Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information and Communication Engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 20, Issue 8 - Aug 2016
Volume 20, Issue 7 - Jul 2016
Volume 20, Issue 6 - Jun 2016
Volume 20, Issue 5 - May 2016
Volume 20, Issue 4 - Apr 2016
Volume 20, Issue 3 - Mar 2016
Volume 20, Issue 2 - Feb 2016
Volume 20, Issue 1 - Jan 2016
Selecting the target year
Social security aimed disaster response policy based on Big Data application
Choung, Young-chul ; Choy, Ik-su ; Bae, Yong-guen ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 683~690
DOI : 10.6109/jkiice.2016.20.4.683
In modern society, disasters frequently occur, and the effect is getting more massive. Also, unpredictable future increases anxiety about social security. Accordingly, in order to prevent national-scale emergency from happening, it is highly required governments' role as ICT power nation and transition to disaster management system using big data applied service. Thus, e-gov necessarily acquires disaster response system in order to predict and manage disasters. Disasters are linked with some attributes of modern society in diversity, complexity and unpredictability, so various approach and remedies of them will appease the nation's anxiety upon them. For this reason, this manuscript suggests epidemics preactive warning algorithm model as a mean of reduce national anxiety on disaster using big data for social security. Also, by recognizing the importance of e-gov and analyzing problems in weak disaster management system, it suggests political implication for disaster response.
Analysis of Tapered Slot Antenna for UWB with Directivity Characteristic
Kim, Sun-Woong ; Choi, Dong-You ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 691~697
DOI : 10.6109/jkiice.2016.20.4.691
In this paper, we propose the antenna to appropriate for a UWB communication system, and it meets characteristics for location recognition in predetermined range. Proposed tapered slot antenna was designed through the HFSS simulation tool of Ansys. Inc., it was produced by Taconic TRF-45 based on dielectric constant of 4.5, loss tangent 0.0035, thickness 1.62mm. The tapered slot antenna is analyzed the standing wave ratio and reflection coefficient, radiation pattern in the frequency domain. The impedance bandwidth range of the produced tapered slot antenna is from 3.8 ~ 8.9GHz to 5.1GHz, E-plane and H-plane radiation pattern meet directional antenna characteristics for indoor and outdoor location recognition in predetermined range. The antenna gain is 7.4 dBi(6GHz)in the simulation, the result of measurement demonstrated 7.4 dBi(6 GHz) of antenna maximum gain. Proposed tapered slot antenna meets UWB communication system but simulated and measured results were slightly different.
Control Gain Optimization for Mobile Robots Using Neural Networks and Genetic Algorithms
Choi, Young-kiu ; Park, Jin-hyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 698~706
DOI : 10.6109/jkiice.2016.20.4.698
In order to move mobile robots to desired locations in a minimum time, optimal control problems have to be solved; however, their analytic solutions are almost impossible to obtain due to robot nonlinear equations. This paper presents a method to get optimal control gains of mobile robots using genetic algorithms. Since the optimal control gains of mobile robots depend on the initial conditions, the initial condition range is discretized to form some grid points, and genetic algorithms are applied to provide the optimal control gains for the corresponding grid points. The optimal control gains for general initial conditions may be obtained by use of neural networks. So the optimal control gains and the corresponding grid points are used to train neural networks. The trained neural networks can supply pseudo-optimal control gains. Finally simulation studies have been conducted to verify the effectiveness of the method presented in this paper.
Efficient Implementation of FMCW Radar Signal Processing Parts Using Low Cost DSP
Oh, Woojin ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 707~714
DOI : 10.6109/jkiice.2016.20.4.707
Active driving safety systems for vehicle, such as the front collision avoidance, lane departure warning, and lane change assistance, have been popular to be adopted to the compact car. For improving performance and competitive cost, FMCW radar has been researched to adopt a phased array or a multi-beam antenna, and to integrate the front and the side radar. In this paper we propose several efficient methods to implement the signal processing module of FMCW radar system using low cost DSP. The pulse width modulation (PWM) based analog conversion, the approximation of time-eating functions, and the adoption of vector-based computation, etc, are proposed and implemented. The implemented signal processing board shows the real-time performance of 1.4ms pulse repetition interval (PRI) with 1024pt-FFT. In real road we verify the radar performance under real-time constraints of 10Hz update time.
