Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of the Korea Contents Association
Journal Basic Information
Journal DOI :
The Korea Contents Association
Editor in Chief :
Volume & Issues
Volume 6, Issue 12 - Dec 2006
Volume 6, Issue 11 - Nov 2006
Volume 6, Issue 10 - Oct 2006
Volume 6, Issue 9 - Sep 2006
Volume 6, Issue 8 - Aug 2006
Volume 6, Issue 7 - Jul 2006
Volume 6, Issue 6 - Jun 2006
Volume 6, Issue 5 - May 2006
Volume 6, Issue 4 - Apr 2006
Volume 6, Issue 3 - Mar 2006
Volume 6, Issue 2 - Feb 2006
Volume 6, Issue 1 - Jan 2006
Selecting the target year
A New PAPR Reduction Methods in OFDM by Combining SLM and PTS
Kee Jong-Hae ; Kim Myoung-Je ; Ryu Jeong-Woong ; Kim Sung-Soo ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 1~7
This paper proposes a new method that reduces the complexity of the combined system, which consists of the selective mapping(SLM) and the partial transmit sequence(PTS) in the Orthogonal Frequency Division Multiplexing(OFDM). In order to reduce the Peak-to-Average Power Ratio(PAPR), many techniques have been developed such as SLM and PTS. and their combined systems. However the method that simply combines PTS and SLM to improve the effectiveness of a system increases the complexity of calculation. The scheme employed in this research suggests a system that combines PTS and SLM reducing the complexity via the N(
)-point inverse fast Fourier transforms(IFFT), which uses the decimation in time domain not only to improve PAPR but also to reduce the amount of calculation. The proposed method reduces the complexity by multiplying a phase sequence and a subblock index to the data sequences in the middle of IFFT, which yields an optimal sequence with minimal PAPR. The superiority of the proposed method is demonstrated by simulation results and analysis.
Implementation of an Automatic Door Lock System Using DTMF Signal of a Mobile Phone
Bae Ki-Won ; Yang Doo-Yeong ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 8~13
In this thesis, an automatic door lock system using a dual tone multiple frequency(DTMF) signal generated as pushing the key button of mobile phone is proposed and implemented. This system consists of a transmitter module and a receiver module for processing the DTMF signal of mobile phone. The DTMF signal of mobile phone connected with ear-phone jack enter into the input terminal of DTMF receiver and those are encoded by a code-converter with 4-bits binary format in the DTMF receiver. The encoded output signals are transmitted to the amplitude shift keying(ASK) modulator of transmitter module and the modulated ASK signals which are converted into radio frequency(RF) signals propagate in a free space. The RF signals passed through a free space are demodulated by the ASK demodulator of receiver module and the demodulated ASK signals are sent to a micro-controller unit(MCU). The output signals processed by the MCU are compared with the secreted identification number which is prerecorded in a microprocessor and are transferred to a power relay. If the result is the same, the automatic door lock system opens a door. In the opposite case, it maintains closing the door. The implemented automatic door lock system operates well in mobile environments.
A Design of A Dynamic Configurational Multimedia Spreadsheet for Effective HCI
Jee Sung-Hyun ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 14~22
The multimedia visualizational spreadsheet environment is shown to be extremely effective in supporting the organized visualization of multi-dimensional data sets. In this paper, we designed the visualization model that consists of the configurational 2D arrangement of spreadsheet elements at run time and each spreadsheet element has a novel framestack. As the feature, it supports 3D data structure of each element on the proposed model. It enables the visualization spreadsheet 1) to effectively manage, organize, and compactly encapsulate multi-dimensional data sets, 2) to reconfigure cell-structures dynamically according to client request, and 3) to rapidly process interactive user interface. Using several experiments with scientific users, the model has been demonstrated to be a highly interactive visual browsing tool for 2D and 3D graphics and rendering in each frame.
A Study for Determining the Best Number of Clusters on Temporal Data
Cho Young-Hee ; Lee Gye-Sung ; Jeon Jin-Ho ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 23~30
A clustering method for temporal data takes a model-based approach. This uses automata based model for each cluster. It is necessary to construct global models for a set of data in order to elicit individual models for the cluster. The preparation for building individual models is completed by determining the number of clusters inherent in the data set. In this paper, BIC(Bayesian Information Criterion) approximation is used to determine the number clusters and confirmed its applicability. A search technique to improve efficiency is also suggested by analyzing the relationship between data size and BIC values. A number of experiments have been performed to check its validity using artificially generated data sets. BIC approximation measure has been confirmed that it suggests best number of clusters through experiments provided that the number of data is relatively large.
