Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Industrial Information Systems Research
Journal Basic Information
Journal DOI :
The Korea Society for Industrial Systems
Editor in Chief :
Volume & Issues
Volume 12, Issue 5 - Dec 2007
Volume 12, Issue 4 - Dec 2007
Volume 12, Issue 3 - Sep 2007
Volume 12, Issue 2 - Jun 2007
Volume 12, Issue 1 - Mar 2007
Selecting the target year
A Query Expansion Technique using Query Patterns in QA systems
Kim, Hea-Jung ; Bu, Ki-Dong ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 1, 2007, Pages 1~8
When confronted with a query, question answering systems endeavor to extract the most exact answers possible by determining the answer type that fits with the key terms used in the query. However, the efficacy of such systems is limited by the fact that the terms used in a query may be in a syntactic form different to that of the same words in a document. In this paper, we present an efficient semantic query expansion methodology based on query patterns in a question category concept list comprised of terms that are semantically close to terms used in a query. The proposed system first constructs a concept list for each question type and then builds the concept list for each question category using a learning algorithm. The results of the present experiments suggest the promise of the proposed method.
A service scheme for the efficient digital contents distribution in mobile environments
Kim, Young-Hee ; Lee, Chang-Yeol ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 1, 2007, Pages 9~18
We use PKI technology for the digital content distribution in mobile environment. Encoding method is used TtipleDES and digital signature is used RSA. For the efficient methods and processes to the digital content distribution, we proposed the mechanism which consists of the sequential steps including the digital contents encoding step, rights management information signature step, and interconnection steps. As a result of this study, we propose the efficient and safe processes for the mobile content distribution environment.
Development of Intelligent Route Planning System for Intermodal Transportation
Choi, Hyung-Rim ; Kim, Hyun-Soo ; Cho, Min-Je ; Lee, Jung-Hee ; Sadeh Norman M. ; Park, Byung-Joo ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 1, 2007, Pages 19~27
The collection of schedule information for intermodal transportation and the establishment of the system to generate available transportation routes have become the basic and necessary factors for the logistics business. However, at present, due to the lack of an effective system, most logistics companies are not providing a sufficient and objective information service to their customers. In an effort to solve this problem, this study tried to develop an intelligent route planning system for intermodal transport, which can generate and select a route suitable to the demands of the user and based on all the collected schedule information of transportation mode.
Implementation of Microsoft COM Software Modules for Elliptic Curve Cryptographic Applications
Kim, Tae-Ho ; Kim, Chang-Hoon ; Nam, In-Gil ; Hong, Chun-Pyo ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 1, 2007, Pages 28~38
In this paper, we implement Microsoft COM software modules for elliptic curve cryptographic applications and analyze its performance. The implemented COM software modules support all elliptic curve key exchange protocols and elliptic curve digital signature algorithm in IEEE 1363 finite fields GF(p) and GF(2m). Since the implemented software modules intend to focus on a component-based software development method, and thus it have a higher productivity and take systematic characteristics to be open outward and to be standardized. Accordingly, it enable a software to be developed easier and faster rather than a method using C library. In addition it support the Microsoft COM interface, we can easily implement secure software applications based on elliptic curve cryptographic algorithms.
An Effective Postprocessing Algorithm for Block Encoded Images Using Adaptive Filtering and Interpolation
Park, Kyung-Nam ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 1, 2007, Pages 39~45
In this paper, we present a new postprocessing algorithm using interpolation and signal adaptive filter according to the each block characteristic which is acquired in block classification process. We applied blocking artifact reduction algorithm for four neighbor low frequency block and ringing artifacts is removed with preserving edges by applying a signal adaptive filter in high frequency block based on edge map. The computer simulation results confirmed a better performance by the proposed method in both the subjective and objective image qualities.
An unified rough and finish cut algorithm for NC machining of free form pockets with general polygon - Part 2. Experiment
Choi, Yong-Hoon ; Kim, Sang-Jin ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 1, 2007, Pages 46~53
NC (Numerical Control) code for the tool path needs to be generated efficiently for machining of free form pockets with arbitrary wall geometry on a three axis CNC machine. The unified rough and finish cut algorithm and the tool motion is graphically simulated in Part 1. In this paper, a grid based 3D navigation algorithm simulated in Part 1 for generating NC tool path data for both linear interpolation and a combination of linear and circular interpolation for three-axis CNC milling of general pockets with sculptured bottom surfaces is experimentally performed and verified.
MPEG-4 BIFS Optimization for Interactive T-DMB Content
Cha, Kyung-Ae ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 1, 2007, Pages 54~60
The Digital Multimedia Broadcasting(DMB) system is developed to offer high quality multimedia content to the mobile environment. The system adopts the MPEG-4 standard for the main video, audio and other media format. For providing interactive contents, it also adopts the MPEG-4 scene description that refers to the spatio-temporal specifications and behaviors of individual objects. With more interactive contents, the scene description also needs higher bitrate. However, the bandwidth for allocating meta data, such as scene description is restrictive in the mobile environment. On one hand, the DMB terminal renders each media stream according to the scene description. Thus the binary format for scene(BIFS) stream corresponding to the scene description should be decoded and parsed in advance when presenting media data. With this reasoning, the transmission delay of the BIFS stream would cause the delay in transmitting whole audio-visual scene presentations, although the audio or video streams are encoded in very low bitrate. This paper presents the effective optimization technique in adapting the BIFS stream into the expected bitrate without any waste in bandwidth and avoiding transmission delays inthe initial scene description for interactive DMB content.