Design of 3-Dimensional Cross-Lattice Signal Constellations with Increased Compactness
Li, Shuang ; Kang, Seog Geun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 715~720
DOI : 10.6109/jkiice.2016.20.4.715
In this paper, a method to design 3-dimensional (3-D) cross-lattice signal constellations with increased compactness is presented and analyzed. Here, the symbols located at the outermost sides in the conventional lattice constellation are moved symmetrically to fill in empty sides and sunken corners. While the minimum Euclidean distance (MED) among adjacent symbols remains unchanged, the presented cross-lattice constellations have 3~5% reduced average power and upto 25% reduced total volume as compared with the conventional ones. Due to the increase compactness, average power of the new 3-D constellations is lower than that of the conventional ones. As a result, computer simulation verifies that the presented cross-lattice constellations can improve symbol error performance of a digital transmission system about 0.4 [dB]. Hence, the proposed 3-D cross-lattice constellations are appropriate for low-power and high-quality digital communication systems.
Performance Analysis of User Clustering Algorithms against User Density and Maximum Number of Relays for D2D Advertisement Dissemination
Han, Seho ; Kim, Junseon ; Lee, Howon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 721~727
DOI : 10.6109/jkiice.2016.20.4.721
In this paper, in order to resolve the problem of reduction for D2D (device to device) advertisement dissemination efficiency of conventional dissemination algorithms, we here propose several clustering algorithms (modified single linkage algorithm (MSL), K-means algorithm, and expectation maximization algorithm with Gaussian mixture model (EM)) based advertisement dissemination algorithms to improve advertisement dissemination efficiency in D2D communication networks. Target areas are clustered in several target groups by the proposed clustering algorithms. Then, D2D advertisements are consecutively distributed by using a routing algorithm based on the geographical distribution of the target areas and a relay selection algorithm based on the distance between D2D sender and D2D receiver. Via intensive MATLAB simulations, we analyze the performance excellency of the proposed algorithms with respect to maximum number of relay transmissions and D2D user density ratio in a target area and a non-target area.
The Data Collection Solution Based on MQTT for Stable IoT Platforms
Kim, Sang-hyun ; Kim, Dong-hwi ; Oh, Hyeung-seok ; Jeon, Hyun-sig ; Park, Hyun-ju ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 728~738
DOI : 10.6109/jkiice.2016.20.4.728
We are currently able to share not only the information from humans but also the data from connected things on the Internet. We are getting close to IoT era because of progress of Information Communication Technology. Therefore, the ways of data transfer are offered between things to things. One of typical way is the HTTP protocol. However, The field of Internet of Things platforms requires more fast and more stable communication protocol to handle massive data. The system supporting HTTP protocol, there is a problem of transmission efficiency in a relatively large header compared to data. also HTTP protocol system overload situations and the problem of data compatibility happens due to each standard of many organizations. Thus, To solve these problems, I suggest the data collection solution based on MQTT protocol for the operation of the stable IoT platforms.
Research on Design of DDS-based Conventional Railway Signal Data Specification for Real-time Railway Safety Monitoring and Control
Park, Yunjung ; Lim, Damsub ; Min, Dugki ; Kim, Sang Ahm ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 739~746
DOI : 10.6109/jkiice.2016.20.4.739
The real-time railway safety monitoring and control system is for prevention of safety accidents, and this system adopts DDS (Data Distribution Service) standard based data transmission method to support integrated management of data from existing on-site safety detection devices. In this paper, we introduce the design of DDS-based data specification from on-site signal equipment on the conventional railway. For this, we (1) design UML data model of KRS SG 0062 standard which defines existing data specification, (2) define DDS Topics for DDS transmission and map KRS model to DDS Topic model, (3) suggest data transformation rules and (4) design network control QoS polices. In addition, we analysis actual on-site log data and validate our data specification design. DDS-based data transmission enables data compatibility among on-site devices and the real-time railway safety monitoring and control system, and allows efficient network management for a large amount of data transfer.
