmission rate. Besides, this paper proposed an UDP transmission that bases on sliding window. Hence, the Stop & Wait transmission speed is improved. The results, which are taken by analyzing performance prove that the proposed scheme has better performance.
  • 16.

    Implementation of Facility Management System for Plant Factory

    이용웅 | 서범석 | 김찬우 and 3other persons | 2011, 16(2) | pp.141~152 | number of Cited : 1
    Abstract PDF
    This paper suggests the Facility Management System for plant factory promising to be a core technology of the agriculture in the future. This system makes diagnoses that status from sensors or facilities in the factory for exact operation and monitors the internal environment with the control status in real-time. It is expected that we could operate a plant factory safely and effectively by using the system. The system consists of the data management module, the context provider module, the context interpreter module, the service provider module, the data storage and user interface. The system provide with the failure diagnosis service, the facility control service, and the high-reliability monitoring service via the interactions between above modules. The failure diagnosis service determines whether the sensors or facility devices are in failure or not, and informs the administrator of their conditions. The facility control service is activated in case if the facilities need to be managed during the diagnosis for failure or malfunction processes. The high-reliability monitoring service provides the administrator with verified data through the failure diagnosis service. Then we confirmed that the suggested system operates correctly through the system simulation.
  • 17.

    Analysis of Threats and Countermeasures on Mobile Smartphone

    전웅렬 | 김지연 | Youngsook Lee and 1other persons | 2011, 16(2) | pp.153~164 | number of Cited : 12
    Abstract PDF
    Smartphone is a mobile device which can perform better than feature phone. Recently, growth in demand for advanced mobile devices boasting powerful performance, market share of smartphone is increasing rapidly in mobile device market, for example, iphone and android phone. Smartphone can provide many functionalities, e-mail, scheduler, word-processing, 3D-game, and etc, based on its powerful performance. Thus, various secret information is integrated in smartphone. To provide service, sometimes, smartphone transmits informations to outside via wireless network. Because smartphone is a mobile device, user can lose his/her smartphone, easily, and losing smartphone can cause serious security threats, because of integrated information in smartphone. Also data which is transmitted in wireless network can be protected for privacy. Thus, in present, it is very important to keep secure smartphone. In this paper, we analyze threats and vulnerabilities of smartphone based on its environments and describe countermeasures against threats and vulnerabilities.
  • 18.

    A Clustered Directed Diffusion Routing Protocol for Wireless Sensor Network

    짜오빈 | 이경오 | 2011, 16(2) | pp.165~172 | number of Cited : 0
    Abstract PDF
    Wireless sensor networks consist of small battery powered devices with limited energy resources. Once deployed, the small sensor nodes are usually inaccessible to the user, and thus replacement of the energy source is not feasible. Hence, energy efficiency is a key design issue that needs to be enhanced in order to improve the life span of the network. Directed Diffusion is a well known routing protocol. In this paper we adopt the clustering mechanism to improve the efficiency of Directed Diffusion. We introduce C-Directed Diffusion which make clusters, select the CH(Cluster Head) and CHs do the same process as in Directed Diffusion. C-Directed Diffusion is pretty simple and show better performance than Directed Diffusion.
  • 19.

    Secure Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks

    Yang,Hyung-Kyu | 2011, 16(2) | pp.173~182 | number of Cited : 0
    Abstract PDF
    User authentication and key exchange protocols are the most important cryptographic applications. For user authentication, most protocols are based on the users' secret passwords. However, protocols based on the users' secret passwords are vulnerable to the password guessing attack. In 1992, Bellovin and Merritt proposed an EKE(Encrypted Key Exchange) protocol for user authentication and key exchage that is secure against password guessing attack. After that, many enhanced and secure EKE protocols are proposed so far. In 2006, Lo pointed out that Yeh et al.'s password-based authenticated key exchange protocol has a security weakness and proposed an improved protocol. However, Cao and Lin showed that his protocol is also vulnerable to off-line password guessing attack. In this paper, we show his protocol is vulnerable to on-line password guessing attack using new attack method, and propose an improvement of password authenticated key exchange protocol for imbalanced wireless networks secure against password guessing attack.
  • 20.

