Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of the Korea Contents Association
Journal Basic Information
Journal DOI :
The Korea Contents Association
Editor in Chief :
Volume & Issues
Volume 3, Issue 4 - Dec 2003
Volume 3, Issue 3 - Sep 2003
Volume 3, Issue 2 - Jun 2003
Volume 3, Issue 1 - Mar 2003
Selecting the target year
A Research on Evaluation Model for information Search and Analysis Learning in Teaching and Learning using ICT
The Journal of the Korea Contents Association, volume 3, issue 3, 2003, Pages 1~10
In this paper, we research on an evaluation model and method for the teaching and loaming using ICT. There are 8 types information search, information analysis, information guidance, collaboration research, discussion with expert, discussion by the web, pen pal by the web, information production in the teaching and teaming using ICT. we propose an evaluation model and method for information search and information analysis which teachers frequently use. Because an evaluation model and mend for the teaching and learning using ICT doesn’t exist, I expect that the evaluation model and method proposed in this paper is effective in the teaching and loaming using ICT.
The Edge Enhanced Error Diffusion Appling Edge Information Weights
The Journal of the Korea Contents Association, volume 3, issue 3, 2003, Pages 11~18
Error diffusion is a procedure for generating high quality bilevel images from continuous-tone images but blurs the edge information. To solve this problem, we propose the improved method appling edge enhanced weights based on local characteristic of the original images. We consider edge information as local characteristic. First, we produce edges by appling 3
3 sobel operator to the original image. The edge is normalized from 0 to 1. Edge information weights are computed by using sinusoidal function and the normalized edge information. The edge enhanced weights are computed by using edge information weights multiplied input pixels. The proposed method is compared with conventional methods by measuring the edge correlation and quality of the recovered images from the halftoned images. The proposed method provides better quality than the conventional method due to the enhanced edge and represents efficiently the detail edge. Also, the proposed method is improved in edge representation than the conventional method.
Applied Research of Active Network to Control Network Traffic in Virtual Battlefield Environments
The Journal of the Korea Contents Association, volume 3, issue 3, 2003, Pages 19~33
Computer simulation has used to a area of military training from about several years ago. War game mode(or computer simulation) endow a military man with lied training such as combat experience without operating combat strength or capabilities. To sanely construct simulation environment against actual combat environment associate among federates on network. us construct virtual combat environment enabling to efficiently manage network traffic among federates(or active nodes) by using active network technique on virtual military training space such as urgent combat field needed to rapidly transfer combat information including image and video, verify its validity by the help of simulation
Design and Implementation of Order System Based on CTI
The Journal of the Korea Contents Association, volume 3, issue 3, 2003, Pages 34~39
In the 21n century, the internet order system half been developed to maintain convenience along with the development of the high speed internet networks. food order system in any place and at any time we developed internet oder systems that uses the wireless internet terminals(PDA, Pocket PC, etc) or the PC based on CTI system. This paper presents the design and implementation of the internet food order system.
Design of Security Module using Key Exchange Protocol in Digital Contents
The Journal of the Korea Contents Association, volume 3, issue 3, 2003, Pages 40~46
In the paper, designed digital contents security module to check unlawfulness reproduction and distribution of digital contents. This paper applied Diffie-Hellman algorithm that use discrete logarithm and random number as primary for public key application to create encryption key that agree each other through communication channel between DCPS and HOST, and applied Triple DES repeat DES 3 times through 2 different encryption key that is selecting ANSI X9.17 that is key management standard, ISO 8732 and PEM(Privacy-Enhanced Mail) etc. by secondary protection for safe transmission of digital contents in transmission line. Designed security module consist of key exchange module, key derivation module and copy protection processing module. Digital contents security module that design in this thesis checks reproduction and distribution of digital contents by unauthenticated user through user certification function and digital contents encryption function, and protect digital contents transmission line.
