Korean | English

pISSN : 1975-7700 / eISSN : 2734-0570

2020 KCI Impact Factor : 0.42
Home > Explore Content > All Issues > Article List

2011, Vol.6, No.4

  • 1.

    A Design of Remote Access False-Positive Rate Improvement Model using Trace Route Information and Access Statistics Information

    백현철 | KimSangBok | 김창근 | 2011, 6(4) | pp.1~7 | number of Cited : 1
    Abstract PDF
    Today the company adopts to use all business management at the network base such as internet, intranet and so on for the speed of business. Especially from a new remote access and user coming issue of the rights which an IP spoofing attack using a situation that is almost impossible to detect. Therefore, for a new remote access and authentication of business continuity issues are directly related to the company's reputation. Today's diverse, this paper attempts to connect from a remote access from the attack of the normal user rights issues related to real-time access to a database application for the illegal and decided to make an active response. In addition, normal and abnormal user false positive/negative rate of detection users to connect remotely, reducing the continuity and reliability are guaranteed.
  • 2.

    A Study on Availability Analysis of Server

    정성재 | 오선우 | Sung Kyung and 1other persons | 2011, 6(4) | pp.9~16 | number of Cited : 0
    Abstract PDF
    Interest is elevated about cloud computing lately, System line-up by server virtualization is becoming common method. But the actual circumstance is that to analyze existing operated system server Availability is too insufficient. The availability is closely related to Resource and Load. This paper will set the 5 item as criterion to analyze Resource and Load that is CPU usage, memory usage, Disk I/O, Network bandwidth, Load Average to analyze physically divided operated WAS(Web Application Server), WEB, Database server. It is used that sar for 5 item related status collecting and statistics and for the graphical analysis, ksar will be used. Based on these contents, operated server Resource and Load is analyzed and the knowledge from this is offered as server virtualization basic setup information.
  • 3.

    Smartwork Security Framework with Secure Access Control

    이동범 | 곽진 | 2011, 6(4) | pp.17~26 | number of Cited : 0
    Abstract PDF
    Many organizations’ employees and contractors use enterprise smartwork technologies to perform their tasks from external locations. Most smartworkers use remote access technologies to interface with an organization’s non-public computing resources. The nature of smartwork and remote access technologies generally places them at higher risk than similar technologies only accessed from inside the organization, as well as increasing the risk to the internal resources made available to smartworkers through remote access. Therefore, in this paper, we will analyze security vulnerability that can occur in smartwork environment, then we proposed smartwork framework that provide secure access control.
  • 4.

    Smartcard-based Remote User Authentication Protocol with Improved Security

    박대식 | 곽진 | 2011, 6(4) | pp.27~34 | number of Cited : 1
    Abstract PDF
    Remote user authentication methods has been continuously developed on the basis of the various researches. In 2008, Bindu et al. pointed out that Chien et al.'s protocol has security weaknesses in the man-in-the-middle attack and the insider attack. And then Bindu et al. proposed new protocol. However Bindu et al.'s protocol was found some weaknesses about strong masquerading user/server attack, DoS attack and restricted reply attack. In this paper, we propose an smartcard-based remote user authentication protocol with improved security functions which can remove vulnerabilities of Bindu et al.'s protocol.
  • 5.

    A Study on Extracting Atypical Character Region of Videos using Graph Theory

    Byung Tae Chun | 2011, 6(4) | pp.35~40 | number of Cited : 0
    Abstract PDF
    Most of the existing character region extraction methods have focused on 2D character regions in video. However, there are also a lot of atypical characters in video and natural images, and they often have significant meanings. In this paper, we propose a method to extract atypical character regions using a graph theory. We first perform a preprocessing for character extraction and segments each region. We then obtains atypical character regions from segmented regions by using a graph algorithm. Experimental results show that the suggested system extracts atypical characters effectively.
  • 6.

    Design and Development of 3D Paper Model Game

    이용운 | 이근호 | 김수균 | 2011, 6(4) | pp.41~47 | number of Cited : 0
    Abstract PDF
    he golden age of arcade games was from the late 1970s to the late 1980s, arcade games were still relatively popular during the first half of the 1990s, but the genre maintain in popularity. Arcade games are easy to handle, simple and intuitive control schemes, and rapidly increasing difficulty. This paper propose a 3D paper model game using DirectX library instead of game engines. Memory efficiency and use of various PC is the advantage of this game. Middle age like to comfortably this game.
  • 7.

