Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of the Korea Contents Association
Journal Basic Information
Journal DOI :
The Korea Contents Association
Editor in Chief :
Volume & Issues
Volume 3, Issue 4 - Dec 2003
Volume 3, Issue 3 - Sep 2003
Volume 3, Issue 2 - Jun 2003
Volume 3, Issue 1 - Mar 2003
Selecting the target year
Usage Analysis of Swearing Words on Web Board and Proposal of Problems Resolution Method
The Journal of the Korea Contents Association, volume 3, issue 4, 2003, Pages 1~10
Recently, usage of swearing words on web board is the most typical Internet negative-functions. For this, technical method is proposed for blocking swearing words or sentences by analyzing swearing words usage types and behaviors. This system consists of 3 steps. Firstly, a survey, analysis of swearing words on web board and algorithm proposal for blocking these words must be studied. Secondly, sufficient and concrete opinion researches about every generations for measuring swearing degree must be accomplished. Finally, implementation on web board by programming will be done. This paper, in the first, deals with usage analysis of swearing and algorithm developement for solving these problems.
A Fast Block Sum Pyramid Algorithm
The Journal of the Korea Contents Association, volume 3, issue 4, 2003, Pages 11~16
In this paper, a Fast Block Sum Pyramid Algorithm (FBSPA) is presented for motion estimation in video coding. PBSPA is based on Block Sum Pyramid Algorithm(BSPA), Efficient Multilevel Successive Elimination Algorithms for Block Matching Motion Estimation, and Fast Algorithms for the Estimation of Motion Vectors. FBSPA reduces the computations for motion estimation of BSPA 29％ maximally using partial distortion elimination(PDE) scheme.
Side-View Fan Detection Using Both the Location of Nose and Chin and the Color of Image
The Journal of the Korea Contents Association, volume 3, issue 4, 2003, Pages 17~22
In this paper, we propose the new side-view face detection method in color images which contain faces over one. It uses color and the geometrical distance between nose and chin. We convert RGB to YCbCr color space. We extract candidate regions of face using skin color information from image. And then, the extracted regions are processed by morphological filter, and the processed regions are labeled. Also, we correct the gradient of inclined face image using projected character of nose. And we detect the inclined side-view faces that have right and left 45 tips by within via ordinate. And we get 92% detection rate in 100 test images.
Adaptive Segment-length Thresholding for Map Contour Extraction
The Journal of the Korea Contents Association, volume 3, issue 4, 2003, Pages 23~28
This paper describes, in order to extract contour from topographic map image, an adaptive segment-length thresholding using a threshold depended on target image. First of all, after recognizing the primary symbols and detecting two edges from the projection histogram of the elevation value area, the threshold value is determined by the distance between the edges. Then, the subdivision is peformed by searching a branch point and erasing its neighboring Hack pixels. And contour components are extracted by segment-length thresholding. The experimental result shows that the final image contains non-contour component of 2.41% and contour one of 97.59%.
An Application of Contract Net Protocol for The Distributed Intrusion Detection
The Journal of the Korea Contents Association, volume 3, issue 4, 2003, Pages 38~47
Distributed problem solving is the cooperative solution of problem by a decentralized and loosely couped collection of knowledge-sources (KS's), located in a number of distinct processor nodes. The contract net protocol has been developed to specify problem-solving communication and control for nodes in a distributed problem solver. Task distribution is affected by a negotiation process, a discussion carried on between nodes with tasks to be executed and nodes that may be able to execute tasks In this paper, we present the coordination method among distributed intrusion detection system and firewall by the contract net protocol. The method enhances the intrusion detection performance and provides the communication methods. To mode IDS and firewall, security models hue been hierarchically constructed based on the DEVS (Discrete Event system Specification) formalism. Each ID agent cooperates through the contract net protocol for detecting intrusions. The IDS which detects the intrusion informs to firewall, so the harmful network traffic is blocked. If an agent detects infusions, the agent transfers attacker's information to a firewall. Using this mechanism attacker's packets detected by In can be prevented from damaging the network.
Detection of Traffic Flooding Attack using SNMP
The Journal of the Korea Contents Association, volume 3, issue 4, 2003, Pages 48~54
Recently it frequently occur that remote host or network device breaks down because of various traffic flooding attacks. This kind of attack is classified an one of the most serious attacks of it can be used to a need of other hackings. This research is gathering system's informations for detecting a traffic flooding attack using the SNMP MIB. We analyze the traffic characteristic applying the critical value commonly used in analytical procedure of traffic flooding attacks. As a result or this analysis, traffic flooding attacks have a special character of its on. The proposed algorithm in this paper would be more available to a previous detecting method and a previous protecting method.