    A Study on the User Authentication Scheme with Forward Secrecy

    Younghwa An | 2011, 16(2) | pp.183~192 | number of Cited : 1
    Abstract PDF
    Recently Wang-Li proposed the remote user authentication scheme using smart cards. But the proposed scheme has not been satisfied security requirements considering in the user authentication scheme using the password based smart card. In this paper, we described the Wang-Li and Yoon et al.'s authentication scheme simply, and we prove that the Wang-Li's scheme is vulnerable to a password guessing attack and impersonation attack in case that the attacker steals the user's smart card and extracts the information in the smart card. Accordingly, we propose the improved user authentication scheme based on the hash function and generalized ElGamal signature scheme that can withstand many possible attacks including a password guessing attack, impersonation attack and replay attack, and that can offer the function of forward secrecy. The result of comparative analysis, the our proposed scheme is much more secure and efficient than the Wang-Li and Yoon et al.'s scheme.
  • 21.

    A Study on Battery Driven Low Power Algorithm in Mobile Device

    Jaejin Kim | 2011, 16(2) | pp.193~200 | number of Cited : 1
    Abstract PDF
    In this paper, we proposed battery driven low power algorithm in mobile device. Algorithm the mobile devices in power of the battery for the task to perform power consumption to reduce the frequency alters. Power of the battery perform to a task power consumption of is less than the task perform to frequency the lower. Frequency control the task, depending on in the entire system devices used among the highest frequency with devices first target perform to. Frequency in the decrease the second largest frequency with of the device the frequency in changes the power consumption to calculate. The calculated consumption power the battery of level is greater than level the frequency by adjusting power consumption, lower power of the battery the task perform when you can to the frequency to adjust. Experiment the frequency by adjusting power consumption a method to reduce using [6 ] and in the same environment power of the battery consider the task to perform frequency were controlled. The results in [6] perform does not battery power on task operates that the result was.
  • 22.

    Design of a digital photo frame for close-range security using the chaotic signals synchronization

    HongSop Kim | GEOSU YIM | 2011, 16(2) | pp.201~206 | number of Cited : 9
    Abstract PDF
    With the development and supply of digital displayers, there has been a heightened interest of late in digital photo frames, eclipsing the existing print frames. This digital photo frame was developed into a new LCD digital photo frame that can be used not only for data display but also as a surveillance monitoring equipment when combined with a CCD camera. The developed photo frame uses a one-way communication encryption method that replaces the existing two-way communication encryption method to ensure the security of the surveillance image data. This method uses the chaotic signal’s one-way synchronization phenomenon, where synchronization is made for a certain amount of time, after which the synchronized data can be encrypted and decoded at any point. It can yield the same results as the two-way communication encryption method. Moreover, if the proposed method is applied to the close-range communication methods of ubiquitous devices, it will be able to obtain more efficient results.
  • 23.

    Dynamic Popular Channel Surfing Scheme for Reducing the Channel Seek Distance in DTV

    이승관 | Jin Hyuk Choi | 2011, 16(2) | pp.207~216 | number of Cited : 3
    Abstract PDF
    Due to the increasing availability and popularity of digital television (DTV), the numbers of TV channels and programs that can be selected by consumers are also increasing rapidly. Therefore, searching for interesting channels and program via remote controls or channel guide maps can be frustrating and slow. In this paper, in order to better satisfy consumers, we propose a dynamic channel surfing scheme that reduces the channel seek distance in DTV. The proposed scheme dynamically rearranges the channel sequences according to the channel currently being watched to reduce the channel seek distance. The results of a simulation experiment demonstrate that the proposed dynamic channel surfing scheme reduces the channel seek distance for DTV channel navigation when up-down channel selection interfaces are used.
  • 24.

