Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Computer and Information
Journal Basic Information
Journal DOI :
Korean Society of Computer Information
Editor in Chief :
Volume & Issues
Volume 8, Issue 4 - Dec 2003
Volume 8, Issue 3 - Sep 2003
Volume 8, Issue 2 - Jun 2003
Volume 8, Issue 1 - Mar 2003
Selecting the target year
A Study on the Recognition of Numerals for AGV Navigation Control
Journal of the Korea Society of Computer and Information, volume 8, issue 2, 2003, Pages 1~7
This study is a research on character recognition based on image processing, using only color tape to mark guidelines instead of magnetic tape or electric wire used by existing AGV. AGV must follow given courses, and stop recognizing signs such as marks and numbers that indicate destinations. In this study. marks to stop AGV employed blue characters of the same font and size as those of number plates. Yellow driving lines and blue numeric characters were marked in corridors. AGV ran ing the characteristics of colors and detecting lines, and temporarily stopped recognizing numbers of 100％ through DP pattern matching. This study presented the image processing technique and the result of operating AGV.
Research on User's Query Processing in Search Engine for Ocean using the Association Rules
Journal of the Korea Society of Computer and Information, volume 8, issue 2, 2003, Pages 8~15
Recently various of information suppliers provide information via WWW so the necessary of search engine grows larger. However the efficiency of most search engines is low comparatively because of using simple pattern match technique between user's query and web document. A specialized search engine returns the specialized information depend on each user's search goal. It is trend to develop specialized search engines in many countries. However, most such engines don't satisfy the user's needs. This paper proposes the specialized search engine for ocean information that uses user's query related with ocean and the association rules in web data mining can prove relation between web documents. So this search engine improved the recall of data and the precision in existent search method.
A Study on XML Document Repository Management System using ODMG Object Model
Journal of the Korea Society of Computer and Information, volume 8, issue 2, 2003, Pages 16~23
In most organizations, the relational DBMS was used for store and manage XML documents due to the pre-established relational DBMS. But, relational DBMS has some problems. They has the possibilities of informational loses in the process of mapping the structure of XML documents to RDB, and they require expensive cost to reflect all XML properties. Thus, this paper was intended to design and implement XML document management system which utilize O2 DBMS-object oriented DBMS in order to overcome the existing problem and reflect all XML Properties. The XML document management system purposed in this thesis has multiple function, such as the library service function for XML documents-check-in/check-out, versioning, user access management-, dynamic indexing and retrieval, and publishing function using style sheet.
JPEG Image Quantization Method with Variable Thresholds
Journal of the Korea Society of Computer and Information, volume 8, issue 2, 2003, Pages 24~30
In this Paper VTQM(Variable Threshold quantization Method) is proposed, which enhances PSNR by composing the advantages of round-off and truncation quantization methods. From vast experiments, PSNR's of JPEG images with the method are compared with that of standard JPEG methods. At the boundary which affects the compression ratio, VTQM quantizes with a new threshold to reduce the length of compressed data; otherwise, VTQM employs the round-off quantization method to preserve the original image information. As a result, VTQM reduces bit rate while preserving the image quality. The experimental results show that VTQM enhances PSNR by 0.2∼0.3dB, 0.4∼0.5dB with the same bit rate than those of the traditional truncation and round-off quantization methods, respectively.
An Acceleration Method of Face Detection using Forecast Map
Journal of the Korea Society of Computer and Information, volume 8, issue 2, 2003, Pages 31~36
This paper proposes an acceleration method of PCA(Principal Component Analysis) based feature detection. The feature detection method makes decision whether the target feature is included in a given image, and if included, calculates the position and extent of the target feature. The position and scale of the target feature or face is not known previously, all the possible locations should be tested for various scales to detect the target. This is a search Problem in huge search space. This Paper proposes a fast face and feature detection method by reducing the search space using the multi-stage prediction map and contour Prediction map. A Proposed method compared to the existing whole search way, and it was able to reduce a computational complexity below 10％ by experiment.
A Study on The Detection of Multiple Vehicles Using Sequence Image Analysis
Journal of the Korea Society of Computer and Information, volume 8, issue 2, 2003, Pages 37~43
The purpose of this thesis is to detect multiple vehicles using sequence image analysis at process that detect forward vehicles and lane from sequential color images. Detection of vehicles candidate area uses shadow characteristic and edge information in one frame. And, method to detect multiple vehicles area analyzes Estimation of Vehicle(EOV) and Accumulated Similarity Function(ASF) of vehicles candidate areas that exist in sequential images and examine possibility to be vehicles. Most researches detected a forward vehicles in road images but this research presented method to detect several vehicles and apply enough in havy traffic. To verify the effects of the proposed method, we capture the road images with notebook and CCD camera for PC and present the results such as processing time, accuracy and vehicles detection in the images.
