Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2008, Vol.13, No.2

  • 1.

    Design of A Model of Software Process Concept Based On Ontology

    신병호 | 최이권 | LEE SANG BUM and 1other persons | 2008, 13(2) | pp.1~10 | number of Cited : 1
    Abstract PDF
    As the size of software becomes larger and the features of it become complex, it is really hard to successfully complete the project without following development guidelines. Software process is the best practices and procedures that organizations of high maturity and capability of software development carry out in common, and it is a set of progressive ideas of management. However, complicated and unfamiliar concepts can interrupt the introduction and improvement of software process of the organizations. Even though many kinds of frameworks such as standard of process and maturity measurement models are introduced, it is still difficult to follow software process without fully understanding their relations. The purpose of this study is to support successful internalization of organizations that introduce and use software process. It also suggests the design of standard ontology, standard relationship domain ontology, and the lifestyle of software process and the relations between them.
  • 2.

    Implementation of Underwater Simulation of a Net using OpenMP

    Park Myeong Chul | 박석규 | 2008, 13(2) | pp.11~18 | number of Cited : 4
    Abstract PDF
    The net shape effects by the various vectors in underwater. Each particle of the net calculating the effect of all vectors augments an accuracy and reality. But, the time complexity becomes larger because of huge calculation. The previous techniques reduced a physics reality. And embodied the underwater virtual reality which augments visual reality with simulation. In this paper, parallel processing the particles, it embodied the simulation which is satisfied a physical reality and time reality. The parallel processing used the OpenMP, and the reality graphic expression used the OpenGL. The simulation which this paper proposes will be the possibility becoming the fundamental data for a model analysis or a specialist system from game and marine field.
  • 3.

    Vertical System Testing Method For Efficient Error Tracing

    서광익 | 최은만 | 2008, 13(2) | pp.19~30 | number of Cited : 0
    Abstract PDF
    In case of unit testing, White-box test can be used to closely check source code and to analyze logic and statement errors. On the other hand, in case of function testing of system level, Black-box test can be mainly used to compare actual and expected results by inputting test data because the scale of function is large. This Black-Box test in system testing level has problem in tracing errors in source code when we find errors. Moreover applying White-box test is not easy for system testing level because the abstract levels of test target are different. Therefore this paper suggests the vertical test method of a practical and integrated system level which can checks up to source code level using White-box test style although it aims to test the highly abstract level like a system function. In addition, the experiment explains how to apply the vertical test by displaying an example which traces from UML specification model to the source code and also shows efficiency of error trace.
  • 4.

    Design and Implementation of a C Coding Style Checker

    황준하 | 2008, 13(2) | pp.31~40 | number of Cited : 2
    Abstract PDF
    Various coding styles for C language have been proposed so far but there has been a lack of synthetic review about them. In this paper, I propose a new C coding style by analyzing coding rules that are included in the representative C coding styles and by adding new coding rules besides them. In addition, I designed an automated C coding style checker named CStyler which was implemented using Lex and Yacc. It is designed to be able to verify unpreprocessed source code as well as preprocessed source code. And I improved its flexibility by being able to add a new coding rule by end user. I think that the new C coding style and coding style checker, CStyler, can be utilized for education and for future research to develop and extend a static analysis tool.
  • 5.

    Implementation of Personalized Recommendation System using RFM method in Mobile Internet Environment

    조영성 | Moonhaeng Huh | RYU KEUN HO | 2008, 13(2) | pp.41~50 | number of Cited : 4
    Abstract PDF
    This paper proposes the recommendation system which is a new method using RFM method in mobile internet environment. Using a implict method which is not used user's profile for rating, is not used complicated query processing of the request and the response for rating, it is necessary for user to keep the RFM score about users and items based on the whole purchased data in order to recommend the items. As there are some problems which didn't exactly recommend the items with high purchasablity for new customer and new item that do not have the purchase history data, in existing recommendation systems, this proposing system is possible to solve existing problems, and also this system can avoid the duplicated recommendation by the cross comparison with the purchase history data. It can be improved and evaluated according to the criteria of logicality through the experiment with dataset, collected in a cosmetic cyber shopping mall. Finally, it is able to realize the personalized recommendation system with high purchasablity for one to one web marketing through the mobile internet.
  • 6.

