Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2010, Vol.15, No.1

  • 1.

    Processor Design Technique for Low-Temperature Filter Cache

    최홍준 | 양나라 | Jeong-A Lee and 2other persons | 2010, 15(1) | pp.1~12 | number of Cited : 1
    Abstract PDF
    Recently, processor performance has been improved dramatically. Unfortunately, as the process technology scales down, energy consumption in a processor increases significantly whereas the processor performance continues to improve. Moreover, peak temperature in the processor increases dramatically due to the increased power density, resulting in serious thermal problem. For this reason, performance, energy consumption and thermal problem should be considered together when designing up-to-date processors. This paper proposes three modified filter cache schemes to alleviate the thermal problem in the filter cache, which is one of the most energy-efficient design techniques in the hierarchical memory systems : Bypass Filter Cache (BFC), Duplicated Filter Cache (DFC) and Partitioned Filter Cache (PFC). BFC scheme enables the direct access to the L1 cache when the temperature on the filter cache exceeds the threshold, leading to reduced temperature on the filter cache. DFC scheme lowers temperature on the filter cache by appending an additional filter cache to the existing filter cache. The filter cache for PFC scheme is composed of two half-size filter caches to lower the temperature on the filter cache by reducing the access frequency. According to our simulations using Wattch and Hotspot, the proposed partitioned filter cache shows the lowest peak temperature on the filter cache, leading to higher reliability in the processor.
  • 2.

    Design of Run-time signal test architecture in IEEE 1149.1

    Kim Jeong Hong | 장영식 | Kim,Jae-Soo | 2010, 15(1) | pp.13~21 | number of Cited : 0
    Abstract PDF
    IEEE 1149.1 test architecture was proposed to support the test of elements within the boards. It is a large serial shift register that uses the TDI pin as an input and the TDO pin as an output. Even though it performs the board level test perfectly, there is a problems of running system level test when the boards are equipped to the system. To test real time operation signal on test pin, output speed of serial shift register chain must be above double clock speed of shift register. In this paper, we designed a runtime test architecture and a runtime test procedure under running system environments to capture runtime signal at system clock rate. The suggested runtime test architecture are simulated by Altera Max+Plus 10.0. through the runtime test procedure. The simulation results show that operations of the suggested runtime test architecture are very accurate.
  • 3.

    Oriental Medical Ontology for Personalized Diagnostic Services

    문경실 | 박수현 | 2010, 15(1) | pp.23~30 | number of Cited : 7
    Abstract PDF
    With the advancement of information technology and increasing diversity in medical field, there are ongoing researches on ontology based intelligent medical system in Oriental medicine field. Intelligent diagnostic support system uses ontology to give a structure to complex medical knowledge and personal medical history so that we can make diagnosis more scientific, and provide better medical services. In this paper, we suggest an ontology that structuralize three knowledge types basic medical data, clinical trial data, and personal health information, which can be used as important information for individually tailored diagnosis. Especially in Oriental medicine diagnosis, both patient's symptoms of illness and physical constitution play a great role; it can lead to distinct diagnosis depending on their combination. Thus, it is much needed to have a diagnostic support system that uses personal health history and physical constitution along with basic medical data and clinical trial data in the field. In this paper, we implemented an Oriental medicine diagnostic support system that provides individualized diagnosis service to each patient by building an ontology on Oriental medicine focused on individual physical constitution and disease information.
  • 4.

    Implementation of GPM Core Model Using OWL DL

    Jeewoong Choe | Myung Ho Kim | 김형진 and 1other persons | 2010, 15(1) | pp.31~42 | number of Cited : 0
    Abstract PDF
    GPM(Generic Product Model) developed by Hitachi in Japan is a common data model to integrate and share life cycle data of nuclear power plants. GPM consists of GPM core model, an abstract model, implementation language for the model and reference library written in the language. GPM core model has a feature that it can construct a semantic network model consisting of relationships among objects. Initial GPM developed and provided GPML as an implementation language to support the feature of the core model, but afterwards the GPML was replaced by GPM-XML based on XML to achieve data interoperability with heterogeneous applications accessing a GPM data model. However, data models written in GPM-XML are insufficient to be used as a semantic network model for lack of studies which support GPM-XML and enable the models to be used as a semantic network model. This paper proposes OWL as the implementation language for GPM core model because OWL can describe ontologies similar to semantic network models and has an abundant supply of technical standards and supporting tools. Also, OWL which can be expressed in terms of RDF/XML based on XML guarantees data interoperability. This paper uses OWL DL, one of three sublanguages of OWL, because it can guarantee complete reasoning and the maximum expressiveness at the same time. The contents of this paper introduce the way how to overcome the difference between GPM and OWL DL, and, base on this way, describe how to convert the reference library written in GPML into ontologies based on OWL DL written in RDF/XML.
  • 5.

