Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2010, Vol.15, No.4

  • 1.

    fficient Blog Retrieval System by Topic-based Weighting

    신현일 | Unil Yun | RYU KEUN HO | 2010, 15(4) | pp.1~9 | number of Cited : 3
    Abstract PDF
    In the new generation of Web, commonly called "Web 2.0", blogging has facilitated the publishing information or his/her opinion on the web. Various blog retrieval algorithms have been proposed to search for blogs more effectively. However, actually keyword-based searching or link-analysis blog ranking system cannot satisfy the user's requirement. In this paper, we suggest a topic-based weighting blog retrieval system in which the links between blog writings and searching words are considered to improve the search results. Our system extracts topics from each blog and weights them much higher than other guide words. In the comparison with other systems, we see that the proposed topic-base system has better recall rate of search results.
  • 2.

    A Non-linear Variant of Global Clustering Using Kernel Methods

    허경용 | 김성훈 | Woo, Young Woon | 2010, 15(4) | pp.11~18 | number of Cited : 0
    Abstract PDF
    Fuzzy c-means (FCM) is a simple but efficient clustering algorithm using the concept of a fuzzy set that has been proved to be useful in many areas. There are, however, several well known problems with FCM, such as sensitivity to initialization, sensitivity to outliers, and limitation to convex clusters. In this paper, global fuzzy c-means (G-FCM) and kernel fuzzy c-means (K-FCM) are combined to form a non-linear variant of G-FCM, called kernel global fuzzy c-means (KG-FCM). G-FCM is a variant of FCM that uses an incremental seed selection method and is effective in alleviating sensitivity to initialization. There are several approaches to reduce the influence of noise and accommodate non-convex clusters, and K-FCM is one of them. K-FCM is used in this paper because it can easily be extended with different kernels. By combining G-FCM and K-FCM, KG-FCM can resolve the shortcomings mentioned above. The usefulness of the proposed method is demonstrated by experiments using artificial and real world data sets.
  • 3.

    Performance Analysis of DoS Security Algorithm for Multimedia Contents Services

    장희선 | Shin Hyun Cheul | Lee Hyun Chang | 2010, 15(4) | pp.19~25 | number of Cited : 2
    Abstract PDF
    In this paper, the performance of the DoS information security algorithm is evaluated to provide the multimedia traffic between the nodes using the multicasting services. The essence technology for information security to distribute the multimedia contents is presented. Under the multicasting services, a node participating new group needs a new address and the node compares the collision with the existing nodes, then DoS attack can be occurred between the nodes by a malicious node. Using the NS2 simulator, the number of DoS attacks, the average number of trials to generate new address, and the average time to create address are analyzed. From simulation results, the efficient algorithm with relevant random number design according to the DRM network is needed to provide secure multimedia contents distribution.
  • 4.

    Efficient Record Filtering In-network Join Strategy using Bit-Vector in Sensor Networks

    송임영 | KIM KYUNG CHANG | 2010, 15(4) | pp.27~36 | number of Cited : 1
    Abstract PDF
    The paper proposes RFB(Record Filtering using Bit-vector) join algorithm, an in-network strategy that uses bit-vector to drastically reduce the size of data and hence the communication cost. In addition, by eliminating data not involved in join result prior to actual join, communication cost can be minimized since not all data need to be moved to the join nodes. The simulation result shows that the proposed RFB algorithm significantly reduces the number of bytes to be moved to join nodes compared to the popular synopsis join(SNJ) algorithm.
  • 5.

    Improvement of Reliability of Static Execution Time Analysis Using Software Monitoring Technique

    Yun Kwan Kim | 김태완 | Chang Chun Hyon | 2010, 15(4) | pp.37~45 | number of Cited : 0
    Abstract PDF
    A system which needs timely accuracy has to design and to verify correctly about execution-time for reliability. Accordingly, it is necessary for timing analysis tools, and much previous research worked. In timing analysis tool, there are two methods. One is a static analysis, and the other is a measurement based analysis. A static analysis is able to spend time less than a measurement based analysis method, but has low reliability of analysis result caused by hard to estimate time of I/O caused by various hardware. A measurement based analysis can be close analysis to real result, but it is hard to adapt to actual application, and spend a lot of time to get result of analysis. As such, this paper present a software monitoring architecture to supply reliability of static analysis process. In a presented architecture, it can select target as needed measurement through static analysis, and reuse result of measurement exist. Therefore, The architecture can reduce overload of time and performance for measurement, and improve the reliability which is the worst problem of static analysis.
  • 6.

