Proceedings of the Korea Society of Information Technology Applications Conference (한국정보기술응용학회:학술대회논문집)
The Korea Society of Information Technology Applications
- Semi Annual
Domain
- Economics/Management > Management Information/e-Business
- Economics/Management > Operations Research and Management Science
2005.11a
-
The purpose of this paper is to propose a novel modeling approach called Services Ecosystem that applies the concept of ecosystems in ecology to Service-Oriented Software Development and Integration. For this purpose, an ecological system for software systems is proposed for the emerging Service-Oriented Computing paradigm, describing how participants interact with each other within their environments. Three emerging concepts, Service-Oriented Programming, Software Factories, and Service Grid, are employed to explain biotic and abiotic environments. Based upon the Services Ecosystem model, we demonstrate Services Ecosystem Model transformations by using a case example. The Services Ecosystem model is a novel approach for envisioning the Service-Oriented Computing paradigm in terms of an ecosystem in which the roles/perspectives of each participant and their relationships/interactions to environments are clearly described with a holistic view.
-
In this paper, we implemented an e-mail and chat program (client) for communication between mobile devices and PCs based on WIPI a South Korea's open wireless platform form developing device and content independent software to break from the way of developing contents that is dependent on different wireless platforms to each mobile communications company. While traditional e-mail and chat programs are written for PC-to-PC communication, we develop them for mobile-to-PC and mobile-to-mobile communications, and we expect to see various mobile contents in the future.
-
It would be desirable to have methods for specific problems, which have low communication costs compared to the computation costs, and in specific applications, algorithms need to be developed and mapped onto parallel computer architectures. Main memory access for shared memory system or global communication in message passing system deteriorate the computation speed. In this paper, it is found that the m-step generalization of the block Lanczos method enhances parallel properties by forming m simultaneous search direction vector blocks. QR factorization, which lowers the speed on parallel computers, is not necessary in the m-step block Lanczos method. The m-step method has the minimized synchronization points, which resulted in the minimized global communications compared to the standard methods.
-
In this work, we compared several feature selection methods in the field of spam mail filtering. The proposed fuzzy inference method outperforms information gain and chi squared test methods as a feature selection method in terms of error rate. In the case of junk mails, since the mail body has little text information, it provides insufficient hints to distinguish spam mails from legitimate ones. To address this problem, we follow hyperlinks contained in the email body, fetch contents of a remote web page, and extract hints from both original email body and fetched web pages. A two-phase approach is applied to filter spam mails in which definite hint is used first, and then less definite textual information is used. In our experiment, the proposed two-phase method achieved an improvement of recall by 32.4% on the average over the
$1^{st}$ phase or the$2^{nd}$ phase only works. -
In this paper, we constructed a two-phase spam-mail filtering system based on the lexical and conceptual information. There are two kinds of information that can distinguish the spam mail from the legitimate mail. The definite information is the mail sender's information, URL, a certain spam list, and the less definite information is the word list and concept codes extracted from the mail body. We first classified the spam mail by using the definite information, and then used the less definite information. We used the lexical information and concept codes contained in the email body for SVM learning in the
$2^{nd}$ phase. According to our results the spam precision was increased if more lexical information was used as features, and the spam recall was increased when the concept codes were included in features as well. -
Because of unreplenishable power resources, reducing node energy consumption to extend network lifetime is an important requirement in wireless sensor networks. In addition both path length and path cost are important metrics affecting sensor lifetime. We propose a dynamic clustering scheme based on location in wireless sensor networks. Our scheme can localize the effects of route failures, reduce control traffic overhead, and thus enhance the reachability to the destination. We have evaluated the performance of our clustering scheme through a simulation and analysis. We provide simulation results showing a good performance in terms of approximation ratios.
-
Mobile devices, such as PDAs, portable multimedia players, are more likely to encompass large storage devices with prevalance of high-quality multimedia contents. This paper proposes an object-based multimedia contents storage architecture that employs the object-based storage device model and the iSCSI protocol. It also provides a multimedia content player that operates directly with the proposed storage architecture. We implement both the proposed storage architecture and the multimedia content player upon the Linux environment. Performance evaluation by playing MP3 multimedia contents reveals that the proposed storage architecture reduces the total power consumption by 9%, compared with an existing networked storage. This enhancement is mainly contributed to the fact that a large portion of the file system is moved into the object-based multimedia contents storage from the mobile device.
-
In this paper, a wideband balun of tapered structure using planar microstrip is desigde ad analyzed. The balun structure was fabricated on a Teflon substrate with a thickness of 0.8mm and relative dielectric constant
${\varepsilon}_r$ of 2.5. Two back-to back CPW-to-CPS transitions were simulated and optimized using HFSS. A movel plaar balun using tapered structure of microstip to CPW is suggested and designed. The measurement result, the bandwidth for a reflection coefficient better than -10dB of the balun is 2GHz to 8GHz. The planar balun can improved the performance of wide band spiral antenna. -
In recent years, embedded systems have become so complex and the development time to market is required to be shorter than before. As embedded systems include more functions for new services, embedded software gradually grow in size, and development costs and time are increasing. In order to overcome this serious matter, we need a customized design and test technique for embedded software. In this paper, we present a software architecture style for embedded software. It facilitates the composition of reusable functions and helps developers to reduce development time. Because the costs associated with revealing errors of embedded software in applications are rising. we propose a test method and tools for target environments.
-
In this paper, we propose a new fast running FIR filter structure that improves the convergence speed of adaptive signal processing and reduces the computational complexity. The proposed filter is applied to wavelet based adaptive algorithm. Actually we compared the performance of the proposed algorithm with other algorithm using computer simulation of adaptive noise canceler based on synthesis speech. As the result, We know the proposed algorithm is prefer than the existent algorithm.
-
The disaster prevention information system is to comprehensively support information collection, processing, search and supply in disaster counter measuring activities, as well as to manage information mainly related to natural disasters unilaterally. Building an optimal system in adequate consideration of features and demands in terms of disaster prevention is requested. Suitable infrastructure that can support information technology (IT) in various aspects should be established in order to utilize IT effectively in disaster prevention information. In addition. accuracy, reliability and efficiency as a disaster prevention information system should be equipped with. In this study, a basic framework for the establishment of disaster prevention information system is presented.
-
Ubiquitous computing environment means the computing environment that has taken its position so closely with the ordinary living so much like air or water. In building up the U-Korea, one of the important issues is the social issue from the drastic increase of senior population. The contemporary society has its distinct trend in increase of senior household following the nuclear family orientation, increase of working parents with the advancement of women in society, unable to support seniors for long distance or short distance of business trip and other reasons that the need of senior welfare has been ever more felt. Accordingly, the Ministry of Government Affairs and Home Administration has developed the wireless paging system to make prompt response system for 119 Rescue when the single senior is encountered with emergency situation that is has been widely provided for the socially neglected people such as single senior, the disabled persons and others. Currently, the wireless paging system is operated as the sub-system for emergency rescue information system, but due to the lack of reliability of product, problems of terminal portable transmitter, receptor and others, rejection of beneficiary and lack of knowledge in use, insufficient management and supervision of managing officers, the efficiency has been declined that there is a need of development for the system. Therefore, this study proposes the context aware information structure of the subject of ubiquitous wireless paging system required for the development of the wireless paging system model of ubiquitous environment that improved the problems of currently operated wireless paging system.