    Implementation of Video Synchronization Algorithm Using Capture Interval Smoothing

    Kwon Oh-Sung | 2011, 6(4) | pp.49~56 | number of Cited : 0
    Abstract PDF
    When we are making a movie file from screen captures and an audio stream, it happens some inconsistency problem between audio and video streams. The audio stream comes from a sound card equipped at a stand-alone PC, In this paper, we propose a new smoothing algorithm between frame intervals of video stream and audio stream. Our proposed method can control the number of frames of video dynamically to solve the inconsistency of one video and one audio stream. We explain implementation method for the algorithm and experiment the efficiency of AV-Timing. We examined the ratio of inserted frames of resulted video files in a unit time, frame insertion interval and correction ratio, etc. In experimental, we confirmed that our proposed algorithm is the method minimizing the lip-synch AV-Timing problems in recording computer screen and movie making.
  • 8.

  • 9.

    Design of Digital Stage Dress Control System based on IEEE 802.11s

    김진술 | Jang, Byeong-Ok | 2011, 6(4) | pp.67~73 | number of Cited : 0
    Abstract PDF
    In this paper, we design wearable sensor-based digital sensitive dress using LED based on digital show-control system. We use flex sensor to send data at digital emotional textiles which are composed data input, PIC micro chip and Line LED. Also, we use IEEE 802.11s system can make mesh topology, and recover from one AP trouble automatically during the show control. We adapt the mesh network to the wireless performer device, test the wireless network for the realtime show.
  • 10.

    Characterization of Passive Components for Embedded PCB

    Hong,Soon-Kwan | 2011, 6(4) | pp.75~81 | number of Cited : 0
    Abstract PDF
    Capacitors with wrinkle or gap type electrodes are proposed to improve the performance of embedded PCB(Printed Circuit Board). Capacitor with the wrinkle type electrodes represents more higher(about 40%) capacitance density than that of conventional embedded capacitor. And capacitor with gap type electrodes represents resonant frequency of 4GHz but a conventional embedded capacitor just represents resonant frequency of 1GHz. Also it is confirmed that resonant frequency can be changed by the gap size. Capacitor with gap type electrodes in which dielectric gap of 50㎛ showed capacitance density of 55. This value is higher than that of conventional embedded capacitor. Embedded inductor with switching transistors for inductance variation shows good quality factor Q.
  • 11.

    Feature and Countermeasure on Enterprise Crisis through Case Analysis

    Hong Han Kuk | 우보현 | 임광혁 | 2011, 6(4) | pp.83~101 | number of Cited : 3
    Abstract PDF
    The purpose of the paper is to show that we are to present suggestions to prevention the crisis of the companies through the case research of major accidents in the area of Enterprise Crisis Management. The wide range of major accidents were collected from the domestic and foreign companies. The study showed several critical results. First, every crisis harms the company trust seriously. The ‘unethical’ showed the great negative influences followed by accident, natural disaster, rumor and malevolence. Second, appropriate response strategy was helpful for rebuilding brand trust remarkably. Apology was a most effective response to all crises and no response and denial were badly response strategies to all crises. Explanation and justification have effects on natural disaster and unethical crisis. This study helps crisis managers to manage crises effectively when the company want to select proper crisis response strategies.
  • 12.

    Hierarchical Clustering based Personalized Feedback System for Mass Health Examination

    강현경 | 김준우 | 2011, 6(4) | pp.103~112 | number of Cited : 2
    Abstract PDF
    As the living standards have improved, the healthcare becomes a major concern of the people and organizations such as schools and companies. The mass health examination is known to be helpful for early detection of diseases, however, there is a limitation that the examination results are generally used to simply identify specific symptoms and diseases. To make full use of the mass health examination result, this paper proposes an intelligent feedback system which can evaluate the individual risk for symptoms and diseases not identified in the examination results and provide the health-related advices. To this end, the hierarchical clustering analysis, one of the common data mining techniques, is deployed to extract the characteristics of the target examinee group. Our system is applied to analyze the mass dental examination result of high school students.
  • 13.

    The Influencing Factors of Performance in University Information Systems

    강문석 | Chung, Young-Soo | Jung, Chul Ho | 2011, 6(4) | pp.113~123 | number of Cited : 2
    Abstract PDF
    The primary purpose of this study is to examine the influencing factors of performance in university information system. Based on relevant literature reviews, this study posits organizational support, personal characteristics(computer self efficacy), and information system quality as influencing factors of performance. And this study posits user satisfaction, individual impact, and organizational impact as performance of university information system. The major findings from the data analyses are as follows. Firstly, organizational support and computer self efficacy had a positive influence upon information system quality. Secondly, information system quality had a positive influence upon user satisfaction. Lastly, as the relationship of performance variables, user satisfaction had a positive influence upon individual impact, and individual impact had a positive influence upon organizational impact.
  • 14.

