Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2011, Vol.16, No.8

  • 1.

    Data processing techniques applying data mining based on enterprise cloud computing

    강인성 | 김태호 | 이홍철 | 2011, 16(8) | pp.1~10 | number of Cited : 4
    Abstract PDF
    Recently, cloud computing which has provided enabling convenience that users can connect from anywhere and user friendly environment that offers on-demand network access to a shared pool of configurable computing resources such as smart-phones, net-books and PDA etc, is to be watched as a service that leads the digital revolution. Now, when business practices between departments being integrated through a cooperating system such as cloud computing, data streaming between departments is getting enormous and then it is inevitably necessary to find the solution that person in charge and find data they need. In previous studies the clustering simplifies the search process, but in this paper, it applies Hash Function to remove the de-duplicates in large amount of data in business firms. Also, it applies Bayesian Network of data mining for classifying the respect data and presents handling cloud computing based data. This system features improved search performance as well as the results Compared with conventional methods and CPU, Network Bandwidth Usage in such an efficient system performance is achieved.
  • 2.

    A Study on Efficient Load Balancing Mechanism in Distributed Web Cluster System

    Lee Bog Gi | 2011, 16(8) | pp.11~18 | number of Cited : 1
    Abstract PDF
    The increasing of web users load to the excessive transmission traffic and system overload problems. To solve these problems, cluster systems are studied. In conventional cluster systems, when the request size is large owing to such types as multimedia and CGI, the particular server load and response time tend to increase even if the overall loads are distributed evenly. In this paper, we consider the methodology of efficient resource usage, specially distributed web cluster system. We develope an algorithm that distributes the load on the web cluster system to use the system resources, such as system memory equally. The response time is chosen as a performance measure on the various clustering models. And based on the concurrent user to the web cluster system, the response time is also examined as the number of users increases. Simulation experience with this algorithm shows that the response time and average throughput seems to have a good results compare to those with the other algorithm.
  • 3.

    Access Control for Efficient Query Processing on Limited Resource Mobile Terminal

    Dong-Chan An | 2011, 16(8) | pp.19~28 | number of Cited : 0
    Abstract PDF
    Access control that has been previously performed mainly on safety, and thus not much effort has been done to consider access control in terms of efficiency. This paper proposes a method for an efficient and secure query processing of XML data streams, such as a personal digital assistant and a portable terminal, at the client side with limited resources. Specifically, this paper proposes an access control processing that possesses a small overhead for attaining a secure result with limited memory and a method to enhance the performance, finding the parts capable of optimizing each processing step for offsetting the overhead caused by the addition of access control processing. The superiority of the new method is analyzed through an experiments.
  • 4.

    Performance Comparison of Column-Oriented and Row-Oriented Database Systems for Star Schema Join Processing

    오병중 | 안수민 | 김경창 | 2011, 16(8) | pp.29~38 | number of Cited : 0
    Abstract PDF
    Unlike in traditional row-oriented database systems, a column-oriented database system stores data in column-oriented and not row-oriented order. Recently, research results revealed the effectiveness of column-oriented databases for applications such as data warehouse and decision support systems that access large volumes of data in a read only manner. In this paper, we investigate the join strategies for column-oriented databases and prove the effectiveness of column-oriented databases in data warehouse systems. For unbiased comparison, the two database systems are analyzed using the star schema benchmark and the performance analysis of a star schema join query is carried out. We experimented with well-known join algorithms and considered early materialization and late materialization join strategies for column-oriented databases. The performance results confirm that star schema join queries perform better in terms of disk I/O cost in column-oriented databases than in row-oriented databases. In addition, the late materialization strategy showed more performance gain than the early materialization strategy in column-oriented databases.
  • 5.

    A Layer-by-Layer Learning Algorithm using Correlation Coefficient for Multilayer Perceptrons

    곽영태 | 2011, 16(8) | pp.39~48 | number of Cited : 1
    Abstract PDF
    Ergezinger's method, one of the layer-by-layer algorithms used for multilyer perceptrons, consists of an output node and can make premature saturations in the output's weight because of using linear least squared method in the output layer. These saturations are obstacles to learning time and covergence. Therefore, this paper expands Ergezinger's method to be able to use an output vector instead of an output node and introduces a learning rate to improve learning time and convergence. The learning rate is a variable rate that reflects the correlation coefficient between new weight and previous weight while updating hidden's weight. To compare the proposed method with Ergezinger's method, we tested iris recognition and nonlinear approximation. It was found that the proposed method showed better results than Ergezinger's method in learning convergence. In the CPU time considering correlation coefficient computation, the proposed method saved about 35% time than the previous method.
  • 6.

    Estimation of 3D Rotation Information of Animation Character Face

    장석우 | 원선희 | HYUNG IL CHOI | 2011, 16(8) | pp.49~56 | number of Cited : 5
    Abstract PDF
    Recently, animation contents has become extensively available along with the development of cultural industry. In this paper, we propose a method to analyze a face of animation character and extract 3D rotational information of the face. The suggested method first generates a dominant color model of a face by learning the face image of animation character. Our system then detects the face and its components with the model, and establishes two coordinate systems: base coordinate system and target coordinate system. Our system estimates three dimensional rotational information of the animation character face using the geometric relationship of the two coordinate systems. Finally, in order to visually represent the extracted 3D information, a 3D face model in which the rotation information is reflected is displayed. In experiments, we show that our method can extract 3D rotation information of a character face reasonably.
  • 7.