    An Extension of Possibilistic Fuzzy C-means using Regularization

    허경용 | 남궁영환 | 김성훈 | 2010, 15(1) | pp.43~50 | number of Cited : 3
    Abstract PDF
    Fuzzy c-means (FCM) and possibilistic c-means (PCM) are the two most well-known clustering algorithms in fuzzy clustering area, and have been applied in many applications in their original or modified forms. However, FCM's noise sensitivity problem and PCM's overlapping cluster problem are also well known. Recently there have been several attempts to combine both of them to mitigate the problems and possibilistic fuzzy c-means (PFCM) showed promising results. In this paper, we proposed a modified PFCM using regularization to reduce noise sensitivity in PFCM further. Regularization is a well-known technique to make a solution space smooth and an algorithm noise insensitive. The proposed algorithm, PFCM with regularization (PFCM-R), can take advantage of regularization and further reduce the effect of noise. Experimental results are given and show that the proposed method is better than the existing methods in noisy conditions.
  • 6.

    Design and Implementation of Parking Information Support System for Inner Parking Lot Based on Microprocessor

    유시온 | 오형진 | Oh Kab Suk | 2010, 15(1) | pp.51~59 | number of Cited : 3
    Abstract PDF
    Apartment complex, buildings, markets and department stores have inner parking lots which can accept many cars but drivers waste lots of times to find the empty parking spaces in crowding parking lots. In this paper, we proposed the inner parking information support system based on microprocessor which can decrease roaming times to find vacant parking spot in confusing parking lots through notice monitor and provide SMS to make it easy to find parked place. Proposed system consist with RFID system for detecting access of cars, microprocessor system for processing data of checking existence of cars on parking spots and communicating with server, and server system which processes information of cars' in and out, guides empty parking spots and parked location to drivers. Suggested system is realized by handmade model parking lot size of 8 cars, and we confirmed practicality by providing information using parking notice monitor and single message service.
  • 7.

    A Robot Coverage Algorithm Integrated with SLAM for Unknown Environments

    Jung Kyu Park | Heung Seok Jeon | Noh Sam Hyuk | 2010, 15(1) | pp.61~69 | number of Cited : 2
    Abstract PDF
    An autonomous robot must have a global workspace map in order to cover the complete workspace. However, most previous coverage algorithms assume that they have a grid workspace map that is to be covered before running the task. For this reason, most coverage algorithms can not be applied to complete coverage tasks in unknown environments. An autonomous robot has to build a workspace map by itself for complete coverage in unknown environments. Thus, we propose a new DmaxCoverage algorithm that allows a robot to carry out a complete coverage task in unknown environments. This algorithm integrates a SLAM algorithm for simultaneous workspace map building. Experimentally, we verify that DmaxCoverage algorithm is more efficient than previous algorithms.
  • 8.

    An extension of state transition graph for distributed environment

    Suh, Jin Hyung | 이왕헌 | 2010, 15(1) | pp.71~81 | number of Cited : 0
    Abstract PDF
    In a typical web environment, it is difficult to determine the update and re-computation status of WebView content or the transition of WebView processing included in web page. If an update to one of data is performed before a read operation to that, we could get a wrong result due to the incorrect operation and increase a complexity of the problem to process. To solve this problem, lots of researchers have studied and most of these problems at the single user environment is not problems. However, the problems at a distributed environment might be occurred. For this reason, in this paper, we proposed the extended state transition graph and algorithms for each status of WebView for explaining WebView state in the distributed environment and analyze the performance of using the materialized WebView and not. Additionally, also analyze the timing issues in network and effectiveness which follows in size of WebView contents.
  • 9.

    The Performance Analysis of Nearest Neighbor Query Process using Circular Search Distance

    Seon,Hwijoon | 김원호 | 2010, 15(1) | pp.83~90 | number of Cited : 1
    Abstract PDF
    The number of searched nodes and the computation time in an index should be minimized for optimizing the processing cost of the nearest neighbor query. The Measurement of search distance considered a circular location property of objects is required to accurately select the nodes which will be searched in the nearest neighbor query. In this paper, we propose the processing method of the nearest neighbor query be considered a circular location property of object where the search space consists of a circular domain and show its performance by experiments. The proposed method uses the circular minimum distance and the circular optimal distance which are the search measurements for optimizing the processing cost of the nearest neighbor query.
  • 10.

