Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

Home > Explore Content > All Issues > Article List

2010, Vol.15, No.9

  • 1.

    CHARMS: A Mapping Heuristic to Explore an Optimal Partitioning in HW/SW Co-Design

    Olufemi , Jeong-A Lee | 2010, 15(9) | pp.1~8 | number of Cited : 1
    Abstract PDF
    The key challenge in HW/SW co-design is how to choose the appropriate HW/SW partitioning from the vast array of possible options in the mapping set. In this paper we present a unique and efficient approach for addressing this problem known as Customized Heuristic Algorithm for Reducing Mapping Sets(CHARMS). CHARMS uses sensitivity to individual task computational complexity as well the computed weighted values of system performance influencing metrics to streamline the mapping sets and extract the most optimal cases. Using H.263 encoder, we show that CHARMS sieves out 95.17% of the sub-optimal mapping sets, leaving the designer with 4.83% of the best cases to select from for run-time implementation.
  • 2.

    Development of the SQL/MM Standard for Metadata Registries

    Dongwon Jeong , 정혜진 , Jangwon Gim and 2 other persons | 2010, 15(9) | pp.9~18 | number of Cited : 4
    Abstract PDF
    Standards for various multimedia and application fields have been developed, and the standardization for the multimedia and applications have been making as ISO/IEC 13249 packages by ISO/IEC JTC 1/SC 32/WG 4. This paper describes SQL/MM part 8, which is currently being standardized for providing consistent access support to metadata registries. Systems for ISO/IEC 11179 - metadata registries, the international standard, have been realized and utilized in various fields. However, there is no standardized query processing to share and exchange information between the systems, and thus it causes many problems. Therefore, SQL/MM part 8 described in this paper resolves these problems as well as makes users easily understand it.
  • 3.

    Traffic Signal Control using Fuzzy Reasoning Rule

    Kim, Kwang-baek | 2010, 15(9) | pp.19~24 | number of Cited : 2
    Abstract PDF
    The number of automobiles are continuously increasing in Korea since 1990's and it causes frustrating commuting traffic and holyday traffic. Meanwhile, the obsolete traffic signal control system is still under static control based on the aggregated traffic statistics thus it is not sufficiently adaptive in real world traffic situation that changes in real time. Thus, in this paper, we propose an adaptive signal control system using fuzzy control technology that can react to real time traffic situations. The method computes the priority of signal phases based on the number of waiting automobiles and occupying time on intersection using fuzzy membership functions. The phase with highest priority obtains "proceed" signal. Also, the duration of this "proceed" signal is determined based on the ratio of number of waiting automobiles of given phase and total number of waiting automobiles on intersection. In experiment, we show that the proposed fuzzy control system is better than the static control system for all sorts of traffic congestion situations by simulation.
  • 4.

    Retouching Method for Watercolor Painting Effect Using Mean Shift Segmentation

    Lee Sang-Geol , Kim Cheol-Ki , CHA,EUI-YOUNG | 2010, 15(9) | pp.25~33 | number of Cited : 2
    Abstract PDF
    We propose a retouching method that converts a general photography to a watercolor painting image using bilateral filtering and mean shift segmentation which are mostly used in image processing. The first step is to weaken high frequency components of the image, while preserving the edge of image using the bilateral filtering. And after that we perform DoG(Difference of Gradient)edge extraction and mean shift segmentation respectively from the bilateral filtered image. The DoG edge extraction is performed using luminance component of the image whose RGB color space is transformed into CIELAB space. Experimental result shows that our method can be applied to various types of image and bring better result, especially against the photo taken in daylight.
  • 5.

    Mining Frequent Sequential Patterns over Sequence Data Streams with a Gap-Constraint

    장중혁 | 2010, 15(9) | pp.35~46 | number of Cited : 0
    Abstract PDF
    Sequential pattern mining is one of the essential data mining tasks, and it is widely used to analyze data generated in various application fields such as web-based applications, E-commerce, bioinformatics, and USN environments. Recently data generated in the application fields has been taking the form of continuous data streams rather than finite stored data sets. Considering the changes in the form of data, many researches have been actively performed to efficiently find sequential patterns over data streams. However, conventional researches focus on reducing processing time and memory usage in mining sequential patterns over a target data stream, so that a research on mining more interesting and useful sequential patterns that efficiently reflect the characteristics of the data stream has been attracting no attention. This paper proposes a mining method of sequential patterns over data streams with a gap constraint, which can help to find more interesting sequential patterns over the data streams. First, meanings of the gap for a sequential pattern and gap-constrained sequential patterns are defined, and subsequently a mining method for finding gap-constrained sequential patterns over a data stream is proposed.
  • 6.