    Optimization of Frequency Assignment for Community Radio Broadcasting

    손석원 | Han Kwang Rok | 2008, 13(2) | pp.51~58 | number of Cited : 1
    Abstract PDF
    We present a modeling of constraint satisfaction problems and provide heuristic algorithms of backtracking search to optimize the frequency assignment. Our research objective is to find a frequency assignment that satisfies all the constraints using minimum number of frequencies while maximizing the number of community radio stations served for a given area. In order to get a effective solution, some ordering heuristics such as variable orderings and value orderings are provided to minimize the backtracking in finding all solutions within a limited time. To complement the late detection of inconsistency in the backtracking, we provide the consistency enforcing technique or constraint propagation to eliminate the values that are inconsistent with some constraints. By integrating backtracking search algorithms with consistency enforcing techniques, it is possible to obtain more powerful and effective algorithms of constraint satisfaction problems. We also provide the performance evaluation of proposed algorithms by comparing the theoretical lower bound and our computed solution.
  • 7.

    Development of e-PBL Based on Web 2.0

    이준희 | 2008, 13(2) | pp.59~66 | number of Cited : 14
    Abstract PDF
    Although the acquisition of information may be done individually, knowledge is created from the social context of peers, teachers. And feedback on the appropriateness and effectiveness of their knowledge and skill is commonly received. Learning occures effectively within environment that have shared understanding of problems and various tools to solve problems. The purpose of this study is to apply the main principles of creative problem solving and develop e-PBL(Problem-Based Learning) to enhance creative problem solving skill. In this research, the group of students who studied by means of e-PBL based on web 2.0 showed much more satisfaction and problem solving skill than the other group of students who did by e-Learning.
  • 8.

    Design and Implementation of a Large Scale Qualification Management System for Performance Improvement Through the Use of a WCBT(Web and Computer based Test)

    Chang, Young-Hyun | 2008, 13(2) | pp.67~78 | number of Cited : 4
    Abstract PDF
    The purpose of this paper is to discuss the design and implementation of a WCBT(Web and Computer based Test). The WCBT combines the strengths of both a WBT(Web-based test) and a CBT(Computer-based test) on the basis of efficiency and stability. The current assessment system, considered an important management tool in the construction and operation of a total management system for the national technical qualification, has some unstable elements with regard to system load and stability. The proposed system's technological aspects have been tested through a basic simulation pilot program. The pilot program will be expanded to include the local Chamber of Commerce and Industry because the stability of the system was proved through its application to the real-time national technical qualification examination of KCCI(Korea Chamber of Commerce and Industry). The WCBT system has shown great efficiency in terms of system load, and has solved frequent communication problems which have occurred through the use of foreign qualifying examinations. The server and client systems of the WCBT have been given good evaluations with regard to the convenience of their use and the management system for operators and supervisors.
  • 9.

    A High-Speed Data Processing Algorithm for RFID Input Data Stream Using Multi-Buffer

    한수 | 박상현 | Seung Ho Shin | 2008, 13(2) | pp.79~86 | number of Cited : 2
    Abstract PDF
    The middleware that provides RFID-based ubiquitous application service should process the data inputted constantly in real time, and acquire and deliver the answers of the questions in the application service. Studies for developing a Data Stream Management System(DSMS) has been performed in order to process a large amount of data stream inputted constantly in this way. Previous algorithms on data stream were mostly focused on reducing the average error between the answers of the successive questions and abandon the data according to the priority of them when a load occurs.This article is composed of presenting the necessity of the studies on the DSMS and speedy data processing, suggesting an algorithm to make possible the speedy data processing using buffers and prompt questions and answers, and testing the performance of the data processing rate and whether a buffer is generated correspondingly to the algorithm suggested, in either a single or a multiple buffer, through simulations.
  • 10.

