Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2010, Vol.15, No.11

  • 1.

    Thermal Analysis of 3D Multi-core Processors with Dynamic Frequency Scaling

    증민 | 박영진 | Jeong-A Lee and 2other persons | 2010, 15(11) | pp.1~9 | number of Cited : 0
    Abstract PDF
    As the process technology scales down, an interconnection has became a major performance constraint for multi-core processors. Recently, in order to mitigate the performance bottleneck of the interconnection for multi-core processors, a 3D integration technique has drawn quite attention. The 3D integrated multi-core processor has advantage for reducing global wire length, resulting in a performance improvement. However, it causes serious thermal problems due to increased power density. For this reason, to design efficient 3D multi-core processors, thermal-aware design techniques should be considered. In this paper, we analyze the temperature on the 3D multi-core processors in function unit level through various experiments. We also present temperature characteristics by varying application features, cooling characteristics, and frequency levels on 3D multi-core processors. According to our experimental results, following two rules should be obeyed for thermal-aware 3D processor design. First, to optimize the thermal profile of cores, the core with higher cooling efficiency should be clocked at a higher frequency.Second, to lower the temperature of cores, a workload with higher thermal impact should be assigned to the core with higher cooling efficiency.
  • 2.

    A Global XQuery Query Processing based on Local XQuery Query Generation

    Jong-Hyun Park | Wonik Park | Kim, Young-Kuk and 1other persons | 2010, 15(11) | pp.11~20 | number of Cited : 0
    Abstract PDF
    XML view is proposed to integrate between XML data and heterogeneous data over distributed environment and global XML view is used to search distributed heterogeneous data. At this time, standard query language for user is XQuery and the method for processing global XQuery queries over distributed environment is one of the new research topics. One of the basic and simple methods to process distributed SQL queries is that generates local queries for processing a global query and constructs the result of the global query from the results of the local queries. However, the syntax of XQuery differs from SQL because the XQuery contains some special expressions like FOR clauses for querying to semi-structured data, of course, FOR clauses are not used in SQL. Therefore, there are some problems to adopt the method for processing global SQL queries for generating local XQuery queries. This paper defines some problems when generates local XQuery queries for processing global XQuery queries and proposes a method for generating local XQuery queries considered these problems. Also we implement and evaluate a Global XQuery Processor which uses our method.
  • 3.

    A Study on the Characteristics of Opinion Retrieval Using Term Statistical Analysis in Opinion Documents

    한경수 | 2010, 15(11) | pp.21~29 | number of Cited : 0
    Abstract PDF
    Opinion retrieval which searches the opinions expressed in documents by users cannot outperform significantly yet traditional topical retrieval which searches the facts. Therefore, the focus of this paper is to identify the statistical characteristics which can be applied to opinion retrieval by comparing and analyzing the term statistics of opinion and non-opinion documents in the blog domain. The TREC Blogs06 collection and 150 TREC topics are used in the experiments. The difference between term probability distributions in opinion documents is measured by JS divergence, and the difference according to the topic types and topic domains is also investigated. Moreover, the term probabilities of opinion terms are analyzed comparatively. The main findings of this study include the following: it is necessary to consider the topic-specific characteristics for the opinion detection; it is effective to extract positive and negative opinion terms according to the topics; the topic types are complementary to the topic domains; and special attention has to be given to the usage of the positive opinion terms.
  • 4.

    An ROI Coding Technique of JPEG2000 Image Including Some Arbitrary ROI

    홍석원 | KimSangBok | Yeong-Geon Seo | 2010, 15(11) | pp.31~39 | number of Cited : 1
    Abstract PDF
    In some image processing system or the users who want to see a specific region of image simply, if a part of the image has higher quality than other regions, it would be a nice service. Specifically in mobile environments, preferential service was needed, as the screen size is small. So, JPEG2000 supplies this function. But this doesn't support the process to extract specific regions or service and does the functions to add some techniques. It is called by ROI(Region-of-Interest). In this paper, we use images including human faces, which are processed most preferentially and compressed with high quality. Before an image is served to the users, it is compressed and saved. Here, the face parts are compressed with higher quality than the background which are relatively with lower quality. This technique can offer better service with preferential transferring of the faces, too. Besides, whole regions of the image are compressed with same quality and after searching the faces, they can be preferentially transferred. In this paper, we use a face extraction approach based on neural network and the preferential processing with EBCOT of JPEG2000. For experimentation, we use images having several human faces and evaluate objectively and subjectively, and proved that this approach is a nice one.
  • 5.