Silhouette-based Gait Recognition Using Homography and PCA
Jeong Seung-Do ; Kim Su-Sun ; Cho Tae-Kyung ; Choi Byung-Uk ; Cho Jung-Won ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 31~40
In this paper, we propose a gait recognition method based on gait silhouette sequences. Features of gait are affected by the variation of gait direction. Therefore, we synthesize silhouettes to canonical form by using planar homography in order to reduce the effect of the variation of gait direction. The planar homography is estimated with only the information which exist within the gait sequences without complicate operations such as camera calibration. Even though gait silhouettes are generated from an individual person, fragments beyond common characteristics exist because of errors caused by inaccuracy of background subtraction algorithm. In this paper, we use the Principal Component Analysis to analyze the deviated characteristics of each individual person. PCA used in this paper, however, is not same as the traditional strategy used in pattern classification. We use PCA as a criterion to analyze the amount of deviation from common characteristic. Experimental results show that the proposed method is robust to the variation of gait direction and improves separability of test-data groups.
An Adaptive ROI Detection System for Spatiotemporal Features
Park Min-Chul ; Cheoi Kyung-Joo ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 41~53
In this paper, an adaptive ROI(region of interest) detection system for spatialtemporal features is proposed. It utilizes spatiotemporal features for the purpose of detecting ROI. It is assumed that motion representing temporal visual conspicuity between adjacent frames takes higher priority over spatial visual conspicuity. Because objects or regions in motion usually draw stronger attention than others in motion pictures. In case of still images visual features that constitute topographic feature maps are used as spatial features. Comparative experiments with a human subjective evaluation show that correct detection rate of visual attention region is improved by exploiting both spatial and temporal features compared to the case of exploiting either feature.
Workflow Oriented Domain Analysis
Kim Yun-Jeong ; Kim Young-Chul ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 54~63
In this paper we will propose a domain analysis methodology that uses an extended workflow mechanism based on dynamic modeling to solve problems of a traditional domain analysis on legacy systems. This methodology is called WODA(Workflow Oriented Domain Analysis). Following procedures on WODA, we can identify common/uncommon component, and also extract the cluster of components. It will be effectively reusable on developing new systems with these components. With our proposed component testing metrics, we can determine highly reusable component/scenario on identifying possible scenarios of the particular system. We can also recognize most critical/most frequent reusable components and prioritize possible component scenarios of the system. This paper contains one application of UPS that illustrates our autonomous modeling tool, WODA.
A Research on the Intelligent E-mail System Using User Patterns
Lim Yang-Won ; Lim Han-Kyu ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 64~71
Electronic mail (E-mail) is an integral part of communication for the recent Internet users. However, e-mail has also come to serve as a means to support flood of unwanted spam mails and junk mails having bad purposes. This paper was conducted in order to develop an intelligent e-mail system using user behavior pattern that can prevent these unnecessary information and enable the user to enjoy communication via e-mail in a cleaner environment. The concentrated analysis of the user behavior in terms of using e-mail functions has resulted in better classification between unnecessary and necessary information, thereby facilitating faster disposal of spam mails.
The Collision Processing Design of an Online Distributed Game Server
Lee Sung-Ug ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 72~79
Recently, a MMORPG(Massively Multi-play Online Role Playing Game) has built distribute server by Seamless world. This paper proposes an efficient collision detection method. DLS is used to dynamically adjust spatial subdivisions in each the boundary regions of distribute server We use an index table to effectively utilize the relationships between in the nodes and can perform the collision detection efficiently by reconstructing nodes of the tree. Also, we maintain the information for the boundary region to efficiently detect the collections and adjust the boundary regions between distributed servers by using DLS. As the DLS uses pointers, the information for each server is not needed and the boundary regions between the distributed servers are efficiently searched. Using node index points, the construction table can be made to find between ray and neighborhood node, In addition, processes for Network traffic reduce because a copy of the boundary regions is not needed when a object moves with realtime.
