Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Computer and Information
Journal Basic Information
Journal DOI :
Korean Society of Computer Information
Editor in Chief :
Volume & Issues
Volume 1, Issue 1 - Aug 1996
Selecting the target year
A Study on the State Policy for the Development of National Information Infrastructure
Journal of the Korea Society of Computer and Information, volume 1, issue 1, 1996, Pages 7~24
In the emerging information society. a well-established national Information network plays a crucial role In enhancing economic efficiency and creating national wealth. Most of the advanced nations In the world are putting forward government-driven projects for the construction of their national Information Infrastructures. strategically focusing on the development of key technologies and Industrial essential for their Infrastructures. Development of the NII (National Infrastructure) can help unleash an Information revolution that will change forever the way people 1ive, work. and interact with each other. Nonetheless. the present Information Infrastructure In Korea loaves a lot to be Improved In order to realize the vision of Information society. The establishment of the KII (korea Information Infrastructure) does not merely mean the construction of physical network that enables the transmission of various modes of information such as voice, data, and image. It further implies the creation of a new kind of social overhead capital, ranging from the establishment of social and cultural which are conductive to seamless flow of information. For the successful implementation of the KII, it is critical to build the public consensus on the importance and necessity of informatization. At the same time, careful consideration should be given to the institutional factors such as timely and adequate supply of specialized personnel, the updating of policy and regulations, and the strengthening of interntional cooperation.
Performance Analysis of Reliability Based On Call Blocking Probability And Link Failure Model in Grid Topology Circuit Switched Networks
Journal of the Korea Society of Computer and Information, volume 1, issue 1, 1996, Pages 25~36
We have analyzed the reliability of failure models In grid topology circuit switched networks. These models are grid topology circuit_ switched networks. and each node transmits packets to object node using flooding search routing method. We hypothesized that the failure of each link Is Independent. We have analyzed for the performance estimation of failure models It using joint probability method to the reliability of a small grid topology circuit switched network. and compared analytic output with simulated output. Also. We have evaluated the reliability of networks using call blocking Probability occurred in circuit switched networks.
A Study on Hardware Design Technique of Wireless LAN Using Spread Spectrum
Journal of the Korea Society of Computer and Information, volume 1, issue 1, 1996, Pages 37~52
In this paper. we aim at accomplishment of wireless LAN system providing more advanced skills and services by realizing frequency band spread LAN that Is one of the systems on the basis of present IEEE 802.11 standard system. Including BPF. we realized hardware of wireless LAN and CSMA software program. Using this system, we can establish the PC wireless LAN.
A Study On The Adaptive Equalizer Of Coefficient Adjustment In Mobile Communication Systems
Journal of the Korea Society of Computer and Information, volume 1, issue 1, 1996, Pages 53~64
The methods for designing the adaptive filter performing DSP(digital signal processing)functions In mobile communication systems are Least-squares algorithm. Fast-Kalman and adaptive lattice algorithm. Least-squares algorithm It fast convergence algorithm for signal Processor of adaptive equallizer and used for eliminating inter symbol Interference which occur inmultiple path fading channel In mobille communication systems. In this paper. we propose the method of control adjustably algebra characteristics of signal vector that is sampling at some of new data sequence and confirm the improvement of fast convergence and iterative performance speed compared to existing algorithms by computer simulation.
Analysis of Quality Audit Points by the comparison of ISO/CD 9000-3 : 1995 and ISO 9001 : Quality System - Life Cycle Activities
Journal of the Korea Society of Computer and Information, volume 1, issue 1, 1996, Pages 65~82
The assurance of software product. which Is different to other products. is very complex because of Its characteristics. The use of objective development standards or guidelines and the confirmation to meet user's requirements are Important to achieve the software quality system. Moreover correct understanding of qualitv standards and continuous applications of check-points for qualify audit are necessary. ISO 9000 series. which are International standards. were made for the qualify assurance. Among them. ISO 9000-3 is the quality management and quality assurance standards for applying ISO 9001 to the design. development. supply. installation and maintenance of software. The newly revised ISO/CD 9000-3：1995 contains a lot of enforced changes within ISO 9001 framework - quality standards for manufactured products. This paper analyses the revised ISO 9000-3 by comparing it to ISO 9001. and derives quality audit points to use for qualify audit In future.
Computation of Noncentral F Probabilities using Neural Network Theory
Journal of the Korea Society of Computer and Information, volume 1, issue 1, 1996, Pages 83~94
The test statistic in ANOVA tests has a single or doubly noncentral F distribution and the noncentral F distribution is applied to the calculation of the power functions of tests of general linear hypotheses. In this paper. the evaluation of the cumulative function of the single noncentral F distribution is applied to the neural network theory. The neural network consists of the multi-layer perceptron structure and learning process has the algorithm of the backpropagation. Numerical comparisons are made between the results obtained by neural network theory and the Patnaik's values.
Detection of Ellipses using Least Square Method
Journal of the Korea Society of Computer and Information, volume 1, issue 1, 1996, Pages 95~104
The Hough transform Is a robust technique Which Is useful in defecting straight lines in an picture. However, the extension of the conventional Hough transform to recover circles and ellipses has been limited by slow speed and excessive memory .This paper presents a method of detecting ellipses from the Image by using Least Square Method. This method Is reduced calculation cost and memory requirement .When detecting ellipse. Instead of obtaining accumulation of Hough transform for determination of ellipse parameters. particular points containing geometric properties of ellipse are selected. Parameters of the ellipse are calculated by Least Square Method using those particular points.