A Call Admission Control Technique of Wireless Networks using Stochastic Petri Nets
The Journal of the Korea Contents Association, volume 3, issue 4, 2003, Pages 55~62
In this paper, a call admission contro(cac) technique is proposed to reduce the dropping probabilities of handoff calls in wireless networks while guaranteeing QoS to the users. The proposed technique is based on the estimated effective load for the target eel if a call is accepted. When the estimated effective load is higher than a predetermined threshold, a nu call is blocked and a handoff call is queued irrespective of the availability channels. The SRN, an extended Stochastic Petri Net, modes are constructed to compare the performance of the techniques. The SRN uses rewards concepts instead of the complicate numerical analysis required for the Markov chain modes. As a result, the SRN modeling techniques provide an easier way to carry out performance analysis for call admission control and channel allocation.
A Development of Sensitivity Measurement for Relations in Communication Network Operation
The Journal of the Korea Contents Association, volume 3, issue 4, 2003, Pages 63~68
This paper is to measure the sensitivity of relations in communication network operation. In order to procure an important adequacy in the network operation and quality improvement, it is necessary to increase network operation efficiency and analyze the characteristic of network operation. Finally, we analyze costing appropriate operation, propose profit increase scheme and apply realistic business. First of all it's important to improve and estimate a proper operating cost thoroughly and comprehensively. Because the important issue of this process is quality process and this quality process occurs customers' satisfaction, therefore, to make a mutual relation in-between individual change of each element is to analyze a reasonable standard. So, for this reason we study on structuring nice moods for network operation and estimating many scenarios for measuring efficiency. Especially those in economic and sensitivity based. It will be the development of analyzing methods which suites the service and communication system. The result of this study gives a basis for making a flexible and highly predictable system by pre configured sensitivity analysis of each scenarios.
3D Face Modeling Using Mesh Simplification
The Journal of the Korea Contents Association, volume 3, issue 4, 2003, Pages 69~76
Recently, in computer graphics, researches on 3D animations have been very active. one of the important research areas in 3D animation is animation of human being. The creation and animation of 3D facial models has depended on animators' manual work frame by frame. Thus, it needs many efforts and time as well as various hardwares and softwares. In this paper, we implements a way to generation 3D human face model easily and quickly just with the front face images. Then, we suggests a methodology for mesh data simplification of 3D generic model.
A Study on the Index to Evaluate the Homepage of Local Governments on the Scope of the Urban Planning Information
The Journal of the Korea Contents Association, volume 3, issue 4, 2003, Pages 77~85
With the rapid development of information and communication technologies(ICTs) and the explosive increasing of inter net users, we can find municipal information in Internet Homepage of local governments without visiting City Hall. And most part of municipal information are related with urban planning and geographic information. In this paper 1try to propose the index to evaluate the sites of urban planning information in the homepage of local governments which are classified 3 Groups. The first group is called information providing and composed with 4 categories and 20 items. The second Group is Communication between local government and citizens with 3 categories (12 items). And the third Group is Internet GIS with 2 categories (8 items). And 1 propose that we have to recognize the internet as the technological media to broaden the opportunities for the community people to participate in the policy-making in reference to their political demands.
Constructing a Nanotechnology Information Supporting System
The Journal of the Korea Contents Association, volume 3, issue 4, 2003, Pages 86~94
This study is about the establishment of an information support system which will provide information for activating national nanotechnology R＆D activities and industrialization. Nanotechnology information support system for collecting, processing, analyzing, disseminating and utilizing informations has been established in cooperation with local and foreign academia, research institutes and industries. The information system including cooperative network with academia and industries is aimed to suggest guidelines for information sharing and direction of R＆D activities and industrialization.
A Study on Information Analysis of Nanotechnology and Contents Development
The Journal of the Korea Contents Association, volume 3, issue 4, 2003, Pages 95~102
He report a systematic method which is useful for the information analysis on technology trends and market status and the construction of analyzed contents for analyzed contents for nanotechnology(NT). For the selection of key subjects, we first surveyed the preliminary demand for items and asked for the opinions of an advisory committee, and implemented the analysis on information and technology trends jointly with internal and external experts. As a result of this study, not only a theoretical method for information analysis is presented, but also a database for the analysis contents is constructed by applying this method. Eventually the national competitiveness for NT is expected to improve by providing these contents to the experts in industry, universities, research institutes and government through internet, publications and CD-ROM.
Convergent Properties of Fuzzy Spheres
Kim, Mi-Hye ; Kim, Tea-Soo ; Kim, Mi-Suk ;
The Journal of the Korea Contents Association, volume 3, issue 4, 2003, Pages 103~110
In this paper, we investigate the properties of fuzzy spheres and estabilish convergence theorems of them. We expect that convergence theorems of fuzzy spheres may be useful for computer graphics and patten recognition.