Cluster Reduction by Korean EFL Students: Insertion vs. Deletion Strategies
Cho Mi-Hui ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 80~84
Motivated by the fact that cluster reduction strategies such as inserting a vowel or deleting a consonant in resolving English complex clusters differ depending on studies, this paper investigates the repair strategies employed by Korean EFL students. A total of 60 college students participated in the present study and the participants' production of English voiceless word-initial and word-final clusters was measured using the materials designed for this study. It has been shown that prosodic positions such as onset and coda and the number of cluster sequences influenced cluster reduction strategies. The error rates of both insertion and deletion were noticeably higher in the coda position than in the onset position and both insertion and deletion error rates were higher in triconsonatal cluster than in biconsonantal cluster sequences. Overall, the insertion rate was higher than the deletion rate. However, the deletion rate was significantly higher than the insertion rate in triconsonantal coda cluster sequences. Because of this, the deletion rate was higher than the insertion rate for triconsonantal cluster sequences across onset and coda. Also, the high deletion rate of triconsonantal coda clusters contributed to the high deletion rate for the coda clusters in general.
The Statute of the International Criminal Court of the Control Crime Due to the Regulation Coat Investigators of ICC
Yoo In-Chang ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 85~92
It seems extremely incongruous that genocide, crimes against humanity and war crimes could ever be justified or excused by 'defensive force'- self-defence, defence of others and defence of property. Nonetheless, art 31(1)(c) of the Rome Statute of the International Criminal Court codifies defensive force as a ground for excluding criminal responsibility. This provision was controversial and extremely difficult to negotiate at the Rome Conference of 1998, largely due to the conceptual differences that exist in respect of criminal defences between the various domestic legal systems of the world. This paper analyses the drafting history and wording of art 31(1)(c) in order to clarify the precise scope of defensive force under the Rome Statute. It then seeks to ascertain the applicability of the provision to genocide, crimes against humanity and war crimes, and to thereby explore the nature of these crimes and the intended prosecutorial strategy of the International Criminal Court.
A Study on the Characteristic Points of the Tourism Resources on the Historical Sites -In case of Kyungju and Kyoto-
Chun Myung-Sook ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 93~101
The purpose of this research is to verify what are the characteristic points of the tourism resources in the historical sites and what kind of factors can roll as the tourism resources in two old cities, Kyungju and Kyoto, Those two old cities are the oldest cities in the world and they have several world cultural heritages that registered by UNESCO. In Old historic cultural sites has its own tourism resources factors and characters such as Uniqueness, Authenticity, Historical character, Regional character, Art factor, Religious factor,
Empirical Approach to Marketing Research on the Quality Control of F&B in Hotels
Choi Seung-Kuk ; Lim Bum-Jong ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 102~113
This article presents the results of empirical studies on the Quality of F&B parts in Hotel services. The main aim is to describe and analyze service breakdown from the customer's point of view and thus create a basis for quality management. The aim is also to find out maximizing factors of sales volume with profit in hotel F&B parts based on the serving systems of F&B items, quality control, change and innovation. The results of the study show statistically significant differences between the each F&B parts in term of quality of foods, location of restaurant, service inconvenience condition, variety of menu, teamwork of empolyees, educational programme, hotel internal culture, etc. Marketing and management implications for effective targeting the market segments are discussed.
Similar Trajectory Store Scheme for Efficient Store of Vehicle Historical Data
Kwak Ho-Young ; Han Kyoung-Bok ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 114~125
Since wireless Internet services and small mobile communication devices come into wide use as well as the use of GPS is rapidly growing, researches on moving object, whose location information shifts sequently in accordance with time interval, are being carried out actively. Especially, the researches on vehicle moving object are applied to Advanced traveler information system, vehicle tracking system, and distribution transport system. These systems are very useful in searching previous positions, predicted future positions, the optimum course, and the shortest course of a vehicle by managing historical data of the vehicle movement. In addition, vehicle historical data are used for distribution transport plan and vehicle allocation. Vehicle historical data are stored at regular intervals, which can have a pattern. For example, a vehicle going repeatedly around a specific section follows a route very similar to another. If historical data of the vehicle with a repeated route course are stored at regular intervals, many redundant data occur, which result in much waste of storage. Therefore this thesis suggest a vehicle historical data store scheme for vehicles with a repeated route course using similar trajectory which efficiently store vehicle historical data.
A Study on the Trends of the U-City Development and Its Direction in the Local Governments
Lim Young-Taek ; Choi Bong-Moon ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 126~136
This paper intended to observe the present state of the U-City development in local governments and to present the basic view-point to carry out it in the context of total urban area. Also, this paper has a meaning to present a fundamental perspective for making plan to go on the U-City development. For this reason, it was investigated on the concept of 'Ubiquitous', the related technologies to realize the U-City, the related policies for 'Ubiquitous' in the central government, and the circumstances of the U-City development in the local government. Finally, on developing the U-City in local government, this paper presented its developing direction in the context of the whole urban structure and in the relation with the developed urban areas.