    Development of a Recognition System of Smile Facial Expression for Smile Treatment Training

    이옥걸 | Kang Sun-Kyung | 김영운 and 1other persons | 2010, 15(4) | pp.47~55 | number of Cited : 1
    Abstract PDF
    In this paper, we proposed a recognition system of smile facial expression for smile treatment training. The proposed system detects face candidate regions by using Haar-like features from camera images. After that, it verifies if the detected face candidate region is a face or non-face by using SVM(Support Vector Machine) classification. For the detected face image, it applies illumination normalization based on histogram matching in order to minimize the effect of illumination change. In the facial expression recognition step, it computes facial feature vector by using PCA(Principal Component Analysis) and recognizes smile expression by using a multilayer perceptron artificial network. The proposed system let the user train smile expression by recognizing the user's smile expression in real-time and displaying the amount of smile expression. Experimental result show that the proposed system improve the correct recognition rate by using face region verification based on SVM and using illumination normalization based on histogram matching.
  • 7.

    Accelerating Levenberg-Marquardt Algorithm using Variable Damping Parameter

    Kwak Young Tae | 2010, 15(4) | pp.57~63 | number of Cited : 6
    Abstract PDF
    The damping parameter of Levenberg-Marquardt algorithm switches between error backpropagation and Gauss-Newton learning and affects learning speed. Fixing the damping parameter induces some oscillation of error and decreases learning speed. Therefore, we propose the way of a variable damping parameter with referring to the alternation of error. The proposed method makes the damping parameter increase if error rate is large and makes it decrease if error rate is small. This method so plays the role of momentum that it can improve learning speed. We tested both iris recognition and wine recognition for this paper. We found out that this method improved learning speed in 67% cases on iris recognition and in 78% cases on wine recognition. It was also showed that the oscillation of error by the proposed way was less than those of other algorithms.
  • 8.

    Motion Capture System using Integrated Pose Sensors

    김병열 | Youngjun Han | Hernsoo Hahn | 2010, 15(4) | pp.65~74 | number of Cited : 1
    Abstract PDF
    At the aim of solving the problems appearing in traditional optical motion capturing systems such as the interference among multiple patches and the complexity of sensor and patch allocations, this paper proposes a new motion capturing system which is composed of a single camera and multiple motion sensors. A motion sensor is consisted of an acceleration sensor and a gyro sensor to detect the motion of a patched body and the orientation (roll, pitch, and yaw) of the motion, respectively. Although Image information provides the positions of the patches in 2D, the orientation information of the patch motions acquired by the motion sensors can generate 3D pose of the patches using simple equations. Since the proposed system uses the minimum number of sensors to detect the relative pose of a patch, it is easy to install on a moving body and can be economically used for various applications. The performance and the advantages of the proposed system have been proved by the experiments.
  • 9.

    A Study of Way guide System Design for a Visual Handicapped in School

    Joong-Yeub Lee | Cho, Wan-sup | 2010, 15(4) | pp.75~82 | number of Cited : 2
    Abstract PDF
    At this time, our country’s social welfare system for the handicapped is switching to increase independence, education is the most important. This study increases the quality of Visual handicapped people’s life which have limit to learn and reduces their inconvenience which may occur during their independent school life through the development of the system which helps them safely to reach their destination by themselves using IT technologies in an educational institute which helps their ability to get information and be independent. This study supports Visual handicapped people to move safely by using cell phone which is necessary items for most modern people, RFID tags and white canes with antenna and reader which read the information installed in the raised blocks outside of school buildings and in the hall or aisle inside of buildings and inform the path by voice and vibration.
  • 10.

    Performance Analysis of RS codes for Low Power Wireless Sensor Networks

    Kyung Kwon Jung | CHOI , WOO SEUNG | 2010, 15(4) | pp.83~90 | number of Cited : 2
    Abstract PDF
    In wireless sensor networks, the data transmitted from the sensor nodes are susceptible to corruption by errors which caused of noisy channels and other factors. In view of the severe energy constraint in Sensor Networks, it is important to use the error control scheme of the energy efficiently. In this paper, we presented RS (Reed-Solomon) codes in terms of their BER performance and power consumption. RS codes work by adding extra redundancy to the data. The encoded data can be stored or transmitted. It could have errors introduced, when the encoded data is recovered. The added redundancy allows a decoder to detect which parts of the received data is corrupted, and corrects them. The number of errors which are able to be corrected by RS code can determine by added redundancy. The results of experiment validate the performance of proposed method to provide high degree of reliability in low-power communication. We could predict the lifetime of RS codes which transmitted at 32 byte a 1 minutes. RS(15, 13), RS(31, 27), RS(63, 57), RS(127,115), and RS(255,239) can keep the days of 173.7, 169.1, 163.9, 150.7, and 149.7 respectively. The evaluation based on packet reception ratio (PRR) indicates that the RS(255,239) extends a sensor node's communication range by up about 3 miters.
  • 11.

