Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2010, Vol.15, No.2

  • 1.

    Real-Time Job Scheduling Strategy for Grid Computing

    최준영 | Lee, Won Joo | Chang Ho Jeon | 2010, 15(2) | pp.1~8 | number of Cited : 3
    Abstract PDF
    In this paper, we propose a scheduling strategy for grid environment that reduces resource cost. This strategy considers resource cost and job failure rate to efficiently allocate local computing resources. The key idea of our strategy is that we use two-level scheduling using remote and local scheduler. The remote scheduler determines the expected total execution times of jobs using the current network and local system status maintained in its resource database and allocates jobs with minimum total execution time to local systems. The local scheduler recalculates the waiting time and execution time of allocated job and uses it to determine whether the job can be processed within the specified deadline. If it cannot finish in time, the job is migrated other local systems. Through simulation, we show that it is more effective to reduce the resource cost than the previous Greedy strategy. We also show that the proposed strategy improves the performance compared to previous Greedy strategy.
  • 2.

    CORDIC using Heterogeneous Adders for Better Delay, Area and Power Trade-offs

    이병석 | 이정근 | Jeong-A Lee | 2010, 15(2) | pp.9~17 | number of Cited : 0
    Abstract PDF
    High performance is required with small size and low power in the mobile embedded system. A CORDIC algorithm can compute transcendental functions effectively with only small adders and shifters and is suitable one for the mobile embedded system. However CORDIC unit has performance degradation according due to iterative inter-rotations. Adder design is an important design unit to be optimized for a high performance and low power CORDIC unit. It is necessary to explore the design space of a CORDIC unit considering trade-offs of an adder unit while satisfying delay, area and power constraints. In this paper, we suggest a CORDIC architecture employing a heterogeneous adder and an optimization methodology for producing better optimal tradeoff points of CORDIC designs.
  • 3.

    Implementation of Registry Virtualization on Windows

    Shin Dong Ha | 2010, 15(2) | pp.19~26 | number of Cited : 0
    Abstract PDF
    The Windows registry is a hierarchical database where the configuration data of a system or application programs is stored. In this paper, we presented and implemented a registry virtualization algorithm, and measured its performance. The registry virtualization algorithm presented in the paper is called Copy-One-level On Write-Open(COOWO) that is a modified version of general Copy On Write(COW) method to make it suitable for registry virtualization. In this paper, we implemented the proposed algorithm as a dynamically loadable library in Windows and applied it to many Windows application programs. This paper is meaningful since we described a registry virtualization algorithm in detail in situation where we can not find papers that describe the registry virtualization in detail, and we could find the performance of the algorithm can be used in the real applications.
  • 4.

    Self Health Diagnosis System of Oriental Medicine Using Enhanced Fuzzy ART Algorithm

    Kim, Kwang-baek | Woo, Young Woon | 2010, 15(2) | pp.27~34 | number of Cited : 4
    Abstract PDF
    Recently, lots of internet service companies provide on-line health diagnosis systems. But general persons not having expert knowledge are difficult to use, because most of the health diagnosis systems present prescriptions or dietetic treatments for diseases based on western medicine. In this paper, a self health diagnosis system of oriental medicine coinciding with physical characteristics of Korean using fuzzy ART algorithm, is proposed. In the proposed system, three high rank of diseases having high similarity values are derived by comparing symptoms presented by a user with learned symptoms of specific diseases based on treatment records using neural networks. And also the proposed system shows overall symptoms and folk remedies for the three high rank of diseases. Database on diseases and symptoms is built by several oriental medicine books and then verified by a medical specialist of oriental medicine. The proposed self health diagnosis system of oriental medicine showed better performance than conventional health diagnosis systems by means of learning diseases and symptoms using treatment records.
  • 5.

    The DRM System for UCC Rights Protection

    양형규 | Choi Jong Ho | 2010, 15(2) | pp.35~39 | number of Cited : 2
    Abstract PDF
    UCC is a key characteristic of so-called Web 2.0 which encourage the publishing of one's own content and commenting on other people's. Nowadays, UCC has become a widely used. Accordingly, problem of copyright become a issue. In this paper, we propose the DRM system for UCC rights protection. The system solve the copyright problem in UCC. Therefore, UCC creator can exert the right of UCC. In addition, if the problem of copyright occur, we can find the illegal user and call a him to account by CE information which is stored in UCC server and have a property that a manufacture of original contents can control the copyright.
  • 6.

