Korean | English

pISSN : 1975-7700 / eISSN : 2734-0570

2020 KCI Impact Factor : 0.42
Home > Explore Content > All Issues > Article List

2010, Vol.5, No.2

  • 1.

    An Empirical Study on the factors of Knowledge Sharing Will - Focusing on the Knowledge Management System's Users -

    강문상 | 2010, 5(2) | pp.1~16 | number of Cited : 2
    Abstract PDF
    This study categorizes as knowledge, social, system and job characteristics the antecedent factors impacting the personnel's knowledge sharing will in organizations using the knowledge management system (KSM) and analyzes the relationships among these factors, knowledge sharing will and KMS. The results of this study show that while the suitability of knowledge, the confidence on fellow workers and management team, the system convenience, the assistance of knowledge management process and the interdependence of job have a significant effect, the willingness to share knowledge has a significant effect on the use of KMS. The confidence on fellow workers in particular has the greatest positive effect on their willingness to share knowledge, with the process of knowledge management process and the interdependence of job following in this order.
  • 2.

    A Study on Module Supporting System for Small Companies - A Case Study of Modularization of Research and Development Process for Efficient Support of Technical difficulties of IT Small Companies -

    Lee See Woo | 2010, 5(2) | pp.17~24 | number of Cited : 1
    Abstract PDF
    In this paper, I propose the module supporting system that assigns specialist on each module and create the module corresponding to R&D processes to small companies in order to support technical difficulties arising in a R&D process of IT small companies. The number of applied target companies is 149 IT small companies and altogether 45 specialist who had supported 10 modules. As a result of observing for two years, I identified that the system helps the technical difficulties.
  • 3.

    Modeling Methodology of Soft-Type Large Scale Building Health Monitoring

    Hee-Suk Seo | Lee Seung Jae | 유지환 | 2010, 5(2) | pp.25~34 | number of Cited : 0
    Abstract PDF
    There are modern buildings are going to invite maximum scale. Technology is also very necessary for building construction materials, as well as develop has also been diversified. Depending on the development of technologies to reduce the time needed for construction has become a fact. Until now, under construction since last time was a lot of research. However, shortening the time for building, sustaining the importance of building maintenance and management should be aware of the importance of the issue. The materials of Teflon, reinforced materials, such as the cable is in very need for a safety check. For example, the roof is Sangam World Cup Stadium is a safe climb to the roof of every manager has a diagnosis. The various aspects of it is true that the efficiency is dropping. Therefore, this research through the maintenance of buildings, limited by a need to manage the safety and effective method for diagnosis is presented. The safety check for the cable material and simulation methods are presented. That way, you can check the ingredients first cable inspection robot is presented for the second, the robot retrieved information based on information entered by the safety manager for the simulation is conducted.
  • 4.

    Clustering of XML Documents using Tag Information with Kohonen Map

    SAJOON PARK | 박현근 | 2010, 5(2) | pp.35~41 | number of Cited : 0
    Abstract PDF
    One of the important features for the XML document is the creation of arbitrary tags. In this paper, we make use of it for clustering XML documents. Tag feature vector and word feature vector are separately created . Clustering was performed by applying a Kohonen map. Because tags are necessary keywords, we utilized binary method for them. TF / IDF technique was used for word feature vector. Reuter-21578 collections are experimented. The results of experimentation is almost rate of 50% in recall and precision rate. In addition, the traditional classification algorithm, SVM and K-NN was also compared with our system. Performance of our results were 10% more than SVM, K_NN system.
  • 5.

    The Comparative Study of Optimal Release Time Based on Erlang Non-Homogeneous Poisson Process Software Model

    Kim Hee Chul | 2010, 5(2) | pp.43~52 | number of Cited : 0
    Abstract PDF
    In this paper, make a study decision problem called an optimal release policies after testing a software system in development phase and transfer it to the user. When correcting or modifying the software, because of the possibility of introducing new faults when correcting or modifying the software, infinite failure non-homogeneous Poisson process models presented and propose release policies of the life distribution applied Erlang distribution model which used to an area of reliability because of various shape and scale parameter. In this paper, discuss optimal software release policies which minimize a total average software cost of development and maintenance under the constraint of satisfying a software reliability requirement. In a numerical example, after trend test applied and estimated the parameters using maximum likelihood estimation of inter-failure time data, make out estimating software optimal release time.
  • 6.

    A Design of Construction Site Management System to build Web-based BIM

    Sung Kyung | 2010, 5(2) | pp.53~58 | number of Cited : 0
    Abstract PDF
    Our situation, in terms of construction information, has inappropriate information system because it is focused on either simple visualizing information or gathering data in one on construction site, thus it is necessary to develop system which is able to manage data in whole construction process. This study aims to develop integrated construction information system applying Web-based BPMS which can simulate overall information flow effectively by work type, accumulating information in each process of construction make.
  • 7.