    Noise Removal using Fuzzy Mask Filter

    이상준 | Seokhyun Yoon | Kim, Kwang-baek | 2010, 15(11) | pp.41~45 | number of Cited : 2
    Abstract PDF
    Image processing techniques are fundamental in human vision-based image information processing. There have been widely studied areas such as image transformation, image enhancement, image restoration, and image compression. One of research subgoals in those areas is enhancing image information for the correct information retrieval. As a fundamental task for the image recognition and interpretation, image enhancement includes noise filtering techniques. Conventional filtering algorithms may have high noise removal rate but usually have difficulty in conserving boundary information. As a result, they often use additional image processing algorithms in compensation for the tradeoff of more CPU time and higher possibility of information loss. In this paper, we propose a Fuzzy Mask Filtering algorithm that has high noise removal rate but lesser problems in above-mentioned side-effects. Our algorithm firstly decides a threshold based on fuzzy logic with information from masks. Then it decides the output pixel value by that threshold. In a designed experiment that has random impulse noise and salt pepper noise, the proposed algorithm was more effective in noise removal without information loss.
  • 6.

    Intelligent Navigation Information Fusion Using Fuzzy Expert System

    김도연 | 이미라 | 2010, 15(11) | pp.47~56 | number of Cited : 1
    Abstract PDF
    In navigation, officers receive data about inside and outside of ship from several devices(ex, GPS / AIS / ECDIS / ARPA Radar / etc) in bridge, and use it to recognize and predict safety situations. However, observation work of a officer is still hard for a torrent of data from several devices, and the problem of inconsistent data among the devices. In previous research, we presented the conceptual model of Intelligent Navigation Safety Information System based on information fusion, and showed the example of the conceptual model using CF (Certainty Factor) expert system to solve this problem. The information fusion technology needs various reasoning skills, and CF expert system is not enough to express ambiguous or indefinite factors. In this paper, we propose the concept of an intelligent navigation information fusion using fuzzy expert system to describe the ambiguous factors, and show the validity of applying fuzzy expert system to the Navigation Safety Information System through the design and implementation of the proposed concept.
  • 7.

    A Mechanism of CAS Client Personalization through separating CAS Service of Protocol A.1 on TTA.KO-07.0079 XCAS

    Youngmo Kim | 최용락 | 장은겸 | 2010, 15(11) | pp.57~66 | number of Cited : 0
    Abstract PDF
    CAS Client personalization means to issue CAS ID or Key for CAS service, which is Core Technology for CAS operation. Protocol A.1 on TTA.KR-07.0079 XCAS, stores CAS Client personalization data from CAS server in XCAS server, and transmits the personalization data by request of XCAS HOST for CAS Client personalization. However, this may increase Network Traffic and CAS Client image management in XCAS server. In this thesis, to complement this, CAS Client personalization is executed on CAS Server by separating CAS service field. Therefore this can distribute Image management and Network Traffic of XCAS server.
  • 8.

    An Improved Face Detection Method Using a Hybrid of Hausdorff and LBP Distance

    박성천 | 구자영 | 2010, 15(11) | pp.67~73 | number of Cited : 0
    Abstract PDF
    In this paper, a new face detection method that is more accurate than the conventional methods is proposed. This method utilizes a hybrid of Hausdorff distance based on the geometric similarity between the two sets of points and the LBP distance based on the distribution of local micro texture of an image. The parameters for normalization and the optimal blending factor of the two different metrics were calculated from training sample images. Popularly used face database was used to show that the proposed method is more effective and robust to the variation of the pose, illumination, and back ground than the methods based on the Hausdorff distance or LBP distance. In the particular case, the average error distance between the detected and the true face location was reduced to 47.9% of the result of LBP method, and 22.8% of the result of Hausdorff method.
  • 9.