    Integer Programming-based Local Search Technique for Linear Constraint Satisfaction Optimization Problem

    Junha Hwang , SungYoung Kim | 2010, 15(9) | pp.47~55 | number of Cited : 3
    Abstract PDF
    Linear constraint satisfaction optimization problem is a kind of combinatorial optimization problem involving linearly expressed objective function and complex constraints. Integer programming is known as a very effective technique for such problem but require very much time and memory until finding a suboptimal solution. In this paper, we propose a method to improve the search performance by integrating local search and integer programming. Basically, simple hill-climbing search, which is the simplest form of local search, is used to solve the given problem and integer programming is applied to generate a neighbor solution. In addition, constraint programming is used to generate an initial solution. Through the experimental results using N-Queens maximization problems, we confirmed that the proposed method can produce far better solutions than any other search methods.
  • 7.

    Implementation of Efficient Container Number Recognition System at Automatic Transfer Crane in Container Terminal Yard

    Donghee Hong | 2010, 15(9) | pp.57~65 | number of Cited : 2
    Abstract PDF
    This paper describes the method of efficient container number recognition in colored container image with number plate at ATC(Automatic Transfer Crane) in container terminal yard. At the Sinseondae terminal gate in Busan, the container number recognition system is installed by "intelligent port-logistics system technology development", that is government research and development project. It is the method that it sets up the tunnel structure inside camera on the gate and it recognizes the container number in order to recognize the export container cargo automatically. However, as the automation equipment is introduced to the container terminal and the unmanned of a task is gradually accomplished, the container number recognition system for the confirmation of the object of work is required at ATC in container terminal yard. Therefore, the container number recognition system fitted for it is necessary for ATC in container terminal yard in which there are many intrusive of the character recognition through image including a sunlight, rain,snow, shadow, and etc. unlike the gate. In this paper, hardware components of the camera, illumination, andsensor lamp were altered and software elements of an algorithm were changed. that is, the difference of the brightness of the surrounding environment, and etc. were regulated for recognize a container number. Through this, a shadow problem, and etc. that it is thickly below hung with the sunlight or the cargo equipment were solved and the recognition time was shortened and the recognition rate was raised.
  • 8.

    Image-based Water Level Measurement Method Adapting to Ruler's Surface Condition

    Jaedo Kim , Youngjun Han , Hernsoo Hahn | 2010, 15(9) | pp.67~76 | number of Cited : 4
    Abstract PDF
    This paper proposes a image-based water level measurement method, which adapt to the ruler's surface condition. When the surface of a ruler is deteriorated by mud, drifts, or strong light reflection, the proposed method judges the pollution of ruler by comparing distance between two levels: the first one is the end position of horizontal edge region which keeps the pattern of ruler's marking, and the second one is the position where the sharpest drop occurs in the histogram which is construct using image density based on the axis of image height. If the ruler is polluted, the water level is a position of local valley of the section having a maximum difference between the local peak and valley around the second level. If the ruler is not polluted, the water level is detected as the position having horizontal edges more than 30% of histogram's maximum value around the first level. The detected water level is converted to the actual water level by using the mapping table which is construct based on the making of ruler in the image. The proposed method is compared to the ultrasonic based method to evaluate its accuracy and efficiency on the real situation.
  • 9.

    Concept of Information Architecture on Digital TV based on User Thought

    현혜정 , Il Ju Ko | 2010, 15(9) | pp.77~85 | number of Cited : 1
    Abstract PDF
    As various convergency products have been actively developed, the study on user interface has been conducted a lot, and for more specific direction, users’ experience-oriented user interface from user-oriented studies is recently developed. Such a tendency aiming to focus on product development to express users’emotion, the next step in the user-oriented development had difficulties in an objective approach, so the data based on previous users’ experiences were presented as the basic data to establish user interface design process with grounds and design direction, and therefore it is available to show more specific and objective grounds. From this perspective, such psychological variables showing users’ experiences like age and job are studied through surveys of users at the development of products, and products according to the variables are released. On the other hand, the products considering psychological difference distinguishing users’experiences as the cultural cap are not progressed yet. Despite the understanding of cultural difference, its decisive grounds are hard to distinguish like age, and job. Therefore, the cognitive concept about how to design menu information structure according to accident types that can be considered regarding user interface design among theoretical backgrounds about cultural difference. As the category according to the range ofthings among accident types, it is divided into analytical type and relational type to conduct a test on similarity and relations about the representative digital TV’s menu information of the convergency product. As the result, analytical type and relational type showed difference and this study aims to use menu information concept considering this difference as explanatory variables of the users’ experience-oriented development.
  • 10.