A Study on Recovery of Design Information Using A Reverse Engineering
Journal of the Korea Society of Computer and Information, volume 1, issue 1, 1996, Pages 105~128
The maintenance cost accounts for over a half of all software costs. Maintenance tools can be used to reduce It. All other maintenance techniques. reverse engineering Is a process of analyzing source code to extract design information and to create representation of it In another form or at the higher level of abstraction. In this thesis. we propose a method to extract the call relationships among programs. the logic structure In program and the data flow of programs iron COBOL source Programs using reverse engineering. We also present a method to generate the structure chart of programs and modules. The structure chart generated from source code provides very important information to understand programs In details. The structure chart modified will be more helpful the maintainer to understand programs when he analyzes them later or others analyze them.
The Improving Method of Characters Recognition Using New Recurrent Neural Network
Journal of the Korea Society of Computer and Information, volume 1, issue 1, 1996, Pages 129~138
In the result of Industrial development. largeness and highness of techniques. a large amount of Information Is being treated every year. Achive informationization. we must store in computer ,all informations written on paper for a long time and be able to utilize them In right time and place. There Is recurrent neural network as a model rousing the output value In learning neural network for characters recognition. But most of these methods are not so effectively applied to it. This study suggests a new type of recurrent neural network to classifyeffectively the static patterns such as off-line handwritten characters. This study shows that this new type Is better than those of before in recognizing the patterns. such as figures and handwritten characters, by using the new J-E (Jordan-Elman) neural network model in which enlarges and combines Jordan and Elman Model.
An data classification and application of psychophyscial scale
Journal of the Korea Society of Computer and Information, volume 1, issue 1, 1996, Pages 139~146
The estimation technique of psychophysical magnitude Is useful tool which measures to subjective feeling or opinion of human. This paper Introduces properties of the measured data, scales(nominal. ordinal. Interval. and ratio scale). and right analyzing methods of the measured data.
The Study for Implementation method of Concurrency Control for DataBase Flow Graphs
Journal of the Korea Society of Computer and Information, volume 1, issue 1, 1996, Pages 147~158
This paper proposed a concurrency control structure based on specialized data flow graphs that was analysed a run-time concurrency control activity to be integrated with the task scheduler Data were viewed as flowing on the arcs from one node to another in a stream of discrete to tokens. The network that Is based upon the Entity-Relationship model, can be viewed a fixed problems used query tokens as a data flow graph. The performance was measured used in the various expriments compared the overall performance of the different concurrency control methods, DBFG (DataBase Flow graphs) scheduling had the knowledge to obtain better performance than 2PL in a distributed environment.
Combination of Evolution Algorithms and Fuzzy Controller for Nonlinear Control System
Journal of the Korea Society of Computer and Information, volume 1, issue 1, 1996, Pages 159~170
In this paper, we propose a generating method for the optimal rules for the nonlinear control system using evolution algorithms and fuzzy controller. With the aid of evolution algorithms optimal rules of fuzzy logic system can be automatic designed without human expert's priori experience and. knowledge. and ran be intelligent control. The approachpresented here generating rules by self-tuning the parameters of membership functions and searchs the optimal control rules based on a fitness value which Is tile defined performance criterion. Computer simulations demonstrates the usefulness of the proposed method In non -linear systems.
The Algrithm Design and System Implementation for Automatic Translation of Stereogram
Journal of the Korea Society of Computer and Information, volume 1, issue 1, 1996, Pages 171~182
This study is, on the design and Implementation of automatic translation (user made pictures, or drawings to 3-dimentional graphics) magic eye system by analyzing and algorithm the principle of the stereogram(so called "magic. eye" ) which Is the another type of stereo images matching method. It was written in C programming language and needs windows 3.1 or higher version of windows. It Is expected to be utilized as acknowledgment tool of 3-dimentional vision and to be use In optalmology as a tool to enhance one's visualpower by general PC user. who are interested In stereogram.tereogram.
A Study on Fuzzy-Rough sets
Journal of the Korea Society of Computer and Information, volume 1, issue 1, 1996, Pages 183~188
Fuzzy sets Introduced by Zadeh is a concept which can process, and reson a vague Information using membership functions. The notion of rough sets introduced by Pawlak is based on the ability to classify. reduce. and perform approximation reasoning for the Indiscernible data.A comparison between fuzzy sets and rough sets has been given In Pawlak where it is shown that these concepts are different and can't combine each other. The purpose of this paper Is to Introduce and define the notion of fuzzy-rough sets which joins the membership function of fuzzy sets to the rough sets.
ON FUZZY SEPARATiON AXiOMS
Cho, Jin-Sun ;
Journal of the Korea Society of Computer and Information, volume 1, issue 1, 1996, Pages 189~194
Several fuzzy separation axioms have been defined and Investigated by many authors. The purpose of this note Is to compare fuzzy T, -axioms due to Ganguly and saha with ones due to Mutton and Reilly.
A Study On The Delayed S Shaped Software Reliability Growth Model
Journal of the Korea Society of Computer and Information, volume 1, issue 1, 1996, Pages 195~210
For predicting the parameters and estimating the goodness of fit reliability growth model based on NHPP(Non Homogeneous Poission Process) among various reliability growth models, a Delayed S Shaped SRGM Tool is designed and Implemented. The Implemented tool is applied to real software error data, and the result Is compared and annalized.