    Edge Feature Extract CBIRS for Car Retrieval : CBIRS/EFI

    Koo Gun Seo | 2010, 15(11) | pp.75~82 | number of Cited : 3
    Abstract PDF
    The paper proposed CBIRS/EFI with contents based search technique using edge feature information of the object from image information of the object which is uncertain. In order to search specially efficiently case of partial image information of the object, we used the search technique which extracts outline information and color information in feature information of object. In order to experiment this, we extracted side edge feature information of the vehicle for feature information of the object after capture the car image of the underground garage. This is the system which applies a contents base search by the result which analyzes the image which extracts a feature, an original image to search and a last similar measurement result. This system compared in FE-CBIRS systems which are an existing feature extraction contents base image retrieval system and the function which improves the accuracy and an effectiveness of search rate was complemented. The performance appraisal of CBIRS/EFI systems applied edge extraction feature information and color information of the cars. And we compared a color feature search time, a shape characteristic search time and a search rate from the process which searches area feature information. We extracted the case 91.84% of car edge feature extraction rate. And a average search time of CBIRS/EFI is showing a difference of average 0.4-0.9 seconds than FE-CBIRS from vehicle. color search time, shape characteristic search time and similar search time. So, it was proven with the fact that is excellent
  • 10.

    Development of Convergence Study Program for Community Child Welfare Center linked Green Growth Using Pico-Cricket

    허정호 | 남동수 | Lee Taewuk | 2010, 15(11) | pp.83~90 | number of Cited : 3
    Abstract PDF
    In this paper, we developed the program related green growth based Educational-Robot in the framework of Convergence for the community child welfare centers' children who are in poverty and broken homes as the way to enhance the competitiveness about education and a solution to cope with actively about the main tasks of the state for human resources in the future. Through the program developed, it has been verified the impact on the energy saving attitude. According to this result, it has been proved that convergence study program linked green growth for children of community welfare child center is effective to energy saving attitude. Through it, it is expected to help to meet the educational needs of the community child welfare centers' children.
  • 11.

    Development of User Music Recognition System For Online Music Management Service

    성보경 | Il Ju Ko | 2010, 15(11) | pp.91~99 | number of Cited : 1
    Abstract PDF
    Recently, recognizing user resource for personalized service has been needed in digital content service fields. Especially, to analyze user taste, recommend music and service music related information need recognition of user music file in case of online music service. Music related information service is offered through recognizing user music based on tag information. Recognition error has grown by weak points like changing and removing of tag information. Techniques of content based user music recognition with music signal itself are researched for solving upper problems. In this paper, we propose user music recognition on the internet by extracted feature from music signal. Features are extracted after suitable preprocessing for structure of content based user music recognition. Recognizing on music server consist of feature form are progressed with extracted feature. Through this, user music can be recognized independently of tag data. 600 music was collected and converted to each 5 music qualities for proving of proposed recognition. Converted 3000 experiment music on this method is used for recognition experiment on music server including 300,000 music. Average of recognition ratio was 85%. Weak points of tag based music recognition were overcome through proposed content based music recognition. Recognition performance of proposed method show a possibility that can be adapt to online music service in practice.
  • 12.

    An ID Mashup Service for the Interoperability of Soundsource Identification Infrastructures

    주용완 | 백형종 | 김윤정 and 2other persons | 2010, 15(11) | pp.101~107 | number of Cited : 1
    Abstract PDF
    As digital environment rapidly changes, various identification infrastructures have been introduced. It inevitably caused the Interoperability issue between the identifiers. Especially, Interoperability issue between the same kinds of identifiers raised the problems such as decreasing usefulness and cost overhead for making bridge system. In this paper, we resolve this issue by suggesting ID mashup service based on XRI. Although both UCI and ICN are the dominant identification infrastructures in the soundsource domain, the modification of identifiers or the requirement of complex system are essential for Interoperability. The ID mashup service suggested in the paper is able to provide interoperable functions to outer world without modifying the structures and resolution service of both identification infrastructures.
  • 13.