    Robust Object Detection from Indoor Environmental Factors

    최미영 | Gyeyoung Kim | HYUNG IL CHOI | 2010, 15(2) | pp.41~46 | number of Cited : 1
    Abstract PDF
    In this paper, we propose a detection method of reduced computational complexity aimed at separating the moving objects from the background in a generic video sequence. In generally, indoor environments, it is difficult to accurately detect the object because environmental factors, such as lighting changes, shadows, reflections on the floor. First, the background image to detect an object is created. If an object exists in video, on a previously created background images for similarity comparison between the current input image and to detect objects through several operations to generate a mixture image. Mixed-use video and video inputs to detect objects. To complement the objects detected through the labeling process to remove noise components and then apply the technique of morphology complements the object area. Environment variable such as, lighting changes and shadows, to the strength of the object is detected. In this paper, we proposed that environmental factors, such as lighting changes, shadows, reflections on the floor, including the system uses mixture images. Therefore, the existing system more effectively than the object region is detected.
  • 7.

    A Study on Real-time Face Detection in Video

    Kim Hyeung Gyun | Bae,Yong-Geun | 2010, 15(2) | pp.47~53 | number of Cited : 0
    Abstract PDF
    This paper proposed Residual Image detection and Color Info using the face detection technique. The proposed technique was fast processing speed and high rate of face detection on the video. In addition, this technique is to detection error rate reduced through the calibration tasks for tilted face image. The first process is to extract target image from the transmitted video images. Next, extracted image processed by window rotated algorithm for detection of tilted face image. Feature extraction for face detection was used for AdaBoost algorithm.
  • 8.

    A Face Detection Method Based on Adaboost Algorithm using New Free Rectangle Feature

    홍용희 | Youngjun Han | Hernsoo Hahn | 2010, 15(2) | pp.55~64 | number of Cited : 4
    Abstract PDF
    This paper proposes a face detection method using Free Rectangle feature which possesses a quick execution time and a high efficiency. The proposed mask of Free Rectangle feature is composed of two separable rectangles with the same area. In order to increase the feature diversity, Haar-like feature generally uses a complex mask composed of two or more rectangles. But the proposed feature mask can get a lot of very efficient features according to any position and scale of two rectangles on the feature window. Moreover, the Free Rectangle feature can largely reduce the execution time since it is defined as the only difference of the sum of pixels of two rectangles irrespective of the mask type. Since it yields a quick detection speed and good detection rates on real world images, the proposed face detection method based on Adaboost algorithm is easily applied to detect another object by changing the training dataset.
  • 9.

    Applying of SOM for Automatic Recognition of Tension and Relaxation

    정찬순 | 한준석 | Il Ju Ko and 1other persons | 2010, 15(2) | pp.65~74 | number of Cited : 2
    Abstract PDF
    We propose a system that automatically recognizes the tense or relaxed condition of scrolling-shooting game subject that plays. Existing study compares the changed values of source of stimulation to the player by suggesting the source, and thus involves limitation in automatic classification. This study applies SOM of unsupervised learning for automatic classification and recognition of player's condition change. Application of SOM for automatic recognition of tense and relaxed condition is composed of two steps. First, ECG measurement and analysis, is to extract characteristic vector through HRV analysis by measuring ECG after having the player play the game. Secondly, SOM learning and recognition, is to classify and recognize the tense and relaxed conditions of player through SOM learning of the input vectors of heart beat signals that the characteristic extracted. Experiment results are divided into three groups. The first is HRV frequency change and the second the SOM learning results of heart beat signal. The third is the analysis of match rate to identify SOM learning performance. As a result of matching the LF/HF ratio of HRV frequency analysis to the distance of winner neuron of SOM based on 1.5, a match rate of 72% performance in average was shown.
  • 10.

    Empirical Analysis of the Feeling of Shooting in 2D Shooting Games

    JINSEOK SEO | 김남규 | 2010, 15(2) | pp.75~81 | number of Cited : 2
    Abstract PDF
    Feeling of shooting is one of the most important features of shooting games. Game developers have tried to improve feeling of shooting by using various techniques, such as visual/sound effects, rumble effects, animations, and camera techniques. In this paper, we introduce the results of the empirical analysis of the several techniques in a 2D shooting game. We carried out two experiments in which levels of feeling of shooting were measured in a simple 2D shooting game. The first experiment was configured with 16 combinations of the four techniques (visual, animation, sound, and rumble effects) applied to a shooting object (a cannon), and the second was configured with 16 combinations of the two techniques (visual and sound effects) applied to both or either side of a shooting object and exploding objects (enemy ships). The analysis results of the experiments showed that all of each techniques were statistically significant factors. We could also found that sound effects and rumble effects are more effective than visual effects and animations and that exploding objects are more important that a shooting object.
  • 11.

