Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Industrial Information Systems Research
Journal Basic Information
Journal DOI :
The Korea Society for Industrial Systems
Editor in Chief :
Volume & Issues
Volume 11, Issue 5 - Dec 2006
Volume 11, Issue 4 - Dec 2006
Volume 11, Issue 3 - Sep 2006
Volume 11, Issue 2 - Jun 2006
Volume 11, Issue 1 - Mar 2006
Selecting the target year
Batch Size Distribution in Input Flow to Queues with Finite Buffer Affects the Loss Probability
Kim Che-Soong ; Oh Young-Jin ;
Journal of the Korea Industrial Information Systems Research, volume 11, issue 1, 2006, Pages 1~6
Queueing models are good models for fragments of communication systems and networks, so their investigation is interesting for theory and applications. Theses queues may play an important role for the validation of different decomposition algorithms designed for investigating more general queueing networks. So, in this paper we illustrate that the batch size distribution affects the loss probability, which is the main performance measure of a finite buffer queues.
Development of Automatic Operating System for Exit Door using RF
Lim Youn-Sub ; Hwang Byung-Kon ;
Journal of the Korea Industrial Information Systems Research, volume 11, issue 1, 2006, Pages 7~12
In this paper, we develop a control system with fire receiver and emergency light that controls (manages) emergency door by wireless signals which prevents crime but also helps evacuate in (fire) emergency. This automatic door operator can be installed on any buildings which have a problem of opening or shutting emergency doors, and it is especially good for buildings with high fire vulnerabilities such as complex buildings, apartments and multistoried buildings without easy control of rooftop doors.
Spam-mail Filtering based on Lexical Information and Thesaurus
Kang Shin-Jae ; Kim Jong-Wan ;
Journal of the Korea Industrial Information Systems Research, volume 11, issue 1, 2006, Pages 13~20
In this paper, we constructed a spam-mail filtering system based on the lexical and conceptual information. There are two kinds of information that can distinguish the spam mail from the legitimate mil. The definite information is the mail sender's information, URL, a certain spam keyword list, and the less definite information is the word lists and concept codes extracted from the mail body. We first classified the spam mail by using the definite information, and then used the less definite information. We used the lexical information and concept codes contained in the email body for SVM learning. According to our results the spam precision was increased if more lexical information was used as features, and the spam recall was increased when the concept codes were included in features as well.
Design and Implementation of Video Conference System Using Hybrid Type P2P
Kim Hyen-Ki ;
Journal of the Korea Industrial Information Systems Research, volume 11, issue 1, 2006, Pages 21~28
This paper describes the design and implementation of video conference system using hybrid type P2P(Peer to Peer). The proposed video conference system has hybrid type P2P architecture based on a client-server and P2P(Peer to Peer), where client-server is used for exchange of account management, client list and status information and P2P is used for the real time video conference. The proposed video conference system decreases the traffic of server, and cuts down the load of a network. Because the multimedia data is decentralized to client by P2P. Also, this system is tested by the multi-party video conference system using communication protocol and application software through high speed networks.
Image Encryption using the chaos function and elementary matrix operations
Kim Tae-Sik ;
Journal of the Korea Industrial Information Systems Research, volume 11, issue 1, 2006, Pages 29~37
Due to the spread of mobile communication with the development of computer network, nowadays various types of multimedia data play an important role in many areas such as entertainments, culture contents, e-commerce or medical science. But for the real application of these data, the security in the course of saving or transferring them through the public network should be assured. In this sense, many encryption algorithm have been developed and utilized. Nonetheless, most of them have focused on the text data. So they may not be suitable to the multimedia application because of their large size and real time constraint. In this paper, a chaotic map has been employed to create a symmetric stream type of encryption scheme which may be applied to the digital images with a large amounts of data. Then an efficient algebraic encryption algorithm based on the elementary operations of the Boolean matrix and image data characteristics.
