Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Computer and Information
Journal Basic Information
Journal DOI :
Korean Society of Computer Information
Editor in Chief :
Volume & Issues
Volume 13, Issue 7 - Dec 2008
Volume 13, Issue 6 - Nov 2008
Volume 13, Issue 5 - Sep 2008
Volume 13, Issue 4 - Jul 2008
Volume 13, Issue 3 - May 2008
Volume 13, Issue 2 - Mar 2008
Volume 13, Issue 1 - Jan 2008
Selecting the target year
Re-engineering framework for improving reusability of embedded software
Kim, Kang-Tae ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 1~9
Most consumer electronics companies hold numerous line-ups to cope with divergent customer's needs. To cope with current situation, most products are derived from the 'base product' which is developed for brand new features with respect to the change requests. That is called derivation. After 'base code' is developed for newly introduced products, some modification will occur corresponding to the derivative product models. So, quality attributes of 'base code' affects quality and productivity of 'derived code'. But in the middle of continuous modification to 'base code', violation of architectural design decision and unauthorized or maybe unsophisticated change to source code willing to happen and thus it cause critical problem. Those code has 'aging symptom' both architectural and code level in nature. In this paper, we introduced reengineering framework which guide the procedure and tactics to find and fix 'aging symptom' for improvement on quality attribute of 'base code'.
Document Clustering using Term reweighting based on NMF
Lee, Ju-Hong ; Park, Sun ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 11~18
Document clustering is an important method for document analysis and is used in many different information retrieval applications. This paper proposes a new document clustering model using the re-weighted term based NMF(non-negative matrix factorization) to cluster documents relevant to a user's requirement. The proposed model uses the re-weighted term by using user feedback to reduce the gap between the user's requirement for document classification and the document clusters by means of machine. The Proposed method can improve the quality of document clustering because the re-weighted terms. the semantic feature matrix and the semantic variable matrix, which is used in document clustering, can represent an inherent structure of document set more well. The experimental results demonstrate appling the proposed method to document clustering methods achieves better performance than documents clustering methods.
Variable Input Gshare Predictor based on Interrelationship Analysis of Instructions
Kwak, Jong-Wook ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 19~30
Branch history is one of major input vectors in branch prediction. Therefore, the Proper use of branch history plays a critical role of improving branch prediction accuracy. To improve branch prediction accuracy, this paper proposes a new branch history management policy, based on interrelationship analysis of instructions. First of all, we propose three different algorithms to analyze the relationship: register-writhing method, branch-reading method, and merged method. Then we additionally propose variable input gshare predictor as an implementation of these algorithms. In simulation part, we provide performance differences among the algorithms and analyze their characteristics. In addition, we compare branch prediction accuracy between our proposals and conventional fixed input predictors. The performance comparison for optimal input branch predictor is also provided.
A Dynamic Job Relocation Strategy Considering Application's Characteristics in Multiple Grid Sites
Ryu, Kyung-Hoo ; Lee, Woo-Joo ; Jeon, Chang-Ho ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 31~37
In this paper, we propose a dynamic job relocation strategy that considering application's characteristics in multiple grid sites. This scheme classifies application to execute in multiple grid sites by their characteristics : computing intensive application, network intensive application. Also, it eliminates the communication between sites by allocating the network intensive application in single site, thus reducing the total job execution time. But if a number of free nodes to execute the network intensive application aren't found in single site, the proposed scheme the first allocates the network intensive application in multiple sites to minimize network latency. Then if the network intensive application being executed in multiple sites suitable free nodes are found in single site. the proposed scheme relocates the application being executed in multiple sites to another single site. This results in reducing the total job execution time. Through simulation, we show that the proposed dynamic job reallocation strategy improves the performance of Data Grid environment compared with previous strategies.