    Techniques on Multi-Marker for the Implementation of Augmented Reality

    김학희 | 2010, 15(11) | pp.109~116 | number of Cited : 6
    Abstract PDF
    This study is intended to propose a technique that can trace objects by utilizing the multi- marker method in the Marker Recognition which is a bridge way connecting virtuality and reality in complex environments or in a condition hands become obstacles. In the existing marker method, the object becomes blinking when the maker is blocked since this method relies only on single marker. However, the researcher was able to confirm the appearance of augmented object when the marker was blocked for the multiple markers replaced the blocked one. In order to implement such technique, multi-marker estimation was utilized with perspective matrix. The advantage is the fast estimation process for there is no need of other calculation. The implemented technique can detect markers and locate their positions, represent 3-D object in various circumstances.
  • 14.

    An Integrated Management Scheme for Wired and Wireless Networks Using Mobile Agents

    나호진 | Kyungsan CHO | 2010, 15(11) | pp.117~124 | number of Cited : 0
    Abstract PDF
    Appling centralized network management architecture SNMP(Simple Network Management Protocol) to wireless networks causes the network overhead, NAT(Network Address Translation) problem on AP, and performance degradation of mobile nodes. In this paper, we propose an integrated management scheme for wired and wireless networks using mobile agents in order to solve above problems. In our proposed scheme, SNMP is applied to manage wired networks and MAs of SNMP are implemented in APs or wireless nodes to manage wireless networks. In addition, we propose a method to reduce the redundant OID information within SNMP response messages. Through the analysis, we show that our proposal resolves the given problems and reduces the processing delay of the wireless nodes.
  • 15.

    A Policy-based Resource Management Framework for QoS Improvement of Mobile Terminals in heterogeneous Network

    이계임 | 정순기 | 이종찬 and 1other persons | 2010, 15(11) | pp.125~133 | number of Cited : 2
    Abstract PDF
    A policy based resource management framework is proposed, that supports the optimal QoS by applying resources management function which is changed according to the status of mobile terminal and heterogeneous connections to hand-over process of mobile terminals based on heterogeneous network. To assess the performance of policy based resource management framework proposed in this thesis, in case of applying weighted policy for selecting optimal cell in hand-over occurring among duplicated heterogeneous connections, the transmission delay was remarkably enhanced as the number of multimedia sessions increased. This means, in case of QoS deterioration of multimedia session occurring in service connection, hand-over was executed with the optimal connection.
  • 16.

    Segment-based Buffer Management for Multi-level Streaming Service in the Proxy System

    Jongdeuk Lee | 2010, 15(11) | pp.135~142 | number of Cited : 2
    Abstract PDF
    QoS in the proxy system are under heavy influence from interferences such as congestion, latency, and retransmission. Also, multi-level streaming services affects from temporal synchronization, which lead to degrade the service quality. This paper proposes a new segment-based buffer management mechanism which reduces performance degradation of streaming services and enhances throughput of streaming due to drawbacks of the proxy system. The proposed paper optimizes streaming services by: 1) Use of segment-based buffer management mechanism, 2) Minimization of overhead due to congestion and interference, and 3) Minimization of retransmission due to disconnection and delay. This paper utilizes fuzzy value and cost weight to process the result. The simulation result shows that the proposed mechanism has better performance in buffer cache control rate, average packet loss rate, and delay saving rate with stream relevance metric than the other existing methods of fixed segmentation method, pyramid segmentation method, and skyscraper segmentation method.
  • 17.