    Implementation of Remote Physical Security Systems Using Smart Phone

    Moonku Lee | 2011, 16(2) | pp.217~224 | number of Cited : 4
    Abstract PDF
    Existing wire based physical security system solutions show limitations in time and space. In order to solve these deficiencies, a remote physical security system has been implemented using smart phone based on mobile cloud computing technique. The security functions of mobile cloud computing technique include mobile device user authentication, confidentiality of communication, integrity of information, availability of system, and target system access control, authority management and secure hand off etc. Proposed system has been constructed as remote building management system using smart phone, and also has been efficient to reduce energy cost (5~30%), result of system average access and response time 7.082 second. This systems are evaluated to have high efficiency compared to performance.
  • 25.

    Modeling and Prediction of Time Series Data based on Markov Model

    조영희 | Gye Sung Lee | 2011, 16(2) | pp.225~234 | number of Cited : 3
    Abstract PDF
    Stock market prices, economic indices, trends and changes of social phenomena, etc. are categorized as time series data. Research on time series data has been prevalent for a while as it could not only lead to valuable representation of data but also provide future trends as well as changes in direction. We take a conventional model based approach, known as Markov chain modeling for the prediction on stock market prices. To improve prediction accuracy, we apply Markov modeling over carefully selected intervals of training data to fit the trend under consideration to the model. Another method we take is to apply clustering to data and build models of the resultant clusters. We confirmed that clustered models are better off in predicting, however, with the loss of prediction rate.
  • 26.

    A Study on Learning Program of Discrete Mathematicsfor Computer Software

    Chun, Sang Pyo | 2011, 16(2) | pp.235~242 | number of Cited : 0
    Abstract PDF
    The industry of computer has been changed quickly by developing and growing info-communications industry and by supplying new technologies. The importance of software field which is based on this change is gradually emphasized. Nowadays more people tend to have realization of mathematics and statistics that are basic theory of software study, moreover, discrete mathematics is especially getting more important in whole mathematics field. It’s essential to understand discrete mathematics in order to understand existing knowledge about software field in computer engineering and develop new technologies in different areas in the future. The way people get education about discrete mathematics, however, is improper as a result of massive materials and uncertain standard. This study subdivides discrete mathematics according to different tracks in the computer software study. In addition, the research which is suitable to individuality in different fields is able to be efficiently carried out by selecting related parts and the method of mathematics education is provided to deal with rapidly changed applications in related fields.
  • 27.

    Client level QoS/SLA Management using UML and Ontology

    Yan Ha | 2011, 16(2) | pp.243~248 | number of Cited : 1
    Abstract PDF
    According to increasing of accessing multimedia stream contents, Web services have become popular. However, these Web services are not supported with the same quality to Web clients who frequently access multimedia services. This paper proposes ontological technique to apply client level Quality of Service(QoS) that provides two different levels to serve Web service with proper quality by contribution value. And, it describes with UML(Unified Modeling Language) how to relate QoS and SLA(Service Level Agreement). Main contribution of this paper is to support client level QoS and SLA and to use Ontology for it. Therefore, this work uses an ontology-based approach to organize QoS and SLA, enabling semantic classification of all Web services based on domains and QoS and SLA attributes.
  • 28.

    A Study of Textured Image Segmentation using Phase Information

    Oh Suk | 2011, 16(2) | pp.249~256 | number of Cited : 0
    Abstract PDF
    Finding a new set of features representing textured images is one of the most important studies in textured image analysis. This is because it is impossible to construct a perfect set of features representing every textured image, and it is inevitable to choose some relevant features which are efficient to on-going image processing jobs. This paper intends to find relevant features which are efficient to textured image segmentation. In this regards, this paper presents a different method for the segmentation of textured images based on the Gabor filter. Gabor filter is known to be a very efficient and effective tool which represents human visual system for texture analysis. Filtering a real-valued input image by the Gabor filter results in complex-valued output data defined in the spatial frequency domain. This complex value, as usual, gives the module and the phase. This paper focused its attention on the phase information, rather than the module information. In fact, the module information is considered very useful at region analysis in texture, while the phase information was considered almost of no use. But this paper shows that the phase information can also be fully useful and effective at region analysis in texture, once a good method introduced. We now propose "phase derivated method", which is an efficient and effective way to compute the useful phase information directly from the filtered value. This new method reduces effectively computing burden and widen applicable textured images.
  • 29.