A Study on the Beam Steering Error Modification method to Adaptive Array System
Lee, Myung-Ho ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 39~44
Wireless channel exists interference by multipath a component. Adaptation array antenna that remove this interference a component forms null point about interference signal and maximizes gains about target signal. If target signal and correlative coherent interference signal are received, there is problem that is removed from arrangement output to target signal. And, adaptation array antenna is shortcoming that is sensitive in directivity error. Therefore, in this paper, introduce each existing algorithm to solve directivity error about coherent interference, and proposed beam forming technique that minimize degree of freedom loss and damage because analyzes the problem and reduces coherent interference and directivity error.
Design of a Remote Meter Reading module considering battery life time
Jeong, Won-Chang ; Gu, Myeong-Mo ; Jang, Sung-Joo ; Kim, Sang-Bok ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 45~50
Meter reading modules, which read the meter and transmit the data to water management offices, can't use the electric wires for their power supply. Therefore, batteries have to be used for meter reading modules and that cause maintenance problems like periodic batteries replacement. To save the maintenance cost, a wireless transmitting solution with less power consumption is required. In This paper, we designed a remote meter reading module, which reads meter automatically with less power consumption of battery by effective management of power source and transmits the reading data using RF.
Place Modeling and Recognition using Distribution of Scale Invariant Features
Hu, Yi ; Shin, Bum-Joo ; Lee, Chang-Woo ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 51~58
In this paper, we propose a place modeling based on the distribution of scale-invariant features, and a place recognition method that recognizes places by comparing the place model in a database with the extracted features from input data. The proposed method is based on the assumption that every place can be represented by unique feature distributions that are distinguishable from others. The proposed method uses global information of each place where one place is represented by one distribution model. Therefore, the main contribution of the proposed method is that the time cost corresponding to the increase of the number of places grows linearly without increasing exponentially. For the performance evaluation of the proposed method, the different number of frames and the different number of features are used, respectively. Empirical results illustrate that our approach achieves better performance in space and time cost comparing to other approaches. We expect that the Proposed method is applicable to many ubiquitous systems such as robot navigation, vision system for blind people, wearable computing, and so on.
The Effect of Children's perception of parenting attitude and learned helplessness on computer game addiction
Kweon, Soon-Hee ; Kweon, Soon-Nyu ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 59~69
The purpose of this study was to investigate children's Perception of parenting attitude parent and learned helplessness on addictive use of computer game. The data was collected through paper-pencils surveys with 745 students who are attending the 4, 5, and 6 grade of three elementary schools. The instrument used to see how they looked at the parenting attitude of their was Ji-hyun Hwang(2006)'s Perceived Parenting Attitude Inventory, Chang-woo Song(1997)'s Learned Helplessness, and Internet Game Addiction Test by developed Korean Agency Digital Apportunity & Promotion. Statistics and methods used for the data analysis were Cronbach'a alpha, freuency, percentage, Two-Way ANOVA, Pearson's Correlation, and Regression by using SPSS WIN 12.0. The results of this study is described as follows. In this study, prevalence of computer addiction tendency and addiction is 14.3%. Male students showed highest computer addiction game than female students.
TV-Anytime Metadata Management System based on a Set-Top Box for Digital Broadcasting
Park, Jong-Hyun ; Kang, Ji-Hoon ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 71~78
Digital Broadcasting serves a variety of broadcasting services for satisfying the requirement of customers. One of main factors for new broadcasting environment is interoperability between providers and consumers. For this interoperability, metadata standards are proposed for the digital broadcasting and TV-Anytime metadata is one of these standards. On the one hand, there are some researches for efficiently managing the broadcasting metadata on Set-Top Box. This paper proposes the metadata management system for efficiently managing the broadcasting metadata based on the STB which is low-cost and low-setting. Our system consists of a storage engine to store the metadata and an XQuery engine to search the stored metadata and uses special index for storing and searching. We expect that our system will keep the interoperability amongst a variety of applications for broadcasting because we adopts the XQuery for searching the metadata and the XQuery is a standard language for searching XML data.