A Study on Buffer Scheme enhancing Performance In Intrusion Detection System
Journal of the Korea Society of Computer and Information, volume 8, issue 2, 2003, Pages 44~50
Even though algorithm of intrusion detection is superior to other algorithm in intrusion detection system, it is supposed that captured packet happened hostly lead to lose packet in system architecture when a buffer is full. If packet lost concerned to be hacked, it might impact to system all over. In this paper, try to focus on performance improvement of detection system. Buffer with threshold value could classify normal packet and hacked packet. The buffer accept normal packet and supposed to be hacked packet until critical value. When buffer reached at threshold value, destroyed packet is only normal packet. Proposed method can complement weakness that bypass hacked packet.
Semantic Access Path Generation in Web Information Management
Lee, Wookey ;
Journal of the Korea Society of Computer and Information, volume 8, issue 2, 2003, Pages 51~56
The structuring of Web information supports a strong user side viewpoint that a user wants his/her own needs on snooping a specific Web site. Not only the depth first algorithm or the breadth-first algorithm, but also the Web information is abstracted to a hierarchical structure. A prototype system is suggested in order to visualize and to represent a semantic significance. As a motivating example, the Web test site is suggested and analyzed with respect to several keywords. As a future research, the Web site model should be extended to the whole WWW and an accurate assessment function needs to be devised by which several suggested models should be evaluated.
Design of a color control driver for liquid crystal on silicon
Journal of the Korea Society of Computer and Information, volume 8, issue 2, 2003, Pages 57~63
In this paper, we propose the hardware architecture of a scale converter which is to convert a variety range of scale into a target scale and a time sequential color control driver for LOCS (Liquid Crystal On Silicon) micro display devices which are considered advanced micro display technology in the next generation. The driver has been implemented and tested with ASIC chips.
A Web-Based Autonomous Design for Unstructured Systems
Journal of the Korea Society of Computer and Information, volume 8, issue 2, 2003, Pages 64~74
The unstructured system requires different system designs and realizations according to the environmental factors of the situation, as well as frequent system changes and revisions. Being realized off-line in most of the cases, such a system is in a great demand for maintenance and repair and very difficult to execute the central intensive management. In such a case, the unstructured system is usually fit into a single standardized framework, which makes it impossible to present the accurate picture of the real world and to properly reflect the features of the system. In an attempt to solve these problems, a new concept of system development theory was suggested; it is called the autonomous system, which enables each module to be designed autonomously and allows easy maintenance and repair An example of system realization on the web using the development methodology of this autonomous system was Presented.
A Risk Analysis Simulation Model for Security Management of IT System
Journal of the Korea Society of Computer and Information, volume 8, issue 2, 2003, Pages 75~81
The Korea standard model is not fitted to general company in many faces because it is made for the public institution. This report suggests the risk analysis Simulation model of Security Management based on korea standard model , to apply and operate for general companies possibly. This model tries to show many standards, come subjectively in the character of the risk analysis, objectively and generally, and tries to give you the possible countermove, which can be operated and actual , for the countermove analysis and presentation.
Color Matching Method for Stitching Machine
Journal of the Korea Society of Computer and Information, volume 8, issue 2, 2003, Pages 82~87
In this paper, the color matching algorithm is Proposed for stitching machine. The matched embroidery color threads are selected by using the proposed algorithm from a computer files which is designed on the computer or scanned from the drawings designed by an artist. The proposed algorithm finds the best matching nearest colors from the given embroidery color threads . The multiple candidates owing to have the equal distance in the CIE color space are further processed to find nearest dominant color. The color dithering method will be useful for reproducing original design with high fidelity.
Analysis of 3-Dimensional TLM for Step Discontinuity Microstrip Line
Journal of the Korea Society of Computer and Information, volume 8, issue 2, 2003, Pages 88~96
Microstrip line is one of the most essential elements of microwave and milimeter-wave integrated circuits. And then the frequency dependent characteristics of the microstrip line have previously been analyzed using several frequency domain approaches But the 3-D TLM method presented in this Paper is another independent approaches for obtaining frequency domain results for microstrip line. The structure analysed with this TLM algorithm is step discontinuity microstrip line and the symmetrical condensed node is used. After numerical analysis, the frequency dependent scattering Parameters of a step discontinuity microstrip line have been calculated by Fourier transform of the time domain data. From the time domain TLM numerical results. this numerical analysis is shown to be an efficient method for modelling complicated structure as step discontinuity microstrip line.
A Design of ATM Switch for High Speed Network
Seok, Seo-In ; Kuk, Cho-Sung ;
Journal of the Korea Society of Computer and Information, volume 8, issue 2, 2003, Pages 97~105
This thesis proposes a new type of Input-Output Buffered ATM Switch which employs an arbiter and its performance under different traffic conditions studied. The proposed switch is designed with a view to exploit the architecture and other characteristics of the arbiter The primary aim of the proposed switch is the elimination, or at least, the reduction of HOL blocking phenomenon which occurs in the simple input buffered switch. Several HOL arbitration algorithms have been proposed for this purpose in the literature. The Proposed switch attempts to reduce the HOL blocking as it uses the arbiter and the buffer at the output Port in an effective manner. The arbiter is designed to work with Three Phase Algorithm which is one of the many well known HOL arbitration algorithms . The proposed switch acquires control over priority transmission through the REd signal. As the signals are transmitted to the arbiter, the latter controls the one which is sent by the input buffer. Computer simulation results have been provided to demonstrate the effectiveness of the proposed switch under non-uniform random traffic conditions.