    Object of Interest Extraction Using Gabor Filters

    김성영 | 2008, 13(2) | pp.87~94 | number of Cited : 1
    Abstract PDF
    In this paper, an extraction method of objects of interest in the color images is proposed. It is possible to extract objects of interest from a complex background without any prior-knowledge based on the proposed method. For object extraction, Gabor images that contain information of object location, are created by using Gabor filter. Based on the images the initial location of attention windows is determined, from which image features are selected to extract objects. To extract object, I modify the previous method partially and apply the modified method. To evaluate the performance of propsed method, precision, recall and F-measure are calculated between the extraction results from propsed method and manually extracted results. I verify the performance of the proposed methods based on these accuracies. Also through comparison of the results with the existing method, I verify the superiority of the proposed method over the existing method.
  • 11.

    A Metadata-based Data Grid System for the Integration of Military Information

    나민영 | 2008, 13(2) | pp.95~104 | number of Cited : 4
    Abstract PDF
    Recently, the need for integration of military-related information is increasing. The fundamental problem for integrating existing information systems is semantic inconsistency. To solve this problem, the use of metadata is essential, because metadata is a key component for effective information integration. In this paper, we present a metadata-based data grid system for integrating military data sources. First, we investigate federated database approach and data grid approach for information integration, and deal with metadata-based data grid. Then we present a data grid system for the integration of military information.
  • 12.

    Level Scale Interface Design for Real-Time Visualizing Large-Scale Data

    이도훈 | 2008, 13(2) | pp.105~112 | number of Cited : 0
    Abstract PDF
    Various visualizing methods have been proposed according to the input and output types. To show complex and large-scale raw data and information, LOD and special region scale method have been used for them. In this paper, I propose level scale interface for dynamic and interactive controlling large scale data such as bio-data. The method has not only advantage of LOD and special region scale but also dynamic and real-time processing. In addition, the method supports elaborate control from large scale to small one for visualization on a region in detail. Proposed method was adopted for genome relationship visualization tool and showed reasonable control method.
  • 13.

    A Clustering Algorithm for Sequence Data Using Rough Set Theory

    Seung-Joon Oh | Chan Oung Park | 2008, 13(2) | pp.113~120 | number of Cited : 2
    Abstract PDF
    The World Wide Web is a dynamic collection of pages that includes a huge number of hyperlinks and huge volumes of usage informations. The resulting growth in online information combined with the almost unstructured web data necessitates the development of powerful web data mining tools. Recently, a number of approaches have been developed for dealing with specific aspects of web usage mining for the purpose of automatically discovering user profiles. We analyze sequence data, such as web-logs, protein sequences, and retail transactions. In our approach, we propose the clustering algorithm for sequence data using rough set theory. We present a simple example and experimental results using a splice dataset and synthetic datasets.
  • 14.

    A study of Image Restoration using User Defined Mean?Wiener Filters in u-Health Care

    Hyun Chang Lee | Shin Hyun Cheul | 2008, 13(2) | pp.121~126 | number of Cited : 1
    Abstract PDF
    According to the development of software and hardware about multimedia technologies, images are used to store information extracted from data. Noises by various causes, however, are added in the process of forming images, recording and transmitting in ubiquitous environments. In image restoration viewpoints to remove them, appropriate filtering methodologies, wiener or mean etc, are utilized. Various ways for image restoration are studied as well. Therefore, in this paper, we propose user defined image restoration that applies the most appropriate parameters for image restoration and show the implementation result of the system using various parameters including mean filter and wiener filter to advance quality of degraded source image affected by noise in ubiquitous environment and medical fields.
  • 15.

    UCC Contents Production System Using Direct Show

    김기백 | 최종호 | 2008, 13(2) | pp.127~134 | number of Cited : 4
    Abstract PDF
    Recently, it has developed that UCC(User Created Contents) is made and created by the users. The mainly issue of production of contents parts is how can make easier and paly the moving picture more useful. In this paper, for this, we implemented UCC production system using Direct Show which is included Direct X. Direct Show is a moving picture editing technique and has been supported in Microsoft with COM component. Our system has features that the various effects can be easily inserted into moving picture by users. Moreover, our system can efficiently apply the effects at playing the moving picture differently from the frame processing method. We confirmed these merits through experiments. The proposed system can be used for commercial purposes which high efficiency is required such as advertisement movie.
  • 16.