    Robust Method of Updating Reference Background Image in Unstable Illumination Condition

    지영석 | Youngjun Han | Hernsoo Hahn | 2010, 15(1) | pp.91~102 | number of Cited : 3
    Abstract PDF
    It is very difficult that a previous surveillance system and vehicle detection system find objects on a limited and unstable illumination condition. This paper proposes a robust method of adaptively updating a reference background image for solving problems that are generated by the unstable illumination. The first input image is set up as the reference background image, and is divided into three block categories according to an edge component. Then a block state analysis, which uses a rate of change of the brightness, a stability, a color information, and an edge component on each block, is applied to the input image. On the reference background image, neighbourhood blocks having the same state of a updated block are merged as a block. The proposed method can generate a robust reference background image because it distinguishes a moving object area from an unstable illumination. The proposed method very efficiently updates the reference background image from the point of view of the management and the processing time. In order to demonstrate the superiority of the proposed method, this paper shows that it detects vehicles in a stable manner in situation that an illumination quickly changes.
  • 11.

    Identification of 5-Jung-color and 5-Kan-color In Video

    SeongYoon Shin | Pyo,Sung-Bae | 2010, 15(1) | pp.103~109 | number of Cited : 0
    Abstract PDF
    As color was used for formative language since a human activity was beginning, all the symptoms in the world that the human eye can see is present. In this paper, we identify Korea traditional color harmony for extracted key frames from scene change detection. Traditional color is classified as 5-Jung-color and 5-Kan-color, and determine whether to harmony. Red, blue, yellow, black, and white, called 5-Jung-color and pink, blue, purple, sulfur, and green, called the 5-Kan-color was identified. First, we extract edge using Canny algorithm. And, we are labeling and clustering colors around the edge. Finally, we identify the traditional color using identification method of traditional color harmony. The proposed study in this paper has been proven through experiments.
  • 12.

    Localization Algorithm in Wireless Sensor Networks Using a Directional Antenna

    홍성화 | 강봉직 | 2010, 15(1) | pp.111~118 | number of Cited : 1
    Abstract PDF
    The proposed algorithm to be explained in this paper is the localization technique using directional antenna. Here, it is assumed that anchor node has the ability to transfer the azimuth of each sector using GPS modules, sector antenna, and the digital compass. In the conventional sensor network, the majority of localization algorithms were capable of estimating the position information of the sensor node by knowing at least 3 position values of anchor nodes. However, this paper has proposed localization algorithm that estimates the position of nodes to continuously move with sensor nodes and traveling nodes. The proposed localization mechanisms have been simulated in the Matlab. The simulation results show that our scheme performed better than other mechanisms (e.g. MCL, DV-distance).
  • 13.

    A Privacy Protection Method in Social Networks Considering Structure and Content Information

    성민경 | CHUNGYONDOHN | 이기용 | 2010, 15(1) | pp.119~128 | number of Cited : 2
    Abstract PDF
    Recently, social network services are rapidly growing and it is estimated that this trend will continue in the future. Social network data can be published for various purposes such as statistical analysis and population studies. When data publication, however, it may disclose the personal privacy of some people, since it can be combined with external information. Therefore, a social network data holder has to remove the identifiers of persons and modify data which have the potential to disclose the privacy of the persons by combining it with external information. The utility of data is maximized when the modification of data is minimized. In this paper, we propose a privacy protection method for social network data that considers both structural and content information. Previous work did not consider content information in the social network or distorted too much structural information. We also verify the effectiveness and applicability of the proposed method under various experimental conditions.
  • 14.

    A Packet Prioritization Scheme for supporting QoS in Wireless Sensor Networks

    Yunseok Rhee | 2010, 15(1) | pp.129~137 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a packet prioritization scheme using preamble signal and backoff time which is designed to provide a differentiated channel occupation with a packet priority in wireless sensor networks. This scheme aims at enabling QoS such as fast delivery of high priority packets by reducing their backoff time as well as thus securing higher channel occupation. We expect that it could also improve the channel utilization of the entire network by avoiding unnecessary channel contention. For the purpose, we add new features of multiple queue and preamble modification to the TinyOS based B-MAC. This scheme achieves 82-88% reduction in delivery time of high priority packets, thus it enables realtime support for urgent applications.
  • 15.