A WWW Images Automatic Annotation Based On Multi-cues Integration
Shin, Seong-Yoon ; Moon, Hyung-Yoon ; Rhee, Yang-Won ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 79~86
As the rapid development of the Internet, the embedded images in HTML web pages nowadays become predominant. For its amazing function in describing the content and attracting attention, images become substantially important in web pages. All these images consist a considerable database. What's more, the semantic meanings of images are well presented by the surrounding text and links. But only a small minority of these images have precise assigned keyphrases. and manually assigning keyphrases to existing images is very laborious. Therefore it is highly desirable to automate the keyphrases extraction process. In this paper, we first introduce WWW image annotation methods, based on low level features, page tags, overall word frequency and local word frequency. Then we put forward our method of multi-cues integration image annotation. Also, show multi-cue image annotation method is more superior than other method through an experiment.
Development of selectable observation point test architecture in the Boundry Scan
Lee, Chang-Hee ; Jhang, Young-Sig ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 87~95
In this paper, we developed a selectable observation Point test architecture and test procedure for clocked 4-bit synchronous counter circuit based on boundary scan architecture. To develope, we analyze the operation of Sample/Preload instruction on boundary scan architecture. The Sample/Preload instruction make Possible to snapshot of outputs of CUT(circuit under test) at the specific time. But the changes of output of CUT during normal operation are not possible to observe using Sample/Preload in typical scan architecture. We suggested a selectable observation point test architecture that allows to select output of CUT and to observe of the changes of selected output of CUT during normal operation. The suggested a selectable observation point test architecture and test procedure is simulated by Altera Max 10.0. The simulation results of 4-bit counter shows the accurate operation and effectiveness of the proposed test architecture and procedure.
Development of a Fall Detection System Using Fish-eye Lens Camera
So, In-Mi ; Han, Dae-Kyung ; Kang, Sun-Kyung ; Kim, Young-Un ; Jong, Sung-tae ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 97~103
This study is to present a fainting motion recognizing method by using fish-eye lens images to sense emergency situations. The camera with fish-eye lens located at the center of the ceiling of the living room sends images, and then the foreground pixels are extracted by means of the adaptive background modeling method based on the Gaussian complex model, which is followed by tracing of outer points in the foreground pixel area and the elliptical mapping. During the elliptical tracing, the fish-eye lens images are converted to fluoroscope images. the size and location changes, and moving speed information are extracted to judge whether the movement, pause, and motion are similar to fainting motion. The results show that compared to using fish-eye lens image, extraction of the size and location changes. and moving speed by means of the conversed fluoroscope images has good recognition rates.
A Routing Protocol for Assuring Scalability and Energy Efficiency of Wireless Sensor Network
Jeong, Yoon-Su ; Kim, Yong-Tae ; Park, Gil-Cheol ; Lee, Sang-Ho ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 105~113
While the wireless sensor network has a strong point which does not have effect on whole activities of network even though neighboring sensor nods fail activities of some sensor nod or make some functions disappear by the characteristic of similar information detection, it has problems which is slowing down of wireless medium, transfer character with severe error, limited power supply, the impossibility of change by optional arrangement of sensor nods etc. This paper proposes PRML techniques which performs the fittest course searching process to reduce power consumption of entire nods while guarantees the scalability of network organizing sensor nods hierarchically. The proposed technique can scatter the load of cluster head by considering the connectivity with surplus energy of nod and reduce the frequency of communication among the nods. As a result of the analysis in comparison with LEACH-C and HEED technique, PRML technique get efficiency of average 6.4% in energy consuming respect of cluster head, efficiency of average 8% in entire energy consuming respect, and more efficiency of average 7.5% in other energy consuming distribution of network scalability than LEACH-C and HEED technique.
