Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Computer and Information
Journal Basic Information
Journal DOI :
Korean Society of Computer Information
Editor in Chief :
Volume & Issues
Volume 6, Issue 4 - Dec 2001
Volume 6, Issue 3 - Sep 2001
Volume 6, Issue 2 - Jun 2001
Volume 6, Issue 1 - Mar 2001
Selecting the target year
Design of serializability Algorithm for Concurrency Control of Multi Transaction in Database
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 1~7
The database development is in need or transaction management composed of operations about data, efficiency database management and security of information data in necessity of as well as the new thinking about data security. When users approach data, transaction concurrency is controlled by the users security authentication and security level of data. So, existing secure algorithm occurred the problems which don't satisfy serializability of high level transaction which is delayed high level transaction repeatedly by the low level transaction, because existing secure algorithm is focused on the part which removes the security channel. Therefore this proposed algorithm which prevents waste of resource from the high level transaction reexecution and delay by stopping serializability offense problem by the increase of efficiency of concurrency control.
Design and Implementation of Dermatology
Kim, Whi-Young ;
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 8~13
We demonstrate a pulsed CO
laser with long pulse duration of millisecond order in the low pressure less than 30 Torr. A new power supply for our laser system switches the voltage of AC power line(60㎐) directly. The power supply doesn't need elements such as a rectified bridge, energy-storage capacitors. and a current-limiting resistor in the discharge circuit. In order to control the laser output power, the pulse repetition rate is adjusted up to 60㎐ and the firing angle of SCR gate is varied from 30˚ to 150˚. A ZCS(Zero Crossing Switch) circuit and a PIC one-chip microprocessor are used to control the gate signal of SCR precisely. The maximum laser output is 23W at the total pressure of 18 Torr, the pulse repetition rate of 60㎐, and SCR gate firing angle of 90˚. In addition, the obtained laser pulse width is approximately 3㎳(FWHM)
A method of extracting edge line from range image using recognition features
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 14~19
This paper presents a new method of 3-D surface feature extraction using a quadratic pol expression. With a range image, we get an edge map through the modified scan line technique this edge map, we label a 3-dimensional object to divide object's region and extract cent corner points from it's region. Then we determine whether the segmented region is a planar or a curved from the quadric surface equation. we calculate the coefficients of the planar su the curved surface to represent regions. In this article. we prove performance of the metho synthetic and real (Odetics) range images.
A Processing Technique for the Condition Using Characteristic of the Active Rule
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 20~26
The research into the conditions of the active rules is a very important element in the enhancing of the performance of the active database, and the processing time of the calculation generated from the conditions must be minimized in order to improve performance. In this paper, we propose the conditions processing system with the preprocessor which determines the delta tree structure and constructs the classification tree. Due to the characteristics of the active database through which the active rules can be comprehended beforehand. the preprocessor can be introduced. In this paper, the delta tree and classification tree which can effectively Process the join and selection operations instead of the delta relation is proposed. enhancing the condition evaluation performance.
Selective Redo recovery scheme for fine-Granularity Locking in Database Management
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 27~33
In this thesis, we present a simple and efficient recovery method, called ARIES/SR(ARIES/Selective Redo) which is based on ARIES(Algorithm for Recovery and Isolation Exploiting Semantics) ARIES performs redo for all updates done by either nonloser transaction or loser transaction, and thus significant overhead appears during restart after a system failure. To reduce this overhead, we propose ARIES/SR recovery algorithm. In this algorithm, to reduce the redo operations, redo is performed, using log record for updates done by only nonloser transaction. Also selective undo is performed. using log record for update done by only loser transaction for reducing recovery operation.
Deadlock Detection Scheme in Distributed Database Systems
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 34~40
This thesis shows that the edge-chasing deadlock detection algorithm of Choudhary fails to remove the existing deadlocks after committing the transaction whose priority is lowest on the transaction wait-fer path. A modified algorithm that solves this problem is proposed.
The Moving Object Detection Of Dynamic Targets On The Image Sequence
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 41~47
In this paper, I propose a detection algorithm that can reliably separate moving objects from noisy background in the image sequence received from a camera at the fixed position. The proposed algorithm consists of four processes: generation of the difference image between the input image and the reference image. multilevel quantization of the difference image, and multistage merging in the quantized image, detection of the moving object using a back propagation in a neural network. The test results show that the proposed algorithm can detect moving objects very effectively in noisy environment.