    Design and Implementation of Educational problem solving game

    Seo Jeong-Man | 2010, 15(2) | pp.83~89 | number of Cited : 3
    Abstract PDF
    The reality is that existing games are commercial or violent rather than informative. So, such a phenomenon resulted in many social problems. To solve such problems, I designed and implemented a game which is not violent but educative and child-friendly. In this thesis, an educative game is defined and its characteristics are described. I designed the user interface of the game for children, proposed relevant algorithms, and showed resultant screens of the game. Also, I compared the game with the existing games in order to prove that my game is non-violent, non-commercial, and rather educative. This ladder rejection game is different from the existing game in terms of design, functions, and contents of the screen. This paper contains specific explanations about the supplemented ladder rejection game. First, the design of this ladder rejection game extended fundamental principles of the existing game and added new diverse functions.
  • 12.

    Realtime Image Transmission System based-on the Zigbee Protocol

    ParkByoungSeob | 2010, 15(2) | pp.91~98 | number of Cited : 1
    Abstract PDF
    In order to control moving facilities on a remote place effectively, it are required to acquire a environment informations such as images where the moving facilities are placed. However, since there is no tools to acquire such informations to the central control system based on the non-networked sensor environments, it is difficult to control the moving facilities remotely. Therefore, we design and implement the Zigbee based image transmission system and communication protocol to control the moving target remotely. The wireless control utilizing the Zigbee protocol is that electrically consumption is more small than the Bluetooth and reliability of data transmission is better. The implemented Zigbee based control systems and communication protocol have the normal and replay function for a realtime control of the moving target under the server PC and the mobile PDA with the WiFi protocol. The functional operability and performance are analyzed by a designed prototype under the wireless home network environment.
  • 13.

    Improving the Performance of Network Management Protocol SNMP

    나호진 | Kyungsan CHO | 2010, 15(2) | pp.99~107 | number of Cited : 3
    Abstract PDF
    SNMP(Simple Network Management Protocol) is most commonly used as a standard protocol for effective network management by supporting the increasing size of the network and the variety of network elements such as router, switch, server and so on. However, SNMP has performance drawbacks of network overhead, processing latency, and the inefficiency in data retrieval. In this paper, we propose two schemes to improve the performance of SNMP; 1) the first scheme to reduce the amount of redundant OID information within a SNMP-GetBulk response message, 2) the second scheme of newly proposed SNMP-GetUpdate message combined with the cache in MNS. Through the analysis with real experiments, we show that our first scheme reduces the network overhead and the second scheme improves the processing latency and the retrieval of SNMP MIB tables. And, therefore the scalability of network management can be improved.
  • 14.

    Robust Audio Watermarking in Frequency Domain for Copyright Protection

    프라납 쿠마르 다르 | 김종면 | 2010, 15(2) | pp.109~117 | number of Cited : 0
    Abstract PDF
    Digital watermarking has drawn extensive attention for protecting digital contents from unauthorized copying. This paper proposes a new watermarking scheme in frequency domain for copyright protection of digital audio. In our proposed watermarking system, the original audio is segmented into non-overlapping frames. Watermarks are then embedded into the selected prominent peaks in the magnitude spectrum of each frame. Watermarks are extracted by performing the inverse operation of watermark embedding process. Simulation results indicate that the proposed scheme is robust against various kinds of attacks such as noise addition, cropping, resampling, re-quantization, MP3 compression, and low pass filtering. Our proposed watermarking system outperforms Cox's method in terms of imperceptibility, while keeping comparable robustness with the Cox's method. Our proposed system achieves SNR (signal-to-noise ratio) values ranging from 20 dB to 28 dB. This is in contrast to Cox's method which achieves SNR values ranging from only 14 dB to 23 dB.
  • 15.

