바로가기메뉴

본문 바로가기 주메뉴 바로가기

logo

Vol.1 No.2

Song Young-Jun ; Kim Young-Gil ; Kim Nam pp.1-4
초록보기
Abstract

In this paper, we compare 5 weighted distance measures between feature vectors with respect to the recognition performance of the principal component analysis(PCA)-based face recognition method, and propose modified weighted distance. The proposed method was modification of z, the weighted vector. The simulation was performed using the ORL face database, showed the best result for some weighted distances such as weighted manhattan, weighted angle-based, weighted modified manhattan, and weighted modified SSE. We also showed that using some various values of z(weighted values) we can achieve better recognition results that using the existing weighted value.

Sun Bok-Keun ; Han Kwang-Rok pp.5-9
초록보기
Abstract

Currently most Internet documents including data are made based on predefined templates, but templates are usually formed only for main data and are not helpful for information retrieval against indexes, advertisements, header data etc. Templates in such forms are not appropriate when Internet documents are used as data for information retrieval. In order to process Internet documents in various areas of information retrieval, it is necessary to detect additional information such as advertisements and page indexes. Thus this study proposes a method of detecting the layout of Web pages by identifying the characteristics and structure of block tags that affect the layout of Web pages and calculating distances between Web pages. This method is purposed to reduce the cost of Web document automatic processing and improve processing efficiency by providing information about the structure of Web pages using templates through applying the method to information retrieval such as data extraction.

Kim Min-Kyung ; Kim Won-Il ; Kim Jin-Sung pp.10-12
초록보기
Abstract

Along with development of the Internet, education is achieved on-line actively. Therefore, interest about computer aided learning is growing. By a lot of advantages such as expense and time-saving side, this type of learning is widening area gradually. In this paper we discuss some of the learning technology, such as e-learning, m-learning, and u-learning.

Lim Seog-Ku pp.13-17
초록보기
Abstract

Base Station Controller which belongs to IMT-2000(International Mobile Telecommunication - 2000) network has several types of structure for efficient control protocol. This difference of structure occurs two different protocols for call handling. Recently the need of IMT-2000 is highly increasing, so it is important to analyze the performance of processors and IPC(Inter-Processor Communication) module with structure of BSC and protocol difference. This paper presents the performance comparison of different types of BSC in view of processor utilization, waiting time, queue length and QoS(Quality of Service) through the simulation model.

So Yo-Hwan ; Kim Seok-Soo pp.18-21
초록보기
Abstract

The following suggested algorithm is completed care report for the family medical history. Rn=<TEX>$U\;Pnj+U\;Dn^i$</TEX> : (j=1,2,...,j), (i=1,2,...,i), (n=1,2,...,n) The Rn(completed care report) integrates comprehensive patients reports ranging from patient <TEX>$P^2\;to\;P^j$</TEX> including <TEX>$P^1$</TEX> (oneself) with the doctors' care reports up to the care No. no by i number of doctors (<TEX>$D^1$</TEX> =doctor in charge, <TEX>$D^{2,3...i}$</TEX>=doctors on corporation program.) This approach, since a participation in a family membership effectuates all of family members, can minimize the membership fees, thus enabling inter-family health care on a home doctor basis.

Kim Seok-Soo ; Soh Woo-Young pp.22-25
초록보기
Abstract

Enterprise security management system: Enterprise Security Management (EMS) is centralized integrated management of other kind of security solutions such as intrusion cutoff system, intrusion detection system and virtual private network. With the system, it is possible to establish security policies for entire IT system through interlocking of solutions. A security system of company network is progressing as a ESM(Enterprise Security Management) in existing security solution foundation. The establishment of the security policy is occupying very important area in ESM of the security system. We tried to analyze existing ESM system for this and designed security solution structure for enhancing the inside security. We applied implementing directly IDS system and tested. This test set the focus about inside security

Kang Yun-Hee pp.26-30
초록보기
Abstract

According to the fast growth of information on the Internet, it is becoming increasingly difficult to find and organize useful information. To reduce information overload, it needs to exploit automatic text classification for handling enormous documents. Support Vector Machine (SVM) is a model that is calculated as a weighted sum of kernel function outputs. This paper describes a document classifier for web documents in the fields of Information Technology and uses SVM to learn a model, which is constructed from the training sets and its representative terms. The basic idea is to exploit the representative terms meaning distribution in coherent thematic texts of each category by simple statistics methods. Vector-space model is applied to represent documents in the categories by using feature selection scheme based on TFiDF. We apply a category factor which represents effects in category of any term to the feature selection. Experiments show the results of categorization and the correlation of vector length.

Lee Seong-Hoon pp.31-34
초록보기
Abstract

The new realtime applications like multimedia and realtime services in a wireless network will be dramatically increased. However, many realtime services of mobile hosts in a cell cannot be continued because of insufficiency of useful channels. Conventional channel assignment approaches didn't properly consider the problem to serve realtime applications in a cell. This paper proposes a new realtime channel assignment algorithm based on time constraint analysis of channel requests. The proposed algorithm dynamically borrows available channels from neighboring cells. It also supports a smooth handoff which continuously serves realtime applications of the mobile hosts.

Lim Joong-Soo pp.35-38
초록보기
Abstract

This paper describes a design of simple and precision direction finder that can be adapted to shipboard or mobile vehicles used for Electronic support measure, ELINT and radio signal monitoring systems. The direction finding technology has improved with monolithic integrated circuit, linear array antennas, and interferometer. Interferometer uses the phase-comparison principle and has a good direction finding accuracy but it has an ambiguity problem. We suggest a simple ambiguity solver using phase-comparison technology with amplitude-comparison principle. The direction finding device that has been designed by the suggested method has 0.7 degree RMS error in azimuth angle and 0.6 degree RMS error in elevation angle in 0.5 - 2.0 GHz.

Shin Seung-Eun ; Seo Young-Hoon pp.39-43
초록보기
Abstract

In this paper, we describe a generation mechanism of semantic-based queries for high accuracy information retrieval and question answering. It is difficult to offer the correct retrieval result because general information retrieval systems do not analyze the semantic of user's natural language question. We analyze user's question semantically and extract semantic features, and we .generate semantic-based queries using them. These queries are generated using the se-mantic-based question analysis grammar and the query generation rule. They are represented as semantic features and grammatical morphemes that consider semantic and syntactic structure of user's questions. We evaluated our mechanism using 100 questions whose answer type is a person in the TREC-9 corpus and Web. There was a 0.28 improvement in the precision at 10 documents when semantic-based queries were used for information retrieval.

Park Chur-Woong pp.44-47
초록보기
Abstract

One of the most important characteristics in Hollywood movies is that Hollywood movies have created heroes. But, the meaning of heroes in Hollywood movies is different from proto- typical heroes. America has such a short history, so it doesn't have the mythology. It is also consist of multi-race, culture. Thus, America people, especially governor need something that tie up governed people spiritually. Hollywood film industry has responded about this expectation since 1920's. Hollywood film producers have created mythology and hero like the western genre and Rambo. Now days, America, as only super power, wants to spread it's mythology and heroes over the world. That is cultural Imperialism.

편집부 pp.48-51

INTERNATIONAL JOURNAL OF CONTENTS