    Constant Time RMESH Algorithm for Finding Maximal Palindromes of String

    Jinwoon Woo | 2010, 5(2) | pp.59~67 | number of Cited : 1
    Abstract PDF
    Since string operations were applied to computational biology area, various data structures and algorithms for computing efficient string operations have been studied. The maximal palindrome problem is an operation to find the maximal symmetric substrings in a string. This operation is importantly used in the string processing area such as pattern matching and likelihood measurement. In this paper, we present an algorithm to compute the maximal palindromes of the given string using three-dimensional n×n×n processors on RMESH(Reconfigurable MESH). The algorithm has O(1) constant time complexity, which is usefully used in the massive data processing areas like the computational biology.
  • 8.

    Optimal Parameter Investigation for Finding Programs of the Limited Expressions Based on Genetic Algorithms

    HWANG SU CHEOL | Cho, Sang Yeop | 2010, 5(2) | pp.69~76 | number of Cited : 0
    Abstract PDF
    In order to solve the optimal problems with genetic algorithms, the parameters such as the ratio of the crossover and mutation give an impact to the problem solving systems. This paper proposes the method of investigating the best crossover and mutation parameters in the problem of finding the program of virtual machine that can be calculated them, given the limited expressions. In experiment, we apply the ten combinations of parameters to the seven categories of the expressions and compare the average generations until finding solutions. The result show that the forth case of combination of parameters is the best solution.
  • 9.

    Study on Applying Data Flow Programming to Spreadsheet

    Choi, Jong Myung | KimGiWeon | 양진영 | 2010, 5(2) | pp.77~84 | number of Cited : 0
    Abstract PDF
    There have been two popular programming paradigms in visual programming field: spreadsheet and data flow programming. However, there have been little effort to combine these two programming paradigms to support easy programming. In this paper, we introduce the way that enables spreadsheet users to develop their applications easily and efficiently by combining the two programming paradigms into one programming language. Furthermore, we also propose how to apply data flow to spreadsheet and how to classify actions and apply them to programming.
  • 10.

    WXDS for XML Digital Signature on Wireless Network

    Kim,SeokHun | 정두용 | Changbok Jang | 2010, 5(2) | pp.85~90 | number of Cited : 0
    Abstract PDF
    As wireless network was grown and performance of wireless device was increased, M-Commerce was activates in Wireless network environment. Therefore many user downloaded various multimedia data(picture, movie, music) by use the wireless network. But for using the multimedia data, it need authentication of user for paying. So authentication technology, such as WPKI and WPLS, Hermes system, is studying. But if authentication systems was implemented to heterogeneous, system that used WPKI technology is difficult to implement, it's not interoperate with authentication system on wire internet, not support XML digital Signature. Hermes system also not interoperates with XML digital signature system. So our paper designed WXDS(Wireless XML Digital signature System) that can interoperate with other digital signature systems and use to XML document to apply XML digital signature technology on wire and wireless network, and then implemented system that can sign to XML digital signature by java card. Through system that suggested by us can supply XML digital signature on the mobile phone. And user can sign multimedia data whereas on wire network and mobile phone.
  • 11.

    A study Noise removal of the image compression for JPEG2000 research

    In-Kyoung Shin | 이상범 | 2010, 5(2) | pp.91~96 | number of Cited : 0
    Abstract PDF
    Internet and multimedia technologies are still image compression technology has been recognized as an important technology has evolved, especially the international standard JPEG compression technology is way over the past 10 years has been used in many applications. JPEG is based on the existing high quality still images are a lot of falling apchukbi have drawbacks. This research provides many advantages over traditional JPEG and the new attribute-based transformation of the way Brit JPEG2000 video compression software to stop the development and implementation of the system conforms to conduct a test, and was developed using JPEG2000 compression codec, the stoppage Noise reduction in the City of video compression system that can reduce the suspension to develop a new video compression technology to compress the image using a standard JPEG2000 image when the algorithm to reduce the rate of corruption had to offer hardware design, the process proposed Consider the nature of the way beulrit coefficient of the operation to remove the effects of noise on the image has gained.
  • 12.

    A Study of Digital Hand-Gesture System for Hearing-Impaireds' Communication Friendly

    김진술 | 정두용 | Lee Sang Joon | 2010, 5(2) | pp.97~103 | number of Cited : 0
    Abstract PDF
    There are many studies about communication in the IT market as hearing impairment is given a great deal of weight in society. Especially in the study about sign language recognition that language of the deaf is a more dynamic topic. The purpose of the paper is to make users who have hearing impairment communicate faster through digital hand gesture equipment that can recognize the consonant. The digital hand equipment that uses finger language discriminate close consonants by bending fingers through 5 Flex sensors, direction of hand through 2 Tilt sensors, and 1 FlexiForce sensor. A highly effective consonant application device helps recognize a total of 14 Hangul consonants with in an association of consonants which can find the saved word or sentences and print quickly.
  • 13.