-
The packet loss problem that occurs in the mobile multicast (MoM) protocol due to designated multicast service provider (DMSP) handoff is investigated through simulation experiments for several DMSP selection policies. Then, two enhanced DMSP schemes are proposed to minimize the packet loss of the MoM protocol with single DMSP. The first scheme uses a backup DMSP and greatly reduces the packet loss rate at the expense of the increased network traffic. The second scheme utilizes the extended DMSP operation and shows many desirable features such as the almost-zero packet loss rate and relatively low network traffic.
-
In this paper, an algorithm to extract bar-space area is suggested. In a section of bar-code space area the threshold value is computed, and bar and space are extracted according to threshold value. PDF417 is used everyday life and printed in many different materials. The printed PDF417 is especially influenced by various light source. The decision of bar and space is very hard under the change of illumination. The fixed threshold value to distinguish the bar and space can not be applied. in these cases, The proposed algorithm is developed to investigate variable threshold. The variable threshold can be obtained by simple calculation.
-
As life style becomes to be complicated, lots of support technologies were developed. The bar code technology is one of them. It was renovating approach to goods industry. However, data storage ability in one dimension bar code came in limit because of industry growth. Two-dimension bar code was proposed to overcome one-dimension bar code. PDF417 bar code most commonly used in standard two-dimension bar codes is well defined at data decoding and error correction area. More works could be done in bar code image acquisition process. Applying various image enhancement algorithms, the recognition rate of PDF417 bar code is improved.
-
The advanced information and communication technology gives vehicles another role of the third digital space, merging a physical space with a virtual space in a ubiquitous society. In the ubiquitous environment, the vehicle becomes a sensor node, which has a computing and communication capability in the digital space of wired and wireless network. An intelligent vehicle information system with a remote control and diagnosis is one of the future vehicle systems that we can expect in the ubiquitous environment. However, for the intelligent vehicle system, many issues such as vehicle mobility, in-vehicle communication, service platform and network convergence should be resolved. In this paper, an in-vehicle gateway is presented for an intelligent vehicle information system to make an access to heterogeneous networks. It gives an access to the server systems on the internet via CDMA-based hierarchical module architecture. Some experiments was made to find out how long it takes to communicate between a vehicle's intelligent information system and an external server in the various environment. The results show that the average response time amounts to 776ms at fixec place, 707ms at rural area and 910ms at urban area.
-
Wireless sensor networks(WSN) technology has various applications such as surveillance and information gathering in the uncontrollable area of human. One of major issues in WSN is the research for reducing the energy consumption and reliability of data. A system with forward error correction(FEC) can provide an objective reliability while using less transmission power than a system without FEC. In this paper, we propose to use LDPC codes of various code rate(0.53, 0.81, 0.91) for FEC for WSN. Also, we considered node-to-node interference in addition to AWGN channel. The proposed system has not only high reliable data transmission at low SNR, but also reduced transmission power usage.
-
Various design schemes for network using wireless sensor nodes have been widely studied on the several application areas ranging from the real world information collection to environmental monitor. Currently, the schemes are focused on the design of sensor network for low power consumption, power-aware routing protocol, micro miniature operating system and sensor network middleware. The indoor localization system that identifies the location of the distributed nodes in a wireless sensor network requires features dealing with mobility, plurality and other environmental constraints of a sensor node. In this paper, we present an efficient location system to cope with mobility of multiple mobile nodes by designing a location handler that processes location information selectively depending on the nodes' density in a specific region. In order to resolve plurality of multiple mobile nodes, a routing method for the location system is also proposed to avoid the occurrence of overlapped location data.
-
The advance of mobile and telematics technologies has produced vehicles with various convenient services for drivers. Specifically lots of researches and several technologies have been developed to provide services of a remote vehicle diagnosis and control. The existing and representative product for a vehicle control is a RCS (remote control system), but it has a problem of short control distance and fragile security. In this paper, a telematics terminal embedded with CDMA and GPS is designed, which can be connected to the Internet. It allows a driver with a cellular phone to remotely diagnosis and control a vehicle via wireless network and SMS.
-
Bones are dynamic structures, being supported by muscles, tendons, and ligaments. When some or all the structures are disturbed i.e. in fractures, the alignment of the bone in respect to the rest of the body is deranged. This gives rise to axial as well as rotational deformity in three dimensional planes. The correct alignment and position of the long bones are to be maintained to heal the bone in the best possible anatomical and functional position. The objective of this research is to address the problems in the current practice involving surgeon, assistant, fluoroscopy and crude mechanical means and to see if a robotic solution exists to solve the problems of manipulating and reducing long bone fractures. This paper presents various design aspects of the proposed surgeon-instructed, image-guided and robotic system including the system design specification, robot design and analysis, motion control and implementation, and x-ray image processing and incorporation in CAD environment.
-
In the paper, a proposed VCO based on bondwire inductances and nMOS varactors was implemented in a standard
$0.25\;{\mu}m$ CMOS process. Using the new drain current model and a propagation delay time model equations, the operation speed of CMOS gate will predict the dependence on the load capacitance and the depth of oxide, threshold voltage, the supply voltage, the channel length. This paper describes the result of simulation which calculated a gate propagation delay time by using new drain current model and a propagation delay time model. At the result, When the reverse bias voltage on the substrate changes from 0 voltage to 3 voltage, the propagation delay time is appeared the delay from 0.8 nsec to 1 nsec. When the reverse voltage is biased on the substrate, for reducing the speed delay time, a supply voltage has to reduce. The$g_m$ value of MOSFET is calculated by using new drain current model. -
This paper reports design and fabrication of CMOS temperature sensor circuit using MOSIS 0.25um CMOS technology. The proposed circuit has a temperature coefficient of
$13mV/^{\circ}C$ for a wide operating temperature range with a good linearity. This circuit may be applicable to the design of one-chip IC where quartz crystal resonator is directly mounted on CMOS oscillator chips. -
This paper deals with a fault detection system design for uncertain nonlinear systems modelled as T-S fuzzy systems with the integral quadratic constraints. In order to generate a residual signal, we used a left coprime factorization of the T-S fuzzy system. From the filtered signal of the residual generator, the fault occurence can be detected effectively. A simulation study with nuclear steam generator level control system shows that the suggested method can be applied to detect the fault in actual applications.
