• Title/Summary/Keyword: Research Information Systems

Search Result 12,228, Processing Time 0.034 seconds

Content-based Image Retrieval Using Color and Chain Code (색상과 Chain Code를 이용한 내용기반 영상검색)

  • 황병곤;정성호;이상열
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.5 no.2
    • /
    • pp.9-15
    • /
    • 2000
  • In this paper, we proposed a content-based image retrieval method using color and object's complexity for indexing of image database. Generally, the retrieval methods using color feature can not sufficiently include the spatial information in the image. So they are reduced retrieval efficiency. Then we combined object's complexity which extracted from chain code and the conventional color feature. As a result, experiments shooed that the proposed method which considers the shape feature improved performance in conducting content-based search.

  • PDF

A Scheme for Protecting Security Rules in Intrusion Detection System (침입 탐지 시스템을 위한 효율적인 룰 보호 기법)

  • 손재민;김현성;부기동
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.4
    • /
    • pp.8-16
    • /
    • 2003
  • This paper moses a method to solve the weakness in Snort, the network based intrusion detection system. Snort which is the rule-based intrusion detection system dose not supports a protection method for their own rules which are signatures to detect intrusions. Therefore the purpose of this paper is to provide a scheme for protecting rules. The system with the proposed scheme could support integrity and confidentiality to the rules.

  • PDF

A Study on Relative Importance of Knowledge Management Success Factors Using Analytic Hierarchy Process (계층분석과정을 이용한 지식경영 성공요인의 상대적 중요도에 관한 연구)

  • 전성룡;이상식;전홍대
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.4
    • /
    • pp.73-81
    • /
    • 2003
  • A firm is very difficult to find sustainable competitive weapons due to global competition and rapid changes in business environments. As a sequence, an increasing number of organizations are focusing their attention on utilizing knowledge management which can effectively disperse, share, and create information and knowledge. Therefore, this study is purposed to investigate success factors of knowledge management through AHP techniques, to analyze the relative importance among success factors, and to contribute to the organizations which have a plan to introduce KMS by providing theoretical background.

  • PDF

Bayesian Multiple Comparison of Normal Populations based on Bayes Factor

  • Kang, Sang-Gil;Lee, Chang-Soon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.1
    • /
    • pp.42-49
    • /
    • 2002
  • In this paper, we develop the Bayesian multiple comparison procedure for the normal model. The procedure which we suggest is based on the fractional Bayes factor of O'Hagan (1995). We apply our procedure to normal populations, when noninformative prior is assumed to the model parameters. We derive explicit form of Bayes Factors when the number of populations is greater than 3. A famous data is analyzed by the proposed procedure. For this example, the suggested method is straightforward for specifying distributionally and to implement computationally, with output readily adapted for required comparison.

  • PDF

A Thinning Algorithm by the Fire Front' Propagation and WPTA Algorithm for the Character Recognition (문자인식을 위한 불 전파와 WPTA 알고리즘에 의한 세선화 알고리즘)

  • 원남식;남인길
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.9 no.1
    • /
    • pp.63-68
    • /
    • 2004
  • This paper is the study about the thinning algorithm by the fire front' propagation and WPTA available for the recognition of various characters. The proposed algorithm can extract the skeleton of a character almost similar to the original pattern by using the depth value representing depth information of each pixel. In this paper we proposed the new thinning algorithm, implemented it, and showed execution results.

  • PDF

A Study on the Image Steganographic method using Multi-pixel Differencing and LSB Substitution Methods (다중 픽셀 차이값과 LSB 교체 기법을 이용한 이미지 스테가노그래픽 기법 연구)

  • Ha, Kyeoung-Ju;Jung, Ki-Hyun;Yoo, Kee-Young
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.3
    • /
    • pp.23-30
    • /
    • 2008
  • A data hiding method based on least significant bit (LSB) substitution and multi-pixel differencing (MPD) is presented on the proposed method to improve the capacity of the hidden secret data and to provide an imperceptible visual quality. First, a sum of different values for four-pixel sub-block is calculated. The low value of the sum can be located on a smooth block and the high value is located on an edged block. The secret data are hidden into the cover image by LSB method in the smooth block, while MPD method in the edged block. The experimental results show that the proposed method has a higher capacity and maintains a good visual quality.

  • PDF

Detecting Steganographic Contents Using EWM Statistics (EWM 통계량을 이용한 스테가노그래픽 자료 감지 기법)

  • Ji, Seon-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.3
    • /
    • pp.54-62
    • /
    • 2008
  • For a message hiding technique to be effectual, it needs to have availability, confidentiality and integrity. Steganography is the science of hiding one message within other types of digital contents. In this case, attempt to defeat steganalysis by restoring the statistics of the composite image to resemble that of the cover, these discrepancies expose the fact that hidden communication is happening. In this paper, I present a steganography scheme capable of concealing a piece of secrete information in a host image and base on the technique's OCT, RGB, statistical restoration.

  • PDF

Unattended Reception Robot using Face Identification (얼굴 인증을 이용한 무인 접수 로봇 개발)

  • Park, Se Hyun;Ryu, Jeong Tak;Moon, Byung Hyun;Cha, Kyung Ae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.5
    • /
    • pp.33-37
    • /
    • 2014
  • As personal information is utilized as an important user authentication means, a trustable certification means is being required. The face identification technology using characteristics of the personal face among several biometrics technologies is easy in extracting features. In this paper, we implement a face identification robot for unattended reception. The robot is performed by face identification. To assess the effectiveness of the robot, it was tested and experimental results show that the proposed method is applicable for unattended reception interface.

Derivations of Single Hypothetical Don't-Care Minterms Using the Quasi Quine-McCluskey Method

  • Kim, Eungi
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.1
    • /
    • pp.25-35
    • /
    • 2013
  • Automatically deriving only individual don't-care minterms that can effectively reduce a Boolean logic expressions are being investigated. Don't-care conditions play an important role in optimizing logic design. The type of unknown don't-care minterms that can always reduce the number of product terms in Boolean expression are referred as single hypothetical don't-care (S-HDC) minterms. This paper describes the Quasi Quine-McCluskey method that systematically derives S-HDC minterms. For the most part, this method is similar to the original Quine-McCluskey method in deriving the prime implicants. However, the Quasi Quine-McCluskey method further derives S-HDC minterms by applying so-called a combinatorial comparison operation. Upon completion of the procedure, the designer can review generated S-HDC minterms to test its appropriateness for a particular application.

An Enterprise Repository System : Architecture and ERP Repositiory Case (기업 리파지토리 시스템 : 아키텍쳐 및 ERP 리파지토리 사례)

  • 이희석;서우종;김태훈;이충석;손명호;백종명;손주찬;박성진
    • The Journal of Information Technology and Database
    • /
    • v.7 no.1
    • /
    • pp.1-15
    • /
    • 2000
  • A repository has been conceived as a critical weapon for managing organizational information resources. The system can help control the heterogeneous data in a variety of CASE (Computer-Aided Software Engineering) tools. However, current repository systems have limitation in creating a synergetic effect by integrating information resources. Therefore, it is important to develop an integrative repository system, called Enterprise Repository System (ERS). This paper (i) defines ERS on the basis of a framework for repository systems, and (ii) suggests an ERS architecture and its detailed components. Finally, a real-life case of developing ERP repository system is illustrated according to the proposed architecture and components. This illustration may demonstrate the usefulness of this research for help developing an advanced repository system.

  • PDF