Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2008, Vol.13, No.3

  • 1.

    Generating Object Diagrams from Java Class Files : A Practical Approach

    Yang, ChangMo | 2008, 13(3) | pp.1~14 | number of Cited : 0
    Abstract PDF
    Gestwicki et. al. proposed the technique that detects and predicts the structure of object diagrams from class diagrams to get the improved drawing of object graphs. Their approach finds two predictable structures - recursive clusters and leaf clusters from class diagrams. Their approach is not practical to be applied to real programs, because the starting point is class diagram.In this work, we improve and implement their technique to apply to Java classes. We obtain the structure and relationships of classes and clusters extracted from class files. This information can be provided and used as a template of object graphs for Java execution visualization tools like JIVE.
  • 2.

    A Study on an Efficient e-learning Content Creation and Maintenance Method

    조수현 | 김영학 | 김명환 | 2008, 13(3) | pp.15~26 | number of Cited : 0
    Abstract PDF
    Recently, with the growing use of e-learning, instructors develop new online courses using a variety of contents and then store the results on their computers. These contents should be updated with new information as time goes on, and a new content also can be produced by reusing these ones. However, a lot of time will be needed for instructors to search, edit, and manage various contents stored from place to place on their computers. Currently, the development of the e-learning content management tool, which performs efficiently these functions on the PC environment, leaves much to be desired. Therefore, in this paper, we proposed an e-learning content creation and management system which can manage efficiently a variety of contents stored from different locations on an instructor's computer and can develop easily new online courses. The proposed system can be used widely to develop contents for instructors based on the PC environment. For performance evaluation, this paper compared the proposed system with the previous system according to the retrieval time of content keyword, and the experiment showed that our system is much better than the previous one.
  • 3.

    Automatic Construction of Korean Unknown Word Dictionary using Occurrence Frequency in Web Documents

    박소영 | 2008, 13(3) | pp.27~34 | number of Cited : 5
    Abstract PDF
    In this paper, we propose a method of automatically constructing a dictionary by extracting unknown words from given eojeols in order to improve the performance of a Korean morphological analyzer. The proposed method is composed of a dictionary construction phase based on full text analysis and a dictionary construction phase based on web document frequency. The first phase recognizes unknown words from strings repeatedly occurred in a given full text while the second phase recognizes unknown words based on frequency of retrieving each string, once occurred in the text, from web documents. Experimental results show that the proposed method improves 32.39% recall by utilizing web document frequency compared with a previous method.
  • 4.

    An EST Sequence Annotation System Based On Service Oriented Architecture

    남성혁 | TaeKyung Kim | 김경란 and 1other persons | 2008, 13(3) | pp.35~44 | number of Cited : 2
    Abstract PDF
    In this paper, we present an EST sequence annotation system based on Service Oriented Architecture, called SeqWeB. We developed the web services of eight applications (Phred, cross_match, RepeatMasker, TGICL, ICAtools, CAP3, Phrap and Blast) which are located in sequence annotation process and integrated the web services through BPEL. SeqWeB uses an XML file format for data input and output to maximize interoperability between each application. SeqWeB can be extended or modified easily through some modification such as insertion, deletion and replacement because service-oriented architecture allows loose coupling between applications.
  • 5.

    Automatic SDL to Embedded C Code Generation Considering μC/OS-II OS Environment

    Jeong-Gun Lee | 곽상훈 | 2008, 13(3) | pp.45~56 | number of Cited : 0
    Abstract PDF
    Due to the increasing complexity of embedded system design, automatic code generation of embedded software and hardware-software co-design methodologies are gaining great interest from industries and academia. Such an automatic design methodologies are always demanding a formal system specification languages for defining designer's idea clearly and precisely. In this paper, we propose automatic embedded C code generation from SDL (Specification and Description Language, ITU-T recommended the SDL as a standard system description language) with considering a real-time uC/OS-II operating system. Our automatic embedded C code generator is expected to provide a fast specification, verification and performance evaluation platform for embedded software designs.
  • 6.

    Co-Validation Environment for Memory Card Compatibility Test

    성민영 | 2008, 13(3) | pp.57~64 | number of Cited : 0
    Abstract PDF
    As diverse memory cards based on NAND flash memory are getting popularity with consumer electronics such as digital camera, camcorder and MP3 player, the compatibility problems between a newly developed memory card and existent host systems have become a main obstacle to time-to-market delivery of product. The common practice for memory card compatibility test is to use a real host system as a test bed. As an improved solution, an FPGA-based prototyping board can be used for emulating host systems. However, the above approaches require a long set-up time and have limitations in representing various host and device systems. In this paper, we propose a co-validation environment for compatibility test between memory card and host system using formal modeling based on Esterel language and co-simulation methodology. Finally, we demonstrate the usefulness of the proposed environment with a case study of real memory card development.
  • 7.