Design and Implementation of DHCP Supporting Network Attack Prevention
Yoo, Kwon-joeong ; Kim, Eun-gi ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 747~754
DOI : 10.6109/jkiice.2016.20.4.747
DHCP(Dynamic Host Configuration Protocol) is a protocol for efficiency and convenience of the IP address management. DHCP automatically assigns an IP address and configuration information needed to run the TCP/IP communication to individual host in the network. However, existing DHCP is vulnerable for network attack such as DHCP spoofing, release attack because there is no mutual authentication systems between server and client. To solve this problem, we have designed a new DHCP protocol supporting the following features: First, ECDH(Elliptic Curve Diffie-Hellman) is used to create session key and ECDSA(Elliptic Curve Digital Signature Algorithm) is used for mutual authentication between server and client. Also this protocol ensures integrity of message by adding a HMAC(Hash-based Message Authentication Code) on the message. And replay attacks can be prevented by using a Nonce. As a result, The receiver can prevent the network attack by discarding the received message from unauthorized host.
Video Production Method using Match Moving Technique
Lee, Junsang ; Park, Junhong ; Lee, Imgeun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 755~762
DOI : 10.6109/jkiice.2016.20.4.755
Motion graphic is the recently emerged technique which extends the ways of expression in video industry. Currently, it is worldwide trends that the image design gets more attention in the field of movie, advertisement, exhibition, web, mobile, games and new media, etc. With the development of computer's new technologies, VFX methods for the visual content is dynamically changed. Such production methods combine the real scenary and CG(Computer Graphic) to compose realistic scenes, which cannot be pictured in the ways of ordinary filming. This methods overcome the difference between the real and virtual world, maximize the expressive ways in graphics and real space. Match moving is technique of accurate matching between real and virtual camera to provide realistic scene. In this paper we propose the novel technique for motion graphic image production. In this framework we utilize the match moving methods to get the movements of the real camera into 3D layer data.
ITFIND Information Utilizing Technology Maturity Level Diagnostics
Hwang, Cheol-Hyeon ; Park, Sang-Hwi ; Lim, Hyeok ; Jung, Hoe-kyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 763~768
DOI : 10.6109/jkiice.2016.20.4.763
IT is the information in government/public policy and technological trends in the industry's R&D has a direct impact on its investment decision making of the very important information. Due to the nature of the information in this technical trend because essential information on open public data the technology by government departments and public institutions that are responsible for producing, on an ongoing basis. In this paper, it was confirmed through the experiment that the method and the possibility to integrate the technology trend information provided by the various agencies can be diagnosed as a maturity level. Also we propose a data collection and processing, storage, optimized service for technical maturity of diagnostic methods. The proposed method determines the overall system configuration and service data ITFIND overall maturity level diagnosis is enabled by leveraging the collected. In addition, through the compensation is considered to be able to proceed to a more accurate diagnostic level.
Design and implementation of TELNET protocol supporting security functionalities
Seong, Jeong-Ki ; Seo, Hye-In ; Kim, Eun-Gi ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 769~776
DOI : 10.6109/jkiice.2016.20.4.769
TELNET is vulnerable to network attack because it was designed without considering security. SSL/TLS and SSH are used to solve this problem. However it needs additional secure protocol and has no backward compatibility with existing TELNET in this way. In this paper, we have suggested STELNET(Secured Telnet) which supports security functionalities internally so that has a backward compatibility. STELNET supports a backward compatibility with existing TELNET through option negotiation. On STELNET, A client authenticates server by a certificate or digital signature generated by using ECDSA. After server is authenticated, two hosts generate a session key by ECDH algorithm. And then by using the key, they encrypt data with AES and generate HMAC by using SHA-256. After then they transmit encrypted data and generated HMAC. In conclusion, STELNET which has a backward compatibility with existing TELNET defends MITM(Man-In-The-Middle) attack and supports security functionalities ensuring confidentiality and integrity of transmitted data.