-
This paper describes a visual control scheme, fuzzy logic system for visual servoing of an autonomous mobile robot. An existing communication autonomous mobile robot always needs to keep the object in image to detect the moving object. This is a problem in an autonomous mobile robot for spontaneous activity. To solve it, some features for an object are taken from an image and then use in the design of fuzzy logic system for decision of moving location and direction of visual servoing contrivance(apparatus). So continuous tracking is possible by moving the visual servoing contrivance. We present some simulation results and further studies in the Section of Simulation and Concluding Remarks.
-
A algorithm for control and performance of a pulse-density-modulated (PDM) series-resonant voltage source inverter developed for corona-dischange precesses is presented. The PDM inverter produces either a square-wave ac-voltage state or a zero-voltage state at its ac terminals to control the average output voltage under constant dc voltage and operating frequency. Moreover it can achieve zero-current-switching (ZCS) and zero-voltage-switching (ZVS) in all the operating condition for a reduction of switching lost. Even though the corona discharge load with a strong nonlinear characteristics, new high frequency resonant inverter is shown the wide range power control from 5% to 100%.
-
Wireless Sensor Networks will revolutionize applications such as environmental monitoring, home automation, and logistics. We developed forest fire surveillance system. In this paper, Considering the fact that in Korea, during November to May, forest fires occur very frequently causing catastrophic damages on the valuable environment, Although exists other forest fire surveillance system such as surveillance camera tower, infrared ray sensor system and satellite system. Preexistence surveillance system can't real-time surveillance, monitoring, database and automatic alarm. But, forest fire surveillance system(FFSS) support above. In this paper, we describes a system development approach for a wireless sensor network based FFSS that is to be used to measure temperature and humidity as well as being fitted with a smoke detector. Such a device can be used as an early warning fire detection system and real-time surveillance in the area of a bush fire or endangered public infrastructure. Once the system has being development, a mesh network topology will be implemented with the chosen sensor node with the aim of developing a sophisticated mesh network.
-
With the increasing use of the Internet improved Internet technologies as well as web-based applications, the uses of e-Learning have also increased the effectiveness of e-Learning has become one of the most practically and theoretically important issues in both Educational Engineering and Information Systems. This study suggests a research model, based on an e-Learning success model, the relationship of the e-leaner's self-regulated learning strategy and the quality perception of the e-Learning environment. This research model focuses on the learning environment and on self regulated learning strategy. The former consists of LMS, learning contents and interaction that are provided by e-Learning and the latter refers to the learners' self-regulated learning strategy. We will show the validity of the model empirically. As result, most of the hypotheses except for H6 suggested in this model were accepted.
-
Many aspects of the way we work and live in the twenty-first century will be determined by the vast web of Internet. Virtual environments open the door to new identity experiences. Having the possibility to enter in a new community, where any personal information is directly shown to others, is a possibility to experiencing different self and thus to show and build new identities. This paper aims to identify how to relate the perception of cyber identity, loyalty and purchase intention. First, we classified cyber identity into two types, personal and social, and analyzed perception of each identity type. Then we conducted a survey using pre-designed questionnaire and found out factors consisting personal and social identity. Finally we analyzed the effects of these factors on loyalty and purchase intention using Structural Equation Model.
-
Recently research interest in Knowledge Management (KM) has grown rapidly. Companies regard intellectual capital as important asset and strive to deploy KM in an organization to gain a competitive edge. Many organizations currently engage in knowledge management in order to leverage knowledge both within their organization and externally to their shareholders and customers. Most of the previous research related to KM are dedicated to investigate the role of information technology in extracting, capturing, sharing, coverting organizational knowledge. Knowledge workers, however, are paid less attention though they are the key players in KM activities such as knowledge creation, dissemination, capture and conversion. We regard knowledge workers as a major component of KM and starting point of understanding organizational knowledge activities. Therefore we adopt a method to understand and analyze knowldge workers' social relationships. In this paper we investigate Social Network Analysis (SNA) as a tool for analyzing knowledge network. We introduce the basic concept of SNA and suggest a framework for implementing knowledge network by explaining how SNA can be used for analyzing knowledge network. We also propose a numerical method for identifying knowledge workers using SNA after classifying knowledge workers. The suggested method is expected to help understanding key knowledge players within an organization.
-
The software reliability growth depends on the testing time because the failure rate varies whether it is long or not. On the other hand, it might be difficult to reduce failure rate for most of the cases are not available for debugging during operational phase, hence, there are some literatures to study that the failure rate is uniform throughout the operational time. The failure rate reduces and the reliability grows with time regardless of debugging. As a result, the products reliability varies with the time duration of these products in point of customer view. The reason of this is that it accumulates the products experience, studies the exact operational method, and then finds and takes action against the fault circumstances. I propose the simple model to represent this status in this paper.
-
CAN(Controller Area Network) is a simple and efficient network system for real time control and measurement. As it is not only good at error detection but also strong in electromagnetic interference, CAN has been widely used all over the industries. Basically, CAN needs a master node in charge of sensor data collection, node scheduling for data transmission to a monitoring system and error detection. According to the number of mater nodes, the CAN system is classified into two type of master system. One is a single master system that has only one master node and the other is a multi-master system where any sensor node can become a master node depending on the system's conditions. While it has the advantage of its fault tolerance, the multi-master system will suffer form the overall performance degradation when a defect is found in the master node. It is because all sensor nodes pertaining to a defective master node lose their position. Moreover, it is difficult and expensive to implement. For a single master system, the whole system will be broken down when a problem happens to a single master. In this paper, a dynamic master system is presented that there are several sub-master nodes of which basic functions are those of other sensor nodes at ordinary times but dynamically changed to replace the failing master node. An effective scheduling algorithm is also proposed to choose an appropriate node among sub-master nodes, where each sub-master node has its precedence value. The performance of the dynamic master system is experimented and analyzed.
-
Skin region detection in images is an important process in many computer vision applications targeting humans such as hand gesture recognition and face identification. It usually starts at a pixel-level, and involves a pre-process of color spae transformation followed by a classification process. A color space transformation is assumed to increase separability between skin classes and other classes, to increase similarity among different skin tones, and to bring a robust performance under varying imaging conditions, without any complicated analysis. In this paper, we examine if the color space transformation actually brings those benefits to the problem of skin region detection on a set of human hand images with different postures, backgrounds, people, and illuminations. Our experimental results indicate that color space transfomation affects the skin detection performance. Although the performance depends on camera and surround conditions, normalized [R, G, B] color space may be a good choice in general.
-
PACS is an integrated communication network system which is consists of image acquisition devices, storage archiving units, display stations, computer processors, and database management systems. In medical industry, they have been introduced the medical equipments through PACS systems based on the DICOM standard. In this paper, we have reviewed the performance of JPEG and JPEG2000 used as medical image compression and realized the transmission mode on DICOM standard.