Access Control of Content Package by Using XML Subject-based Encryption
Cho Kwang-Moon ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 137~142
As a large quantity of information is represented in XML format on the web, there are increasing demands for XML security. Until now research on XML security has been focused on the security of data network using digital signature and encryption technology. As XML data become extensive and complex, however, XML security comes to involve not only network security but also managerial security. But XML encryption support only simple network security. So it cannot support multiple users and multiple access control policy. In this paper, we propose an integration method of encryption and access control policy for securing XML documents. This methodology can support multiple authorization of multiple users with integrating access control.
User Identification System Based on Iris Information Using a Mouse
Kim Sin-Hong ; Rho Kwang-Hyun ; Moon Soon-Hwan ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 143~150
Recently, the fields such as internet banking and electronic commerce are more and more growing due to the growth of practical use of personal computer and the progress of communication technology, So importance of information security has been increased. In fact, traditional identification systems are inherently insecure because the personal identification information can be forgotten, stolen or lost. In this paper, we propose an identification system that can decide whether the user is registered based on iris information using a mouse. The proposed system is mounted a CCD camera and an illumination device on general type mouse. Then it decides whether the user is registered after the acquired image are processed and analyzed. This system gives a PC user the advantage of low-cost and convenience without necessity preparing high-cost equipment for biometrics when using a identification system.
The Scheme for Generate to Active Response Policy in Intrusion Detection System
Lee Jaw-Kwang ; Paek Seung-Hyun ; Oh Hyung-Geun ; Park Eung-Ki ; Kim Bong-Han ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 151~159
This paper studied active response policy generation scheme in intrusion detection system. We considered seven requirements of intrusion detection system for active response with components as the preceding study We presented the scheme which I can generate signature with a base with integrate one model with NIDS and ADS. We studied detection of the Unknown Attack which was active, and studied scheme for generated to be able to do signature automatically through Unknown Attack detection.
A Study on Control Flow Analysis Using Java Bytecodes in CTOC
Yoo Weon-Hee ; Kim Ki-Tae ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 160~169
This paper describes the data structure for program analysis and optimization of bytecode level. First we create an extended CFG(Control Flow Graph). Because of the special properties of bytecode, we must adaptively extend the existing control flow analysis techniques. We build basic blocks to create the CFG and create various data that can be used for optimization. The created CFG can be tested for comprehension and maintenance of Java bytecode, and can also be used for other analyses such as data flow analysis. This paper implements CTOC's CTOC-BR(CTOC-Bytecode tRanslator) for control flow analysis of bytecode level. CTOC(Classes To Optimized Classes) is a Java bytecode framework for optimization and analysis. This paper covers the first part of the CTOC framework. CTOC-BR is a tool that converts the bytecode into tree form for easy optimization and analysis of bytecode in CTOC.
Hybrid-Watermarking for DWT Based Authentication and Detection of Image Modification
Kim Dong-Seo ; Joo Nak-Keun ; Kang Tae-Hwan ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 170~178
In this paper, the hybrid-watermarking method to make it possible to the authentication, modification detection and copyright protection of the digital image was proposed. After the original image is transformed by the DWT(Discrete Wavelet Transform), the encrypted watermark information is embedded into the LSB(Least Significant Bit) of LL band on the low frequence domain for authenticating and detecting modified position in the image. And watermark information is embedded by exchanging the wavelet coefficient for the copyright protection. Thereby, we can authenticate the modification and detect the modified location by extracting the values of LSB on the low frequence domain. And we can perceive the copyright information of original image by extracting the embedded watermark on the high frequence domain.
Design of a Forecasting Model for Customer Classification in the Telecommunication Industries
Lee Byoung-Yup ; Joh Kyu-Ha ; Song Seok-Il ; Yoo Jae-Soo ;
The Journal of the Korea Contents Association, volume 6, issue 1, 2006, Pages 179~189
Recently, according to the development of computer technology, a large amount of customer data have been stored in database. Using such data, decision makers extract the useful information to make a valuable plan with data mining. In this paper, we design a forecasting model that classifies the exiting customers in the telecommunication industries using the classification rule, one of the data mining technologies. In other words, this paper builds a model of customer loyalty detection and analyzes customer patterns in mobile communication service market with data mining using neural network and regression methods. This model improves the relationship of customers and enterprises. As a result, the enterprise creates the profits from many customers and the customer receives more benefits from the enterprise.