Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Industrial Information Systems Research
Journal Basic Information
Journal DOI :
The Korea Society for Industrial Systems
Editor in Chief :
Volume & Issues
Volume 12, Issue 5 - Dec 2007
Volume 12, Issue 4 - Dec 2007
Volume 12, Issue 3 - Sep 2007
Volume 12, Issue 2 - Jun 2007
Volume 12, Issue 1 - Mar 2007
Selecting the target year
A Study on the Design and Analysis of a Mobile Game
Woo, Won-Taek ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 2, 2007, Pages 1~15
The purpose of this study is to design and develop a mobile game using J2ME, which is currently the most popular choice for game development to understand the process of mobile game development and to develop methods that address weaknesses of J2ME. The development was done with the Eclipse IDE(Integrated Development Environment) tool to simplify mobile game development by removing the need for complex commands and installation processes which are intrinsic to the DOS command Batch file arid J2ME Wireless Toolkit when used for the implementation of java mobile games. Literature was also reviewed on mobile game environments, the structures of J2ME Platform, and past research on mobile games, to investigate which parts of J2ME are important to the characteristics of mobile game development and how to implement these important parts when developing.
Optimization of Buffers Capacity in Tandem Queueing Systems with Batch Markovian Arrivals Process
Kim, Che-Soong ; Lee, Seok-Jun ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 2, 2007, Pages 16~23
Tandem queueing systems well suit for modeling many telecommunication systems. Recently, very general
type tandem queues were constructively studied. In this paper we illustrate application of the obtained results for optimization of a buffer pool design.
An Authentication Protocol using the EXOR and the Hash Function in RFID/USN
Shin, Jin-Seob ; Park, Young-Ho ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 2, 2007, Pages 24~29
The essential factor of ubiquitous is security technology to properly prepare making possible network access, economic and convenient information exchange. This paper proposes an authentication protocol for RFID as one technology to realize such an ubiquitous. The proposed protocol used only the EXOR and the hash function operations reduces operations at RFID tag, which improves stability compared to existing protocols.
A Study for Vulnerability of Security of the UPnP Home-Networking
Oh, Im-Geol ; Lee, Jong-Il ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 2, 2007, Pages 30~36
The UPnP uses the same standard protocol as SSDP and UDP based on standard internet and technology like the TCP/IP, and is independent of other physical networking product. But the structure of the UPnP has the of vulnerability to the security countermeasure for home-networking technology since it is operated on the same protocol as the SSDP and UDP. In this paper, we analyze and report against the DoS attack, where the worm virus, using the vulnerability to the UPnP, eliminates the attack of all equipments that are based on networking and eliminates the information belonging to the equipments of the home-networking or transmits the massive data.
Development of the automated gate system based on RFID/OCR in a container terminal
Choi, Hyung-Rim ; Park, Byung-Joo ; Shin, Joong-Jo ; Keceli, Yavuz ; Lee, Jung-Hee ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 2, 2007, Pages 37~48
In order to become a mega hub port, major ports all over the world are making every effort to enhance their productivity through efficiency of internal operation and introduction of the state-of-the-art technologies. They are not only installing various kinds of high-technology equipments but also introducing advanced technologies for the development of an effective gate system. Recently thanks to the appearance of RFID (radio frequency identification) and OCR (optical character recognition) technology, major container terminals are stewing up the automation of truck and container identification at the container luminal gate. This study aim to develop an automated gate system for identification task based on RFID and OCR technology. It will make mn effective gate operations in a container terminal.
Automatic semantic annotation of web documents by SVM machine learning
Hwang, Woon-Ho ; Kang, Sin-Jae ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 2, 2007, Pages 49~59
This paper is about an system which can perform automatic semantic annotation to actualize "Semantic Web." Since it is impossible to tag numerous documents manually in the web, it is necessary to gather large Korean web documents as training data, and extract features by using natural language techniques and a thesaurus. After doing these, we constructed concept classifiers through the SVM (support vector machine) teaming algorithm. According to the characteristics of Korean language, morphological analysis and syntax analysis were used in this system to extract feature information. Based on these analyses, the concept code is mapped with Kadokawa thesaurus, which made it possible to map similar words and phrase to one concept code, to make training vectors. This contributed to rise the recall of our system. Results of the experiment show the system has a some possibility of semantic annotation.
A Case Study on Remote Computer Vision Laboratory
Lee, Sung-Youl ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 2, 2007, Pages 60~67
This paper describes the development of on-line computer vision laboratories to teach the detailed image processing and pattern recognition techniques. The computer vision laboratories include distant image acquisition method, basic image processing and pattern recognition methods lens and light, and communication. This study introduces a case study that teaches computer vision in distance learning. environment. It shows a schematic of a distant teaming workstation and contents of laboratories with image processing examples. The study focus more on the contents of the vision Labs rather than internet application method. The study proposes the ways to improve the on-line computer vision laboratories and includes the further research perspectives.
Efficient Multiplication of Boolean Matrices and Algorithm for D-Class Computation
Han, Jae-Il ; Shin, Bum-Joo ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 2, 2007, Pages 68~78
D-class is defined as a set of equivalent
boolean matrices according to a given equivalence relation. The D-class computation requires the multiplication of three boolean matrices for each of all possible triples of
boolean matrices. However, almost all the researches on boolean matrices focused on the efficient multiplication of only two boolean matrices and a few researches have recently been shown to deal with the multiplication of all boolean matrices. The paper suggests a mathematical theory that enables the efficient multiplication for all possible boolean matrix triples and the efficient computation of all D-classes, and discusses algorithms designed with the theory and their execution results.
A CMOS Temperature Control Circuit for Direct Mounting of Quartz Crystal on a PLL Chip
Park, Cheol-Young ;
Journal of the Korea Industrial Information Systems Research, volume 12, issue 2, 2007, Pages 79~84
This papar reports design and fabrication of CMOS temperature control circuit using MOSIS 0.25um-3.3V CMOS technology. The proposed circuit has a temperature coefficient of
for a wide operating temperature range with a good linearity. Furthermore, the temperature coefficient of output voltage can be controlled by adjusting external bias voltage. This circuit my be applicable to the design of one-chip IC where quartz crystal resonator is mounted on CMOS oscillator chips.