Forensic Analysis of chatting messenger service in KakaoTalk and Comparison Study of KakaoTalk and WhatsApp Artifacts
Yoon, JongCheol ; Park, Yongsuk ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 777~785
DOI : 10.6109/jkiice.2016.20.4.777
IM(Instant Messenger) chatting service can carry user's various information including life style, geographical position, and psychology & crime history and thus forensic analysis on the IM service is desirable. But, forensic analysis for KakaoTalk's chatting service is not well studied yet. For this reason, we study KakaoTalk's forensic analysis focusing on chatting service. This paper first details a general method of IM forensics investigating the previous articles about IM forensics although there are not many articles. Second, we discuss methodologies for IM forensics wherein we present analysis of table structure and method for reconstruction of chatting message. These result in the basic element of forensic tools of KakaoTalk chatting message. Last, we compare artifacts of KakaoTalk with that of WhatsApp. We conclude that these applications are, at least, different in that table structures and the ways to reconstruct chatting messages are not same and therefore digital evidences or artifacts are not same and somewhat distinct.
Design of Encryption/Decryption Core for Block Cipher Camellia
Sonh, Seungil ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 786~792
DOI : 10.6109/jkiice.2016.20.4.786
Camellia was jointly developed by Nippon Telegraph and Telephone Corporation and Mitsubishi Electric Corporation in 2000. Camellia specifies the 128-bit message block size and 128-, 192-, and 256-bit key sizes. In this paper, a modified round operation block which unifies a register setting for key schedule and a conventional round operation block is proposed. 16 ROMs needed for key generation and round operation are implemented using only 4 dual-port ROMs. Due to the use of a message buffer, encryption/decryption can be executed without a waiting time immediately after KA and KB are calculated. The suggested block cipher Camellia algorithm is designed using Verilog-HDL, implemented on Virtex4 device and operates at 184.898MHz. The designed cryptographic core has a maximum throughput of 1.183Gbps in 128-bit key mode and that of 876.5Mbps in 192 and 256-bit key modes. The cryptographic core of this paper is applicable to security module of the areas such as smart card, internet banking, e-commerce and satellite broadcasting.
Memory window characteristics of vertical nanowire MOSFET with asymmetric source/drain for 1T-DRAM application
Lee, Jae Hoon ; Park, Jong Tae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 793~798
DOI : 10.6109/jkiice.2016.20.4.793
In this work, the memory window characteristics of vertical nanowire device with asymmetric source and drain was analyzed using bipolar junction transistor mode for 1T-DRAM application. A gate-all-around (GAA) MOSFET with higher doping concentration in the drain region than in the source region was used. The shape of GAA MOSFET was a tapered vertical structure that the source area is larger than the drain area. From hysteresis curves using bipolar junction mode, the memory windows were 1.08V in the forward mode and 0.16V in the reverse mode, respectively. We observed that the latch-up point was larger in the forward mode than in the reverse mode by 0.34V. To confirm the measurement results, the device simulation has been performed and the simulation results were consistent in the measurement ones. We knew that the device structure with higher doping concentration in the drain region was desirable for the 1T-DRAM using bipolar junction mode.
Relation of Oxide Thickness and DIBL for Asymmetric Double Gate MOSFET
Jung, Hakkee ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 799~804
DOI : 10.6109/jkiice.2016.20.4.799
To analyze the phenomenon of drain induced barrier lowering(DIBL) for top and bottom gate oxide thickness of asymmetric double gate MOSFET, the deviation of threshold voltage is investigated for drain voltage to have an effect on barrier height. The asymmetric double gate MOSFET has the characteristic to be able to fabricate differently top and bottom gate oxide thickness. DIBL is, therefore, analyzed for the change of top and bottom gate oxide thickness in this study, using the analytical potential distribution derived from Poisson equation. As a results, DIBL is greatly influenced by top and bottom gate oxide thickness. DIBL is linearly decreased in case top and bottom gate oxide thickness become smaller. The relation of channel length and DIBL is nonlinear. Top gate oxide thickness more influenced on DIBL than bottom gate oxide thickness in the case of high doping concentration in channel.