    Traceability Management Model Supporting Safety Critical Transaction of Livestock Products

    최인영 , 정순기 | 2010, 15(9) | pp.87~97 | number of Cited : 3
    Abstract PDF
    A set of definitions for traceability and quick recall service function were urgently needed to facilitate handling of events threatening food safety caused by livestock diseases or germ contaminations. However, the research on the unified management system for both international and domestic livestock products distribution was scarce. The livestock products traceability evaluation model proposed in the paper was composed of four modules: the Forward Transaction Trace (FTT) module, the Backward Record Trace (BRT) module, the Forward Product Trace (FPT)module, and the Origin Pedigree (OP) module. The evaluation indexes for each module was included and finally a pilot system evaluating the proposed management model was suggested and displayed. The result of the paper was expected to be a solution to the distributed traceability system and the proposed traceability management model could be expected to any food traceability.
  • 11.

    An Efficient Management Model of Security Policy in the Unified Threat Management System

    주헌식 , 김종완 | 2010, 15(9) | pp.99~107 | number of Cited : 3
    Abstract PDF
    This paper showed that the integrated system to fortify security was much more efficient than the respective system through the analysis of problems from Firewall and IPS system in the existing security systems. The results of problem analysis revealed that there were the delay of processing time and lack of efficiency in the existing security systems. Accordingly, their performance was evaluated by using the separated Firewall, IPS system, and the integrated system. The result of evaluation shows that the integrated security system this paper suggested is five times faster than the existing one in terms of processing speed of response. This paper demonstrated the excellence of the proposed security system is also more than fivefold in session handling per second and six times process speeding in the CPU processing performance. In addition, several security policies are applied, and it provided a fact that it gave an excellent performance when it comes to protecting from harmful traffic attacks. In conclusion, this paper emphasized that fortifying the integrated security system was more efficient than fortifying the existing one considering in various respects such as cost, management, time, space and so on.
  • 12.

    A Secure and Efficient RFID Tag Search Protocol Protecting Mobile Reader's Privacy

    최현우 , 여돈구 , 장재훈 and 1 other persons | 2010, 15(9) | pp.109~117 | number of Cited : 1
    Abstract PDF
    Recently, study on RFID Tag Searching technique which is used to find a specific tag in particular tag group were developed continuously. RFID tag searching technique can be applicate in various fields such as product management, finding children, and electronic anklet. To implement a RFID tag search system, RFID tag searching protocol should be considered various security threats such as reader and tag tracking, privacy, etc. For implementing a safe RFID tag lookup system, it is important to consider the potential security threats such as the tag tracking problem, and the privacy of the owner of the tag reader problem. There exists an RFID tag lookup system that satisfies a few security requirements, but the privacy of the owner of the tag reader problem has still been left unsolved, and even if it were solved, it requires a considerable amount of cryptographic operations to be performed which results in a decrease in performance. This paper proposes a system that does not degrade the performance while solving the privacy of the owner of the tag reader problem.
  • 13.

    Design of General-Purpose Middleware for QoS Guaranteed Context-Aware Services on USN Environment

    김광훈 , 최운수 , 이태우 and 3 other persons | 2010, 15(9) | pp.119~128 | number of Cited : 1
    Abstract PDF
    Recently, many researchers interested in core technology related to USN(Ubiqutious Sensor Network) with emerging Ubiqutious computing era. Especially, researched about various wireless telecommunication technologies such as ZigBee, Bluetooth, WLAN, CDMA, and various sensor nodes such as nano, Mote, and NeurFon are progressed in universities and research institutes of the world. In this paper, an advanced algorithm is proposed by analyzing problems of circumstance recognition and conventional real-time QoS of USN middleware technology. Finally, the performance of the proposed USN middleware is demonstrated through simulation.
  • 14.

