Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

Home > Explore Content > All Issues > Article List

2009, Vol.14, No.4

  • 1.

    An Implementation of Cutting-Ironbar Manufacturing Software using Dynamic Programming

    김성훈 | 2009, 14(4) | pp.1~8 | number of Cited : 0
    Abstract PDF
    In this paper, we deal an implementation of the software that produces sub-optimal solution of cutting-ironbar planning problem using dynamic programming. Generally, it is required to design an optimization alogrithm to accept the practical requirements of cutting ironbar manufacturing. But, this problem is a multiple-sized 1-dimensional cutting stock problem and Linear Programming approaches to get the optimal solution is difficult to be applied due to the problem of explosive computation and memory limitation. In order to overcome this problem, we reform the problem for applying Dynamic Programming and propose a cutting-ironbar planning algorithm searching the sub-optimal solution in the space of fixed amount of combinated columns by using heuristics. Then, we design a graphic user interfaces and screen displays to be operated conveniently in the industry workplace and implement the software using open-source GUI library toolkit, GTK+.
  • 2.

    Energy and Performance-Efficient Dynamic Load Distribution for Mobile Heterogeneous Storage Devices

    김영진 , Kim, Jihong | 2009, 14(4) | pp.9~18 | number of Cited : 1
    Abstract PDF
    In this paper, we propose a dynamic load distribution technique at the operating system level in mobile storage systems with a heterogeneous storage pair of a small form-factor hard disk and a flash memory, which aims at saving energy consumption as well as enhancing I/O performance. Our proposed technique takes a combinatory approach of file placement and buffer cache management techniques to find how the load can be distributed in an energy and performance-aware way for a heterogeneous mobile storage pair of a hard disk and a flash memory. We demonstrate that the proposed technique provides better experimental results with heterogeneous mobile storage devices compared with the existing techniques through extensive simulations.
  • 3.

    A Study on Extraction of Skin Region and Lip Using Skin Color of Eye Zone

    박영재 , Gye-young Kim , 장석우 | 2009, 14(4) | pp.19~30 | number of Cited : 10
    Abstract PDF
    In this paper, We propose a method with which we can detect facial components and face in input image. We use eye map and mouth map to detect facial components using eyes and mouth. First, We find out eye zone, and second, We find out color value distribution of skin region using the color around the eye zone. Skin region have characteristic distribution in YCbCr color space. By using it, we separate the skin region and background area. We find out the color value distribution of the extracted skin region and extract around the region. Then, detect mouth using mouthmap from extracted skin region. Proposed method is better than traditional method the reason for it comes good result with accurate mouth region.
  • 4.

    The correction of Lens distortion based on Image division using Artificial Neural Network

    Kiyoung Shin , Jang-Han Bae , Joung Hwan Mun | 2009, 14(4) | pp.31~38 | number of Cited : 0
    Abstract PDF
    Lens distortion is inevitable phenomenon in machine vision system. More and more distortion phenomenon is occurring in order to choice of lens for minimizing cost and system size. As shown above, correction of lens distortion is critical issue. However previous lens correction methods using camera model have problem such as nonlinear property and complicated operation. And recent lens correction methods using neural network also have accuracy and efficiency problem. In this study, I propose new algorithms for correction of lens distortion. Distorted image is divided based on the distortion quantity using k-means. And each divided image region is corrected by using neural network. As a result, the proposed algorithms have better accuracy than previous methods without image division.
  • 5.

    Real-time Lip Region Detection for Lipreadingin Mobile Device

    김영운 , Kang Sun-Kyung , Jung, Sung-Tae | 2009, 14(4) | pp.39~46 | number of Cited : 1
    Abstract PDF
    Many lip region detection methods have been developed in PC environment. But the existing methods are difficult to run on real-time in resource limited mobile devices. To solve the problem, this paper proposes a real-time lip region detection method for lipreading in Mobile device. It detects face region by using adaptive face color information. After that, it detects lip region by using geometrical relation between eyes and lips. The proposed method is implemented in a smart phone with Intel PXA 270 embedded processor and 386MB memory. Experimental results show that the proposed method runs at the speed 9.5 frame/sec and the correct detection rate was 98.8% for 574 images.
  • 6.