    Image Recognition Using Colored-hear Transformation Based On Human Synesthesia

    SeongYoon Shin | 문형윤 | Pyo,Sung-Bae | 2008, 13(2) | pp.135~142 | number of Cited : 1
    Abstract PDF
    In this paper, we propose colored-hear recognition that distinguishing feature of synesthesia for human sensing by shared vision and specific sense of hearing. We perceived what potential influence of human's structured object recognition by visual analysis through the camera, So we've studied how to make blind persons can feel similar vision of real object. First of all, object boundaries are detected in the image data representing a specific scene. Then, four specific features such as object location in the image focus, feeling of average color, distance information of each object, and object area are extracted from picture, Finally, mapping these features to the audition factors. The audition factors are used to recognize vision for blind persons. Proposed colored-hear transformation for recognition can get fast and detail perception, and can be transmit information for sense at the same time. Thus, we were get a good result when applied this concepts to blind person's case of image recognition.
  • 17.

    A Study of Network Forensics related to Internet Criminal at UCC

    이규안 | 박대우 | Yongtae Shin | 2008, 13(2) | pp.143~152 | number of Cited : 1
    Abstract PDF
    74 % of Internet users use the UCC, and You Tube using firearms in a crime occurred. Internet crime occurred in the online, non-face transaction, anonymous, encapsulation. In this paper, we are studied a Network Forensic Way and a technique analyze an aspect criminal the Internet having appeared at Internet UCC, and to chase. Study ID, IP back-tracking and position chase through corroborative facts collections of the UCC which used UCC search way study of the police and a public prosecutor and storage way and network forensic related to crimes of Internet UCC. Proof data encrypt, and store, and study through approach control and user authentication so that they are adopted to legal proof data through integrity verification after transmission and storages. This research via the Internet and criminal conspiracy to block the advance promotion, and for the criminal investigative agencies of the Internet will contribute to the advancement forensics research.
  • 18.

    A study on removing blocking artefact noise for highly compressed images

    차성원 | Shin Jae Ho | 2008, 13(2) | pp.153~158 | number of Cited : 0
    Abstract PDF
    Blocking artefact noise is necessarily happened in compressed images using block-coded algorithms such as JPEC compressing algorithm. This noise is more recognizable especially in highly compressed images. In this paper, an algorithm is presented for reduction of blocking artefact noise using wavelet. Furthermore, we also mention about the median filter which is often used in image processing. Moreover, we compared the algorithm in this paper with the median filter, and its result was much better than the median filter both visually and numerically.
  • 19.

    A Study on Difference of Internet Game Addiction Tendency According to The Game with Use

    Hye-Myoung Choung | 이동수 | 2008, 13(2) | pp.159~166 | number of Cited : 10
    Abstract PDF
    The purpose of this study is to examine the usage of time for internet game in students of college and analyse the addiction and verify the relation between elements of the capacity of self-control and internet game addiction. The result show that the use time and the duration of daily internet game have influence on the internet game addiction(p<0.05) and also show that they have highly influence(+) on the relation elements of self-control : the trouble of studies, the loss of human relation, the confusion between the real and virtual, and the escapism.
  • 20.

    A Secure Authentication Protocol of Nodes between Cluster based on ECC

    Jeong Yoon Su | Yongtae Kim | Lee, Sang-ho | 2008, 13(2) | pp.167~176 | number of Cited : 2
    Abstract PDF
    The current pre-distribution of secret keys uses q-composite random key and it randomly allocates keys. But there exists high probability not to be public-key among nodes and it is not efficient to find public-key because of the problem for time and energy consumption. We presents key establishment scheme designed to satisfy authentication and confidentiality, without the need of a key distribution center. Proposed scheme is scalable since every node only needs to hold a small number of keys independent of the network size, and it is resilient against node capture and replication due to the fact that keys are localized. In simulation result, we estimate process time of parameter used in proposed scheme and efficiency of proposed scheme even if increase ECC key length
  • 21.