    Improvements of the Hsiang-Shih's remote user authentication scheme using the smart cards

    Younghwa An | 2010, 15(2) | pp.119~125 | number of Cited : 1
    Abstract PDF
    Recently Hsiang-Shih proposed the user authentication scheme to improve Yoon et al's scheme. But the proposed scheme has not been satisfied security requirements considering in the user authentication scheme using the password based smart card. In this paper, we proved that Hsiang-Shih's scheme is vulnerable to the off-line password guessing attack. In other words, the attacker can get the user's password using the off-line password guessing attack on the scheme when the attacker steals the user's smart card and extracts the information in the smart card. Also, the improved scheme based on the hash function and random number was introduced, thus preventing the attacks, such as password guessing attack, forgery attack and impersonation attack etc. And we suggested the effective mutual authentication scheme that can authenticate each other at the same time between the user and server.
  • 16.

    Gaussian Optimization of Vocabulary Recognition Clustering Model using Configuration Thread Control

    안찬식 | 오상엽 | 2010, 15(2) | pp.127~134 | number of Cited : 1
    Abstract PDF
    In continuous vocabulary recognition system by probability distribution of clustering method has used model parameters of an advance estimate to generated each contexts for phoneme data surely needed but it has it's bad points of gaussian model the accuracy unsecure of composed model for phoneme data. To improve suggested probability distribution mixed gaussian model to optimized that phoneme data search supported configuration thread system. This paper of configuration thread system has used extension facet classification user phoneme configuration thread information offered gaussian model the accuracy secure. System performance as a result of represent vocabulary dependence recognition rate of 98.31%, vocabulary independence recognition rate of 97.63%.
  • 17.

    Recommendation system for supporting self-directed learning on e-learning marketplace

    권병일 | 문남미 | 2010, 15(2) | pp.135~146 | number of Cited : 5
    Abstract PDF
    In this paper, we propose an Recommendation System for supporting self-directed learning on e-learning marketplace. The key idea of this system is recommendation system using revised collaborative filtering to support marketplace. Exisiting collaborative filtering method consists of 3 stages as preparing low data, building familiar customer group by selecting nearest neighbor, creating recommendation list. This study designs recommendation system to support self-directed learning by using collaborative filtering added nearest neighbor learning course that considered industry and learning level. This service helps to select right learning course to learner in industry. Recommendation System can be built by many method and to recommend the service content including explicit properties using revised collaborative filtering method can solve limitations in existing content recommendation.
  • 18.

    Design of Distributed Hierarchical Routing Plan Method for Urban Traffic Information System

    BAEK, Yeong Tae | 김상오 | 2010, 15(2) | pp.147~154 | number of Cited : 0
    Abstract PDF
    This paper suggests new route plan cost calculation and cost-effective route plan algorithm and architecture for the new city traffic information system when it is operated nationwide. New algorithm and architecture estimates cost with traffic speeds which is supported for all different lanes, stratifies logical layer which process different levels’ traffic information with diverse traffic patterns and provides different traffic information in the few levels. Also suggested new algorithm supports drivers’ customized traffic information through both-way communications and plans routes effectively based on the distance between drivers’ start position and destination and different levels which start and end position located. It proposes additional research items and requirement for integration between different cities’ traffic information system which the national police agency invested and led.
  • 19.

    Simulator for Performance Analysis of Wireless Network based on Microsoft Windows Operating Systems

    최관덕 | 장호 | 2010, 15(2) | pp.155~162 | number of Cited : 0
    Abstract PDF
    To ensure accurate measurements of wireless network performance, it should be collected real-time data which are transmitted between a large number of nodes in the actual network environment. Therefore, it is necessary to develop simulation tool for finding optimal network system design method such as media access control, routing technique, ad-hoc algorithm of node deployment while overcoming spatial and temporal constraints. Our research attempts to provide an improved architecture and design method of simulation tool for wireless network is an application of multi-threading technique in these issues. We finally show that usability of the proposed simulator by comparing results derived from same test environment in the wireless LAN model of our simulator and widely used network simulation package, NS-2.
  • 20.