-
As the power of influence of the Internet grows steadily, attacks against the Internet can cause enormous monetary damages nowadays. A worm can not only replicate itself like a virus but also propagate itself across the Internet. So it infects vulnerable hosts in the Internet and then downgrades the overall performance of the Internet or makes the Internet not to work. To response this, worm detection and prevention technologies are developed. The worm detection technologies are classified into two categories, host based detection and network based detection. Host based detection methods are a method which checks the files that worms make, a method which checks the integrity of the file systems and so on. Network based detection methods are a misuse detection method which compares traffic payloads with worm signatures and anomaly detection methods which check inbound/outbound scan rates, ICMP host/port unreachable message rates, and TCP RST packet rates. However, single detection methods like the aforementioned can't response worms' attacks effectively because worms attack the Internet in the distributed fashion. In this paper, we propose a design of distributed worm detection system to overcome the inefficiency. Existing distributed network intrusion detection systems cooperate with each other only with their own information. Unlike this, in our proposed system, a worm detection system on a network in which worms select targets and a worm detection system on a network in which worms propagate themselves cooperate with each other with the direction-aware information in terms of worm's lifecycle. The direction-aware information includes the moving direction of worms and the service port attacked by worms. In this way, we can not only reduce false positive rate of the system but also prevent worms from propagating themselves across the Internet through dispersing the confirmed worm signature.
-
The objects, which can be personal digital assistants, electronic rings, doors or even clothes, offer embedded chips with computation facilities and are generally called artifacts. I later realized that this was not so the real problem is actually authentication. Recent results indicate scalability problems for flat ad hoc networks. Sensor network achieves function that handle surrounding information perception through sensor and sensed information to network that is consisted of sensor nodes of large number. Research about new access control techniques and height administration techniques need authentication information persons' certification assurance level classification in sensor network environment which become necessary different view base with authentication information at node for application of AAA technology in USN environment that must do authentication process using information that is collected from various sensor mountings. So, get base authentication information in sensor type and present weight grant model by security strength about authentication information through information who draw. In this paper collected information of sensor nodes model who give weight drawing security reinforcement as authentication information by purpose present be going to. and Must be able to can grasp special quality of each sensor appliances in various side and use this and decide authentication assurance level for value estimation as authentication information elements. Therefore, do to define item that can evaluate Authentication information elements thus and give simple authentication assurance level value accordingly because applying weight. Present model who give authentication assurance level value and weight for quotation according to security strength.
-
Genetic algorithm based predictor for lossless image compression is propsed. We describe a genetic algorithm to learn predictive model for lossless image compression. The error image can be further compressed using entropy coding such as Huffman coding or arithmetic coding. We show that the proposed algorithm can be feasible to lossless image compression algorithm.
-
This paper proposes a fuzzy correction algorithm that can correct the distorted medical image caused by the scanning nonlinear velocity of the Digital X-ray Scanner System (DX-Scanner) using the Multichannel Ionization Chamber (MIC). In the DX-Scanner, the scanned medical image is distorted for reasons of unsuitable integration time at the nonlinear acceleration period of the AC servo motor during the inspection of patients. The proposed algorithm finds the nonlinear motor velocity modeling through fuzzy system by clustering and reconstructs the normal medical image lines by calculating the suitable moving distance with the velocity of the motor using the modeling, acceleration time and integration time. In addition, several image processing is included in the algorithm. This algorithm analyzes exact pixel lines by comparing the distance of the acceleration period with the distance of the uniform velocity period in every integration time and is able to compensate for the velocity of the acceleration period. By applying the proposed algorithm to the test pattern for checking the image resolution, the effectiveness of this algorithm is verified. The corrected image obtained from distorted image is similar to the normal and better image for a doctor's diagnosis.
-
Wireless 1394 over IEEE802.15.3 must allow a data reserved for delivery over a wired 1394 network to be delivered over an IEEE802.15.3 wireless network through bridging IEEE 1394 to IEEE802.15.3. Isochronous transfers on the 1394 bus guarantee timely delivery of data. Specifically, isochronous transfers are scheduled by the bus so that they occur once every
$125\;{\mu}s$ and require clock time synchronization to complete the real-time data transfer. IEEE1394.1 and Protocol Adaptation Layer for IEEE1394 over IEEE802.15.3 specify clock time synchronization for a wired 1394 bus network to a wired 1394 bus network and wireless 1394 nodes, which are IEEE802.15.3 nodes handling 1394 applications, over IEEE802.15.3. Thus, the clock time synchronizations are just defined within a homogeneous network environment like IEEE1394 or IEEE802.15.3 until now. This paper proposes new clock time synchronization method for wireless 1394 heterogeneous networks between 1394 and 802.15.3. If new method is adopted for various wireless 1394 products, consumer electronics devices such as DTV and Set-top Box or PC devices on a 1394 bus network can transmit real time data to the AV devices on the other 1394 bus in a different place via IEEE 802.15.3. -
The Home Phoneline Networking Alliance (HomePNA) 2.0 technology can establish a home network using existing in-home phone lines, which provides a channel rate of 4 - 32 Mbps. HomePNA 2.0 Medium Access Control (MAC) protocol adopts an IEEE 802.3 Carrier Sense Multiple Access with Collision Detection (CSMA/CD) access method, a Quality of Service (QoS) algorithm, and a Distributed Fair Priority Queuing (DFPQ) collision resolution algorithm. In this paper, we analyze the HomePNA 2.0 MAC protocol and propose the architecture of HomePNA 2.0 MAC controller circuit. Then, we present the simulation result of each block included in the HomePNA 2.0 MAC controller.
-
WUSB is a new technology which combines the speed and the security of wired USB with the easy use of wireless technology. In this paper, GUI for WUSB is designed and implemented to show the connectivity and contents of the WUSB devices. Also, the proposed GUI shows the log window while content transfers occur between the host and device. The proposed GUI can be used for various wireless technologies which provide wireless function with existing USB hosts and devices.
-
Ultra wideband (UWB) technologies have been developed to exploit a new spectrum resource in substances and to realize ultra-high-speed communication, high precision geolocation, and other applications. The energy of UWB signal is extremely spread from near DC to a few GHz. This means that the interference between conventional narrowband systems and UWB systems is inevitable. However, the interference effects had not previously been studied from UWB wireless systems to conventional mobile wireless systems sharing the frequency bands such as WCDMA system. This paper experimentally evaluates the interference from two kinds of UWB sources, namely a direct-sequence spread-spectrum UWB source and an impulse radio UWB source, to a WCDMA digital transmission system. The average frame error rate degradations are presented. From these experimental results, we show that in all practical cases UWB system can coexist with WCDMA terminal without causing any dangerous interference.