    Cryptanalysis and Enhancement of a Remote User Authentication Scheme Using Smart Cards

    Youngsook Lee | Dongho Won | 2010, 15(1) | pp.139~147 | number of Cited : 5
    Abstract PDF
    A remote user authentication scheme is a two-party protocol whereby an authentication server in a distributed system confirms the identity of a remote individual logging on to the server over an untrusted, open network. In 2005, Liao et al. proposed a remote user authentication scheme using a smart card, in which users can be authenticated anonymously. Recently, Yoon et al. have discovered some security flaws in Liao et al.’s authentication scheme and proposed an improved version of this scheme to fix the security flaws. In this article, we review the improved authentication scheme by Yoon et al. and provide a security analysis on the scheme. Our analysis shows that Yoon et al.’s scheme does not guarantee not only any kind of authentication, either server-to-user authentication or user-to-server authentication but also password security. The contribution of the current work is to demonstrate these by mounting two attacks, a server impersonation attack and a user impersonation attack, and an off-line dictionary attack on Yoon et al.’s scheme. In addition, we propose the enhanced authentication scheme that eliminates the security vulnerabilities of Yoon et al.’s scheme.
  • 16.

    A Study on Web Mining System for Real-Time Monitoring of Opinion Information Based on Web 2.0

    주해종 | BongWha Hong | Bok-Cheol Jeong | 2010, 15(1) | pp.149~157 | number of Cited : 2
    Abstract PDF
    As the use of the Internet has recently increased, the demand for opinion information posted on the Internet has grown. However, such resources only exist on the website. People who want to search for information on the Internet find it inconvenient to visit each website. This paper focuses on the opinion information extraction and analysis system through Web mining that is based on statistics collected from Web contents. That is, users' opinion information which is scattered across several websites can be automatically analyzed and extracted. The system provides the opinion information search service that enables users to search for real-time positive and negative opinions and check their statistics. Also, users can do real-time search and monitoring about other opinion information by putting keywords in the system. Proposed technologies proved to have outstanding capabilities in comparison to existing ones through tests. The capabilities to extract positive and negative opinion information were assessed. Specifically, test movie review sentence testing data was tested and its results were analyzed.
  • 17.

    A Study Of EIS Build Method by ISP Base for Large Scale Enterprise Associate Company

    김수겸 | 하수철 | 2010, 15(1) | pp.159~166 | number of Cited : 0
    Abstract PDF
    It is noteworthy that EIS Consulting Method by ISP based on ERP Linkage Type for Large Scale Enterprise Associate Company. In this thesis, IT Strategy plan and methodology are suggested in order to solve the several problems including standardization on implementation of EIS Introduction and operation between large-small enterprise. Integration of business and information technical is made by Business management group's continuous IT concern and future information strategy. Also this paper proposes ISP Planning method (environment analysis, present analysis, IT analysis, target IT plan etc..), EIS Construction (based ERP Real data/time). In addition to , we suggest to use electron industry model and LCD/LED field in this system.
  • 18.

    An Integrated Management Model of OS-RBAC and Separation Of Duty Policy

    변창우 | 2010, 15(1) | pp.167~175 | number of Cited : 0
    Abstract PDF
    Like most large organizations, there are business rules such as ‘separation of duty’ and ‘delegation’ which should be considered in access control. From a SOD point of view, previous SOD models built on the (Administrative) Role-Based Access Control model cannot present the best solution to security problems such as information integrity by the limited constituent units such as role hierarchy and role inheritance. Thus, we propose a new integrated management model of administration role-based access control model and SOD policy, which is called the OS-SoDAM. The OS-SoDAM defines the authority range in an organizational structure that is separated from role hierarchy and supports a decentralized security officer-level SOD policy in which a local security officer can freely perform SOD policies within a security officer’s authority range without the security officer’s intervention.
  • 19.

    Efficient Continuous Vocabulary Clustering Modeling forTying Model Recognition Performance Improvement

    안찬식 | 오상엽 | 2010, 15(1) | pp.177~183 | number of Cited : 14
    Abstract PDF
    In continuous vocabulary recognition system by statistical method vocabulary recognition to be performed using probability distribution it also modeling using phoneme clustering for based sample probability parameter presume. When vocabulary search that low recognition rate problem happened in express vocabulary result from presumed probability parameter by not defined phoneme and insert phoneme and it has it's bad points of gaussian model the accuracy unsecure for one clustering modeling. To improve suggested probability distribution mixed gaussian model to optimized for based resemble Euclidean and Bhattacharyya distance measurement method mixed clustering modeling that system modeling for be searching phoneme probability model in clustered model. System performance as a result of represent vocabulary dependence recognition rate of 98.63%, vocabulary independence recognition rate of 97.91%.
  • 20.