    A management system for plural viewing coordinates of multiplanar reformation

    김준호 | Heewon Kye | 2010, 15(2) | pp.163~170 | number of Cited : 0
    Abstract PDF
    Multi-planar reformatting(MPR) is a volume rendering technique which generates images of sectional planes users define, so that it is essential for medical imaging system. Due to the recent advances of medical imaging system, users require to place plural planes on a single dataset and to enable an individual and easy control for each plane. In this paper, we enumerate various user operations for recent MPR and analyze user requirements to update the plane equation. For the effective control of coordinate system, each plane is considered in a separated coordinate system and all informations which form a coordinate system are grouped into two components: the individual components and the common components. The proposed system is implemented on a graphics hardware, so that it smoothly performs MPR including recent requirements.
  • 21.

    Establishment of Standard Model for Production Facility Informatization System for Molding Business and its Effect Analysis

    KyungBae Yoon | 2010, 15(2) | pp.171~178 | number of Cited : 5
    Abstract PDF
    The purpose of this research is to develop a standard model for the compilation of production results in molding business to establish the informatization system for the production facility among informatization projects which can generate the performance of medium and short term introduction of the project in implementing the system to small and medium industry. The theory on the development method for the standardization of informatization for production facility in molding business applies PSDM (Production System Development Method) for which a number of researches were already done while developing a standardization model by standardizing two processes of raw material demand/supply management and making sum total for production quantity which are main processes for production management process. On the basis of the result of this research, small and medium companies in molding business and relevant specialized IT companies which desire to establish production facility informatization systems will be able to establish more efficient system by applying standardized model, and the result of research will enable to facilitate the establishment of the system for them while providing reliability of the system. Through the application of the result of this research, it will be possible to accomplish the elimination of unreasonable factors in production process, the enhancement of product quality and the saving of production cost.
  • 22.

    A Study on the Advancement of the Competitive Power of Korean Electronics and Automobile Industries from a Product-Architectural Point of View

    RHO, HYUNG JIN | 2010, 15(2) | pp.179~187 | number of Cited : 3
    Abstract PDF
    The purpose of this study is to suggest the advancement of the competitive power of Korean electronics and automobile industries from a product-architectural point of view. There are two types for the characteristics of parts. They are the modular type and the integral type. The former is very independent between one subsystem and another, whereas the other is very dependent. The distinction of product architecture makes them different for the ability to organize developing products suited for the product manufacturing. The organizing ability is generally divided into the abilities of ‘modulation⋅integration’ and ‘selection⋅assembly’. For the integral products such as cars, the integration ability is important between an enterprise and another, as well as between a part and another. However, the modular products such as a PC need the ability to select and effectively organize optimal parts or enterprises. The strategy raising product competitiveness is pursued by synthesizing ‘design⋅manufactu-turing strategy’ for the product architecture and ‘customer value strategy’ for the customer values.
  • 23.

    An Analysis on Working Attitude of Workers in Integrated Social Welfare Facilities through Mediation Effects of Relationship Factors

    김경숙 | 2010, 15(2) | pp.189~197 | number of Cited : 0
    Abstract PDF
    This study positively analysed the effects of service qualities of workers in integrated social welfare facilities on their working attitudes, targeting those who work for the welfare facilities. It identified the effects of service qualities such as tangibility, reliability, responsiveness, assurance, and sympathy on relationship factors such as relationship closeness through customization, organizational immersion and job satisfaction and presents suggestions to improve working attitudes of the workers. The results of the study are presented as follows: Reliability, responsiveness and assurance, service qualities of the workers, had effects on working attitudes. Relationship closeness through customization had an effect on organizational immersion and job satisfaction. Therefore, reliability, responsiveness and assurance that had effects on working attitudes of the workers were very significant factors and relationship closeness through customization were significant factors to improve working attitudes of the workers. This study presents political suggestions on the relations between service qualities of the workers in the welfare facilities and their working attitudes as alternatives.
  • 24.

    SEED and Stream cipher algorithm comparison and analysis on the communication

    Insoo Ahn | 2010, 15(2) | pp.199~206 | number of Cited : 0
    Abstract PDF
    Society of digital information becomes gradually advancement, and it is a situation offered various service, but it is exposed to a serious security threat by a fast development of communication such as the internet and a network. There is required a research of technical encryption to protect more safely important information. And we require research for application of security technology in environment or a field to be based on a characteristics of market of an information security. The symmetric key cipher algorithm has same encryption key and decryption key. It is categorized to Block and Stream cipher algorithm according to conversion ways. This study inspects safety and reliability of proposed SEED, Stream cipher algorithm. And it confirms possibility of application on the communication environments. This can contribute to transact information safely by application of suitable cipher algorithm along various communication environmental conditions.