-
In this paper the platform system for IEEE 802.15.4 Low Rate WPAN is designed and fabricated. IEEE 802.15.4 Low Rate WP AN system serves the functions and realization of home-area network. According to the IEEE 802.15.4 standard, there are two modes, One is BPSK modulation in 868/915MHz frequency band. The other is O-QPSK modulation in 2.45GHz frequency band. In this paper we implemented the platform system mounted in one PCB board in 868/915MHz frequency band of IEEE 802.15.4 Low Rate WPAN system. We measured that the platform system which consists of digital part and RF part has good performance. Also RF part is realized by design and fabrication of the RF transceiver IC. The key issue is to make the platform system which provides the function of Low Rate WPAN system to meet the requirement of IEEE 802.15.4 standards.
-
UWB is the most spotlighted wireless technology that transmits data at very high rates using low power over a wide spectrum of frequency band. UWB technology makes it possible to transmit data at rate over 100Mbps within 10 meters. To preserve important header information, MBOFDM UWB adopts Reed-Solomon(23,17) code. In receiver, RS decoder needs high speed and low latency using efficient hardware. In this paper, we suggest the architecture of RS decoder for MBOFDM UWB. We adopts Modified-Euclidean algorithm for key equation solver block which is most complex in area. We suggest pipelined processing cell for this block and show the detailed architecture of syndrome, Chien search and Forney algorithm block. At last, we show the hardware implementation results of RS decoder for ASIC implementation.
-
USB has arguably become the most successful PC peripheral interconnect ever defined. As appearing UWB, wireless USB (WUSB) emerges very popular technology. However, the distributed Medium Access Control (MAC) does not harmonize with the topology of WUSB. In this paper, we address a novel MAC protocol for conformity with WUSB. The protocol is to handle negotiation on Distributed Reservation Protocol (DRP) including the channel time slot of WUSB.
-
Recently, the RFID(Radio Frequency Identification) technology has gained significant attention. One of the performance issues in RFID systems is to resolve the tag collision among responses from RFID tags. In this paper, we proposed a new scheme for estimation of the number of tags in the reader filed. The scheme is used by anti-collision algorithm to identify multiple tags efficiently. And we also present the simulation result that shows the proposed scheme to estimate tags efficiently and also to improve the systems efficiency.
-
Ubiquitous computing is one of the key technology areas in the "Project on Development of Ubiquitous computing and network technology" promoted by the Ministry of Science and Technology as a frontier business of the
$21^{st}$ century in Korea, which is based on the new concept merging physical space and computer-based cyber space. With recent advances in Micro Electro Mechanical System (MEMS) technology, low cost and low-power consumption wireless micro sensor nodes have been available. Using these smart sensor nodes, there are many activities to monitor real world, for example, habitat monitoring, earthquake monitoring and so on. In this paper, we introduce web-based real environment monitoring system incorporating wireless sensor nodes. It collects sensing data produced by some wireless sensor nodes and stores them into a database system to analyze. Our environment monitoring system is composed of a networked camera and environmental sensor nodes, which are called Mica2 and developed by University of California at Berkeley. We have modified and ported network protocols over TinyOS and developed a monitoring application program using the MTS310 and MTS420 sensors that are able to observe temperature, relative humidity, light and accelerator. The sensed data can be accessed user-friendly because our environment monitoring system supports web-based user interface. Moreover, in this system, we can setup threshold values so the system supports a function to inform some anomalous events to administrators. Especially, the system shows two useful pre-processed data as a kind of practical uses: a discomfort index and a septicity index. To make both index values, the system restores related data from the database system and calculates them according to each equation relatively. We can do enormous works using wireless sensor technologies, but just environment monitoring. In this paper, we show just one of the plentiful applications using sensor technologies. -
There are emerging many eScience applications. More and more scientists want to collaborate on their investigation with international partners without space limitation by using these applications. Since these applications have to analyze the massive raw data, scientists need to send and receive the data in short time. So today's network related requirement is high speed networking. The key point of network performance is transport protocol. We can use TCP and UDP as transport protocol but we use TCP due to the data reliability. However, TCP was designed under low bandwidth network, therefore, general TCP, for example Reno, cannot utilize the whole bandwidth of high capacity network. There are several TCP variants to solve TCP problems related to high speed networking. They can be classified into two groups: loss based TCP and delay based TCP. In this paper, I will compare two approaches of TCP variants and propose a hybrid approach for high speed networking.
-
We have investigated on the development of 2-2 piezocomposites that have better piezoelectric activity and lower acoustic impedance than those of conventional piezoceramics. In this study, we have investigated the piezoelectric and acoustic properties of 2-2 piezocomposites sensor which were fabricated using dice-and-fill technique for the different volume fraction of PZT. The resonance characteristics measured by an impedance analyzer were similar to the analysis of finite element method. The resonance characteristics and the electromechanical coupling factor were the best when the volume fraction PZT was 0.6. It also showed the highest result from the standpoint of sensitivity, bandwidth and ring-down property and so on at the same condition. The specific characteristics shows that the 2-2 piezocomposites turned out to be superior to the ultrasonic sensor composed by single phase PZT.
-
Developable surface plays an important role in computer aided design and manufacturing systems. This paper is concerned with improving the develop ability of mesh. Since subdivision is an efficient way to design complicated surface, we intend to improve the developability of the mesh obtained from Loop subdivision. The problem is formulated as a constrained optimization problem. The optimization is performed on the coordinates of the points of the mesh, together with the constraints of minimizing shape difference and maximizing developability, a developability improved mesh is obtained.
-
A context-aware services platform supporting mobile agents consists of sensor nodes and a sensor coordinator. Sensor nodes collect environmental information and transmit the collected information to the sensor coordinator through wireless sensor networks. The sensor coordinator passes the information to the context-aware service module, and the mobile agent. The context-aware service module or the mobile agent performs services suitable for a user's situation based on the environmental information and a service actuation message is delivered to an actuation node through the sensor coordinator. In this paper, we present a context-aware services platform structure employed in our project, and describe context-aware services platform interfaces with a context-aware service module and mobile agents.
-
In this paper, an image-based "approach-align -grasp" visual servo control design is proposed for the problem of object grasping, which is based on the binocular stand-alone system. The basic idea consists of considering a vision system as a specific sensor dedicated a task and included in a control servo loop, and we perform automatic grasping follows the classical approach of splitting the task into preparation and execution stages. During the execution stage, once the image-based control modeling is established, the control task can be performed automatically. The proposed visual servoing control scheme ensures the convergence of the image-features to desired trajectories by using the Jacobian matrix, which is proved by the Lyapunov stability theory. And we also stress the importance of projective invariant object/gripper alignment. The alignment between two solids in 3-D projective space can be represented with view-invariant, more precisely; it can be easily mapped into an image set-point without any knowledge about the camera parameters. The main feature of this method is that the accuracy associated with the task to be performed is not affected by discrepancies between the Euclidean setups at preparation and at task execution stages. Then according to the projective alignment, the set point can be computed. The robot gripper will move to the desired position with the image-based control law. In this paper we adopt a constant Jacobian online. Such method describe herein integrate vision system, robotics and automatic control to achieve its goal, it overcomes disadvantages of discrepancies between the different Euclidean setups and proposes control law in binocular-stand vision case. The experimental simulation shows that such image-based approach is effective in performing the precise alignment between the robot end-effector and the object.