    A Similarity Valuating System using The Pattern Matching

    고방원 | 김영철 | 2010, 15(1) | pp.185~192 | number of Cited : 2
    Abstract PDF
    This research suggests that valuate similarities by using the matches of patterns which is appeared on different two documents. Statistical ways such as fingerprint method are mainly used for evaluate similarities of existing documents. However, this method has a problem of accuracy for the high similarity which is occurred when many similar words are appeared from two irrelevant documents. These issues are caused by simple comparing of statistical parameters of two documents. But the method using patterns suggested on this research solved those problems because it judges similarity by searching same patterns. This method has a defect, however, that takes long time to search patterns, but this research introduce the algorithms complement this defect.
  • 21.

    The Effects of the School Environmental Factors on Internet Addition in Adolescence -Focusing on moderating effects of gender-

    김효순 | 2010, 15(1) | pp.193~200 | number of Cited : 8
    Abstract PDF
    This study is to identify the effects of school environmental factors on internet addiction. Especially, this study is focused on identifying the moderating effects of gender. To achieve the purpose of the study, this study identified the affecting factors of adolescents's internet addiction and established the causal model and research hypothesis. To test this study model and hypothesis, this study interviewed 539 young boys and girls who were attending to high schools using questionnaire. This study suggests the policy implications based on the analysis results.
  • 22.

    Building An Ontology Model for Warehouse Management using Sensor

    Lee Hyun Chang | 2010, 15(1) | pp.201~206 | number of Cited : 1
    Abstract PDF
    According to the ubiquitous technology development, managing of the warehouse system which stores and manages agriculture products is realized effectively. This paper proposes an ontology-based context aware system model for the purpose of storing and managing agricultural products using ubiquitous sensors to share and distribute information. In these days, owing to penetrating ubiquitous technologies into our way of life, the importance of information is increasing gradually. The importance of ontology in a domain is getting as well. Therefore, this paper focuses on describing to get data from ubiquitous devices such as sensors, and designs and build an ontology-based agricultural product warehouse model.
  • 23.

    The Stocks Profit Rate Analysis which Uses Individual‧Engine‧ foreigner‧ Knowledge Base HTS at The Bear Period‧The Bear Wave Period‧The Bull Period‧The Bull Wave Period

    이정훈 | Dea-woo Park | 2010, 15(1) | pp.207~217 | number of Cited : 4
    Abstract PDF
    It is taken a violent fall of the international stocks market that was an American Subprime Mortgage Situation. The loss rate of individual investor judged than foreigner and institution by bigger thing. Therefore, further scientific and mechanical investment is needed at the stock investment using Internet HTS. This dissertation is stocks profit rate analysis which uses individual․engine‧foreigner‧Knowledge Base HTS at the Bear Period‧the Bear Wave Period‧the Bull Period‧the Bull Wave Period. Knowledge Based e-friend HTS was Installed. HTS does composite stock exchange index in actuality stock trading and engine's fund earning rate, yield that is abroad comparative analysis using trend line that is HTS tool, MACD, Bollinger Bands, Stochastic slow's function. Usually, each subjects suppose that deal 5 stocks, and comparative study of the profit(loss)rate of the down to earth falling rate and rising rate, by comparing the earning rate of 5 Small capital stocks with 5 medium capital stocks and 5 Large capital stocks during the bear period, the bear wave period, the bull period, the bull wave period has meaning at the making research of the financial IT field.
  • 24.

    Fuzzy Inference System Architecture for Customer Satisfaction Service

    권희철 | 유정상 | 2010, 15(1) | pp.219~226 | number of Cited : 4
    Abstract PDF
    Recently most parking control systems provide customers with various services, but most of the services are just the extension of parking spaces, automatic parking control system and so on. It is essential to use the satisfaction degree as the extent that customer are satisfied with parking control system to improve the quality of the system services and diversify the system services. The degree of satisfaction is different from customer to customer in same condition and can be represented as linguistic variables. In this paper, we present therefore a technique that quantify how much customer are satisfied with parking control system and fuzzy inference system architecture as a solution that can help us to make a efficient decision for these parking problems. In this architecture, inference engine using fuzzy logic compares context data with the rules in the fuzzy rule-based system, gets the sub-results, aggregates them and defuzzifies the aggregated result using MATLAB application programming to obtain crisp value. Fuzzy inference system architecture presented in this paper, can be used as a efficient method to analyze the satisfaction degree which is represented as fuzzy linguistic variables by human emotion. And it can be used to improve the satisfaction degree of not only parking system but also other service systems of various domains