Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Computer and Information
Journal Basic Information
Journal DOI :
Korean Society of Computer Information
Editor in Chief :
Volume & Issues
Volume 8, Issue 4 - Dec 2003
Volume 8, Issue 3 - Sep 2003
Volume 8, Issue 2 - Jun 2003
Volume 8, Issue 1 - Mar 2003
Selecting the target year
Condition Evaluation Using Shared Predicates of Active Rule
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 1~6
As the condition evaluation of the active rules is performed whenever an event occurs, the performance of the system is influenced greatly depending on the conditions Processing method. Therefore, a study on evaluating the conditions of active rules becomes a very important element for enhancing the performance of active database. and the processing time of the calculation generated from the conditions must be minimized in order to improve the Performance. In this paper, the tree processing system which can effectively Process the join and selection operations is proposed. The experimental results show that tree processing system has the lower evaluation cost for the conditions processing of the active rules than the existing methods.
Approximate conversion using the degree reduction of NURBS
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 7~12
Because some systems limit the supported maximal degree, the degree reduction of NURBS is necessary in Parametric curves and surfaces of the different geometric modeling systems. Therefore an approximate degree reduction method of NURBS curves was introduced in this research. Also the existing Eck's B
zier degree reduction method and knot removal algorithm were used to reduce data in the degree reduction process. Finally we found that this method was stable, efficient for implementations, and easy to use algorithms.
A Study on the Navigation Control of Automated Guided Vehicle using Color Line Search
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 13~19
There are active researches on automated guided vehicles(AGV) generally used in flexible manufacturing system(FMS) or automated warehouse systems(AWS). Because existing AGV uses magnetic tapes, electric wire, RF or laser as guidelines, its installation and modification require a lot of money and time. The present study implemented AGV that detects paths marked with 50mm Yellow tape using a mono-color CCD camera. Because it uses color tape, it is easy and inexpensive to install and change lines. This study presented the structure of the developed AGV, the image Processing technique for detecting guidelines by ing the characteristics of color, and the result of operating AGV.
Design and Implementation of Intelligent Web Search Agent using Case Based Reasoning
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 20~29
According as quantity of information is augmented rapidly in World Wide Web, users are investing more times finding correct information to on. Search function that a search agent is personalized according to user's preference degree or search objective to solve these problem should be offered. Therefore, a search agent accumulates experienced knowledge connected with user's past search in this research. When new query was given, search agent offered learning function of intelligence that decides category group through estimation method of similarity using this knowledge. So this paper showed that case based search can bring superior result in the correctness rate than other search method.
The study of performance evaluation between 32bit and 64bit K4 Firewall System
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 30~36
Korea has been issued on K4 Firewall Certificates for security, and these K4 Firewalls has been installing all Korean public organizer. In this paper, I would analysis process and functions of K4 Firewall. I had been created by difference and performance test between existing 32bit and latest 64bit K4 Firewall System on Solaris Operating System that wide use in Korea So that the result of improved more two times passed rate on 64bit than 32bit on Solaris K4 Firewall System At finally, I would conclude that the change direction will be useful for research and development on K4 Firewall System and Korean Firewall System which is a very competitive system in the world.
Design of Log Analysis System for Enterprise IDS/Firewall/Router
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 37~43
The growing Internet business has required the acceleration of the development of security components. There are many different kinds of security components that have been developed in accordance with the appearance of various logs. Therefore, it is important that after the logs are collected they become integrated and need to Once the data from the logs have been collected form the IDS/Firewall/Router logs. It needs to be analyzed and formatted for standardization. This paper suggests designs that the log analyzation system could use in analyzing, detecting, and preventing intrusion in the various systems. Once the data has been analyzed it would be possible to Prevent further intrusion as well as trace the intrusion back to the source.
A design and implementation of the Wireless Firewall
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 44~50
When Mobile terminal user want to contact inner-network information sever, wireless information security need for Protect hacking. For the security, Mobile terminal user could have contact to wireless network through the gateway of Wireless Firewall. In this paper, I present a design scheme of Wireless Firewall that included major function of Packet Filtering, NAT, Authentication, and auditing reports services. I would implement to Wireless Firewall that included major function of Packet Filtering, NAT, Authentication, Integrity, and auditing reports services. I would conclude that the suggest will be useful for research and development on Korean Wireless Firewall System.