    Analysis of Network Influence Factor considering Social Network Analysis and C2 Time

    전진태 | 박건우 | Lee Sang Hoon | 2011, 16(2) | pp.257~266 | number of Cited : 2
    Abstract PDF
    Over the society the trial for several systems to be connected with Network has been continued to share information and to make it various. In accordance with such a change, the concept of military warfare conduction has been changing form platform centric warfare in separate combat system based on network centric warfare in network based. We have continuously made an effort that we try to get the goal with efficient system which is linked up with network, but such a study on that one in military system analysis is still slower than the study out of military until now. So this study is searching network influence factor by using military network with application of social network analysis method which is used broadly in the society and the science as well. At this time we search co-relationships between social network and the thing that we can analyse C2 time by effectiveness measurement means. By this study it has value of network influence factor identification for the growing network composition.
  • 30.

    The study on payment system improvement in Korean firms : The impacts of stock options on pay equity, job attitude and intention to turnover

    차성호 | Yang, Donghoon | 2011, 16(2) | pp.267~278 | number of Cited : 4
    Abstract PDF
    This study examines the relationship among stock options, pay equity, organizational commitment. Employees who received stock options tend to perceive their pay more equitable and the tendency shows a positive relationship among the amount of stock options and the equity perception. Also employees who received stock options perceive greater procedural equity, as they recognize stock options are awarded to many employees. However, the perception of stock options was not significantly associated with organizational commitment, turnover intention, and pay satisfaction. In 2003, the study surveyed 115 employees who received stock options in 10 publicly owned Korean firms that introduced stock option plans. The statistical analysis leads to the conclusions as follows. First, as the number of stock options increases, the receiver tends to perceive that pay system is more distributively equitable. Second, as the number of stock option receivers increases, the employees perceive the pay system more procedurally equitable. Third, stock option payments don't ensure that it improves pay satisfaction, turnover intention, and organizational commitment. This study shows a positive relationship that stock options work favorably in terms of pay equity, but the effect doesn't seem to be widely positive. The reason is that the introduction of stock options in domestic firms has been made only recently after the foreign exchange crisis in the late 1990s. More experiments and design issues should be discussed for the future.
  • 31.

    Standardization Model Development and its Effect Analysis for Effective Available Stock Management Process of Automobile Parts Manufacturing Industry using the ERP System

    KyungBae Yoon | 2011, 16(2) | pp.279~288 | number of Cited : 4
    Abstract PDF
    The purpose of this research is to develop a standardization model for available stock management process among the entire Enterprise Resource Planning System modules of Automobile Parts Manufacturing Industry. The standardization model system is constructed through the phased method based on the development methodology of information establishment suggested by the Small and Medium Business Administration and Korea Technology and Information Promotion Agency for Small & Medium Enterprises. The standardization model is to develop the process modules of ordering management, storing management, delivering management, and stock management for available stock management process. The study will help the manufacturing business and related IT business which want to construct available stock management process under the ERP system to establish the system more effectively by applying the standardization model and also will provide them with construction availability and reliability. By application of this study results, the businesses will not only prevent the excessive possession of raw materials and products and reserve adequate and steady stock but also will check real-time stock, observe customer due date, decrease over-production and reduce stock cost.
  • 32.

    An Approach to Navigating Data Cubes with a Hierarchical Visualization Technique

    오미화 | 황만모 | 최정우 and 1other persons | 2011, 16(2) | pp.289~305 | number of Cited : 4
    Abstract PDF
    To efficiently analyze complex and voluminous data, OLAP systems increasingly provide functionalities for visual exploration of the data allowing end-users to navigate the desired view of the data cube. This paper only deals with data cubes whose schemas represented like the exclusive symmetric hierarchy which is not addressed by current OLAP implementations. This paper presents a conceptual classification of abstraction hierarchies, and an approach to navigating data cubes with a hierarchical visualization technique. The hierarchical visualization technique is developed by using the transitive closure of a binary relation. The approach is exemplified using a real-world study from the domain of national license administration.