    A Hybrid MAC Protocol for Wireless Sensor Networks Enhancing Network Performance

    Seong Cheol Kim | 김동민 | 2008, 13(2) | pp.177~184 | number of Cited : 5
    Abstract PDF
    In this paper we suggest a hybrid MAC protocol for wireless sensor networks(WSN) to enhance network performance. The proposed MAC scheme is specifically designed for wireless sensor networks which consist of lots nodes. The contributions of this paper are: First, the proposed scheduling algorithm is independent of network topology. Even though the BS node has lots of one hop node in dense mode network, all the time slots can be assigned fully without increasing frequencies. Second, BS one hop nodes can use more than one time slots if necessary, so total network performance is increased. We compare the network performance of the proposed scheme with previous one, HyMAC [1].
  • 22.

    Design of Effective Intrusion Detection System for Wireless Local Area Network

    우성희 | 2008, 13(2) | pp.185~192 | number of Cited : 1
    Abstract PDF
    Most threats of WLAN are easily caused by attackers who access to the radio link between STA and AP, which involves some problems to intercept network communications or inject additional messages into them. In comparison with wired LAN, severity of wireless LAN against threats is bigger than the other networks. To make up for the vulnerability of wireless LAN, it needs to use the Intrusion Detection System using a powerful intrusion detection method as SVM. However, due to classification based on calculating values after having expressed input data in vector space by SVM, continuous data type can not be used as any input data. In this paper, therefore, we design the IDS system for WLAN by tuning with SVM and data-mining mechanism to defend the vulnerability on certain WLAN and then we demonstrate the superiority of our method.
  • 23.

    Performance Evaluation of Finite Field Arithmetic Implementations in Network Coding

    이철우 | Joon-Sang Park | 2008, 13(2) | pp.193~202 | number of Cited : 1
    Abstract PDF
    Using Network Coding in P2P systems yields great benefits, e.g., reduced download delay. The core notion of Network Coding is to allow encoding and decoding at intermediate nodes, which are prohibited in the traditional networking. However, improper implementation of Network Coding may reduce the overall performance of P2P systems. Network Coding cannot work with general arithmetic operations, since its arithmetic is over a Finite Field and the use of an efficient Finite Field arithmetic algorithm is the key to the performance of Network Coding. Also there are other important performance parameters in Network Coding such as Field size. In this paper we study how those factors influence the performance of Network Coding based systems. A set of experiments shows that overall performance of Network Coding can vary 2-5 times by those factors and we argue that when developing a network system using Network Coding those performance parameters must be carefully chosen.
  • 24.

    A Study on Implementation of ZigBee Module for the Home Networking

    HWANG IL-KYU | Jinwook Baek | 2008, 13(2) | pp.203~210 | number of Cited : 5
    Abstract PDF
    Home networking has been noticed as a key technology for the home automation because it is possible to remotely monitor and control the in-house appliances and devices through the network. Wireless home networking method is easily applied to the conventional houses compared to the wired home networking method because of low cost and small effort due to no extra wired works. Especially, home networking using the ZigBee protocol is one of the most attractive technologies in the wireless networking area because of its low cost and low power consumption characteristics. However, there are a lot of practical problems to be solved in implementing the ZigBee module and constructing the wireless network. In this paper, one of the practical structures of the hardware and software modules for implementing the ZigBee protocol is proposed. Moreover, problems in constructing the home networking with the proposed ZigBee module are introduced, and the effective solutions to solve these problems are described through various tests.
  • 25.

    The Design and Implementation of Mobile base on Access Control System Using ZigBee Method

    주헌식 | 2008, 13(2) | pp.211~220 | number of Cited : 9
    Abstract PDF
    The home network technology which used USN is developing quickly. Use yet line to a lot of part as home network technology. Recently be leap into prominence to technology core of home network as wireless technology a ZigBee. ZigBee Perceive with cognition from tag and sensor as use USN, and processing, save, integration, and provide information. Implement the access control system which used technology ZigBee with design at these papers. The wireless-based construction that used ZigBee. The influence that can let you implement early a Ubiquitous society is technology there being. Also, show by a large spinoff in an allied industry field, and improve the quality of life, and invention calls value added of leading edge IT service and product. The implementation of mobile base on access control system using zigbee mothed is expected to be helpful for the convenience in home network use.
  • 26.