    Semantic Grid Management System based on the Ontology of Application Software

    김민성 | 이관수 | 2008, 13(3) | pp.65~76 | number of Cited : 1
    Abstract PDF
    Grid Computing has enabled enormous amount of computational jobs by connecting distributed computing resources. This technology has developed and widely used in various fields. Previous researches usually focused on how to efficiently manage and use the grid resources. However, there was not enough tries to understand and manage information of application softwares in a well-defined structure. Therefore users in application domain need to know about grid deeply to identify and describe the resource requirements matching for each jobs. We introduce a semantic grid management system based on application ontology to overcome this problem. We design and implement the ontology to store various information of the applications. With the ontology, this system can infer the resource requirements from input parameters and input data of the application software and automatically assign appropriate resources by matching the requirement. Also it can transform the information to other forms which grid middlewares can handle. We apply the system to construct an analysis environment of bioinformatics and compare it with other grid systems to explain usefulness of the system.
  • 8.

    A study of Implementing An Embedded System for Conversion from Text to Speech

    Hyun Chang Lee | Seo Jeong-Man | 2008, 13(3) | pp.77~84 | number of Cited : 2
    Abstract PDF
    According to the development and expansion of software and hardware about recent information technologies(IT), disabled persons in using IT seem to feel more information gap. Devices for IT are important tools for users including disabled persons to communicate with each other and get information. Although the Korea faces ageing society rapidly, products for disabled persons are seldom shown in time for use. As getting older especially, one of the body function disorders is visual disturbance. There are tools, braille lettering, for disabled persons with visual disturbance to communicate or get information from book. Compared to general books, however, braille lettering book is lack of including all of information of our society. Therefore, in this paper, we implement and show an embedded system for disabled person with visual disturbance to get information by scanning text, extracting characters and converting the text to speech automatically.
  • 9.

    Efficient Robot Cleaning Algorithm based on Set Cover Algorithm

    Heung Seok Jeon | 2008, 13(3) | pp.85~90 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a new robot cleaning algorithm, which we call SetClean. The new algorithm cleans from the most less complex area. Sometimes, when the cleaning completion time can be longer or can not be estimated, cleaning larger area first is better than optimizing the whole time for cleaning. To do this, SetClean algorithm divides the whole area into cleanable sub-areas using Set Cover algorithm and cleans the area in the order of high efficiency that maximize the cleanable area per unit time. SetClean algorithm decides the navigation flow by considering not only the size of the area but also the distance from the current robot location to the area to be cleaned and the delay time caused by the number of turns within the area. The experimental results show the mechanism and performance of the SetClean algorithm.
  • 10.

    A Study on Efficient CRI managing for Certificate Status Validate in Distributed OCSP

    김경자 | 장태무 | 2008, 13(3) | pp.91~98 | number of Cited : 1
    Abstract PDF
    The conventional CA(Certificate Authority) has problems in dealing with certificates whose valid time is expired and in managing CRI(Certificate Revocation Information) produced by clients. Many researches are conducted to solve them, but they have limitations in providing real-time verifications of certificates’ status for clients. In this paper, we propose a new CRI management model to address these limitations in distributed OCSP(On-line Certificate Status Protocol) environments. CRL(Certificate Revocation List) is divided into two parts: one part that is recent is replicated over several OCSP servers, the other part is replicated and distributed over servers. Our methods can help to break the bottleneck of CA, and effectively reduce the size of CRL transferred. Therefore, with our methods, clients can verify the state of certificates in real time.
  • 11.

    Same music file recognition method by using similarity measurement among music feature data

    Bokyung Sung | MyoungBeom Chung | Il Ju Ko | 2008, 13(3) | pp.99~106 | number of Cited : 2
    Abstract PDF
    Recently, digital music retrieval is using in many fields (Web portal, audio service site etc). In existing fields, Meta data of music are used for digital music retrieval. If Meta data are not right or do not exist, it is hard to get high accurate retrieval result. Contents based information retrieval that use music itself are researched for solving upper problem. In this paper, we propose Same music recognition method using similarity measurement. Feature data of digital music are extracted from waveform of music using Simplified MFCC (Mel Frequency Cepstral Coefficient). Similarity between digital music files are measured using DTW (Dynamic time Warping) that are used in Vision and Speech recognition fields. We success all of 500 times experiment in randomly collected 1000 songs from same genre for proving of proposed same music recognition method. 500 digital music were made by mixing different compressing codec and bit-rate from 60 digital audios. We proved that similarity measurement using DTW can recognize same music.
  • 12.