An Adaptive Search Strategy using Fuzzy Inference Network
Lee, Sang-Bum ; Lee, Sung-Joo ; Lee, Mal-Rey ;
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 48~57
In a fuzzy connectionist expert system(FCES), the knowledge base can be constructed of neural logic networks to represent fuzzy rules and their relationship, We call it fuzzy rule inference network. To find out the belief value of a conclusion, the traditional inference strategy in a FCES will back-propagate from a rule term of the conclusion and follow through the entire network sequentially This sequential search strategy is very inefficient. In this paper, to improve the above search strategy, we proposed fuzzy rule inference rule used in a FCES was modified. The proposed adaptive search strategy in fuzzy rule inference network searches the network according to the search priorities.
A Study on optimized design for automated operation of gate complex in port
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 58~64
The quantity of container transportation of the world harbors is constantly increasing by 8.8％ per year until 2011. present port facilities will not satisfy it. So facility expansion is necessary. Because the processing cost in the harbor becomes to 30％ of total transportation expense, major ports in the world are making an effort in the automation facilities to solve the problems of higher labor costs and insufficient labor and to maximize the efficiency of the work and use of the land. Especially, the automation of the gate, which is the place of cargo's appearance and disappearance, the node which creates the information. is now rising as the important issue. In this study suggests more efficient design for port gate automation.
Edge Detection in Color Image Using Color Morphology Pyramid
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 65~69
Edge detection is the most important process that belongs to the first step in image recognition or vision system and can determine the efficiency valuation. The edge detection with color images is very difficult. because color images have lots of information that contain not only general information representing shape, brightness and so on but also that representing colors. In this paper, we propose architecture of universalized Color Morphological Pyramids(CMP) which is able to give effective edge detection. Image pyramid architecture is a successive image sequence whose area ratio 2
-1/(ι= 1, 2, . . . ,N) after filtering and subsampling of input image. In this technique, noise removed by sequential filtering and resolution is degraded by downsampling using CMP in various color spaces. After that, new level images are constructed that apply formula using distance of neighbor vectors in close level images and detection its image.
Implementation of Secure POS SYSTEM
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 70~77
This paper focuses on the design and implementation of the secure POS SYSTEM We propose a secure POS SYSTEM with RSA, MD5, Triple-DES for security and with RBAC model for access control. The client authentication is implemented before the data transferred be4ween client and server in proposed POS SYSTEM. We apply security algorithms with it, so that it can maintain confidentiality and integrity In addition. we apply RBAC model for access control of data. We verified the proposed system's stability by applying the proposed system to real works.
The Design and Implementation of Internet Messaging System(XML/EDI System) with based on Java
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 78~83
In this paper. I design and implement The Internet Messaging System(XML/EDI System), that is able to transform to user requested format as registering mapping script even though it was transferred any formatted message. Also, This system is able to easily migrate the existed Legacy System(ERP, MIS. etc). As basic service. I implement message sending message receiving, message retrieval, and mapping in Client system. And I support EDI, XML. DB. HTML that is selected among various message format.
Performance Analysis of Multi-Link Switching Method with Concurrent Processing Function
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 84~89
In this paper, an improved protocol of Multi-Link Switching Method is proposed by supplementing a concurrent processing function. This protocol is proposed to complement the shortcomings of the conventional Multi-Link Switching Method which is used for the medium access in LAN. We analyzed the improved protocol in channel utilization viewpoint and compared the result with that of the conventional protocol From this result, we showed that the channel utilization of the improved protocol is superior to that of the conventional protocol when the maximum normalized propagation delay is increased.
A Design of Block Cryptosystem using Multiple Nonlinear S-box Function
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 90~96
The development of network and the other communication-network can generate serious social problems. So. it is highly required to control security of network. These problems related security will be developed and keep up to confront with anti-security part such as hacking. cracking. In this paper. the proposed multiple nonlinear S-box function which is capable to cipher regardless of key distribution or key-length for these definite problem is proposed and designed in hardware. The proposed multiple nonlinear S-box function increase secret level from using a nonlinear function in multiply for key data utilized in cryptography that generates MDP and MLP in maximum is proposed to prevent cryptography analysis. The designed the multiple nonlinear S-box function in this paper performed synthesization and simulation using Synopsys Ver. 1999.10 and VHDL
A study on the middleware integrated home networking with policy-based network on the Internet.
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 97~100
Home network can be recently communicated with many various devices. but It has complications of the communication of devices. So the methods that can manage the devic integrate them are being developed in home networking And. there are lacks of the consid to provide users with QoS in home networking. Therefore, this paper describes the middlew can integrate home network with policy-based network for the purpose of supporting QoS.