    Development of a Remote Dust Collector Bag Control System using Power Line Communication

    Jung-Sook, Kim | 2010, 15(4) | pp.91~98 | number of Cited : 1
    Abstract PDF
    Advances in communications and control technology, the strengthening of the Internet, and the growing recognition of the urgency to reduce the risk and production cost are motivating the development of improvements in the traditional manufacturing industry. In this paper, we developed a remote dust collector bag control system which is a combination of advanced IT and traditional dust collector based on the event. At first, we made the A/D(Analog/Digital) converter using a micro processor because the differential pressure transmission, which is a sensor of the dust collector, produces analog volt data. A/D converter can provide RS-232 communication to connect with Power Line Communication(PLC) modem. And, n-bytes message format was defined for the efficient dust collector bag information transmission from a dust collector to a user. Also, we designed the data types to model the dust collector and the dust collector bag, and they were logically modeled using XML and object-oriented modeling method. In addition to that, we implemented the system for showing the dust collector bag exchange time exactly to users at real-time using various visual user interfaces.
  • 12.

    A Design and Implementation of Industrial Fluid Monitoring System

    Lee, Won Joo | 이상준 | 2010, 15(4) | pp.99~106 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an industrial fluid monitoring system which performs the flow control function and monitors fluid pressure transmitted from MFC(Mass Flow Controller) unit. This system consists of MFC unit, channel device, and monitoring management software. MFC unit transmits the measured data of the fluid pressure to the channel device which would provide the input/output interface between management software, monitoring and MFC unit. The monitoring and management software control and analyze by monitoring real time measurements of fluid pressure from each channel of MFC unit. This software can process 20 channels and 0.1 monitoring cycle which gives 200 data measurement per second (i.e., 720,000 data/hour). At this time, the storage space increases in proportion to the rise of input data. This growth of data and storage space makes loss of data access efficiency. Therefore, it demands the implementation by sensing scheme of change scope and data, which can effectively manage the data.
  • 13.

    A Design on the Audit Framework of the User Interface for the Web Accessibility

    Hee Wan Kim | 강소영 | 강재화 and 1other persons | 2010, 15(4) | pp.107~118 | number of Cited : 5
    Abstract PDF
    The user interface is the medium, which provides the users to have an access to the web-based information system. The user interface is the means of improving usability and accessibility for the user, as well as being the core component in the web-based information system. In this paper, the audit framework of the user interface was developed to upgrade the usability and accessibility; it was based on the three basic components of the current audit framework in the web-based information system. At the time of an audit, the UI process of the ‘Analysis’, ‘UI Design’, ‘UI Production’, and ‘Test’ was defined, which was analyzed through the web development methodology. Also, for the area of an audit, the ‘Information‘, ‘Design‘, and ‘Technology‘ were defined by the analysis of the components that makes up the user interface, From the view of an audit, the standard criteria of an assessment were set as ‘Usability’, ‘Accessibility’, and ‘Cross Browsing’. Through the framework that was proposed in this paper, practical audit applies the performed examples. By this, the efficiency of the proposed framework was verified.
  • 14.

    A Study on Satisfaction of Internet Shopping-mall between Customer's Lifestyle

    Lee Jung Sae | Jinsup Kim | 2010, 15(4) | pp.119~128 | number of Cited : 5
    Abstract PDF
    The purpose of this thesis is to analyze and test hypotheses that the internet shopping customer's satisfaction would be differences between customer's lifestyle and a type of buying product characteristics. In addition, this study tested differences between lifestyle groups and product type in terms of customer's transaction continuity. In result, we find that there are significant differences of customer's satisfaction and customer's continuity in terms of the lifestyle, but not in the product types. This study provide useful informations on market segmentation strategy to the firms which had been doing on-line shopping and will help them minimize the possible risks when firms enter into internet shopping market.