    Ubiquitous healthcare model based on context recognition

    Kim Jeong-won | 2010, 15(9) | pp.129~136 | number of Cited : 2
    Abstract PDF
    With mobile computing, wireless sensor network and sensor technologies, ubiquitous computing services are being realized and could satisfy the feasibility of ubiquitous healthcare to everyone. This u-Healthcare service can improve life quality of human since medical service can be provided to anyone, anytime, and anywhere. To confirm the vision of u-Healthcare service, we've implemented a healthcare system for heart disease patient which is composed of two components. Front-end collects various signals such as temperature, blood pressure, SpO2, and electrocardiogram, etc. As a backend, medical information server accumulates sensing data and performs back-end processing. To simply transfer these sensing values to a medical team may be too trivial. So, we've designed a model based on context awareness for more improved medical service which is based on artificial neural network. Through rigid experiments, we could confirm that the proposed system can provide improved medical service.
  • 15.

    An Analysis of Learning Effect by Computer Programming Areas based on Leveled Intense and Supplementary Learning

    Ahn You-Jung , Kim Kyung-Ah | 2010, 15(9) | pp.137~144 | number of Cited : 1
    Abstract PDF
    We've run leveled intense and supplementary study groups connected with JAVA regular classes for more effective learning of computer programming. We performed the test for evaluating learning understanding degrees between before and after study to analyze learning effect for three leveled study groups and a non study group, and we also analyzed the differences of learning understanding degrees among 4 learner groups by computer programming areas. As a result, we can reach the result what programming areas are effective to be operated by intense and supplementary study groups. Those areas are the area to improve the ability of programming applying concepts through in-depth understanding of concepts, and the area of programming through mixed knowledges related each other. The study group for low-leveled learners has most improved of four groups. Low-leveled group was behind the other study groups on programming application ability, but the group was more excellent than non study group in most programming areas.
  • 16.

    Designing Effective Prototypes for Establishing an e-Learning Center

    Jang Seok-Woo , 허문행 | 2010, 15(9) | pp.145~153 | number of Cited : 0
    Abstract PDF
    E-learning is cyber-education that gives open education to everyone by providing various contents through Internet and IT technologies, and it has been spreading rapidly. In this paper, we describes an effective prototype design scheme for establishing e-Learning center, centered on the case of A University, in order to overcome a lot of shortcomings related to cyber-education and to settle down efficient and systematic on-line realtime cyber education. For this purpose, we first analyzed the current status concerning e-Learning at A University. Learners and lecturers then participated in a survey so that we could find some problems on current e-Learning and prepare their solutions. We finally designed e-Learning center prototypes, and selected the prototype 2 as a best one and designed it in more details. The prototype made in this paper would be very useful to other institutes who want to establish a new e-Learning center.
  • 17.

    An Empirical Study on Factors and Degrees of EDI Diffusion

    최도원 , SeongYoon Shin , 김남석 | 2010, 15(9) | pp.155~164 | number of Cited : 2
    Abstract PDF
    Until now, most of studies on Electronic Data Interchange(EDI) have been focused on the introduction of EDI and the performance of EDI. But recently, there have been increasing researches on diffusion of Electronic Data Interchange. The aims of this study are twofold. First,to find the impacts of various factors on EDI diffusion, second, to examine the relationship between EDI diffusion factors and EDI diffusion degree. To accomplish those aims of study, two kinds of methodologies are adopted in the studies, First, model building by wide investigation on previous papers, Second, empirical research for finding the determinants of diffusion of EDI. The results of testing the hypotheses of this research are summarized as follows. First, The important EDI diffusion variables influencing internal diffusion of EDI consist of top management support,scope for EDI, IS sophistication, compatibility, complexity, relative advantages, competition intensity and external pressure. Second, Top management support, scope for EDI, IS sophistication, compatibility, relative advantages, competition intensity and external pressure are associated with external diffusion of EDI. We are aware of the important fact that top management support, scope for EDI, IS sophistication, compatibility, relative advantage, competition intensity and external pressure were simultaneously associated with internal and external diffusion of EDI
  • 18.

    A Framework to Evaluate Communication Quality of Operators in Nuclear Power Plants Using Cosine Similarity

    김승환 , Jinkyun Park , HanSangyong | 2010, 15(9) | pp.165~172 | number of Cited : 3
    Abstract PDF
    Communication problems have been regarded as one of the biggest causes in trouble in many industries. This led to extensive research on communication as a part of human error analysis. The results of existing researches have revealed that maintaining a good quality of communication is essential to secure the safety of a large and complex process system. In this paper, we suggested a method to measure the quality of communication during off-normal situation in main control room of nuclear power plants. It evaluates the cosine similarity that is a measure of sentence similarity between two operators by finding the cosine of the angle between them. To check the applicability of the method to evaluate communication quality, we compared the result of communication quality analysis with the result of operation performance that was performed by operators under simulated environment.