Developing the Automatic Measurement System of Tree's Vigor based on Ubiquitous Sensor Network
Sim, Kyu-Won ; Jeon, Mun-Jang ; Kim, Jung-Gyu ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 1, 2007, Pages 61~71
The main purpose of this study was to develop Automatic Measurement System for monitoring tree's vigor using Ubiquitous Sensor Network This study also focused on presenting an alternative for monitoring automatically tree's vigor due to Shigometer's limits. Application test of the system in comparison with Shigometer showed that the measurement values were not different to choose between the two, and battery lasted about 1,844 days in this system. To test the sensor network the possible transmission distance using the sensor network in maximum was 130m. Investigation and management expenses can be reduced and labor productivity will also be improved in the forest and street trees.
A Serious Game Platform Design for Collaboration Game
Lee, Kwang-Jae ; Lee, Chang-Jo ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 1, 2007, Pages 72~79
This paper will analysis the Jam-O-Drum developed for collaborative musical experience at first. And we suggest the multi-user interactive game system Kom-O-Drum(Korean Jam-O-Drum) as a Serious Game Platform By combining velocity, direction and touch sensitive input devices like a korea traditional drum "Jang Go" and computer graphics imagery into an LCD or PDP display up to four simultaneous players are able to participate in a collaborative approach to game's mission. Also we introduce the design of detail input device and application fields of Kom-O-Drum for Serious Game.
The Estimation of the Coverage Probability in a Redundant System with a Control Module
Lim, Jae-Hak ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 1, 2007, Pages 80~86
The concept of the coverage has been played an important role in the area of reliability evaluation of a system. The widely used measures of reliability include the m time between failures, the availability and so on. In this paper, we propose an estimator of the coverage probability in a redundant system with a control unit and investigate some moments of the proposed estimator. And assuming exponential distribution of all units, we conduct a simulation study for calculating the estimates of the coverage probability and its confidence bounds. An example of evaluating the availability of an optical transportation system is illustrated.
Applying CSP techniques to automated scheduling with agents in distributed environment
Jung, Jong-Jin ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 1, 2007, Pages 87~94
Many researchers have modeled complicated problems with distributed AI technologies in distributed environment. Especially, intelligent agent technology we often proposed among researchers as efficient method to solve the complicated problems because agent technology makes possibile to share different problem solving abilities among processors in distributed processing environment. In this paper, we propose multiagent system model to solve distributed scheduling problem. At this point we apple CSP techniques to the multiagent model as individual problem solving ability of member agents. Scheduling problem is divided into subproblems according to constraints by distributed resources, then each agent solves its subproblem using CSP solver in the proposed model. This method improves scheduling efficiency. For meeting scheduling problem of case study, we show CSP modeling process and suggest problem solving procedure by multiagent system model.
Development of vision system for the recognition of character image which was included at the slab image
Park, Sang-Gug ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 1, 2007, Pages 95~100
In the steel & iron processing line, some characters are marked for the material management in the surface of material. This paper describes about the developed results of vision system for the recognition of material management characters, which was included in the slab image. Our vision system for the character recognition includes that CCD camera system which acquire slab image, optical transmission system which transmit captured image to the long distance, input and output system for the interface with existing system and monitoring system for the checking of recognition results. We have installed our vision system at the continuous casting line and tested. Also, we have performed inspection of durability, reliability and recognition rate. Through the testing, we have confirmed that our system have high recognition rate, 97.4%.
An Implementation of Stable Optical Security System using Interferometer and Cascaded Phase Keys
Kim, Cheol-Su ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 1, 2007, Pages 101~107
In this paper, we proposed an stable optical security system using interferometer and cascaded phase keys. For the encryption process, a BPCGH(binary phase computer generated hologram) that reconstructs the origial image is designed, using an iterative algorithm and the resulting hologram is regarded as the image to be encrypted. The BPCGH is encrypted through the exclusive-OR operation with the random generated phase key image. For the decryption process, we cascade the encrypted image and phase key image and interfere with reference wave. Then decrypted hologram image is transformed into phase information. Finally, the origianl image is recovered by an inverse Fourier transformation of the phase information. During this process, interference intensity is very sensitive to external vibrations. a stable interference pattern is obtained using self-pumped phase-conjugate minor made of the photorefractive material. In the proposed security system, without a random generated key image, the original image can not be recovered. And we recover another hologram pattern according to the key images, so can be used an authorized system.
Sensitivity Analysis of Expected Project Completion Time in a PERT Network with Discrete Distributions
Cho, Jae-Gyeun ; Park, Chul-Jae ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 1, 2007, Pages 108~117
For a PERT network the sensitivity analyses are valuable tools for effective management and control of a project. In a previous article, a method was developed for the sensitivity analysis of the expected project completion time (
) with respect to the expected duration of an activity (
) under the assumption that the durations of activities are independent and normally distributed. In the present article, a method is presented for the sensitivity analysis of
with respect to
when the durations of activities are independent and follow discrete distributions, which utilizes the previous sensitivity analysis method with modifications. The accuracy of the proposed method is assessed using various example PERT networks, and the computational results indicate that the accuracy is comparable to that of direct Monte Carlo simulation.