Extending VNC Server and Client for Sharing Clipboard Contents Composed of Text and Images
Lee, Tae-Ho ; Lee, Hong-Chang ; Park, Yang-Su ; Lee, Myung-Joon ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 115~126
VNC(Virtual Network Computing) is a desktop sharing system based on the RFB(Remote Framebuffer) protocol which allows you to control a remote computer running a VNC server through a VNC client(or viewer) on a local computer. To exchange information between the two computers, VNC provides the functionality of sharing the clipboard contents. Unfortunately, the current VNC softwares support only the clipboard text contents, not providing methods for sharing the clipboard multimedia contents such as images. In this paper, we extend the RFB protocol to share the clipboard contents composed of text and images. Also, to support the developed protocol. we extend both the UltraVNC server and the JavaViewer VNC client which are free open-source softwares. Through the developed VNC softwares, users can exchange the clipboard contents including texts and images between the remote computer and the local computer.
Cluster-head-selection-algorithm in Wireless Sensor Networks by Considering the Distance
Kim, Byung-Joon ; Yoo, Sang-Shin ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 127~132
Wireless sensor network technologies applicable to various industrial fields are rapidly growing. Because it is difficult to change a battery for the once distributed wireless sensor network, energy efficient design is very critical. In order to achieve this purpose in network design, a number of studies have been examining the energy efficient routing protocol. The sensor network consumes energy in proportion to the distance of data transmission and the data to send. Cluster-based routing Protocols such as LEACH-C achieve energy efficiency through minimizing the distance of data transmission. In LEACH-C, however, the total distance between the nodes consisting the clusters are considered important in constructing clustering. This paper examines the cluster-head-selection-algorithm that reflect the distance between the base station and the cluster-head having a big influence on energy consumption. The Proposed method in this paper brought the result that the performance improved average
when LEACH-C and the base station are located beyond a certain distance. This result showed that the distance between cluster-head and the base station had a substantial influence on lifetime performance in the cluster-based routing protocol.
Heuristics for Selecting Nodes on Cable TV Network
Chong, Kyun-Rak ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 133~140
The cable TV network has delivered downward broadcasting signals from distribution centers to subscribers. Since the traditional coaxial cable has been upgraded by the Hybrid Fiber Coaxial(HFC) cable, the upward channels has expanded broadband services such as Internet. This upward channel is vulnerable to ingress noises. When the noises from the children nodes accumulated in an amplifier exceeds a certain level, that node has to be cut off to prevent the noise propagation. The node selection problem(NSP) is defined to select nodes so that the noise in each node does not exceed the given threshold value and the sum of Profits of selected nodes can be maximized. The NSP has shown to be NP-hard. In this paper, we have proposed heuristics to find the near-optimal solution for NSP. The experimental results show that interval partitioning is better than greedy approach. Our heuristics can be used by the HFC network management system to provide privileged services to the premium subscribers on HFC networks.
A Tree-Based Indexing Method for Mobile Data Broadcasting
Park, Mee-Hwa ; Lee, Yong-Kyu ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 141~150
In this mobile computing environment, data broadcasting is widely used to resolve the problem of limited power and bandwidth of mobile equipments. Most previous broadcast indexing methods concentrate on flat data. However. with the growing popularity of XML, an increasing amount of information is being stored and exchanged in the XML format. We propose a novel indexing method. called TOP tree(Tree Ordering based Path summary tree), for indexing XML document on mobile broadcast environments. TOP tree is a path summary tree which provides a concise structure summary at group level using global IDs and element information at local level using local IDs. Based on the TOP tree representation, we suggest a broadcast stream generation and query Processing method that efficiently handles not only simple Path queries but also multiple path queries. We have compared our indexing method with other indexing methods. Evaluation results show that our approaches can effectively improve the access time and tune-in time in a wireless broadcasting environment.
Adaptive Scanning Scheme for Mobile Broadband Wireless Networks based on the IEEE 802.16e Standard
Park, Jae-Sung ; Lim, Yu-Jin ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 151~159
Mobile broadband wireless network is emerging as one of the hottest research areas due to technical advances, and the demands of users who wish to enjoy the same network experience on the move. In this paper, we investigate the handover process at the medium access control (MAC) layer in an IEEE 802.16e-based system. In particular, we identify problems concerned with the scan initiation Process called cell reselection and propose a received signal strength (RSS) estimation scheme to dynamically trigger a scanning process. We show how the RSS estimation scheme can timely initiate a scanning process by anticipating RSS values considering scan duration required.