    An integrated framework of security tool selection using fuzzy regression and physical programming

    Hoai-Vu Nguyen | Pauline Kongsuwan | SHIN SANGMUN and 2other persons | 2010, 15(11) | pp.143~156 | number of Cited : 0
    Abstract PDF
    Faced with an increase of malicious threats from the Internet as well as local area networks, many companies are considering deploying a security system. To help a decision maker select a suitable security tool, this paper proposed a three-step integrated framework using linear fuzzy regression (LFR) and physical programming (PP). First, based on the experts’ estimations on security criteria, analytic hierarchy process (AHP) and quality function deployment (QFD) are employed to specify an intermediate score for each criterion and the relationship among these criteria. Next, evaluation value of each criterion is computed by using LFR. Finally, a goal programming (GP) method is customized to obtain the most appropriate security tool for an organization, considering a tradeoff among the multi-objectives associated with quality, credibility and costs, utilizing the relative weights calculated by the physical programming weights (PPW) algorithm. A numerical example provided illustrates the advantages and contributions of this approach. Proposed approach is anticipated to help a decision maker select a suitable security tool by taking advantage of experts’ experience, with noises eliminated, as well as the accuracy of mathematical optimization methods.
  • 18.

    RI-RSA system design to increase security between nodes in RFID/USN environments

    Seon-Keun Lee | 2010, 15(11) | pp.157~162 | number of Cited : 0
    Abstract PDF
    Due to the IT development, RFID/USN became very familiar means of communication. However, because of increased number, security, and size constraints of nodes, it is insufficient to implement a variety of services. To solve these problems, this paper suggests RI-RSA, which is an appropriate asymmetric cryptographic system for RFID/USN environment. The proposed RI-RSA cryptographic system is easy to implement. To increase the processing speed, RI-RSA was suggested by subdividing the multiplication section into two-dimensional, where bottleneck phenomena occurs, and it was implemented in the hardware chip level. The simulation result verified that it caused 6% of circuit reduction, and for the processing speed, RI-RSA was 30% faster compare to the existing RSA.
  • 19.

    A Time Constraints Permission Based Delegation Model in RBAC

    김태식 | 장태무 | 2010, 15(11) | pp.163~171 | number of Cited : 0
    Abstract PDF
    RBAC(Role-Based Access Control) has advantages in managing access controls, because it offers the role inheritance and separation of duty in role hierarchy structures. Delegation is a mechanism of assigning access rights to a user. RBDM0 and RDM2000 models deal with user-to-user delegation. The unit of delegation in them is a role. However, RBAC does not process delegation of Role or Permission effectively that occurs frequently in the real world. This paper proposes a Time Constraints Permission-Based Delegation Model(TCPBDM) that guarantees permanency of delegated permissions and does not violate security principle of least privilege and separation of duty. TCPBDM, based on the well-known RBAC96, supports both user-to-user and role-to-role delegation with time constraints. A delegator can give permission to a specific person, that is delegatee, and the permission can be withdrawn whenever the delegator wants. Our model is analyzed and shown to be effective in the present paper.
  • 20.

    A Study on the Factors Influencing RFID Diffusion: In the Perspective of Innovation Diffusion Theory

    Sung-Hee Jang | 2010, 15(11) | pp.173~183 | number of Cited : 2
    Abstract PDF
    The purpose of this study is to examine the factors influencing RFID(Radio Frequency IDentification) diffusion. This study has been reviewed various theoretical research relating to innovation diffusion theory and RFID. The model was tested Structural Equation Modeling(SEM) using Smart PLS 2.0 analysis on the sample collected from 73 companies. The result of hypothesis testing is as follows. First, standardization, IS infrastructure influence positively RFID integration. Second, perceived benefits, inter-organizational cooperation, competitive pressure influence positively RFID usage. Third, RFID integration influence positively RFID usage. The results of this study will provide various implications on RFID diffusion.
  • 21.

    Design and Implementation of Context-Aware Computing System based on UPnP Sensor Network

    김종판 | AmSuk Oh | 2010, 15(11) | pp.185~193 | number of Cited : 0
    Abstract PDF
    In this paper, we Provide context-aware services based on UPnP Device Module including sensor unit in existing PLC network without additional infrastructure. so existing PLC devices are controlled based on knowledge context and can be used in a ubiquitous environment. And efficient remote control and device management based on UPnP can also be provided.
  • 22.

  • 23.