    Recognition of Events by Human Motion for Context-aware Computing

    최요환 , SeongYoon Shin , Chang Woo Lee | 2009, 14(4) | pp.47~57 | number of Cited : 1
    Abstract PDF
    Event detection and recognition is an active and challenging topic recent in Computer Vision. This paper describes a new method for recognizing events caused by human motion from video sequences in an office environment. The proposed approach analyzes human motions using Motion History Image (MHI) sequences, and is invariant to body shapes, types or colors of clothes and positions of target objects. The proposed method has two advantages; one is thant the proposed method is less sensitive to illumination changes comparing with the method using color information of objects of interest, and the other is scale invariance comparing with the method using a prior knowledge like appearances or shapes of objects of interest. Combined with edge detection, geometrical characteristics of the human shape in the MHI sequences are considered as the features. An advantage of the proposed method is that the event detection framework is easy to extend by inserting the descriptions of events. In addition, the proposed method is the core technology for event detection systems based on context-aware computing as well as surveillance systems based on computer vision techniques.
  • 7.

    A Geographic Routing based Data Delivery Scheme for Void Problem Handling in Wireless Sensor Networks

    김석규 | 2009, 14(4) | pp.59~67 | number of Cited : 2
    Abstract PDF
    In wireless sensor networks(WSNs), geographic greedy forwarding fails to move a packet further towards its destination if the sender does not have any closer node to the destination in its one hop transmission region. In this paper, we propose a enhanced geographic routing, called CGR(Cost based Geographic Routing) for efficient data delivery against void problem environment. CGR first establishes Shadow Bound Region and then accomplishes Renewing Cost Function Algorithm for effective greedy forwarding data delivery. Our simulation results show significant improvements compared with existing schemes in terms of routing path length, success delivery ratio and energy efficiency.
  • 8.

    Harmful Traffic Control Using Sink Hole Routing

    장문수 , 이정일 , 오창석 | 2009, 14(4) | pp.69~76 | number of Cited : 2
    Abstract PDF
    The construction of Internet IP-based Network is composed of router and switch models in a variety of companies. The construction by various models causes the complexity of the management and control as different types of CLI is used by different company to filter out abnormal traffics like worm, virus, and DDoS. To improve this situation, IETF is working on enacting XML based configuration standards from NETCONF working group, but currently few commands processing at the level of operation layer on NETCONF are only standardized and it’s hard for unified control operation process between different make of system as different company has different XML command to filter out abnormal traffics. This thesis proposes ways to prevent abnormal attacks and increase efficiency of network by re-routing the abnormal traffics coming thru unified control for different make of systems into Sinkhole router and designing a control system to efficiently prevent various attacks after checking the possibility of including abnormal traffics from unified control operation.
  • 9.

    A Framework to Support Reconfiguration of Single Web Service Based on Dynamic Qos Properties

    진상찬 , Eun Ju Lee | 2009, 14(4) | pp.99~108 | number of Cited : 2
    Abstract PDF
    At present, Web services become main means to construct web applications. As the number of web services grows and various kind of web services have been produced, QoS properties of web services are one of important criteria to select more appropriate web services. However, the selected web services may become inappropriate for the Requester's requirements, because QoS is kind of dynamic properties. this paper proposes a framework that proposed that finds an appropriate web service for Requester's QoS requirements, and dynamically replaces an inappropriate web service with right one. The problems which happen in substitution step are also identified and the solutions are described with an illustrative example.
  • 10.

    Adapted Sequential Pattern Mining Algorithms for Business Service Identification

    LEE JUNG WON | 2009, 14(4) | pp.109~121 | number of Cited : 0
    Abstract PDF
    The top-down method for SOA delivery is recommended as a best way to take advantage of SOA. The core step of SOA delivery is the step of service modeling including service analysis and design based on ontology. Most enterprises know that the top-down approach is the best but they are hesitant to employ it because it requires them to invest a great deal of time and money without it showing any immediate results, particularly because they use well-defined component based systems. In this paper, we propose a service identification method to use a well-defined components maximally as a bottom-up approach. We assume that user's inputs generates events on a GUI and the approximate business process can be obtained from concatenating the event paths. We first find the core GUIs which have many outgoing event calls and form event paths by concatenating the event calls between the GUIs. Next, we adapt sequential pattern mining algorithms to find the maximal frequent event paths. As an experiment, we obtained business services with various granularity by applying a cohesion metric to extracted frequent event paths.
  • 11.