    Management System of Characters for Storytelling by using Ontology

    하얀 | 2008, 13(3) | pp.107~114 | number of Cited : 0
    Abstract PDF
    In this paper, a management system of characters and roles for storytelling that is used for drama is proposed with ontology which is a key factor of semantic web. While there are few tools domestically, usage for storytelling with authoring tools is increasing outside. Especially, a study for the management system of characters, roles and casting is not performed. This study proposes a system to control a series of works related with them. It contributes to poor domestic environment of writing, which makes it systematically. Also, it applies semantic web technology by defining ontology.
  • 13.

    Simulation System of Broadcasting Stream for T-DMB Receiver Test

    손석원 | Yoowon Kim | 차상진 and 1other persons | 2008, 13(3) | pp.115~122 | number of Cited : 0
    Abstract PDF
    The terrestrial DMB receivers and their application products need many tests such as normal reception, reception state for the noisy environment, reception state changes due to the changes of output power of the DMB signal, and reception state of various environment. Therefore, the real-time simulation system of the terrestrial DMB broadcasting system is a necessity to the terrestrial DMB research institutions, manufacturers, and other related organizations. In the paper, we design the DMB simulation system, which generates the real-time streams of terrestrial DMB broadcast signals and simulates the real DMB broadcasting signals. The system consists of T-DMB signal generator with PCI interface and simulation software for various functional components of programs. The study reveals that the implementation of software-based T-DMB simulation system is possible with low cost. Through various experiments, we evaluate the performance of the simulation system, and we provide the future directions of research.
  • 14.

    Flow-based P2P Traffic Identification using SVM

    엄남경 | 우성희 | Lee, Sang-ho | 2008, 13(3) | pp.123~130 | number of Cited : 3
    Abstract PDF
    To avoid some protection systems such as firewall, P2P applications have recently used to apply dynamic port numbers. Reliable estimates of P2P traffic require examination of packet payload, a methodological land mine from legal, privacy, technical, logistic, and fiscal perspectives. Indeed, access to user payload is often rendered impossible by one of these factors, inhibiting trustworthy estimation of P2P growth and dynamics. Despite various methods such as port-based and signature-based techniques, it still dose not satisfy the method which uses both qualitative and quantitative aspects. In this paper, a method using SVM mechanism which discriminate the P2P traffic from non-P2P traffics using differences between P2P and other application traffics is suggested. This is a systematic methodology to identify P2P networks, and without relying on packet payload.
  • 15.

    Design and Construction of Convention e-Portal Information System

    Jeon In-Ho | 박대우 | 2008, 13(3) | pp.131~138 | number of Cited : 1
    Abstract PDF
    This paper designed an Internet Convention e-Portal Information System through an experience and knowledges accumulated in case of information utilization regarding international meeting and conventions in knowledge information societies. Established the Non-stop Cluster system that was the H/W side, L4 and the applied system which was the 3-tier structure and Firewall, VPN, IDS/IPS security control system, S/W side, that utilized the WAS MVC architecture used WAS and a SOA architecture, an ASP EAI function. A user and a manager, designs and constructor, the user efficiency who were an evaluation basis of a Verification commissioner, Ubiquitous evaluated system stability, Information security anger, and evaluated former system and comparison. Therefore is evaluated to the excellent Convention e-Portal Systems that a performance 25.9% improvement consisted of compare with the existing Convention e-Portal Systems, and will contribute so as to be able to carry out-driven enemy role in development of the industrial our country Convention Ubiquitous Internet IT information Industry and International Society Conventions.
  • 16.

    Web Application Attack Prevention by Traffic Analysis

    장문수 | Changsuk Oh | 2008, 13(3) | pp.139~146 | number of Cited : 3
    Abstract PDF
    Despite of information security installation, leakage of personal information in web services has not decreased. This is because traffics to web applications are still vulnerable by permitting external sources to access services in port HTTP 80 and HTTPS 443, even with firewall systems in place. This thesis analyzes various attack patterns resulted from web service environment and vulnerable traffic and categorizes the traffics into normal and abnormal traffics. Also this proposes ways to analyze web application attack patterns from those abnormal traffics based on weak points warned in OWASP(Open Web Application Security Project), design a system capable of detect and isolate attacks in real time, and increase efficiency of preventing attacks.
  • 17.