The Study of the Object Replication Management using Adaptive Duplication Object Algorithm
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 51~59
It is effective to be located in the double nodes in the distributed object replication systems, then object which nodes share is the same contents. The nodes store an access information on their local cache as it access to the system. and then the nodes fetch and use it, when it needed. But with time the coherence Problems will happen because a data carl be updated by other nodes. So keeping the coherence of the system we need a mechanism that we managed the to improve to improve the performance and availability of the system effectively. In this paper to keep coherence in the shared memory condition, we can set the limited parallel performance without the additional cost except the coherence cost using it to keep the object at the proposed adaptive duplication object(ADO) algorithms. Also to minimize the coherence maintenance cost which is the bi99est overhead in the duplication method, we must manage the object effectively for the number of replication and location of the object replica which is the most important points, and then it determines the cos. And that we must study the adaptive duplication object management mechanism which will improve the entire run time.
A Study on CA-VPN Design using Authentication Mechanism
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 60~68
Now the development of using a internet and security equipment is Processed actively. But It is presented problems about compatability and availability between variable equipment as several protocol. It is able to occur the Problem which is not considered efficiency as monopoly security equipment for the standardization of some vendor As a using of VPN gateway equipment. the same equipments have been actually used only for sale a communication equipment which are not confirmed(authenticate) between of mutual equipments. These problem is remain which are not considered suitable network environment and Position by mutual authentication Processing. Because it is considered for only sale a equipment of several vendor. And You will be remain where is unable to protect from attack of using the same equipment, and You will need a actually Protected method. By authentication system of base on Pn , although there is an intended attack from the third intruder, users can be protected with safe from the physical attacks since he is not a Permitted user by employing CA-VPN gateway that is more viable than the previous VPN connection in its security and certification.
A Design Version Control System of Component using UML
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 69~75
The Development of software Puts component of software made in advance to use to improve productivity Reuse of component can cut down on the development costs of software and reduce the development Period. By reusing component needed for software development, it can minimize risk factors from the software design to implementation We are going to Proposal the method which can promote efficiency of reuse by introducing with skill to implement the software and managing the specification using UML with version through the version management systems. The object of this study is that when the software is developed, we make software used effectively through the version management of component using UML.
A Design of Customer Relationship Management Evaluation Model for Educational Site
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 76~83
CRM technology, which increase the benefit with the improvement of customer loyalty, has been one of the important strategies of industry. At the same time it is essential to evaluate the CRM characteristics to activate the CRM technology in the educational sites. So in this study, CRM technology concept and Web-site evaluation trend is mentioned ahead. By using Web-site CRM, that is one of the latest quantitative global evaluation method, CRM characteristics evaluation model is designed. So CRM service contents of currently operational academic sites are compared and analyzed. And through students'point of view CRM characteristics evaluation base and quantitative model is proposed to improve customer loyalty and customer satisfaction. Computed results of proposed CRM evaluation model for the educational site is included partially.
Performance Analysis of S-LExpressnet protocol added a control station
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 84~89
In this Paper, an improved protocol is proposed by supplementing a control station for transmission cycle management. This protocol is proposed to complement the shortcomings of the conventional L-Expressnet protocol which is used for round robin process in bus topology. We analyzed the improved protocol in channel utilization viewpoint and compared the result with that of the conventional protocol. From this result, we showed that the channel utilization of the improved protocol is superior to that of the conventional protocol when a maximum normalized propagation delay is increased.
A Study on the Beam forming method suitable receive area shape using planar array antenna
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 90~96
In this paper, arranged the isotropic point source of N number with the structure which is identical with the receive area. And against the array structure which has the radiation pattern which is identical with the receive area it researched. The arranged the element space flees grating lobe and in order to set the characteristic of optimum with half-wave equally space it selects. After inducing the array factor of each array structure, it calculated a radiation pattern. As a result of, the radiation pattern of the each Planar array antenna with structure of the receive area was similar and the possibility of getting an beam characteristic it was.
Design of the Java-based Call Control System for CTI(Computer Telephony Integration) Service
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 97~102
In this paper it Is to suggest that beyond the Previous communication concept of exchange, transmission mounting. and terminal , the call control system function should be added to the call control exchange server, to make an external telephone call available through the internet by connecting the interior line and the Internet. The function evaluation of call control system is found to become stable when the callers are 10 rather than 20 above, as a result of the more than ten times repeated concurrent calls. Furthermore, the evaluation shows that the program responds Quickly within a second, even when there are more than 100 callers as well as secures a stable system operation and mutual inter-feasibility due to a fast connectivity and a superb function.
