Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Industrial Information Systems Research
Journal Basic Information
Journal DOI :
The Korea Society for Industrial Systems
Editor in Chief :
Volume & Issues
Volume 14, Issue 5 - Dec 2009
Volume 14, Issue 4 - Dec 2009
Volume 14, Issue 3 - Sep 2009
Volume 14, Issue 2 - Jun 2009
Volume 14, Issue 1 - Mar 2009
Selecting the target year
Extraction of Car License Plate Region Using Histogram Features of Edge Direction
Kim, Woo-Tae ; Lim, Kil-Taek ;
Journal of the Korea Industrial Information Systems Research, volume 14, issue 3, 2009, Pages 1~14
In this paper, we propose a feature vector and its applying method which can be utilized for the extraction of the car license plate region. The proposed feature vector is extracted from direction code histogram of edge direction of gradient vector of image. The feature vector extracted is forwarded to the MLP classifier which identifies character and garbage and then the recognition of the numeral and the location of the license plate region are performed. The experimental results show that the proposed methods are properly applied to the identification of character and garbage, the rough location of license plate, and the recognition of numeral in license plate region.
An Iterative Digital Image Watermarking Technique using Encrypted Binary Phase Computer Generated Hologram in the DCT Domain
Kim, Cheol-Su ;
Journal of the Korea Industrial Information Systems Research, volume 14, issue 3, 2009, Pages 15~21
In this paper, we proposed an iterative digital image watermarking technique using encrypted binary phase computer generated hologram in the discrete cosine transform(OCT) domain. For the embedding process of watermark, using simulated annealing algorithm, we would generate a binary phase computer generated hologram(BPCGH) which can reconstruct hidden image perfectly instead of hidden image and repeat the hologram and encrypt it through the XOR operation with key image that is ramdomly generated binary phase components. We multiply the encrypted watermark by the weight function and embed it into the DC coefficients in the DCT domain of host image and an inverse DCT is performed. For the extracting process of watermark, we compare the DC coefficients of watermarked image and original host image in the DCT domain and dividing it by the weight function and decrypt it using XOR operation with key image. And we recover the hidden image by inverse Fourier transforming the decrypted watermark. Finally, we compute the correlation between the original hidden image and recovered hidden image to determine if a watermark exits in the host image. The proposed watermarking technique use the hologram information of hidden image which consist of binary values and encryption technique so it is very secure and robust to the external attacks such as compression, noises and cropping. We confirmed the advantages of the proposed watermarking technique through the computer simulations.
Network Anomaly Detection using Association Rule Mining in Network Packets
Oh, Sang-Hyun ; Chang, Joong-Hyuk ;
Journal of the Korea Industrial Information Systems Research, volume 14, issue 3, 2009, Pages 22~29
In previous work, anomaly-based intrusion detection techniques have been widely used to effectively detect various intrusions into a computer. This is because the anomaly-based detection techniques can effectively handle previously unknown intrusion methods. However, most of the previous work assumed that the normal network connections are fixed. For this reason, a new network connection may be regarded as an anomalous event. This paper proposes a new anomaly detection method based on an association-mining algorithm. The proposed method is composed of two phases: intra-packet association mining and inter-packet association mining. The performances of the proposed method are comparatively verified with JAM, which is a conventional representative intrusion detection method.
Development of Mobile DICOM Image Viewer for Decipher of Medical Images
Lee, Jung-Il ; Park, Seung-Je ; Won, Hul-Chul ;
Journal of the Korea Industrial Information Systems Research, volume 14, issue 3, 2009, Pages 30~36
With the rapid progress of medical image information system, a variety of researches for the system that can read and decipher the medical images in anytime and anywhere have been studied. In this paper, we develop personal digital assistant (PDA) device based mobile digital imaging and communications in medicine (DICOM) image viewer that can process the received medical images at any time. In particular, with the aid of the proposed mobile DICOM image viewer, we can read several images simultaneously and we can read the selected image only from the several images. To cope with the small size of PDA screen, the function of image enlargement is also included in the proposed mobile DICOM image viewer.
Locating and Searching Hidden Messages in Stego-Images
Ji, Seon-Su ;
Journal of the Korea Industrial Information Systems Research, volume 14, issue 3, 2009, Pages 37~43
Steganography conceals the fact that hidden message is being sent on the internet. Steganalysis can be detected the abrupt changes in the statistics of a stego-data. After message embedding, I have analyzed for the statistical significance of the fact the occurrence of differences among the four-neighboring pixels. In this case, when a embedding messages within a images is small, use EC value and chi-square test to determine whether a distribution in an images matches a distribution that shows distortion from stego-data.