    Implementations of Hypercube Networks based on TCP/IP for PC Clusters

    Hyung-Bong Lee | 홍준표 | Youngtae Kim | 2008, 13(2) | pp.221~234 | number of Cited : 0
    Abstract PDF
    In general, we use a parallel processing computer manufactured specially for the purpose of parallel processing to do high performance computings. But we can deploy and use a PC cluster composed of several common PCs instead of the very expensive parallel processing computer. A common way to get a PC cluster is to adopt the star topology network connected by a switch hub. But in this paper, we grope efficient implementations of hypercube networks based on TCP/IP to connect 8 PCs directly for more useful parallel processing environment, and make evaluations on functionality and efficiency of them using ping, netperf, MPICH. The two proposed methods of implementation are IP configuration based on link and IP configuration based on node. The results of comparison between them show that there is not obvious difference in performance but the latter is more efficient in simplicity of routing table. For verification of functionality, we compare the parallel processing results of an application in them with the same in a star network based PC cluster. These results also show that the proposed hypercube networks support a perfect parallel processing environment respectively.
  • 27.

    A Study on Object Tracking for Autonomous Mobile Robot using Vision Information

    KangJingu | LEE, JANG-MYUNG | 2008, 13(2) | pp.235~241 | number of Cited : 4
    Abstract PDF
    An Autonomous mobile robot is a very useful system to achieve various tasks in dangerous environment, because it has the higher performance than a fixed base manipulator in terms of its operational workspace size as well as efficiency. A method for estimating the position of an object in the Cartesian coordinate system based upon the geometrical relationship between the image captured by 2-DOF active camera mounted on mobile robot and the real object, is proposed. With this position estimation, a method of determining an optimal path for the autonomous mobile robot from the current position to the position of object estimated by the image information using homogeneous matrices. Finally, the corresponding joint parameters to make the desired displacement are calculated to capture the object through the control of a mobile robot. The effectiveness of proposed method is demonstrated by the simulation and real experiments using the autonomous mobile robot.
  • 28.

    Efficient Coverage Algorithm based-on Grouping for Autonomous Intelligent Robots

    Heung Seok Jeon | Noh Sam H. | 2008, 13(2) | pp.242~250 | number of Cited : 2
    Abstract PDF
    The coverage algorithm based on Boustrophedon path has been known to be the most efficient in places without or less obstacles If the map of an environmental area thru SLAM algorithm can be obtainable . However, the efficiency of the coverage algorithm based on Boustrophedon path drops drastically when obstacles are complex. In this paper, we propose and implement a new algorithm, which we call Group-k, that efficiently handles the complex area. The Group-k algorithm groups the obstacles and prioritizes the covering sequences with complex rank of the groups. Implementation-based experiments show about 20% improved performance when applying the new algorithm, compared to the Boustrophedon path algorithm.
  • 29.

    The Study on the Relationship of Logistics Service Quality, Relationship Orientation, and Customer Satisfaction for the Repurchase Intention in On-Line Shopping Mall

    김도관 | IL RYU | 2008, 13(2) | pp.251~258 | number of Cited : 16
    Abstract PDF
    The purpose of this study is to examine the structural relationship among logistics service quality, relationship-orientation for on-line shopping malls, customer satisfaction and repurchase intention in on-line shopping malls. Based on extensive review of relevant literature, nine components of logistics service quality and six components of relationship orientation are introduced in this study. And a conceptual model is developed and four research hypotheses are empirically examined using structural equation modeling. The findings indicate that logistics service quality is positively and significantly associated with customer satisfaction, and relationship- orientation is the antecedent variable of repurchase intention in the on-line shopping mall. In conclusion, it is revealed that logistics service quality and relationship-orientation play a major role in the success of on-line shopping mall.