    An Analysis on Actual Usage of ICT Utilizing Education by Elementary Special Class Teacher

    김형수 | Gwon-Woo Yang | 2010, 5(2) | pp.105~112 | number of Cited : 3
    Abstract PDF
    The purpose of this study was to investigate the reality of utilizing ICT teaching․learning material in elementary special class. Analysis measures were elementary special class teachers' recognition on the importance of ICT utilizing education, the degree of using ICT teaching․learning material, level of satisfaction of using materials, types of materials. Special class teachers(71.4%) considered ICT teaching․learning materials essential to conduct ICT utilizing learning. Teachers used various materials, especially korean language(77.9%), web(62.3%). 75.3% of teachers responded development and distribution of ICT materials were urgently necessary. 53.2% of teachers used own materials reconstructed to meet special class student's level and learning contents.
  • 14.

    Teachers' Perceptions on Microblog and its Potential for Education

    Keol Lim | 2010, 5(2) | pp.113~122 | number of Cited : 10
    Abstract PDF
    Microblogs that integrate blogs and instant messaging with smart phones online and offline have a great potential for education through using microblogs' characteristic such as cooperation, collaboration, participation, interaction, group activities, multiple perspectives, and communications. In this study, 80 teachers participated in a class for experiencing microblogs and it was found that they microblogged for various purposes and the analysis of the participants' postings implied that microblogs would play an important role in education with well-designed learning strategies. Some studies already have reported microblogs for classroom tools, school administrative tools, and other various types of tools for educational activities. Therefore, it is required to study the strategies to maximize the effects of microblogs in education.
  • 15.

    Design and Implementation for Home Network Service Detect based on UPnP

    Byoung-Chan Jeon | 김희자 | Lee Sang Jeong | 2010, 5(2) | pp.123~132 | number of Cited : 1
    Abstract PDF
    Ubiquitous computing offers us unobtrusive services by embedding computers to all objects. Home network service is a typical service of the ubiquitous computing. The home network service has to provide for personal services for us according to place and time. The paper designs and implements a service detect technology based on the mobile PDA and UPnP in home network environments. PDA connect with local server located in the home network using Bluetooth. They also detect and use UPnP services and devices connected the local server using UPnP. We construct a home network serve testbed to test our service discovery technology. Also, we implement and test the service detect technology to apply UPnP based on Blutetooth communication.
  • 16.

    Q-STAR Game with A New Number ordered Cube Puzzle Game

    SYUNGOG AN | 2010, 5(2) | pp.133~139 | number of Cited : 2
    Abstract PDF
    This thesis bodies out a simple but challenging fun new game, the Q-Star Game, in JAVA. It may appear to be a simple puzzle game of linking numbers but Q-Star is not one that is easily finished, and therefore challenges the players’ minds. Q-Star game was inspired by a fairly popular offline toy called the cube, which the player must twist and turn the squares that make up the cube until each side is in one color. In Q-Star, instead of colors different numeric digits are used on each of the squares. Difficulty levels start with 3x3 (1-8) and continues on to 4x4 (1-15), 5x5 (1-24), and so on. The player must line up the numbers on each side. This thesis only mentions a two dimensional game which the player only needs to complete one side, but in the development of the next level it is planned to make it into a three dimensional game in which the player must align numbers on all six sides of the cube. As of right now it is merely a PC game but eventually a mobile version will be developed to be used on smart phones with the AnDroid, iPhones, or even regular cell phones. The Q-Star game also depends on luck when deciding which piece to rotate. Also, it only requires small memory space and the rules are simple, making it even more appropriate for cell phones. Even if the players continue to fail, the game will test their instant memory skills and allow them to apply the Trial and Error method and further develop their minds.
  • 17.

    LT Decoding using On the Fly Belief Propagation

    Cheong, Ho Young | 2010, 5(2) | pp.141~147 | number of Cited : 0
    Abstract PDF
    LT codes provide an efficient way to transmit data stream over erasure channels, like Internet. Belief Propagation(BP) algorithm is a fast decoding algorithm for LT codes but for small k it requires a large overhead to decode. In this paper, an efficient decoding algorithm for short k, called On the Fly Belief Propagation(OFB), is proposed. It provides a low decoding complexity while guaranteeing the same overhead with OFG. OFB performs useful processing at each coded packet arrival, so distributing the decoding operations during all packets receptions.