A Design and Implementation of Information System Using Zigbee Technology
Ha, Kyeoung-Ju ;
Journal of the Korea Industrial Information Systems Research, volume 14, issue 3, 2009, Pages 44~49
We show the way how to design and develop the information system using Zigbee technology. First we set the protocol for zigbee tag and reader. And then we give the information system using designed system based on zigbee technology. In this paper, we use MG2455-F48 module as zigbee module.
Adaptive relay node search scheme for reducing network fragmentation
Hong, Won-Kee ; Byun, Jeong-Sik ;
Journal of the Korea Industrial Information Systems Research, volume 14, issue 3, 2009, Pages 50~57
We propose a network node search scheme to address the network fragmentation due to high node mobility in the VANET. VANET is very similar to MANET in that a multi-hop ad-hoc network is configured by wireless communication between vehicles without any network infrastructure. However, high speed mobility, high node density, and frequent topology change induce frequent network fragmentation so that overall network traffic can be increased. In this paper, new broadcasting protocol called an adaptive relay node search protocol is proposed to decrease the network fragmentation. It reduces the network fragmentation and network traffic by researching nodes outside the dangerous area only in case of network fragmentation. Simulation results show that the proposed protocol decreases network fragmentation by up to 39.9% and increase informed rate by up to 41.9% compared to the existing broadcasting protocol.
Developing a Model of Technology Readiness Levels(TRLs) for a Large-Scale National Research and Development Project
Hong, Jin-Won ; Park, Seung-Wook ; Suh, Woo-Jong ; Park, Ji-Man ;
Journal of the Korea Industrial Information Systems Research, volume 14, issue 3, 2009, Pages 58~75
As practicalization and commercialization of the technologies invented from the national R&D(Research & Development) project has been emerging as an important issue, the need for a tool for R&D project management has been increased. Technology Readiness Levels model(TRL) has currently been used for R&D project management because it provides distinctive definition of the nine levels in the progress of technology development starting from the basic research level to the utilization level. However, it is difficult to adopt the model for a large-scale national R&D project in which multiple research projects are involved simultaneously. In addition, TRL demands evaluation of research projects done by relevant experts and offers no specific measures determining the level of technology development. This study uses Delphi method to develop the measurement system helping to determine technology readiness levels for the technologies invented in a large scale national R&D project. The proposed model includes definition and measurement scles for each level in TRL.
A Study on the Power Process and Sustainable Competitive Advantage
Lee, Kyung-Hwan ;
Journal of the Korea Industrial Information Systems Research, volume 14, issue 3, 2009, Pages 76~97
The strategic management process includes the establishment of competitive strategy, its implementation and the measurement of its performance. The sucess of strategic management largely depends on the integration of strategic management process into a managerial tool. This study is on the integration of strategic management process into a managerial tool based on the power process, so that it contributes to strategic success or sustainable competitive advantage of a ￡inn In order to do this, I discussed the principles of the power process, its characteristics, and then suggest their applications to the integration of the strategic management process. According to the results, the power process offers a theoretical and managerial tool which integrates the establishment of competitive strategy with managerial concepts, so that it increases the likelihood of strategic success. Furthermore I discussed the position of the power process approach to competitive advantage in a manner that displays similarities and differences with existing approaches such as industry organizational, resource-based and game theory approach.
Human Search Patterns on Product Comparison Service
Lee, Hong-Hee ; Lee, Choog-Kwon ; Yoo, Sang-Jin ;
Journal of the Korea Industrial Information Systems Research, volume 14, issue 3, 2009, Pages 98~105
It is important for firms to help customers find the products or information they need in order to increase sales and promote return visits to their websites. Hence, the presentation of product information is very important in e-commerce websites. In this research, we study how disposition styles can influence browsing patterns. The test results show that people are inclined to use feature information paths in the vertical disposition style and product information paths in the horizontal disposition style. With vertical disposition, users are more likely to follow feature information paths which may help them focus on comparisons across products.
Classification Analysis for the Prediction of Underground Cultural Assets
Yu, Hye-Kyung ; Lee, Jin-Young ; Na, Jong-Hwa ;
Journal of the Korea Industrial Information Systems Research, volume 14, issue 3, 2009, Pages 106~113
Various statistical classification methods have been used to establish prediction model of underground cultural assets in our country. Among them, linear discriminant analysis, logistic regression, decision tree, neural network, and support vector machines are used in this paper. We introduced the basic concepts of above-mentioned classification methods and applied these to the analyses of real data of I city. As a results, five different prediction models are suggested. And also model comparisons are executed by suggesting correct classification rates of the fitted models. To see the applicability of the suggested models for a new data set, simulations are carried out. R packages and programs are used in real data analyses and simulations. Especially, the detailed executing processes by R are provided for the other analyser of related area.