-
Non-contact power supply (NCPS), as a clean and safe energy supply concept has been applying wildly. Comparing with the conventional transformer the non-contact transformer has a large air gap between the long primary winding and the secondary winding. Due to it, the non-contact transformer has increased leakage inductance and reduced magnetizing inductance. So the high frequency series resonant converter has been widly used on the non-contact power supply system for transferring the primary power to the secondary one, from what a high influence voltage can be gained on the secondry coil even though the large air gap exists. However, it still has the disadvantages of the load sensitive voltage gain characteristics when load is changing. In this paper, we propose a fuzzy logic controller to adjust the frequency of the inverter to track the resonat which is changing when the load is change.
-
We present a device model for organic light emitting diodes(OLEDs) which includes charge injection, transport, recombination, and space charge effects in the organic materials. The model can describe both injection limited and space charge limited current flow and the transition between them. Calculated device current, light output, and quantum and power efficiency are presented for different cases of material and device parameters and demonstrate the improvements in device performance in bilayer devices. These results are interpreted using the calculated spatial variation of the electric field, charge density and recombination rate density in the device. We find that efficient OLEDs are possible for a proper choice of organic materials and contact parameters.
-
Recent ubiquitous computing environments increasingly impact on our lives using the current technologies of sensor network and ubiquitous services. In this paper, we propose ubiquitous architectural framework for ubiquitous sleep aid service(UbiSAS) in the subset of ubiquitous computing for refreshing of human's sleep. And we examine technical feasibility. Human can recover his health through refreshing sleep from fatigue. Ubiquitous architectural framework for UbiSAS in digital home offers agreeable sleeping environment and improves recovery from fatigue. So we present new concept of ubiquitous architectural framework dissolving stress. Specially, we apply context to context-aware framework module. This context is transferred to context adaptive inference engine which has service invocation function in intelligent agent module. Ubiquitous architectural framework for UbiSAS using context adaptive rule inference engine without user intervention is technical issue. That is to say, we should take sleep comfortably during our sleeping. And sensed information during sleeping is changed to context-aware information. This presents significant information in context adaptive rule inference engine for UbiSAS. This information includes all sleeping state during sleeping in context-aware computing technique. So we propose more effective and most suitable ubiquitous architectural framework using context adaptive rule inference engine for refreshing sleep in this paper.
-
Recently, a concept of bid-rigging is issued in electronic auction. To prevent this attack, Abe-Suzuki proposed firstly receipt-free scheme based on bidding-booth. Chen-Lee-Kim pointed out that Abe-Suzuki's scheme only provides receipt-freeness for losing bidders. Also, they introduced a new receipt-free sealed bid auction scheme using the homomorphic encryption technique. The main participants of their scheme are Auctioneer, Auction Issuer, Bidder and Seller. Bid-rigging can happen by a seller in their scheme. We propose receipt-free sealed-bid auction scheme using a universal re-encryption mixnet. For our receipt-free sealed-bid auction, we use Pseudo ID of a bidder and universal re-encryption technique of Golle et al. Also, our scheme satisfies privacy, correctness, public verifiability, non-reputation, and receipt-freeness.
-
In this paper, an adaptive algorithm is proposed in streaming MPEG-4 contents with fluctuating resource amount such as throughput of network conditions. MPEG-4 is the international standard for audiovisual presentation which is composed of object based media streams. The proposed technique provides the media stream corresponding an object with multiple media streams with different qualities and bit rate in order to support object based scalability to the MPEG-4 content. In addition, making the object streams adaptable, a feasible stream set selected from the multiple streams for transmission with optimal quality in the form of the current status.
-
A blind-mode integer frequency offset estimation algorithm is proposed for an OFDM system. Imperfect integer frequency offset estimation causes ambiguity in the data sub-carrier position. Morelli's blind integer frequency offiet estimation algorithm exploits the likelihood function by comparing the power in sub-carriers. It, however, shows performance degradation when there is the fractional frequency offset. The proposed algorithm solves this by using interpolation in the frequency domain. In this algorithm, it is exploited that the effect of the frequency offset is shown as a shift of power spectrum. By calculating the covariance of over-sampled samples, most approximate samples to integer point are obtained. It enables integer frequency offset estimation less affected by fractional frequency offset.
-
This paper addresses the problem of protecting security policies in security mechanisms, such as the detection policy of an Intrusion Detection System. Unauthorized disclosure of such information might reveal the fundamental principles and methods for the protection of the whole network. In order to avoid this risk, we suggest two schemes for protecting security policies in Snort using the symmetric cryptosystem, Triple-DES.
-
An UHF (
$860{\sim}960MHz$ ) RFID tag antenna is optimized and designed using a genetic algorithm (GA). The tag antenna impedance should be matched to the conjugate of the impedance of the tag IC Chip. The chip impedance has real and capacitive imaginary parts due to the parasitic capacitance of the RFID chip. A GA linked with a commercially available antenna simulation program optimizes the UHF$860{\sim}960\;MHz$ tag antenna to match a commercially available RFID chip. This method shows that any RFID antenna can be designed for any commercial RFID chip with any impedance. -
An RFID patch antenna for metallic object has been designed. The effects of variation of distance between the tag antenna and ground of the antenna have been studied. Various dielectric constants, thickness, permittivity, width of transmission line and length of transmission line have been used to design the better tag antenna for metallic object.
-
Queueing models are good models for fragments of communication systems and networks, so their investigation is interesting for theory and applications. Theses queues may play an important role for the validation of different decomposition algorithms designed for investigating more general queueing networks. So, in this paper we illustrate that the batch size distribution affects the loss probability, which is the main performance measure of a finite buffer queues.
-
With the proliferation of mobile terminals, use of the Internet in mobile environments is becoming more common. To support mobility in these terminals, Mobile IPv4 is proposed and represents the standard in IPv4 environments. Authentication should be mandatory, because mobile terminals can utilize Internet services in any foreign domain. Mobile IPv4 provides symmetric key based authentication using the default HMAC-MD5. However, symmetric key based authentication creates a key distribution problem. To solve this problem, public key based authentication mechanisms have been proposed. In this paper, the performance of each of these mechanisms is evaluated. The results present that, among these mechanisms, partial certificate based authentication has superior performance, and certificate based authentication has the worst performance. Although current public key based authentication mechanisms have lower performance than symmetric key based authentication, this paper presents the possibility that public key based authentication mechanisms may be used for future mobile terminal authentication.
