Korean | English

pISSN : 2092-8114 / eISSN : 2733-4384

2020 KCI Impact Factor : 0.41
Home > Explore Content > All Issues > Article List

2012, Vol.8, No.1

  • 1.

    Software Appraise for Cyber Expo System

    Byung Tae Chun | 2012, 8(1) | pp.1~10 | number of Cited : 0
    Abstract PDF
    We can classify the software appraise into three type such as coping, similarity, completion. In this paper, we introduce the Software Appraise for Cyber Expo System to you. The completion appraise is performed by investigating the contract documents and a field investigation.
  • 2.

    Improvement of SW Maintenance and Operation Cost Estimation Model

    Kwon, Ki Tae | Hyeja Park | 2012, 8(1) | pp.11~21 | number of Cited : 0
    Abstract PDF
    Now at the time in which software industry has become the core of national competitiveness, estimating the accurate budget at the initial phase of software business got recognized as one of the important factors in the success or failure of software business. This paper proposes improved software maintenance and operation cost estimation guideline in order to estimate more accurately after surveying realistic problems. It also defines the task of software maintenance and operation and sets the scope of them. It presents the model for fixed cost to make accurate estimation, which allow the regular task. Furthermore, it proposes the model for variable cost to make rational estimation, which allow the maintenance and문 operation jobs.
  • 3.

    The Needs of the Research Work of the Scope of Copyright Protection for Software Appraisal

    Kim, Si Yeol | 2012, 8(1) | pp.23~31 | number of Cited : 0
    Abstract PDF
    In this paper, it is considered the scope of possible protection in the course of software appraisal in copyright law and needs for further research on what I've seen about. Recently commissioned the software, according to the type of appraisal changes, and legislative changes through the Assessor's role there is a need to change the copyright system with a point on the premises, one of the most important issue regarding the scope of protection is becoming increasingly important. so, this appraisal in order to effectively meet the detailed elements of the protection of computer programs, will be needed review and research of scope.
  • 4.

    Simulation Model for MIPv6 Handover between Interfaces in Multihomed Node

    Ki Jang Geun | 2012, 8(1) | pp.33~40 | number of Cited : 0
    Abstract PDF
    OPNET software has been widely used in network related research area. OPNET supports creation of the custom device model such as a multihomed client but the generated multihomed node model works in gateway mode and can not be used as a MIPv6 host. In this paper, we has developed the simulation model and program code to support MIPv6 handover between interfaces of a multihomed mobile node. Function of the developed program has been verified by simulations under various environments to test MIPv6 handover between interfaces based on different wireless technologies.
  • 5.

    A Complimentary verification of the Object code file

    LEE KYU TAE | 2012, 8(1) | pp.41~48 | number of Cited : 1
    Abstract PDF
    IT device is a hardware system which has special processor and interface modules for it's own function and performance upgrade. On property right verification of these system, there could be a mis-result when they have open source and general known program code by a interface module company. For verifying owner's copyright by object code only, it would be a difficult process to be justify. This paper shows the guideline to keep the property right of owner on the comparison only with object code verification.
  • 6.

    An Investigation of Privacy Information Protection and Security

    Younseo Jeong | 2012, 8(1) | pp.49~56 | number of Cited : 0
    Abstract PDF
    The world has seen an unusual increase in hacking attacks, mostly originating from an increase in malwares activities. And, with the frequent abuse and a leakage of personal information recently the importance of the protection of personal information has been increasingly emphasized. The government enforced the act on the privacy protection in 2011. In this paper, we investigate issue of the act on the privacy protection and relevant technologies and equipments for protection of personal information. Lastly, we present plans for protection of personal information.