    A Study on DB Security Problem Improvement of DB Masking by Security Grade

    백종일 , Dea-woo Park | 2009, 14(4) | pp.123~131 | number of Cited : 5
    Abstract PDF
    An encryption module is equipped basically at 8i version ideal of Oracle DBMS, encryption module, but a performance decrease is caused, and users are restrictive. We analyze problem of DB security by technology by circles at this paper whether or not there is an index search, object management disorder, a serious DB performance decrease by encryption, real-time data encryption beauty whether or not there is data approach control beauty circular-based IP. And presentation does the comprehensive security Frame Work which utilized the DB Masking technique that is an alternative means technical encryption in order to improve availability of DB security. We use a virtual account, and set up a DB Masking basis by security grades as alternatives, we check advance user authentication and SQL inquiry approvals and integrity after the fact through virtual accounts, utilize to method as collect by an auditing log that an officer was able to do safely DB.
  • 12.

    Real-time wireless Audio/Video Transmission Techniquefor Handheld Devices

    윤경섭 | 2009, 14(4) | pp.133~139 | number of Cited : 3
    Abstract PDF
    Improvement of Wireless internet and handheld devices makes it possible that users can use various multimedia services. But, access point devices are needed while using handheld devices, and those devices use virtual network address for networking. For that reason, end-users hardly use the 1:1 voice or video chat, and messenger service that require direct communications between devices. Also, service providers need central server for relaying packets from terminals to others, the traffic and costs of relaying go high, so real-time massive data transmission services are restrictively provided. In this study, we apply TCP/UDP hole punching technique to those applications. And we implement service that supports real-time multimedia direct transmission between equipments that use virtual network addresses.
  • 13.

    Attendance Appraisal for Learner Participation Degree Based Virtual Lecture

    HyunJu Kim | 2009, 14(4) | pp.141~151 | number of Cited : 0
    Abstract PDF
    In The increasing use of computers and high-speed Internet network has greatly influenced education, causing a veering away from the typical and traditional way of delivering instruction. Specifically, the various kinds of Web-based multimedia technology, the interactive activities on the Internet, and satellite broadcasting technology are accelerating the emergence of a virtual-lectures-based educational model, which transcends time and space. Such virtual lectures make it possible for the entire teaching-learning process to be done in a virtual learning environment, thus giving rise to problems regarding learning guidance, feedback, and appraisal. In this paper, we propose a system for attendance appraisal for learner participation degree based virtual lecture, an appraisal element in virtual learning environments. This appraisal model can set the elements of virtual learning environments in such a way as to reflect in the attendance appraisal of the opened virtual learning environment information regarding the learner's participation in class. In addition, this model motivates the learners to actively participate in the virtual learning environment and to support instructors by accomplishing the activities that are needed for attendance appraisal.
  • 14.

    Development Method's Impact on Function Points in IT Projects - Focused on New Development and Enhancement -

    이원호 | 2009, 14(4) | pp.153~161 | number of Cited : 1
    Abstract PDF
    The decision makers of IT projects are faced to situations to choose a best development method between inhouse development and solution purchase when companies must develop a new system or enhance the existed system. For those decision makers related to the IT projects, this study provides them with meaningful results through the ISBSG project repositary, how each development method, such as a development inhouse, a solution purchased, a combined method, impact the function point, which is a critical factor to measure the required time, efforts, cost of IT project development.
  • 15.

