Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Industrial Information Systems Research
Journal Basic Information
Journal DOI :
The Korea Society for Industrial Systems
Editor in Chief :
Volume & Issues
Volume 13, Issue 5 - Dec 2008
Volume 13, Issue 4 - Dec 2008
Volume 13, Issue 3 - Sep 2008
Volume 13, Issue 2 - Jun 2008
Volume 13, Issue 1 - Mar 2008
Selecting the target year
Multiple-Model Probabilistic Design of Repetitive Controllers
Lee, Soo-Cheol ;
Journal of the Korea Industrial Information Systems Research, volume 13, issue 2, 2008, Pages 1~7
This paper presents a method to design a repetitive controller that is robust to variations in the system parameters. The uncertain parameters are specified probabilistically by their probability distribution functions. Instead of working with the distribution functions directly, the repetitive controller is designed from a set of models that are generated from the specified probability functions. With this multiple-model design approach, any number of uncertain parameters that follow any type of distribution functions can be treated. furthermore, the controller is derived by minimizing a frequency-domain based cost function that produces monotonic convergence of the tracking error as a function of repetition number. Numerical illustrations show how the proposed multiple-model design method produces a repetitive controller that is significantly more robust than an optimal repetitive controller designed from a single nominal model of the system.
An Home-Delivery Service Management System Using OMA DM Agents
Park, Kee-Hyun ; Yoo, Sang-Jin ;
Journal of the Korea Industrial Information Systems Research, volume 13, issue 2, 2008, Pages 8~17
Since different methods or protocols have been used to manage various mobile terminals, it has been difficult to manage mobile terminals efficiently. OMA(Open Mobile Alliance), therefore, proposed OMA DM(Device Management) as a standard for device management. In this paper, in an effort to apply the OMA DM concept ta real application area a home-delivery service management system using OMA DM agents is designed and implemented. The home-delivery service management system is developed using SyncML Tool Kit 4.3, SK WIPI SDK and Embedded Visual-C++ under the environment of SK-WIPI Clet. Since the home-delivery service management system is developed using OMA DD which is expected to be installed in most of the mobile terminals, separate lower level program modules for the management system would not be necessary. In order to justify this world some experiments are performed using SK WIPI emulator 1.1., which provides the same execution environments as a real mobile terminals does. Experiments show that the home-delivery service management system developed in this paper, works properly.
A Software Test Environment for Embedded Systems
Kang, Byeong-Do ;
Journal of the Korea Industrial Information Systems Research, volume 13, issue 2, 2008, Pages 18~27
In recent years, the functions added ta an embedded system have grown various and complex in most parts of the applications. Embedded software comes to include more functions and is getting bigger. Therefore it is getting difficult for software developers to keep the development time to market on time. This leads to a need for adequate design and test technique for embedded software. In this paper, we propose a software architecture style for embedded software. It facilitates the composition of reusable functions and helps developers reduce development time. We also propose a test method and tools for embedded software running on target systems.
Energy Aware Routing Protocol over Wireless Sensor Network
Choi, Hae-Won ; Yoo, Kee-Young ;
Journal of the Korea Industrial Information Systems Research, volume 13, issue 2, 2008, Pages 28~34
This paper reports the problem in the previous routing protocol, EAR, and proposes an energy aware routing protocol to solve the problem in it. Proposed routing protocol considers the number of hops, the possibility of node exhaustion, and the node energy amount at the same time from the source to the sink. Thereby, it could efficiently solve the potential network separation problem and the sensing hole problem in EAR. Proposed routing protocol could remove the problems in the previous routing protocols but it still gets the advantages in them.
Strategy development through Quality Assessments of Mobile Banking Service
Yang, Ji-Youn ; Yeo, Kyu-Hun ;
Journal of the Korea Industrial Information Systems Research, volume 13, issue 2, 2008, Pages 35~46
This research developed a strategy for mobile banking services based on the important factors deduced from quality assessment of mobile banking service that is experiencing rapid growth of user. SERVQUAL model and importance-performance tool were used. First, SERVQUAL model uses the important factors of mobile banking service selected from literature reviews. As a result, four dimensions that affect user satisfaction are found; assurance, customer orientation, tangibility, and reliability. Second, importance-performance analysis is to develop the strategy using the four factors. The final results revealed that assurance dimension had the strongest influence on user satisfaction. Assurance dimension of high expectation and yet low real performance needs immediate improvement. Customer orientation dimension of low expectation and performance should be reconsidered definition of satisfaction. On the other hand, tangibility dimension of higher performance than expectation is simply to maintain current level. Reliability dimension of high expectation and performance is recommended consistent management.