Design and Implementation of Embedded LINUX-Based System for Iris Recognition System
The Journal of the Korea Contents Association, volume 3, issue 3, 2003, Pages 47~54
In this paper, we implemented embedded LNUX-based UI(User Interface) board which can be applied to Human Iris recognition product. for this purpose, we also analyzed and designed LNUX operating system and adapted boot loader, kernel, control program modules according to the developed H/W architectures. As the experimental results shows that Iris recognition system is operable and embedded LNUX-based UI board which is connected to heterogeneous system by TCP/IP protocol can both successfully send and receive data this UI board has been able to obtain high performance.
WRR Cell Scheduling Algorithm for Improving Smoothing Scheme
The Journal of the Korea Contents Association, volume 3, issue 3, 2003, Pages 55~62
In this paper, I proposed a new WRR Cell Scheduling algorithm for improving the problem of existing smoothing scheme. in proposed algorithm, when queue of being service VC in present round is emptied, instead VC that difference between assigned weight and length of present buffer is biggest in all VC service. This result efficiency of bandwidth allocation is increased. And above all real-time traffic is serviced, non-real-time to allocate bandwidth of the remainder multimedia-service is possible. In one cycle, number of serviced average cell is increased. And for many eel serviced, length of total Duffer is decreased.
A Scalable Cache Group Configuration Policy using Role-Partitioned Cache
The Journal of the Korea Contents Association, volume 3, issue 3, 2003, Pages 63~73
Today, in exponential growth of internet, the importance of file caching which could reduce the sun load, the volume of network traffic, and the latency of response has emerged. Actually, in one network, the traffic has reduced by using the cache and this means that file caching can improve the internet environment by cost a fraction of link upgrades. In this paper, we address a dynamic cache group configuration policy, to solve the scalable problem. The simulation result shows that the cache group using our proposal policy reduces the latency of response time and it means that out cache group configuration is more scalable than the static cache configuration.
A Study on Design of Location Service Protocol using SDL in the IMT-2000 System
The Journal of the Korea Contents Association, volume 3, issue 3, 2003, Pages 74~84
The Location Service (LCS) feature which provides the terminal UE’s geographical location information has been important issues in IMT-2000 system. The existing location positioning methods are classified into the cell ID based, OTDOA, and network assisted GPS. In this paper, a new hybrid location positioning method which combine three of these methods is proposed. Then the LCS protocol is developed under SDL (Specification and Description Language) development environment after designing a new LCS system architecture and behavior. This protocol design covers the LCS functional model and signaling procedure, system architecture, primitive and data structure, and process SDL diagrams.
A Survey and Comparison of 3D Registration of Brain Images Between Marker Based and Feature Based Method
The Journal of the Korea Contents Association, volume 3, issue 3, 2003, Pages 85~97
Medical tomography images like CT, MRI, PET, SPECT, fMRI, ett have been widely used for diagnosis and treatment of a patient and for clinical study in hospital. In many cases, tomography images are scanned in several different modalities or with time intervals for a single subject for extracting complementary information and comparing one another. 3D image registration is mapping two sets of images for comparison onto common 3D coordinate space, and may be categorized to marker -based matching and feature-based matching. 3D registration of brain images has an important role for visual and quantitative analysis in localization of treatment area of a brain, brain functional research, brain mapping research, and so on. In this article, marker-based and feature-based matching methods which are often used are introduced.
Decreasing of Correlations Among Hidden Neurons of Multilayer Perceptrons
The Journal of the Korea Contents Association, volume 3, issue 3, 2003, Pages 98~102
For elucidating the key role of hidden neurons in information processing of Multilayer perceptrons(MLPs), we prove that the correlation coefficient between weighted sums to hidden neurons decreases under element-wise nonlinear transformations. This is verified through training of MLPs for an isolated word recognition problem. From this result, we can say that the element-wise nonlinear functions reduces redundancy in the information contents of hidden neurons.
Stability of a Generalized Quadratic Functional Equation
Kim, Mi-Hye ; Hwang, In-Sung ;
The Journal of the Korea Contents Association, volume 3, issue 3, 2003, Pages 103~109
Functional equations are useful in the expermental science because they play very important to formulate mathematical moods in general terms, through some not very restrictive equations, without postulating the forms of such functions. In this paper n solve one of a generalized quadratic functional equation (equation omitted) and prove the stability of this equation.