    Effect on bone environments by human nervous system

    곽한식 | 이성훈 | 김진희 and 1other persons | 2011, 6(4) | pp.125~132 | number of Cited : 0
    Abstract PDF
    Acetylcholine(ACh) is all ganglionic fiber neurotransmitters in sympathetic nerve and parasympathetic nerve. And which effector cells and synepses released by parasympathetic preganglionic fiber. These the transfer of synapse is called cholinergic. Another Neurotransmiters is called norepinephrine(or noradrenaline) and in transfer of synepses is called adrenergic. Adrenergic stimulation has all the excitability and the inhibitory effect by epinephrine and norepinephrine in the blood, there are α- and β- two major receptor proteins. The two receptors for the neurotransmitter stimulated by drugs that stimulate or block is used as therapy and medical applications, these receptors has been known involved in bone metabolism by the neurotransmitters. Osteoblasts and oasteoclasts has α- and β-adrenoreceptors(β-ARs) that stimulation operate sympathetic nervous system also anabolism and catabolism of bone metabolism showned an effect. However, adrenoreceptor ligands is not known directly involved the osteoblast differentiation and function, there is need for further studies.
  • 15.

    A Study on the Activation Way of Meister High School Using Career Path

    김지연 | 엄기홍 | Lim, Dong Kyun | 2011, 6(4) | pp.133~138 | number of Cited : 0
    Abstract PDF
    In this paper, we present a activation way of Meister High School using career path. Meister High School which produce preparatory meister connecting a promising specialized industry demand is special purpose High school. This career path model forms a matrix form based on career categories and levels, including main causes, and qualifications. Also, the model requires developing and applying standard career steps. The method that this paper presents is thought to be a very successful the activation way of Meister high school since it gives various and precise information to students for their self-developed future plan.
  • 16.

    A Study on the Development of ICT Teaching-Learning Materials based on SNS for Sequence Control

    김강래 | 엄기홍 | Lim, Dong Kyun | 2011, 6(4) | pp.139~144 | number of Cited : 0
    Abstract PDF
    In this paper, We developed an effective ICT teaching-learning materials about sequence control for technical high school students. This developed ICT teaching-learning materials structured and embodied SNS based ICT videos to give easier understanding of the classes. Since this material allows web sites and smart phones to access it, it could be useful as students studies whenever and wherever they want.
  • 17.

    Development and Characteristics of Internet Game Industry in China

    张换兆(Huan-Zhao Zhang) | 김상욱 | 2011, 6(4) | pp.145~152 | number of Cited : 2
    Abstract PDF
    This paper analyses the structure and characteristics of internet game industry in China. Along with the development of IT industry and cultural industry, the internet game industry becomes the new growth industry which lead the economic development. Generally speaking, the online game industry could classifies the internet game industry, mobile game industry and PC game industry. And, the internet game industry is most important industry in the online game industry. In the base of national government and local government policy support, the internet game industry take a good opportunity after 2000. In particular, the growth of the domestic enterprises more rapid than the foreign enterprises after 2005. The domestic internet game enterprises use the Chinese traditional culture concept, developed the game production. The domestic internet game enterprises mainly located in the economic development high level region, as Beijing, Shanghai and Guangdong region. The domestic internet game enterprises mainly use MMORPG pattern. And, in the base of domestic competitiveness, the domestic internet game enterprises entered the foreign game market.
  • 18.

    The Information Processing Technology Developing Procedure of Computer Language in China

    양진영 | Im Jin ho | 2011, 6(4) | pp.153~158 | number of Cited : 0
    Abstract PDF
    The information processing technology in computer language takes language as driving force to program and organize word choice, phrase structure, stress and accent type that the computer can understand, changing knowledge system into artificially intelligented. After machine translation in language caused a problem in 1949, the information processing technology of computer language was officially introduced to China for the first time in 1957. In the mid-1960s, the Cultural Revolution in China had influenced that the information processing technology had to go through the depressing period and could not develop. With the Chinese government's support, nationwide computer language information processing technology society was founded after 1978 and the technology got into the developing phase. Especailly from the mid-80's to the 90's, national standard in China had been organized, and its theory and related system were getting completed. These factors contributed to making a remarkable achievement in the information processing technology of computer language around the 21st century. At this point, China's international status has rapidly increased and the exchange between Korea and China has been vitalized so that the information processing technology of computer language, processing both Korean and Chinese quickly, is urgently required.
  • 19.

    End-to-End Authentication Protocol based on Intelligent Vehicle in M2M

    이근호 | 2011, 6(4) | pp.159~164 | number of Cited : 0
    Abstract PDF
    In the future, machine and device tools will be more improved in the form of a knowledge evolution based smart device using IT(Information Technology). The intelligent machine tools is expected to gather knowledge autonomously by producing knowledge, understanding knowledge and making a new decision with other machine. In this paper, we propose a secure authentication scheme that provides end-to-end authentication protocol based on intelligent vehicle in M2M. We present detailed security threats against intelligent vehicle cluster architecture in M2M.