Dependence of Channel Doping Concentration on Drain Induced Barrier Lowering for Asymmetric Double Gate MOSFET
Jung, Hakkee ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 805~810
DOI : 10.6109/jkiice.2016.20.4.805
The dependence of drain induced barrier lowering(DIBL) is analyzed for doping concentration in channel of asymmetric double gate(DG) MOSFET. The DIBL, the important short channel effect, is described as lowering of source barrier height by drain voltage. The analytical potential distribution is derived from Poisson's equation to analyze the DIBL, and the DIBL is observed according to top/bottom gate oxide thickness and bottom gate voltage as well as channel doping concentration. As a results, the DIBL is significantly influenced by channel doping concentration. DIBL is significantly increased by doping concentration if channel length becomes under 25 nm. The deviation of DIBL is increasing with increase of oxide thickness. Top and bottom gate oxide thicknesses have relation of an inverse proportion to sustain constant DIBL regardless channel doping concentration. We also know the deviation of DIBL for doping concentration is changed according to bottom gate voltage.
A Continuous Fine-Tuning Phase Locked Loop with Additional Negative Feedback Loop
Choi, Young-Shig ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 811~818
DOI : 10.6109/jkiice.2016.20.4.811
A continuous fine-tuning phase locked loop with an additional negative feedback loop has been proposed. When the phase locked loop is out-of-lock, the phase locked loop has a fast locking characteristic using the continuous band-selection loop. When the phase locked loop is near in-lock, the bandwidth is narrowed with the fine loop. The additional negative feedback loop consists of a voltage controlled oscillator, a frequency voltage converter and its internal loop filter. It serves a negative feedback function to the main phase locked loop, and improves the phase noise characteristics and the stability of the proposed phase locked loop. The additional negative feedback loop makes the continuous fine-tuning loop work stably without any voltage fluctuation in the loop filter. Measurement results of the fabricated phase locked loop in
CMOS process show that the phase noise is -109.6dBc/Hz at 2MHz offset from 742.8MHz carrier frequency.
Design of Dual loop PLL with low noise characteristic
Choi, Young-Shig ; Ahn, Sung-Jin ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 819~825
DOI : 10.6109/jkiice.2016.20.4.819
In this paper, a phase locked loop structure with parallel dual loop which have a different bandwidth has been proposed. The bandwidths depending on transfer functions are obtained through dual loops. Two different bandwidths of each loop are used to suppress noise on the operating frequency range. The proposed phase locked loop has two different voltage controlled oscillator gains to control two different wide and narrow loop filters. Furthermore, it has the locking status indicator to achieve an accurate locking condition. The phase margin of
for wide loop and
for narrow loop is designed for stable operation and the phase margin of
is maintained during both loops work together. It has been designed with a 1.8V 0.18um complementary metal oxide semiconductor (CMOS) process. The simulation results show that the proposed phase locked loop works stably and generates a target frequency.
Automatic segmentation of a tongue area and oriental medicine tongue diagnosis system using the learning of the area features
Lee, Min-taek ; Lee, Kyu-won ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 826~832
DOI : 10.6109/jkiice.2016.20.4.826
In this paper, we propose a tongue diagnosis system for determining the presence of specific taste crack area as a first step in the digital tongue diagnosis system that anyone can use easily without special equipment and expensive digital tongue diagnosis equipment. Training DB was developed by the Haar-like feature, Adaboost learning on the basis of 261 pictures which was collected in Oriental medicine. Tongue candidate regions were detected from the input image by the learning results and calculated the average value of the HUE component to separate only the tongue area in the detected candidate regions. A tongue area is separated through the Connected Component Labeling from the contour of tongue detected. The palate regions were divided by the relative width and height of the tongue regions separated. Image on the taste area is converted to gray image and binarized with each of the average brightness values. A crack in the presence or absence was determined via Connected Component Labeling with binary images.