Information Technology Application for Oral Document Analysis
Park, Soon-Cheol ; Hahm, Han-Hee ;
Journal of the Korea Industrial Information Systems Research, volume 13, issue 2, 2008, Pages 47~55
The purpose of this paper is to develop an analytical methodology of or릴 documents by the application of. Information Technologies. This system consists of the key word search, contents summary, clustering, classification & topic tracing of the contents. The integrated model of the five levels of retrieval technologies can be exhaustively used in the analysis of oral documents, which were collected as oral history of five men and women in the area of North Jeolla. Of the five methods topic tracing is the most pioneering accomplishment both home and abroad. In final this research will shed light on the methodological and theoretical studies of oral history and culture.
An Investigation on the Relationships of Psychological Characteristics with Technology Affinity and Adoption Intention
Kim, Young-Kyun ;
Journal of the Korea Industrial Information Systems Research, volume 13, issue 2, 2008, Pages 56~68
Technology adoption has been an important issue for researchers and practitioners. In this paper, we identified the relationships between intention of technology adoption and technological affinity and other psychometric characteristics. We believe that technology affinity may be one of the general psychometric traits of individuals, and thus people have a different affinity levels which may influence the technology adoption intention. As a result it was found that need for cognition and self efficacy had positive influence on technology affinity, and the affinity also positively affected adoption intention. In addition, it was also found that technology affinity displayed a mediating role for the consumers adoption intention with need for cognition and self efficacy.
Mixed Mobile Education System using SIFT Algorithm
Hong, Kwang-Jin ; Jung, Kee-Chul ; Han, Eun-Jung ; Yang, Jong-Yeol ;
Journal of the Korea Industrial Information Systems Research, volume 13, issue 2, 2008, Pages 69~79
Due to popularization of the wireless Internet and mobile devices the infrastructure of the ubiquitous environment, where users can get information whatever they want anytime and anywhere, is created. Therefore, a variety of fields including the education studies methods for efficiency of information transmission using on-line and off-line contents. In this paper, we propose the Mixed Mobile Education system(MME) that improves educational efficiency using on-line and off-line contents on mobile devices. Because it is hard to input new data and cannot use similar off-line contents in systems used additional tags, the proposed system does not use additional tags but recognizes of-line contents as we extract feature points in the input image using the mobile camera. We use the Scale Invariant Feature Transform(SIFT) algorithm to extract feature points which are not affected by noise, color distortion, size and rotation in the input image captured by the low resolution camera. And we use the client-server architecture for solving the limited storage size of the mobile devices and for easily registration and modification of data. Experimental results show that compared with previous work, the proposed system has some advantages and disadvantages and that the proposed system has good efficiency on various environments.
A Study on RFID System for Accessing Multiple Objects Using Encrypted ID
Jung, Jong-Jin ; Kim, Ji-Yeon ;
Journal of the Korea Industrial Information Systems Research, volume 13, issue 2, 2008, Pages 80~87
RFID systems are being studied and developed in the area of the industry and marketplace. Recently RFID systems are core element of the ubiquitous technologies in individual life and industry. However, RFID systems often cause some serious problems such as violation of privacy and information security because their contactless devices communicate each other by radio frequency In this paper, we propose multiple objects RFID tag scheme including tag structure and authentication protocol. The proposed RFID tag structure maintains several object IDs of different applications in a tag memory. The tag structure allows those applications to access object IDs simultaneously. The authentication protocol for multiple objects tag is designed ta overcome the problems of security and privacy. The protocol has robustness against various attacks in low cost RFID systems. We evaluate the efficiency of proposed scheme and compare security of our scheme with several traditional schemes.
A study on the method of the personnel recording of DHRMIS
Cho, Young-Pyong ; Yang, Hae-Sool ;
Journal of the Korea Industrial Information Systems Research, volume 13, issue 2, 2008, Pages 88~99
In this article, DHRMIS being developed with ERP at resent realizes the personnel affairs recording procedures that all the Ministry of National Defense, the army, the navy and the air force can use on personnel affairs in order to solve the problem of the personnel recording procedures of the MND and each of the troops such as using manual affairs together with computation affairs, absence of electronic recording managements in some of the institutions MND, insufficiency of real time recording, and excess of centralized managements to present and record the personnel data. The personnel recording procedures consist of standardized personnel recording procedures and definition of the personnel recording procedures. This personnel recording procedures propose 3 improvements such as an atomic electronic recording management, a real time recording affair, effective centralization and distribution of verification authority so as to guarantee authentication, integrity, reliance, and accessibility of personnel data. When proposed personnel recording procedures are realized through developing DHRMS, these can bring on unification of 10 recording management systems, reduction of recording management time from 45 days to 3 days, distribution of verification authority MND, each of the troops, each of the institutes, an individual, and reduction of some of the manual documents.