Performance Analysis of Slot-Extension Adapt ive SECS-LExpressnet protocol
Journal of the Korea Society of Computer and Information, volume 8, issue 2, 2003, Pages 106~111
In this Paper, an improved protocol is proposed by supplementing a control station for transmission cycle management and slot-extension function. This protocol is proposed to complement the shortcomings of the conventional L-Expressnet protocol which is used for round robin process in bus topology. We analyzed the improved protocol in channel utilization viewpoint and compared the result with that of the conventional Protocol. From this result, we showed that the channel utilization of the improved protocol is superior to that of the conventional protocol when a maximum normalized propagation delay is increased.
A Study on the Design of Key Scheduler Block Cryptosystem using PRN
Journal of the Korea Society of Computer and Information, volume 8, issue 2, 2003, Pages 112~121
Information Protection and cryptography technology is developed with if but solved problem of real time processing and secret maintain. Therefore this paper is Proposed new PRN-SEED(Pseudo-Random Number-SEED) for the increasing secret rate and processing rate perform performance analysis with existed other cryptography algorithms. Proposed new PRN-SEED crypto-algorithm increase in the processing rate than existed algorithms use bit and byte mixed operation with RNG(Random Number Generator). PRN-SEED that performs simultaneous operations have higher 1.03 in the processing rate and 2 in the cryptosystem performance than existed cryptosystems. Implementation for PRN-SEED use Synopsys Design Analyser Ver. 1999.10, samsung KG75 library and Synopsys VHDL Debegger. As a simulation result, symmetric cryptosystem DES operate 416Mbps at the 40MHz and Rijndael operate 612Mbps at the 50MHz. PRN-SEED cryptosystem have gate counting 10K and operate 430Mbps at the 40MHz and 630Mbps at the 50MHz.
A Performance Comparative between WAP Service and JAVA Wireless Internet Service
Journal of the Korea Society of Computer and Information, volume 8, issue 2, 2003, Pages 122~128
There are many development methods to implement wireless internet service. These methods are WAP(Wireless Application Protocol) based services and Java based service WAP based service has been proposed to support limited convenience for user But Java based service can support many convenience and GUI(Graphic User Interface) and easy to use to access for user. This paper will be propose a WAP based application development method and Java based application development method. As an illustrative experiment, WAP based service and Java based service are used to show performance for each systems.
A study on service composition for web caching on active network
Journal of the Korea Society of Computer and Information, volume 8, issue 2, 2003, Pages 129~134
This paper describes an application level composition mechanism called Generic Modeling Environment(GME) for web caching on an Application Level Active Network(ALAN). Web caching on an ALAN requires the application level composition mechanism and a service composition to support adaptability for self-organization. ALAN was developed to solve the problems of the network level Active Network(AN) ALAN has the features of both AN as well as mobile agents. The efficient composition mechanism for the existing AN Projects has been supported primarily for the network level AN. Conversely, ALAN lacks support for the application level AN The existing web caching technology is inter-connected in a manually configured hierarchical tree. Since a self-organization system is intended to be adaptive, web caching for self-organization does not involve a manual configuration or any low-level tuning of the individual nodes of the entire system but requires service composition to support adapting intelligence and fault-tolerance to enable self-organization.
Analysis of Assessment Model applying to Internet Business Mall
Journal of the Korea Society of Computer and Information, volume 8, issue 2, 2003, Pages 135~144
This paper focus on the analyzing objective bases for Proper assessment in Internet business mall. UP to now, assessment protocol of Internet business mall has been accomplished with financial factor, traffic factor and no quantitative factor respectively. But decision process of this malls value by one of these factors is not the best method. A new assessment model considering qualitative and quantitative factors is suggested and reviewed with existing model . As a result, a quantitative assessment protocol is appraised by a customer for the reason that this model includes not only comparative superiority between company but also weighting factor in assessment factors.
A Case Study on SCM Establishment: C Corporation
Journal of the Korea Society of Computer and Information, volume 8, issue 2, 2003, Pages 145~154
Business environment is changing rapidly because of the introduction of the newest Technologies development and the newest management skills. With the development of Information Technology (IT) and the rapid growth of Internet based business, there have been great improvements of business processes and total costs of many firms. Many firms realize that they have to change their organizational structure and managerial skills in order to carry on their corporate goals(growth and development) according to business paradigm shift. The purpose of this dissertation is to watch how consumer product manufacturer(C corporation) could build effective SCM strategies under Electronic Commerce paradigm shift and how it can reform its organizational structure in order to perform its business goat. C corporation has been doing a groat role in logistics and distribution for the last 50 years with logistics know-how in domestic market, however there were many problems such as lack of shared information, demand Paradox, order batch, stock shortage and duplicated processes among vendors and chain members. Most of problems were based on lack of shared information and old business processes.