    Elite Ant System for Solving Multicast Routing Problem

    이승관 | 2008, 13(3) | pp.147~152 | number of Cited : 5
    Abstract PDF
    Ant System(AS) is new meta heuristic for hard combinatorial optimization problem. It is a population based approach that uses exploitation of positive feedback as well as greedy search. It was first proposed for tackling the well known Traveling Salesman Problem. In this paper, AS is applied to the Multicast Routing Problem. Multicast Routing is modeled as the NP-complete Steiner tree problem. This is the shortest path from source node to all destination nodes. We proposed new AS to resolve this problem. The proposed method selects the neighborhood node to consider all costs of the edge and the next node in state transition rule. Also, The edges which are selected elite agents are updated to additional pheromone. Simulation results of our proposed method show fast convergence and give lower total cost than original AS and ASelite.
  • 18.

    A Study on Posture Control Algorithm of Performing Consecutive Task for Mobile Manipulator

    김종익 | Rhyu,Kyeong-Taek | KangJingu | 2008, 13(3) | pp.153~160 | number of Cited : 0
    Abstract PDF
    One of the most important features of the Mobile Manipulator is redundant freedom. Using it's redundant freedom, a Mobile Manipulator can move in various modes, and perform dexterous motions. In this paper, to improve robot job performance, two robots -mobile robot, task robot- are joined together to perform a job, we studied the optimal position and posture of a Mobile Manipulator to achieve a minimum of movement of each robot joint. Kinematics of mobile robot and task robot is solved. Using the mobility of a Mobile robot, the weight vector of robots is determined. Using the Gradient method, global motion trajectory is minimized, so the job which the Mobile Manipulator performs is optimized. The proposed algorithm is verified with PURL-Ⅱ which is Mobile Manipulator combined Mobile robot and task robot, and the results are discussed.
  • 19.

    A High-Speed Message Processing System for Mobile Web Services

    Kim Jin-Il | Yongtae Kim | Gil-Cheol Park | 2008, 13(3) | pp.161~168 | number of Cited : 1
    Abstract PDF
    A standard Web server or web application servers require the Web Servlet container to execute SOAP messages. But it requires additional process to make web service modules and need communication port. Also, Recently many webapplications is becoming increasingly demand against the dynamic document than the static documnet. But a recent study has found that Apache Web Server always does not show the better performance. The more it have the dynamic documents, rather it can show worse performance. To solve this problem, we propose a new High-Speed Message Processing System, in which the SOAP_MP and the WSDL builder are used. The WSDL builder convert HTML/XML to WSDL files automatically and the SOAP_MP minimize SOAP massage processing time by eliminating the Tomcat Servlet container in the mobile Web Services implementation. We compare and analyze the System, which was proposed by us, with the standard Web Service system.
  • 20.

    Ontology-based Grid Resource Selection System

    노창현 | Tae Young Kim | 장성호 and 1other persons | 2008, 13(3) | pp.169~178 | number of Cited : 1
    Abstract PDF
    Grid resources are composed of various communication networks and operation systems. When a grid system searches and selects grid resources, which meet requirements of a grid user, existing grid resource selection systems are limited due to their storage methods for resource information. In order to select grid resources suitable for requirements of a grid user and characteristics of data, this paper constructs an ontology for grid resources and proposes an ontology-based grid resource selection system. This system provides an inference engine based on rules defined by SWRL to create a resource list. Experimental results comparing the proposed system with existing grid resource selection systems, such as the Condor-G and the Nimrod-G, verify the effectiveness of the ontology-based grid resource selection system with improved job throughput and resource utilization and reduced job loss and job processing time.
  • 21.

    Nucleus Recognition of Uterine Cervical Pap-Smears using Fuzzy Reasoning Rule

    Kim, Kwang-baek | SONG,DOO HEON | 2008, 13(3) | pp.179~188 | number of Cited : 2
    Abstract PDF
    In this paper, we apply a set of algorithms to classify normal and cancer nucleus from uterine cervical pap-smear images. First, we use lightening compensation algorithm to restore color images that have defamation through the process of obtaining 1400 microscope magnification. Then, we remove the background from images with the histogram distributions of RGB regions. We extract nucleus areas from candidates by applying histogram brightness, Kapur method, and our own 8-direction contour tracing algorithm. Various binarization, cumulative entropy, masking algorithms are used in that process. Then, we are able to recognize normal and cancer nucleus from those areas by using three morphological features - directional information, the size of nucleus, and area ratio - with fuzzy membership functions and deciding rules we devised. The experimental result shows our method has low false recognition rate.
  • 22.