A method to compute the packet size and the way to transmit for the efficient VoIP using the MIL-STD-188-220C Radio
Han, Joo-Hee ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 161~167
A method to compute the size of packet and the optimal way to transmit the packets are proposed in this work for the VoIP communication using the MIL-STD-188-220C, military wireless Ad-hoc protocol which is used for the amicable communications of both speeches and data between several radiotelegraph. The expected time of data transmission is estimated beforehand, and then the size of package and transmission method are decided in the consideration of VoIP speech quality for the users as well as the data transmission quality of radiotelegraph.
An Efficient Dynamic Network Security Method based on Symmetric Block Cipher Algorithms
Song, Byoung-Ho ; Yang, Sung-Ki ; Bae, Sang-Hyun ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 169~175
The existing block encryption algorithms have been designed for the encryption key value to be unchanged and applied to the round functions of each block. and enciphered. Therefore, it has such a weak point that the plaintext or encryption key could be easily exposed by differential cryptanalysis or linear cryptanalysis, both are the most powerful methods for decoding block encryption of a round repeating structure. Dynamic cipher has the property that the key-size, the number of round, and the plaintext-size are scalable simultaneously. Dynamic network is the unique network satisfying these characteristics among the networks for symmetric block ciphers. We analyze the strength of Dynamic network for meet-in-the-middle attack, linear cryptanalysis, and differential cryptanalysis. Also, In this paper we propose a new network called Dynamic network for symmetric block ciphers.
An Energy Efficient Data Delivery Scheme based on Cross-Layer Design in Wireless Sensor Networks
Shin, Jong-Whoi ; Kim, Jae-Hyun ; Kim, Seog-Gyu ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 177~184
The design goal of protocols in wireless sensor networks (WSN) is mainly energy efficiency because of their stringent resource and energy constraints. In this paper, we propose a simple cross-layered protocol for WSNs, so called EATD(Energy-Aware Tree based Delivery scheme). EATD is a tree-based energy aware data delivery algorithm by using a SYNC packet with link and node cost to maximize the network lifetime. Our simulation results show significant improvements compared with existing schemes in terms of energy efficiency and delay.
A Design of Weather Ontology for Intelligent Weather Service
Jung, Eui-Hyun ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 185~193
In spite of rapid development of IT-related meteorology and services, human users still ought to check the weather information manually as they did before because traditional weather information retrieval is based on pull-type and human interpretation. Furthermore, the automatic machine-driven weather information processing has been neglected for a long time although the intelligent weather information processing is expected to be very useful for personal daily life and ubiquitous computing. In this paper, we discussed a design of GRIB based ontology to enable smart weather information processing. GRIB is the general purposed and world-wildly used weather data format approved by the World Meteorological Organization. With the designed ontology and the inference system containing Jess engine, several intelligent weather applications have been implemented and tested to verify the virtue of machine-driven weather information processing.
A Study on the Application of the RFID Technology in Textile Industry
Yang, Hyo-Seok ; Kim, Byeong-Chan ; Yang, Dae-Yong ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 195~204
Textile industry of Domestic has beeb confronted with Free Trade, and Regional Trade Blocks. In addition, textile industry market is changing from the provider market-oriented to consumer-driven market. RFID is the core technology to correspond in the these environmental change. In this study, we reviewed characteristic and present condition of domestic textile industry and newest technology aspect of RFID. Also, we suggested application plan of RFID technology in textile industry through the analyzing RFID application case of domestic and outside the country textile industry. More precisely, it is propsed that tracking, inspecting and logistics management of raw materials or yarn in up-stream, and Development hysteresis and process management of textile fabrics in middle-stream sector, theftproofing or returning clothes and providing information of products in down-stream sector, through RFID Technology.