Normal Behavior Profiling based on Bayesian Network for Anomaly Intrusion Detection
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 103~113
Program Behavior Intrusion Detection Technique analyses system calls that called by daemon program or root authority, constructs profiles. and detectes anomaly intrusions effectively. Anomaly detections using system calls are detected only anomaly processes. But this has a Problem that doesn't detect affected various Part by anomaly processes. To improve this problem, the relation among system calls of processes is represented by bayesian probability values. Application behavior profiling by Bayesian Network supports anomaly intrusion informations . This paper overcomes the Problems of various intrusion detection models we Propose effective intrusion detection technique using Bayesian Networks. we have profiled concisely normal behaviors using behavior context. And this method be able to detect new intrusions or modificated intrusions we had simulation by proposed normal behavior profiling technique using UNM data.
An Efficient Load Balanced Cost Calculation Scheme for QoS Routing in On-line Game Service
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 114~119
An efficient QoS routing scheme for improving on-line games services needs to find a path that satisfies a given noS requirements while consuming as few resources as possible. In this paper, we propose a scheme of calculating resources' costs for precomputation QoS routing schemes. For a domain in the networks. the routing scheme first precomputes K multiple paths between all pairs of ingress and egress border routers while considering balancing of the expected load. We. therefore, expect that the paths are better than any other paths in respect to reserving the network resources on paths. The routing scheme combines inter and intra domain routings seamlessly and uses the same cost calculation scheme.
A Developmental Plan on Public Education in Digital Times, 21c
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 120~128
The Purpose of this study is to clarify present situation and condition of information in public education and then. indicate the problems and suggest their solutions on new developmental plan. As a result, it was found that a lots of problems, a crisis of 'collapse on classroom' and insufficient using a medium of information. This study suggested the information equipment should be supplied. to develop the educational effective programs using a medium of information, to build information infrastructure, and the role of teacher in information education.
Building Strategy for Successful Venture Creation Education in Korea by Reviewing Venture Creation Education of Korea and USA
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 129~139
Venture Creation Management in the USA has been very successful since World War II. The venture creation management education has made the venture enterprises' management successful in the USA. Thus, this study compared the venture creation management education of Korea with that of the USA and provided the strategic suggestions for successful venture creation management in Korea.
B2B Electronic Commerce: It′s Current Situation And Policy
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 140~148
It is expected that the role and market share of B2B Electronic Commerce between countries increase in the future. To motivate this new type of marketing, civil-leading flexible regulation frame is needed than any other factors including its legislation and administration for activating each companys cooperation mind and friendly relationship also. Government policies should focus on coordination of competing circumstances and participating to international standardization working scope In addition, domestic situation of B2B Electronic Commerce and political perspectives are to be analyzed and proposed that contribute to broaden market share. These aims are obtained by scrutinizing some critical factors of current B2B market: companys trading characteristics, possibility of introducing to trading scope, and B2B Electronic Commerce Policy etc.
An Empirical Research on the Effect of Quality's Dimensions Through ISO 9000 Certification
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 149~155
The purpose of this study is to analyze the degree of product's qualify improvement by the effectiveness which is identified as worker's mindset improvement, a management ability improvement and quality system's establishment in the existing papers as well as the construction of a quality assurance system by acquiring the ISO 9000 series certification. In order to identify the product's quality improvement, the analysis of Garvin's eight dimensions of quality characteristics as well as the analysis a design quality improvement, a manufacturing quality improvement, a service quality improvement are conducted through this study.
A Study on the Evaluation of Vendors for Information Systems Projects Using Possibilistic Decision Making Model
Journal of the Korea Society of Computer and Information, volume 8, issue 1, 2003, Pages 156~165
The purpose of this study is concerned with possibilistic decision making model (PDMM) that can be used to help CEO and information systems managers decide which information systems should be selected. The application of IT which has influence on rapidly changed environment of enterprise plays an important role in enterprise's activity. When enterprise outsource IT, it is very important to select vendors that reflect goals and constraints of organization. For this purpose, mathematical model in which possibilistic programming is applied is suggested in this study. Although many researches have conducted in conventional programming and stochastic programming. they are still limited in solving practical problems and imprecise/uncertain situations. Multiple decision making model in which impreciseness of input variable is considered can be constructed in PDMM.