    A Study on the Factors for Adopting Financial Information System and the Companies’ Business Performance

    황인태 , Yi, Seon Gyu | 2009, 14(4) | pp.163~174 | number of Cited : 2
    Abstract PDF
    EThis research conducted research on the provision of the strategic information for the companies’ financial and accounting parts among the functions that are provided by the ERP, elements related to the adoption of financial information system that influence and that supports decision-making and management performance. The results of this research are as follows. First, organization's degree of decentralization among the organization structure’s characteristics and the element of information technology infrastructure among the information technology characteristics does not affect financial or non-financial performance. Second, financial information characteristics do not affect financial performance partially, Third, organization’s size does not play the role of adjuster when it comes to the financial performance. Fourth, some research variables used on this research were not analyzed as important elements that influence financial performance, but the analysis showed that they mostly influence non-financial performance, which means that these are what could be considered strategically when adopting financial information system in the future.
  • 16.

    The Effects on Knowledge Contribution in Online Communities

    Ho Kyoung Shin , 이기원 , 김경준 | 2009, 14(4) | pp.175~182 | number of Cited : 5
    Abstract PDF
    This study investigated what factors influence the knowledge contribution in online communities. Based on the theoretical framework like self-presentation theory and organizational citizenship behavior theory, we developed the research model and proposed four hypotheses. In order to test our hypotheses with an empirical study, we have conducted a survey which resulted in 192 valid responses in the final sample. The PLS analysis results indicate that knowledge contribution is influenced by self-presentation, innovation, organizational citizenship behavior, and affection similarity of online community users. Practical implications of these findings and future research implications are also discussed.
  • 17.

    A Study on Impediments and Suggestion in Developing DHRMIS

    노승담 , HaeSool Yang | 2009, 14(4) | pp.183~191 | number of Cited : 0
    Abstract PDF
    Republic of Korea is actively adopting IT fusion technologies to achieve the goal of 'Advanced National Defense'. This study is aiming to directly contribute to the ongoing DHRMIS project by analyzing its any discovered and substantial problems as well as suggesting improvements. Current difficulties include the efficient estimation on project cost, the lack of statistics for cross-referencing, the inefficient development methodology, compliance with global quality control standard, and the separated command centers. This study suggests the budget appraisal process prior to the actual execution, the introduce of regulatory business registration system, applying an efficient development methodologies as well as ISO9126 standard for quality control, and a centralized command department. We expect this study would contribute to following researches in advancing our national defense.
  • 18.

    Business Processes Automation and Analysis Techniques by Using BPM and SOA

    이충헌 , Jonghak Lee , Seo Jeong-Man and 1 other persons | 2009, 14(4) | pp.193~200 | number of Cited : 4
    Abstract PDF
    Recently, a combination of Business Process Management (BPM) and Service Oriented Architecture (SOA) is being recommended as the best approach for automating large business systems. And the need to create meaningful information from daily operational data is increased today. In this paper, we propose a methodology for automating business processes based on the BPM-SOA convergence trend and verify the methodology by implementing the project management business process. BPM-SOA convergence provides higher extensibility and productivity due to the loosely coupled system construction and maintenance. The system has good properties for frequent process changes and reuse of duplicate processes. We then analyze extensibility of the system as new business processes are added to the existing system. We finally analyze the data generated by BPM by using SAP business intelligence to support management’s decision making and strategy. Business intelligence provides not only useful data for business decisions but also chance to optimize the business processes.
  • 19.

    A Modeling Methodology for Analysis of Dynamic Systems Using Heuristic Search and Design of Interface for CRM

    전진호 , Gye Sung Lee | 2009, 14(4) | pp.201~209 | number of Cited : 3
    Abstract PDF
    Most real world systems contain a series of dynamic and complex phenomena. One of common methods to understand these systems is to build a model and analyze the behavior of them. A two-step methodology comprised of clustering and then model creation is proposed for the analysis on time series data. An interface is designed for CRM(Customer Relationship Management) that provides user with 1:1 customized information using system modeling. It was confirmed from experiments that better clustering would be derived from model based approach than similarity based one. Clustering is followed by model creation over the clustered groups, by which future direction of time series data movement could be predicted. The effectiveness of the method was validated by checking how similarly predicted values from the models move together with real data such as stock prices.