A CASA-Based Dynamic Access Control Scheme for Ubiquitous Environments
Kim, Kyoung-Ja ; Chang, Tae-Mu ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 205~211
Conventional context-aware service models permit the access of resources only by user authentication, but the ubiquitous environments where the context information around users is changing frequently require the resource access control according to the rapid changes. This paper proposes a scheme to control access permission of resource dynamically as context information of user changes. Our access control model is based on traditional CASA (Context-Aware Security Architecture), but can restrict the access of the user already has been authorized. With the real-time checking of context information, our scheme gives different access controls according to changes in environmental information, and provides more secure services than conventional context-aware models.
Development of National Qualification Management System for Performance Improvement based on Real-Time Data Sharing
Chang, Young-Hyun ; Seo, Jeong-Man ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 213~220
The purpose of this paper is to improve efficiency in the construction and operation of a total management system for the national technical qualification through the design and development of a real-time data sharing system which is connected with the management system of external consignment. The current a total management system for the national technical qualification precesses the work depend on information and results which pass over by external IT company. But this method of processing has some unstable elements with regards to information reprocessing, functional supplement, system stability, etc. The proposed system's technological concepts have been tested through a basic simulation pilot program. The pilot program will be expanded to include the local Chamber of Commerce and Industry because the stability of the system was proved through its application to the real-time national technical qualification examination of KCCI(Korea Chamber of Commerce and Industry). The real-time data sharing system has shown great efficiency in terms of system management, and has solved problems of developmental period for information reprocessing and functional supplement. The real-time data sharing system has been given good evaluations with regard to the convenience of their use and the management system for operators and supervisors.
A Study of the Next Generation Ubiquitous Flight Information System and a Design
Park, Wan-Soon ; Yang, Hae-Sool ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 221~230
We Studied current Flight Information System everyone employing, and this paper designed a next generation Ubiquitous Flight Information System. Studied a Ubiquitous Flight Information System regarding AVOD, game TV, cellular phone, cabin Internet use for a customer, and airline and control of Air Traffic Service, Air Traffic Control, in seat reservation, transportation, ticketing and luggage back-tracking and airplanes in earthly service. We Designed for a Next Generation Ubiquitous Flight Information System and for necessary for network security, system security of information security system, and derived from comparative analysis of improvement point and difference to existing Ubiquitous Flight Information System and Next Generation Ubiquitous Flight Information as was based on result of research. Present vision to aerial the result of research world of this paper related industry, and ensure safety and communication efficiency and a customer and flight satisfaction, efficiency, and will reclaim the new horizon to the Flight Information Industry.
Estimating the Determinants of foreign direct investment of korea : A Panel Data Model Approach
Kim, Hee-Cheul ; Shin, Hyun-Dae ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 231~240
In respect complication, group and period, the foreign direct investment of korea is composed of various factors. This paper studies focus on estimating the determinants of foreign direct investment of korea. The region of analysis consist of 7 groups, that is, Asia, Europe, Central and South America, Oceania, Africa, Middle East. Analyzing period be formed over a 67 point(2002. 6
2007. 12). In this paper dependent variable setting up an amount of foreign direct investment, explanatory(independent) variables composed of gross domestic product, a balance of current accounts, the foreign exchange rate, employment to population ratio, an average of the rate of operation(the manufacturing industry), consumer price index, the amount of export, wages(a service industry). For an actual proof analysis, LIMDEP 8.0 software, analysis model is random effect in TWECR The result of estimating the determinants of foreign direct investment of korea provides empirical evidences of significance positive relationships between employment to population ratio and wages(a service industry). However this study provides empirical evidences of significance negative relationships between the foreign exchange rate, censurer price index and the amount of export. The explanatory variables, that is, an average of the rate of operation(the manufacturing industry), gross domestic product and a balance of current accounts, are non-significance variables.