-
Kerberos is system that offer authorization in internet and authentication service. Can speak that put each server between client and user in distributed environment and is security system of symmetry height encryption base that offer authentication base mutually. Kerberos authentication is based entirely on the knowledge of passwords that are stored on the Kerberos Server. A user proves her identity to the Kerberos Server by demonstrating Knowledge of the key. The fact that the Kerberos Server has access to the user's decrypted password is a rwsult of the fact that Kerberos does not use public key cryptogrphy. It is a serious disadvantage of the Kerbercs System. The Server must be physically secure to prevent an attacker from stealing the Kerberos Server and learning all of the user passwords. Kerberos was designend so that the server can be stateless. The Kerberos Server simply answers requests from users and issues tickets. This study focused on designing a SIP procy for interworking with AAA server with respect to user authentication and Kerberos System. Kerberos is security system of encryption base that offer certification function mutually between client application element and server application element in distributed network environment. Kerberos provides service necessary to control whether is going to approve also so that certain client may access to certain server. This paper does Credit-Control Server's function in AAA system of Diameter base so that can include Accounting information that is connected to Rating inside certification information message in Rating process with Kerberos system.
-
We propose a novel programmable miniature vision module based on a custom designed analog VLSI (aVLSI) chip. The vision module consists of the optical flow vision sensor embedded with commercial off-the-shelves digital hardware; in our case is the Intel XScale PXA270 processor enforced with a programmable gate array device. The aVLSI sensor provides gray-scale imager data as well as smooth optical flow estimates, thus each pixel gives a triplet of information that can be continuously read out as three independent images. The particular computational architecture of the custom designed sensor, which is fully parallel and also analog, allows for efficient real-time estimations of the smooth optical flow. The Intel XScale PXA270 controls the sensor read-out and furthermore allows, together with the programmable gate array, for additional higher level processing of the intensity image and optical flow data. It also provides the necessary standard interface such that the module can be easily programmed and integrated into different vision systems, or even form a complete stand-alone vision system itself. The low power consumption, small size and flexible interface of the proposed vision module suggests that it could be particularly well suited as a vision system in an autonomous robotics platform and especially well suited for educational projects in the robotic sciences.
-
In this paper, we introduce the backward solution of nonlinear wave equation for denoising. The PDE method is approved about 4 PSNR value compare with any convolution method. In neuro images, denoising process using proposed PDE is good about 0.2% increased Voxel Region.
-
This study applies the Analytic Hierarchy Process (AHP) to evaluate service quality of Third-Party Logistics (3PL) service providers. For this, we first conceptualize five dimensions of 3PL service quality (i.e. tangibles, reliability, responsiveness, assurance and empathy). We then apply the AHP method to determining the relative weights of five service quality dimensions and eventually selecting the best 3PL service provider. To implement this idea in practice, we conduct an empirical study on four companies providing 3PL services in Korea.
-
Especially, system security is very important in the ubiquitous environment. This paper proposes a protecting scheme for security policies in Firewall and intrusion detection system (IDS). The one-way hash function and the symmetric cryptosystem are used to make the protected rules for Firewalls and IDSs. The proposed scheme could be applied in diverse kind of defense systems which use rules.
-
Most of the small and medium industries rather focus on immediate problems and how to properly maintain organizational matters and existing system than the strategic and operational use of Information Technology when they deal with applications and operation of Information System. This study found out that there were few studies on IT outsourcing for small and medium companies in Korea compared to large enterprises' IT outsourcing. Most preceding studies researched the problems of partnership and technical, managerial, and economical success factors for big companies. Small and medium companies have the problems of financial difficulty, organizational scale (40.3%), shortage of manpower for system operation (24.1%), and lack of practical use of managers (8.9%). SMB firms have required support of government for their Informationalization but, we found out amount of companies (41%) not be informed or don't account on government's supporting IT of SMB programs. In addition, Range and Contents of outsourcing, Reputation of Outsourcing vendor, Reliability of maintaining were selected as CSFs of SMB IT outsourcing. While large corporation staff more considered CEO's willing and inner facts of their companies.
-
Recently, many organizations in various industries have introduced e-businesses for the purpose of adding value to their businesses. However, due to no comparable business models to e-business in the past, there are no reliable yardsticks to predict the performance of an e-business. This paper considers an environmental change analysis as a means to resolve this difficulty. System Dynamics (SD) could be a useful tool to generate effective results by examining the e-business model. SD model is developed to analyze the effects of an e-sales channel which was appended to the existing sales channels in the steel manufacturing industry. The results show an increase in average price and sales volume through the use of an auction process on the e-marketplace. Stocking expenses are reduced as well by the increase of the sales turnover. A possible scenario was adopted to the developed simulation model and investigated strategic issues to draw desirable strategies with market changes.
-
Supply chain optimization is one of the most important components in the optimization of a company's value chain. This paper considers the problem of designing the supply chain for a product that is represented as an assembly bill of material (BOM). In this problem we are required to identify the locations at which different components of the product arc are produced/assembled. The objective is to minimize the overall cost, which comprises production, inventory holding and transportation costs. We assume that production locations are known and that the inventory policy is a base stock policy. We first formulate the problem as a 0-1 nonlinear integer programming model and show that it can be reformulated as a 0-1 linear integer programming model with an exponential number of decision variables.
-
Lots of researches have been focusing on ubiquitous computing which means wherever, whenever, whatever the required information must be accessible. In ubiquitous computing environment, ubiquitous sensor network (USN) is the basis technology for gathering and transferring the required information. However sensor network characteristically has more severe vulnerability than the existing networks do. The paper presents operation of secure protocols for delivering information in secure in ubiquitous computing environment and show improvement of the secure transferring protocol.
-
As the software industry develops at a rate speed, anyone can copy or plagiarize without difficulty contents that are becoming digitalized. To make it worse, the development of various contents that be illegally copied and plagiarized are resulting in the increasing infringement on and the plagiarism of the intellectual property. This dissertation tries to put forth the method and the theory to effectively detect any plagiarism of the source code of programs realized in various languages. This dissertation analyzes the advantage and disadvantage of the plagiarism test software, and especially, presents a method to detect possible plagiarism by using the Pattern Matching to overcome its disadvantage. And it also intends to introduce more developed automatic detection system by overcoming the problems with the method of Pattern Matching.