A Study on the Algorithms for Web Accessibility Evaluations
Hong Soon-Goo ; Park Ji-Yong ; Lee Dae-Hyung ;
Journal of the Korea Industrial Information Systems Research, volume 11, issue 1, 2006, Pages 38~48
Several software programs such as Bobby and A-Prompt developed based on the W3C's WCAG 1.0 guidelines have been employed to evaluate the accessibility of web sites. Although these programs make an evaluation of web accessibility easy and objective, many researchers pointed out that the results of web accessibility are lack of reliability. Therefore, this study is intended to suggest the modified algorithms for evaluating web accessibility focused on the 'images' and 'tables'. To verify them, we compared the accessibility of the Korean governmental web sites with new and current algorithms, respectively. The results show that the suggested algorithms are more accurate than the existent one.
A Study on the Measuring Model of Productivity Using DEA in Container Terminal
Choi Hyung-Rim ; Park Nam-Kyu ; Kwon Hae-Kyoung ; Yoo Dong-Ho ; Lim Sung-Taeck ; Lee Sun-Yong ; Jung Bong-Jin ;
Journal of the Korea Industrial Information Systems Research, volume 11, issue 1, 2006, Pages 49~57
In order to strengthen the competitiveness of port against calling for the huge vessel and reducing the shipping service time, the productivity of container terminal must be improved. This productivity variously results according to the kinds of productivity evaluation model, input elements like yard, equipment, employee, facility, etc,. But, it is discussed that the productivity is measured by partial productivity evaluation model or general input elements. Therefore, we measured for the productivity of the container terminal using the Developed the data Envelopment Analysis (DEA), which is developed in order to evaluate the relative efficiency of decision making units - it's difficult to clear cause and effect between input and output. We measured the whole productivity of container terminal in Busan according to decision of the correct input elements. And we investigated the change of the productivity measurement result according to input elements, presents more accurate productivity evaluation model in container terminal.
A Study on the Effects of Total Product Liability Activities on Firm Performance
Park Byung-Kwon ; Lim Chae-Kwan ;
Journal of the Korea Industrial Information Systems Research, volume 11, issue 1, 2006, Pages 58~68
The purpose of this study is to find empirical relationship between PL activities and firm performance. Five categories of PL activities and three performance measures were examined. Using a sample of 135 companies, we found that activities related to TQM practices and manufacturing defect had significant impacts on all three measures of performance. Activities related to design defect, warning defect and sales partially influenced performance measures. The result suggests that performance could be maximized by the mutual organic combination of the product safety efforts with the overall process from design to sales.
A remote vehicle diagnosis and control system based on mobile cellular network
Choi Yong-Wun ; Hong Won-Kee ;
Journal of the Korea Industrial Information Systems Research, volume 11, issue 1, 2006, Pages 69~76
Telematics, which is a compound word of a telecommunication and informatics, provides drivers with useful driving information such as driving path guidance, accident or robbery detection, traffic conditions and other valuable data at real time. This paper proposes and implements how to build a telematics terminal equipped with CDMA and GPS running embedded Linux, to check a vehicle's state through communication between telematics server and vehicle terminals using a cellular phone and to control a vehicle using SMS as shown in Figure 1. In order to do this, we use the SK-VM platform which is mobile terminal platform based on JAVA to design, implement and evaluate it.
Object Image Classification Using Hierarchical Neural Network
Kim Jong-Ho ; Kim Sang-Kyoon ; Shin Bum-Joo ;
Journal of the Korea Industrial Information Systems Research, volume 11, issue 1, 2006, Pages 77~85
In this paper, we propose a hierarchical classifier of object images using neural networks for content-based image classification. The images for classification are object images that can be divided into foreground and background. In the preprocessing step, we extract the object region and shape-based texture features extracted from wavelet transformed images. We group the image classes into clusters which have similar texture features using Principal Component Analysis(PCA) and K-means. The hierarchical classifier has five layes which combine the clusters. The hierarchical classifier consists of 59 neural network classifiers learned with the back propagation algorithm. Among the various texture features, the diagonal moment was the most effective. A test with 1000 training data and 1000 test data composed of 10 images from each of 100 classes shows classification rates of 81.5% and 75.1% correct, respectively.