    A Study on Effective Response of Police Officer against Cybercrime

    박창욱 | 2008, 13(3) | pp.189~196 | number of Cited : 4
    Abstract PDF
    In this modern society, a main tendency of crime is to increase in the incidence frequency of cyber crime. Varied criminal techniques from simple crimes to highly specialized crimes appear through cyber space. With the expansion of Internet spread, ordinary people increasingly have an opportunity to have access to information media and their possibilities to be involuntary associated with crimes get higher. In this sense, its seriousness is great. This study examined the present state of cyber crimes that appear through their several types and characteristics and the problems of police response to cyber crimes. and suggest effective response of police officer
  • 23.

    An Empirical Study on Measurement and Improvement for the Service of Education and Administration in the University

    이필재 | 김유라 | 정해준 | 2008, 13(3) | pp.197~210 | number of Cited : 11
    Abstract PDF
    Since the theories of service quality were introduced in Korea, they have been applied to the various organizations, such as hospital, hotel, travel agency, bank, telecom company, and even retail market. Compared with these areas, however, studies on the service quality in educational institutions have been scarcely conducted. Also, higher educational service challenges user-oriented education system of the 21st century, concept of Service quality from the theories of market economy. The purpose of this study is to identify the dimensions of educational and administrative service, and their influence upon the satisfaction and value on service quality, and formulate the service quality model based on the revised quality dimensions using SERVQUAL measuring method, to find out the most influential factors upon the service quality among these factors. This study also suggests proper measures for improving service quality.
  • 24.

    The study on factors a special feature and the intention to use Traceability System

    강봉재 | 고완기 | 고석용 | 2008, 13(3) | pp.211~224 | number of Cited : 0
    Abstract PDF
    Occurrences of large-scale food-related mishaps around the globe are degrading the safety and confidence on food items. This can be said to result from problems such as information asymmetry between the supplier and the consumer(information user). It makes it difficult to confirm product-related information including 'who produced an item how, what manufacturing process was involved, and how the product was distributed, and deal with a food-related trouble. The research verified and analyzed what has an effect on the intention to use Traceability System when the user uses information service.
  • 25.

    The Effects of MTO's Marketing Activity Factors on Relationship Continuity under Transactional Types

    Lee Jung Sae | 2008, 13(3) | pp.225~238 | number of Cited : 1
    Abstract PDF
    This study is to evaluate the influence of relationship marketing and identify empirically the important factors which affect relationship continuity between multimodal transport operators and shippers. The empirical findings of this research are; MTO's marketing activity factors which consist of customers' contact intensity, relationship-oriented factors, positively affects relationship continuity such as revisit intention and word-of-mouth communication. As a result, relationship marketing activities are essential to the market strategy of MTO for continuous and stable growth. Also, on condition of transactional types, On-line transaction has an effect of customer switching, but there is no different effect in case of service type. Accordingly, international MTO in domestic need to develop various relationship marketing programs such as a special program for enhancing the continuity, an event for long-term customers and training program should be implemented and enforced to elevate quality of the service encounter.
  • 26.

    The Base of Understanding for Interdisciplinary Studies on Cyber Crimes - Centering on Regulations in Criminal Law -

    임병락 | 2008, 13(3) | pp.239~244 | number of Cited : 0
    Abstract PDF
    This study aims to provide theoretical base in criminal law for engineers in the viewpoint of jurists to encourage interdisciplinary studies on cyber crimes. Apart from seriousness of discussion on current cyber crimes, a good effect of the internet networks such as sharing of information has bee emphasized while the evil influence of its side effect has been neglected. Therefore, this study suggests that we need to consider reinforcement of cyber ethics, and legal mind of IT technicians, strict security by managers, active efforts to develop legitimate contents by managers of web hardware and P2P, and reinforcement of punishments against crimes by internet users. And this study approaches new norms on computer and cyber crimes in interpretational sense of criminal law, and provides the theoretical base of the criminal law focusing on traditional theories, assumptions, and precedents involved in regulations against computer virus distribution.