-
Vast amount of information is generated and shared in this active digital As the digital informatization is vividly going on now, most of documents are in digitalized forms, and this kind of information is on the increase. It is no exaggeration to say that this kind of newly created information and knowledge would affect the competitiveness and the future of our nation. In addition to that, a lot of investment is being made in information and knowledge based industries at national level and in reality, a lot of efforts are intensively made for research and development of human resources. It becomes easier in digital era to create and share the information as there are various tools that have been developed to create documents along with the internet, and as a result, the share of dual information is increasing day in and day out. At present, a lot of information that is provided online is actually being plagiarized or illegally copied. Specifically, it is very tricky to identify some plagiarism from tremendous amount of information because the original sentences can be simply restructured or replaced with similar words, which would make them look different from original sentences. This means that managing and protecting the knowledge start to be regarded as important, though it is important to create the knowledge through the investment and efforts. This dissertation tries to suggest new method and theory that would be instrumental in effectively detecting any infringement on and plagiarism of intellectual property of others. DICOM(Dynamic Incremental Comparison Method), a method which was developed by this research to detect plagiarism of document, focuses on realizing a system that can detect plagiarized documents and parts efficiently, accurately and immediately by creating positive and various detectors.
-
This paper suggests the Ethernet aggregation to XGMII framing procedure (EAXFP) mechanism to economically combine the traffic adaptation technology with the link aggregation method in designing 10 Gigabit Ethernet (10 GbE) interfaces. This design sidesteps the data-loss issues that can result from designing an interface with only one link. The most critical issue in relation to the link aggregation interface is the algorithm used to control frame distribution between the ten ports. The proposed EAXFP mechanism offers an efficient link aggregation method as well as an efficient frame distribution algorithm, which maximize the throughout of the 10 GbE interface. In the experiment and analysis of the proposed mechanism, it was also discovered that the 10 GbE interface that uses the proposed EAXFP mechanism significantly reduced the packet loss rate. When there will be heavy traffic loads come about in the future, the proposed EAXFP mechanism assures an efficient and economical transmission performance on the router system.
-
In this paper, we propose a downlink power control scheme to apply in the unequal error protection multi-code CDMA mobile medicine system. The mobile medicine system contains (i) blood pressure and body temperature measurement value, (ii) ECG medical signals measured by the electrocardiogram device, (iii) mobile patient's history, (iv) G.729 audio signal, MPEG-4 CCD sensor video signal, and JPEG2000 medical image. By the help of the multi-code CDMA spread spectrum communication system with downlink power control scheme and unequal error protection strategy, it is possible to transmit mobile medicine media and meet the quality of service. Numerical analysis and simulation results show that the system is a well transmission platform in mobile medicine.
-
In order to support ultrawide-band signal generation for low rate WPAN, several types of signal generation mechanisms are suggested such as Chaos, Impluse, and Chirp signals by the activity of IEEE 802.15.4a. The communication system applied chaos theory may have ultrawide-band characteristics with spread spectrum and immunity from multipath effect. In order to use the advantage of chaotic signal generation, we introduce the system implementation of communication and networking systems with the chaos UWB signal. This system may be composed of mainly three parts in hardware architecture : RF transmission with chaotic signal generation, signal receiver using amplifiers and filters, and 8051 & FPGA unit. The most difficult part is to implement the chaotic signal generator and build transceiver with it. The implementation of the system is devidced into two parts i.e. RF blocks and digital blocks with amplifiers, filters, ADC, 8051 processor, and FPGA. In this paper, we introduce the system block diagram for chaotic communications. Mainly the RF block is important for the system to have good performance based on the chaotic signal generator. And the main control board functions for controlling RF blocks, processing Tx and Rx data, and networking in MAC layer.
-
It will not be impossible to develop an Information Systems and Information Technologies (IS/IT) program and a curriculum that represents the true needs of the IS/IT industry until IS/IT educator, reduce the gap perception and IS/IT practitioner's perception of IS/IT knowledge and technical skills that the industry might need. This paper represents and analysis of perceptions about IS/IT knowledge and skills that IS/IT practitioners might consider important. This study is based in Korean. The findings give us a very important lesson for IS/IT academicians that their understanding about the required knowledge and skills for the IS/IT career is not in line with that of IS/IT industry. Classifies the critical knowledge/skill set according to content or domain of knowledge by means of a survey. This is conducted in accordance with what IS/IT practitioners and educators can easily relate. The survey uses this approach and includes four broad categories of critical information Systems and Information technologies (IS/IT) knowledge/skills: IS/IT technology knowledge/skills, organizational and societal knowledge/skills, interpersonal knowledge/skills, and personal trait knowledge/skills.
-
A loop RFID tag antenna and a dipole RFID antenna with a T-matching method have been designed. The characteristic of loop and dipole with T-matching antenna structures of RFID tag antennas have been studied. The impedance of different sizes of loop and dipole antenna structures are found. This paper shows parametric research of loop RFID antenna structure and RFID dipole antenna with T-matching method to match the impedance of commercially available RFID chips.
-
Domestic enterprises are surveyed and analyzed to find the empirical relationship between environmental characteristics and electronic commerce(EC) performance. Dynamism, hostility and heterogeneity are selected as environmental characteristics. EC performance is articulated as EC utilization, EC satisfaction and EC usefulness. Empirical test presents that dynamism has a statistically significant relationship with EC performance except EC usefulness, but hostility and heterogeneity have no statistically significant relationship with EC performance. The impact of industry type on environmental characteristics and EC performance is also tested.
-
Recently, many companies and consumers are using Internet to sell and buy goods and manage their businesses. And for most companies, they have Electronic Commerce system and Enterprise Resource Planning (ERP) system. But the two systems manage separately and the data are not integrative. So it is hard to mangement the system alike and the costs may be higher than the system which has intergrated information. ebXML-based Electronic Catalog (e-Catalog) can provide intergrated information. In this paper, we took a manufacturing industry company for example. We planned to construct the e-Catalog System, analyze the products of the company as well as design e-Catalog system using ebXML to connect EC with ERPs.
-
While the goal of new IT adoption in small and medium sized firms is to choose an optimal system to fit with their own environments and conditions, that of IT post-adoption usage is to fully implement new IT and maximize their benefits from it. Therefore, the decision-making environments of new IT adoption is definitely different from those of post-adoption. Also, The direct experience of IT usage can provide some learning effect and the change of users' beliefs on new IT. From this point of view, this study attempts to figure out the differences of influencing factors on IOS usage intention between adopters and non-adopters. The results show that there are clear differences of influencing factors between two groups. Non-adopter group shows that perceived financial cost and ability of use have significant influences on IOS usage intention, while relative advantage and perceived risk in adopter group have statistically significant influences on post-adoption usage of IOS.
-
Virtual Communities are many and varied have been around for a number of years now. Cyworld has all the makings of a successful website, with its unique and profitable business model. Our purpose in studying Cyworld is two fold ; we want to know the motivations people have for using the service and why they are willing to pay to use it. This study is based on motivation theory and flow theory to enhance our understanding of Cyworld user's behavior.
-
Recently, the area of ubiquitous computing has gained a great attention both in academics and in industry. However, previous research on this area attempts the categorization in part of context and the critical success factors (CSFs) and services of ubiquitous computing unsuccessfully. The purpose of this paper is to propose a framework on ubiquitous computing, including its context, roadmap, CSFs, and services.