Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Industrial Information Systems Research
Journal Basic Information
Journal DOI :
The Korea Society for Industrial Systems
Editor in Chief :
Volume & Issues
Volume 8, Issue 4 - Dec 2003
Volume 8, Issue 3 - Sep 2003
Volume 8, Issue 2 - Jun 2003
Volume 8, Issue 1 - Mar 2003
Selecting the target year
Statistical Process Control of Stochastic Network for the evaluation of six sigma Level
Journal of the Korea Industrial Information Systems Research, volume 8, issue 1, 2003, Pages 1~8
There are many statistical evaluation methods, A more technical Perspective is needed in estimating the effect of the Manufacturing Process for improving the Productivity, Process network analysis is a technique which has the potentiality for a wire use to improve the manufacturing process which other techniques can't be used to analyze effectively. The concept of six sigma plan was developed and pursued by Motorola to improve the process control. The goals of six sigma plan are established on the foundation of customer satisfaction such as Quality, Cost Delivery and Service This paper presents how to improve the manufacturing process by statistical process control for the evaluation of six sigma level.
Analysis of circular waveguide transformer using FDTD
Journal of the Korea Industrial Information Systems Research, volume 8, issue 1, 2003, Pages 9~17
The finite-difference time-domain (FDTD) method is used to analyze circular waveguide transformer in order to match different two waveguides. 2-dimensional cylindrical FDTD algorithm is applied for rotationally symmetric. The transformer is inserted at a circular-to-circular waveguide junction and two type transformers are proposed. One is a partially dielectric filled circular waveguide type and the other is filled a tapered circular dielectric rod. The numerical results are derived for various structure parameters, such as transformer length. dielectric diameter and waveguide diameter.
Adaptive dissolve detection based on video editing model
Journal of the Korea Industrial Information Systems Research, volume 8, issue 1, 2003, Pages 18~25
In this Paper, we propose a dissolve detection method based on video editing model. Our method consists of two steps In the first step, the candidate regions are found by using the first md second derivative of a variance curve. In a variance curve, a dissolve presents a parabola that is downward convex. Therefore the parabola is found as a candidate region for a dissolve. In the second step, the candidate region is verified for a dissolve region. In each candidate region, a variance at a valley of the parabola corresponding to dissolve is estimated and then the candidate region is verified by using estimated valley's variance. The valley's variance is determined by neighbor scene variances, so proposed method is adaptive to detect dissolve with various variances. Experiment results on video of various content types are reported and validated.
Lossless image compression based Quadtree with F-transform
Journal of the Korea Industrial Information Systems Research, volume 8, issue 1, 2003, Pages 26~32
As the computer communication becomes generalized thanks to the advancement in information technology, the technology to process a large amount of images is much more required. The paper proposed a lossless image compression method using quadtree algorithm and F-transform, which efficiency transmission and storage. The computer simulation shows that compression ratio to make use of proposed method turned out to be improved more significantly compared with the established L-JPEG, LOCO-I, CALIC.
Determination of Thematic Roles according to Syntactic Relations Using Rules and Statistical Models in Korean Language Processing
Journal of the Korea Industrial Information Systems Research, volume 8, issue 1, 2003, Pages 33~42
This paper presents an efficient determination method of thematic roles from syntactic relations using rules and statistical model in Korean language processing. This process is one of the main core of semantic analysis and an important issue to be solved in natural language processing. It is problematic to describe rules for determining thematic roles by only using general linguistic knowledge and experience, since the final result may be different according to the subjective views of researchers, and it is impossible to construct rules to cover all cases. However, our hybrid method is objective and efficient by considering large corpora, which contain practical usages of Korean language, and case frames in the Sejong Electronic Lexicon of Korean, which is being developed by dozens of Korean linguistic researchers. To determine thematic roles more correctly, our system uses syntactic relations, semantic classes, morpheme information, position of double subject. Especially by using semantic classes, we can increase the applicability of our system.
Design and Verification of Applied Public Information Based Authentication Protocol in the Message Security System
Journal of the Korea Industrial Information Systems Research, volume 8, issue 1, 2003, Pages 43~54
E-Commerce, characterized by the exchange of message, occurs between individuals, organizations, or both. A critical promotion factor of e-Commerce is message authentication, the procedure that allows communicating parties to verify the received messages are authentic. It consists of message unforgery, message non-repudiation, message unalteration, and origin authentication. It is possible to perform message authentication by the use of public key encryption. PGP(Pretty Good Privacy) based on X.400 MHS(Message Handling System) and PKC(Public Key Cryptosystem) makes extensive use of message exchange. In this paper we propose, design and implement NMAP(New Message Authentication Protocol), an applied public information based encryption system to solve the message authentication problem inherent in public key encryption such as X.400 protocol and PGP protocol and were to cope with the verification of NMAP using fuzzy integral. This system is expected to be use in the promotion of the e-Commerce and can perform a non-interactive authentication service.
Implementation of RFID Reader System using the Data Encryption Standard Algorithm
Journal of the Korea Industrial Information Systems Research, volume 8, issue 1, 2003, Pages 55~61
The Data Encryption Standard(DES) has been a worldwide standard for over 20 years. DES is one of the block encryption techniques which ciphers 64-bit input data blocks using a 56-bit private key. The DES algorithm transforms 64-bit input in a series of steps into a 64-bit output. Thus, it is impossible to deduce the plaintext from the ciphertext which encrypted by this algorithm without the key. This paper presents an implementation of RFID roader system using the DES algorithm. An implemented system enhances the credibility of the encryption algorithm by using the Cipher Block Chining(CBC). Experimental results also show that the implemented system has better performance over the conventional commercial product.