A Study on How to Enhance the Healthiness of UCC Value Chain
Kim, Yoo-Jung ; Yoon, Jong-Soo ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 241~253
UCC(User Created Content) has brought about much change in the way Internet users produce, publish, and share digital content. That means that Internet users are participating in the UCC service much mure voluntarily, and interacting each other mure proactively to meet their social-psychological needs such as self-expression, social presence and so on. Also, there has been the sharp increase in variety and volume of digital content on Internet. The reasons why are that UCC enables Internet users to produce and publish their own content with much low cost, and lowers the entrance barriers to the digital content market. Like this, UCC causes the unbundling of the value chain of digital content, resulting in the high uncertainty and complexity, and then leading to the low healthiness of UCC value chain in terms of productivity, robustness, niche creation, and safety. Thus, this paper is to identify the status and problems of UCC value chain and present the way how to enhance the healthiness of UCC value chain more comprehensively and systematically.
A Study On a point of conclusion time of Electronic Commerce
Park, Jong-Ryeol ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 255~262
It is settled in the economic arena that electronic commerce which used the Internet is new recently by explosive increase of the rapid development and Internet use of the information and communication technology. The problem that is legitimate at a point called the business of the form that the electronic transactions to set together if I drift are new of the times is the situation caused a lot. However, the use custom of construction and electronic transactions of the maintenance that is the legislation thief who can do rules of electronic transactions is the fact that it was not able to be still established It may not be just applied to the Internet electronic transactions that an exchange promise between our characters does against unspecified number of the general public person in the property even if I say that the conclusion of the purchase agreement is concluded in Internet electronic transactions by EDI method. That can have the approval of contract in the main legal problem of such an Internet electronic transactions contract. We civil law sorts it by a contract between the talks characters and a contract between the remote area people and all the adopted children are equal and must decide the formation of contract time in a principle of Empfangstheorie because it may be said that the rule of the civil law that it be heated and decides to be able to be available is irrational.
Study on the Criminal Information System of Police Cooperation Organization between European Nations
Kim, Young-Hwan ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 263~271
This study is about the criminal information system of police cooperation organization between European nations. The criminal information system of police cooperation organization between European nations is the organization created by the sign of the Europol convention in 26 July 1995 and the effectuation in 1 October 1998 for European nations' cooperative confrontation with frequent international terror, international organization crime, drug trafficking, illegal immigrant smuggling, and other critical crimes. From the beginning, this organization established the criminal information system for overcoming the working limits of previous international police organization. This system consists of information system, work file, and index system and enables every national unit or other law enforcement agents to collect, exchange, and utilize the information. Additionally, it try to keep in step with the rapidly change time, such as the integration with CMS, the establishment of correspondence system against cyber crime, and the introduction of biometric database. The criminal information system of the Europol gives important suggestions to the police cooperation organization between nations, besides prevention and suppression against the international crimes in Europe.
A Study for DHRMIS S/W Quantitive Quality Evaluation
Rho, Seung-Dam ; Park, Dea-Woo ;
Journal of the Korea Society of Computer and Information, volume 13, issue 4, 2008, Pages 273~280
This paper is thing for a quantitive quality evaluation in national Defense Human Resource Management Information S/W system development. Apply a quantitive quality evaluation way to be based on an international standard to admonish at ISO/IEC 9126. Proposed 6 basis of count, and set up sub 27 items detailed functionality, reliability, use anger, efficiency, maintenance anger, a transplant result, and inspection of quality table wrote the Matrix measured S/W quality to a chart. Studied a quantitive evaluation plan of a Defense Human Resource Management Information S/W system to see weight by the priority order that reflected a characteristic of a national defense business to a Purpose of a subject user, and Presented. It is 80% in quantitive quality evaluation application satisfied under 8, Very Satisfied 7(87.5%) Satisfied 1(12.5%) of Defense Human Resource Managers and judgment worked as marked so that satisfaction of reliability and a user regarding functionality was high and there will be contribute to an elevation of defense capabilities as analyze efficient national defense S/W use and effect.