    The Goods Recommendation System based on modified FP-Tree Algorithm

    김종희 | 정순기 | 2010, 15(11) | pp.205~213 | number of Cited : 2
    Abstract PDF
    This study uses the FP-tree algorithm, one of the mining techniques. This study is an attempt to suggest a new recommended system using a modified FP-tree algorithm which yields an association rule based on frequent 2-itemsets extracted from the transaction database. The modified recommended system consists of a pre-processing module, a learning module, a recommendation module and an evaluation module. The study first makes an assessment of the modified recommended system with respect to the precision rate, recall rate, F-measure, success rate, and recommending time. Then, the efficiency of the system is compared against other recommended systems utilizing the sequential pattern mining. When compared with other recommended systems utilizing the sequential pattern mining, the modified recommended system exhibits 5 times more efficiency in learning, and 20% improvement in the recommending capacity. This result proves that the modified system has more validity than recommended systems utilizing the sequential pattern mining.
  • 24.

    Prediction of SNP interactions in complex diseases with mutual information and boolean algebra

    임상섭 | Kyubum Wee | 2010, 15(11) | pp.215~224 | number of Cited : 1
    Abstract PDF
    Most chronic diseases are complex diseases which are caused by interactions of several genes. Studies on finding SNPs and gene-gene interactions involved in the development of complex diseases can contribute to prevention and treatment of the diseases. Previous studies mostly concentrate on finding only the set of SNPs involved. In this study we suggest a way to see how these SNPs interact using boolean expressions. The proposed method consists of two stages. In the first stage we find the set of SNPs involved in the development of diseases using mutual information based on entropy. In the second stage we find the highest accuracy boolean expression that consists of the SNP set obtained in the first stage. We experimented with clinical data to demonstrate the effectiveness of the proposed method. We also compared the differences between our method and the previous results on the SNP associations studies.
  • 25.

    Estimating the Determinants for Transaction Value of B2B (Business-to-Business): A Panel Data Model

    Kim Hee Chul | Shin Hyun Dai | 2010, 15(11) | pp.225~231 | number of Cited : 0
    Abstract PDF
    Transaction value of business-to-business(B2B) is composed of various factors for groups and time series. In this paper, we use the panel data for finding various variables and using this we analyse the factors that is major influence to transaction value of business-to-business. For analysis we looked at transaction value of business-to-business of 7 groups such as manufacturing industry, electric, gas and piped water industry, construction industry, retail & wholesale trade, traffic industry, publish, image; broad-casting & telecommunication and information service industry, etc. In our analysis we looked at the transaction value of business-to-business during the period from 2005.01 to 2009.12. We examined the data in relation to the transaction value of cyber shopping mall, company bond, composite stock price index, transaction value of credit card, loaned rate of interest in deposit bank, rate of exchange looking at the factors which determine the transaction value of business-to-business, evidence was produced supporting the hypothesis that there is a significant positive relationship between the transaction value of cyber shopping mall, composite stock price index and loaned rate of interest in deposit bank, rate of exchange. The company bond is negative relationship, transaction value of credit card is positive relationship and they are not significant variables in terms of the transaction value of business-to-business.
  • 26.

    A Study on the model found of the duty factor whom follows in old person welfare facility worker holding office duration and organized performance research

    Cho Woo Hong | 2010, 15(11) | pp.233~239 | number of Cited : 0
    Abstract PDF
    The research which sees the fact that about model found of the duty factor whom follows in old person welfare facility worker holding office duration and organized performance researches in purpose. From theoretical background about the old person welfare facility system investigated a theory about the duty factor and organized performance of literature investigation and the old person welfare facility worker. A theory analysis of positive data led based on about the effect factor of the causality which the duty factor of the old person welfare facility worker reaches in organized performance under verifying boil the modulating effect of holding office duration. The repair which is a duty factor of the old person welfare facility worker, according to the holding office duration which is a personal quality factor job satisfaction the promotion and organized natural features, business environment and organized structure are organized performance and organization immersion and loyalty degree different assumed with the fact that will affect. From positive analysis about the research object verifies a suitable degree about demographics school register analytical and study model, structural equation model leads and construction verification and modulating effect analysis under executing boil.