A Study on Relationships Between Information Systems Risk and Password Characteristics
Journal of the Korea Industrial Information Systems Research, volume 8, issue 1, 2003, Pages 62~74
Information security becomes a critical attribute to corporate information systems as increased strategic an operational reliance on information systems. Current proliferation of password requires more attention on information security because its nature of external connection with password user makes information systems more vulnerable from various threats are an important element of information systems management. This study focused on two issues : (1) the relationships between risk management factors(asset, threat, vulnerability) and risk level affected by threat, (2) the relationships between risk level and key password characteristics(length, composition, lifetime, selection method).
Intrusion Detection System using Pattern Classification with Hashing Technique
Journal of the Korea Industrial Information Systems Research, volume 8, issue 1, 2003, Pages 75~82
Computer and network security has recently become a popular subject due to the explosive growth of the Internet Especially, attacks based on malformed packet are difficult to detect because these attacks use the skill of bypassing the intrusion detection system and Firewall. This paper designs and implements a network-based intrusion detection system (NIDS) which detects intrusions with malformed-packets in real-time. First, signatures, rules in NIDS like Snouts rule files, are classified using similar properties between signatures NIDS creates a rule tree applying hashing technique based on the classification. As a result the system can efficiently perform intrusion detection.
A Design of All-Digital QPSK Demodulator for High-Speed Wireless Transmission Systems
Journal of the Korea Industrial Information Systems Research, volume 8, issue 1, 2003, Pages 83~91
High-speed QPSK demodulator has been in important design objective of any wireless communication systems, especially those offering broadband multimedia service. This paper describes all-digital QPSK demodulator for high-speed wireless communications, and its hardware structures are discussed. All-digital QPSK demodulator is mainly composed of symbol time circuit and carrier recovery circuit to estimate timing and phase-offsets. There are various schemes. Among them, we use Gardner algorithm and Decision-Directed carrier recovery algorithm which is most efficient scheme to warrant the fast acquisition and tacking to fabricate FPGA chip. The testing results of the implemented onto CPLD-EPF10K100GC 503-4 chip show demodulation speed is reached up to 2.6[Mbps]. If it is implemented a CPLD chip with speed grade 1, the demodulation speed can be faster by about 5 times. Actually in case of designing by ASIC, its speed my be faster than CPLD by 5 times. Therefore, it is possible to fabricate the all-digital QPSK demodulator chipset with speed of 50[Mbps].
Performance of the Asymmetric Turbo Codes for Wireless ATM Transmission
Journal of the Korea Industrial Information Systems Research, volume 8, issue 1, 2003, Pages 92~96
A Study on the Consumer's Web Site Attitude by Product Perception
Journal of the Korea Industrial Information Systems Research, volume 8, issue 1, 2003, Pages 97~111
The purpose of this study is to identify the consumer's website attitude by product perception. There are a lot of benefits of some obstacles in the use of e-commence through the Internet-enabled website. The website or webpage is a marketing message for customers and many consumers use the Internet to acquire own informations. Indeed, it is necessary to construct positive attitude within an operating website, and IT is used as a useful tool for building the trust relationships with consumers. For eCRM in Internet era, it is very important to identify factors affecting consumer's website attitude. In sum, this study is focused the relationships between consumer's website attitude and product perception, brand attitude.
A Visualization Technique for Cyclic Queries in the Graphical Object Query Language OGQL
Journal of the Korea Industrial Information Systems Research, volume 8, issue 1, 2003, Pages 112~120
We propose a graphical object query language called OGPL (Odysseus Graphical Query Language) for Odysseus object databases. By employing simple graphical notations, OGQL provides a user friendly database interface for object databases. OGQL provides a simple graphical notation for advanced features of the object queries such as path expressions including cycles (cyclic queries). Cyclic queries have not been handled in the previous graphical query languages because of their complexity and ambiguity in devising appropriate graphical notations. GOQL also provides a graphical notation for inheritance hierarchy. Since OGQL has been implemented in Java and JDBC standard interface, users can access the remote databases in a web environment and the system has platform-independent architecture.
Validating MEDIQUAL Constructs: Reliability, Empathy, Assurance, Tangibles, and Responsiveness
Lee, Sang-Gun ; Sangjin Yoo ; Lee, Hu-Hyuk ;
Journal of the Korea Industrial Information Systems Research, volume 8, issue 1, 2003, Pages 121~130
In this paper, we validate MEDIQUAL constructs through different media users in help desk. In a previous paper only two end-users' constructs were used: assurance and responsiveness. In this paper we extended MEDIQUAL constructs to include reliability, empathy, assurance, tangibles, and responsiveness, which are based on the SERVQUAL theory. The results suggested that: 1) five MEDIQUAL constructs were validated through the factor analysis. That is, importance of the constructs have relatively high correlations between measures of the same construct using different methods and low correlations between measures of construct that are expected to differ (Cronbach, 1971; Campbell and Fiske, 1959) 2) five MEDIQUAL constructs are statistically significant on media users' satisfaction in help desk service by regression analysis.