Analysis of the APS protocol for BSHR/2 networks
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 108~115
SDH-based SHR networks are the reconfiguration process in case of failure and APS protocol used. In this study, addresses the maximum allowed recovery time in two fiber bidirectional networks. We analyse the APS protocol and derive the Processing time domains of each n order to cope with the maximum reconfiguration time of 50㎳, as specified in the ITU-T standard. We finally analyze the interleaved failures. One is the signal degrade then the signal failure, the other is the signal failure then the signal failure. Any case analysis is carried out. reconfiguration time can be guaranteed.
Multicast Secure Architecture based on PIM-SM
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 116~122
A conventional multicast secure protocol. MVMRP, CBT is designed for a large scaled r protocol so the PIM-SM (protect Independent Multicst-Sparse Mode) routing protocol which small number of clients, long distance path among the hosts and shortest path routing chara weak point of require it's own Core tree and re-keying when the traffic is pass through the ro In this study, proposes a architect for a licit information secure of join/leave to all the user or on-service user. With proposed architect, subgroups for multicast secure group mana will be divided by RP (Rendezvous-Point) unit and each RP has a subgroup manager. As a result, the transmitting time is shortened because there is no need to data translation by group key on data sending and the whole architecture size is samller than the other multicast secure architecture.
A Study on Critical Success Factors of Information System in Manufacturing Firms
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 123~128
In recent years, there has been growing interest among academics and practitioners in improving information system effectiveness of manufacturing firms in Korea. This study is conducted to find critical factors which influence information system effectiveness of manufacturing firms in Korea. The result of this study shows that (1) use of information system for decision-making and (2) use of information system for buyer - supplier relationship and (3) support of top management are very important to increase information system effectiveness. In addition, this study provides information system effectiveness of small manufacturing firms are regarded inferior to large manufacturing firms in Korea.
Real Option View in the Analysis of Highly Risky Business : Review and Critique
Lee, Woong-Hee ;
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 129~142
This paper reviews real option theory and its recent application to management studies involving highly risky business. Three problems are identified in previous studies that created confusions in the application of real option view. It is proposed in this paper that by explicitly stating the underlying real asset on which real option is written, researchers can prevent real option analysis from becoming a tautology and clarify three problems identified in this paper.
A Study on the Introduction of Pharmacy Information Systems After Medical Reform
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 143~151
The purpose of this study is to present the model for introduction of pharmacy information systems after medical reform. AHP(analytic hierarchy process) method is used to compute preference over factors which are included in the introduction of information systems. The fuzzified mu1ti-objective programming model is given to consider the aspects of resource and to accommodate the aspiration level and satisfaction level of decision makers. Numerical examples illustrating interpolated model are presented to accommodate the uncertainty of priority and the implications of this model is discussed.
An Evaluation of the internet shopping mall with regard to consumer's behaviors
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 152~156
Internet shopping mall is growing the new paradigm of a next generation commerce. And, the primary goal of a shopping mall web site is to facilitate economic action. Therefore. it is important in designing the shopping mall to support consumer's behaviors characteristics of a traditional commerce, This paper analyzed and evaluated two shopping mall with regard to consumer's behaviors characteristics. It is used the method of a user's performance and a subjective evaluation. It was shown that the user prefered the shopping mall web site to analogy with the traditional commerce pattern. Also, the database of an anatomic data and the development of a 3D virtual environment are suggested.
An Evaluation of Usability and Interface Design of Internet Shopping Mall
Journal of the Korea Society of Computer and Information, volume 6, issue 2, 2001, Pages 157~162
Internet shopping mall is done commercial trade in particular web sites, and zoomed with an important means of trade for the next generation. When users visit shopping mall, the best objective is determined to users by of offering satisfaction and pleasant experience. Therefore. this paper was selected a menu list as an evaluation factor to emphasize a usage convenience of internet shopping mall, and executed a performance and a subjective satisfaction evaluations on a screen design and a structure design. The results of all the performance and the subjective evaluations for the screen design were shown the shortest search times on left type of the main-menu and vertical type of the medium-menu. In the structure design, it was shown that users were the highest satisfaction in type that search product and shopping cart procedure were firstly processed, and the procedure of a shopping membership and paying a bill were secondly processed at the same screen with regard to a comprehensibility and convenience of purchase procedure. It was shown that the user prefered the shopping mall web site to analogy with the real purchase procedure