Selective Feature Extraction Method Between Markov Transition Probability and Co-occurrence Probability for Image Splicing Detection
Han, Jong-Goo ; Eom, Il-Kyu ; Moon, Yong-Ho ; Ha, Seok-Wun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 833~839
DOI : 10.6109/jkiice.2016.20.4.833
In this paper, we propose a selective feature extraction algorithm between Markov transition probability and co-occurrence probability for an effective image splicing detection. The Features used in our method are composed of the difference values between DCT coefficients in the adjacent blocks and the value of Kullback-Leibler divergence(KLD) is calculated to evaluate the differences between the distribution of original image features and spliced image features. KLD value is an efficient measure for selecting Markov feature or Co-occurrence feature because KLD shows non-similarity of the two distributions. After training the extracted feature vectors using the SVM classifier, we determine whether the presence of the image splicing forgery. To verify our algorithm we used grid search and 6-folds cross-validation. Based on the experimental results it shows that the proposed method has good detection performance with a limited number of features compared to conventional methods.
A Study on Modified Average Filter using Standard Deviation of Local Mask in AWGN Environments
Kwon, Se-Ik ; Kim, Nam-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 840~846
DOI : 10.6109/jkiice.2016.20.4.840
Recently, with the rapid demand expansion on the devices of digital image processing, the excellent quality of the images is required. However, the degradation of the images occurs in the processes of data acquisition, processing, and transmission by various external causes and the noise has been well known as the major cause of image degradation. There are a variety of noises to be added on the images, with typical example of AWGN. Hence, in this article, we suggested average filter algorithm processed by the threshold values using them applying standard deviation of local mask under the AWGN environment in this study. As the result of the simulation, The proposed algorithm shows a high PSNR of 24.56[dB] for Barbara images that had been damaged of AWGN(
), compared to the existing MF, CWMF and AWMF there were improvements by 3.34[dB], 2.57[dB], and 3.32[dB], respectively.
Application of Flipped Learning in Database Course
Kim, Eun-Gyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 847~856
DOI : 10.6109/jkiice.2016.20.4.847
Flipped learning is a pedagogic model in which the typical lecture and homework elements of a course are reversed. Short video lectures or e-learning contents or other learning materials are viewed by students at home before the in-class session, while students are mainly carried out diverse active learning activities such as the discussions, exercises, team projects and so on in class time. Recently flipped learning has been emerging as an effective teaching-learning method that can train the 21st century talents who can create creative values based on fusion competencies. Based on the experience in applying the flipped learning to the database class that is an elective course of the school of computer engineering through three semesters, this paper proposes a flipped learning model consists of 7 steps in detail. Also, this paper analyzes the effects and weak points of the flipped learning and proposes several things for the successful flipped learning application.
Identification on Risk Factors of Outsourcing for Calculating Costs in Defense Industry Using AHP Technique
Kim, Ki-taek ; Shim, Sang-Ryul ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 4, 2016, Pages 857~865
DOI : 10.6109/jkiice.2016.20.4.857
It has been four years after outsouring to private outsourced institute about calculating the costs on defense industry was commenced. Although the objectivity and reliablity has been improved somewhat, there were also a negative view of spending more time and money such as a costing official re-calculates the costs on the results by out-sourced institute. Therefore I want to study on countermeasure about the risks according to the importance by analysing a priority with deriving susceptible risk factors from the outsourced institute's conduct of calculating the costs in defense industry through this study. The purpose of this study contributes to the reduction of defense budget, a guarantee of the reasonable profit for defense suppliers and the improvement the effective strength of an army with a smooth supply procurement by managing the risks in advance about the conduct regarding to the outsourcing for calculating costs on defense materials in the future.