    Method of Human Detection using Edge Symmetry and Feature Vector

    변오성 | 2011, 16(8) | pp.57~66 | number of Cited : 0
    Abstract PDF
    In this paper, it is proposed for algorithm to detect human efficiently using a edge symmetry and gradient directional characteristics in realtime by the feature extraction in a single input image. Proposed algorithm is composed of three stages, preprocessing, region partition of human candidates, verification of candidate regions. Here, preprocessing stage is strong the image regardless of the intensity and brightness of surrounding environment, also detects a contour with characteristics of human as considering the shape features size and the condition of human for characteristic of human. And stage for region partition of human candidates has separated the region with edge symmetry for human and size in the detected contour, also divided 1st candidates region with applying the adaboost algorithm. Finally, the candidate region verification stage makes excellent the performance for the false detection by verifying the candidate region using feature vector of a gradient for divided local area and classifier. The results of the simulations, which is applying the proposed algorithm, the processing speed of the proposed algorithms is improved approximately 1.7 times, also, the FNR(False Negative Rate) is confirmed to be better 3% than the conventional algorithm which is a single structure algorithm.
  • 8.

    A Case Study on Instruction Using Robot in Elementary Regular Classes

    PARK JUNG HO | Cho, Hye-Kyung | 2011, 16(8) | pp.67~76 | number of Cited : 13
    Abstract PDF
    This study is to analyze the effects on using robots in elementary regular classes. The robots and PC-linked applications were developed considering the school subjects' academic goals and the learners' responses were carefully examined while applying the robots in the class. The image profile after the robot application shows positive feedbacks in most of the contents and some significant differences were found in contents such as 'theoretical-practical', 'uncooperative-coope rative'(p<.05). Moreover, the analysis on the learners' image drawings shows that more robot images are formed related to the concrete learning environment. The learners have answered in an interview to evaluate their understanding of 「Robot based instruction」 that both direct and indirect robot experience induce positive participations and provide authentic learning experience. During the robot based instruction, the learners cooperate with their group members and recognize the cooperation as a positive activity. It proves that the robot based instruction can lead to a possibility of new education paradigm.
  • 9.

    Performance Evaluation of Cryptographic Algorithms for the 6LoWPAN with Packet Fragmentations

    HYUNGON KIM | 2011, 16(8) | pp.77~84 | number of Cited : 0
    Abstract PDF
    In this paper we implement a 6LoWPAN protocol on the MICAz sensor platform, which could minimize packet re-transmission, and support security primitives for packet integrity and confidentiality. And we also present a performance evaluation of the implemented protocol calculated according to the cryptographic algorithms. In the re-transmission method, time stamp, nonce, and checksum are considered to protect replay attacks. As cryptographic algorithms, AES, 3DES, SHA2, and SHA1 are implemented. If transmission errors (thus, packet losses) and the number of hops are increase then, packet re-transmissions are increase exponentially from the experimental results. Also, the result shows that cryptographic operations take more time than packet re-transmission time.
  • 10.

    Analysis of Utility Metering Data for Estimation of User Abnormal Life Status

    백종목 | Byung-gi Kim | 2011, 16(8) | pp.85~94 | number of Cited : 0
    Abstract PDF
    In this paper, we analyzed the function elements of the Integrated meter reading system based on PLC which is working in Mok-dong, Seoul and studied how to improve the vulnerability. Also we propose an efficient method for the estimation of abnormal life status through frequency domain processing of utility meter readings. We found out that even after removing the high-frequency components from the raw meter data, the shape of the graph still maintains the original graph characteristics. The graph of the inverse transformed data has simpler and smoother curve than the original graph pattern. The original graph is not good to be used in deciding whether the residence's life pattern is normal or not. We could find out that the graph which is processed frequency signal has simple and intuitive graph pattern.
  • 11.

    Pseudo Feature Point Removal using Pixel Connectivity Tracing

    김강 | 이건익 | 2011, 16(8) | pp.95~102 | number of Cited : 0
    Abstract PDF
    In this paper, using pixel connectivity tracking feature to remove a doctor has been studied. Feature extraction method is a method using the crossing. However, by crossing a lot of feature extraction method sis a doctor. Extracted using the method of crossing the wrong feature to remove them from the downside and the eight pixels around the fork to trace if it satisfies the conditions in the actual feature extraction and feature conditions are not satisfied because the doctor was removed. To evaluate the performance using crossing methods and extracted using pixel connectivity trace was compared to the actual feature, the experimental results using pixel connectivity trace arcuate sentence, croissants sentence, sentence the defrost feature on your doctor about47%, respectively, 40%, 30%were found to remove.
  • 12.

    The Primality Test

    Sang-Un, Lee | MyeongBok Choi | 2011, 16(8) | pp.103~108 | number of Cited : 0
    Abstract PDF
    Generally, Miller-Rabin method has been the most popular primality test. This method arbitrary selects at -times from range and . Miller-Rabin method performs times and reports prime as or such that . This paper suggests more simple primality test than Miller-Rabin method. This test method computes for times and reports prime as . The proposed primality test method reduces times of Miller-Rabin method to times.
  • 13.

    Vulnerability Analysis on Digital Signature Function of Word Processors

    이창빈 | 박선우 | Kwangwoo Lee and 4other persons | 2011, 16(8) | pp.109~118 | number of Cited : 1
    Abstract PDF
    Recently, electronic documents are deployed in many areas. However, trust concerns arise owing to the fact that detecting whether an electronic document is modified or not is not an easy process. To facilitate this process, many word processors provide digital signature capabilities on themselves. However, there were not much research on the security of digital signature function of various programs including Microsoft Word and Hancom Hangul. Therefore, in this paper, we analyze the security of Microsoft Word and Hancom Hangul, and propose improvements for their digital signature schemes.
  • 14.

    Implementation of an Optimal Many-core Processor for Beamforming Algorithm of Mobile Ultrasound Image Signals

    최병국 | 김종면 | 2011, 16(8) | pp.119~128 | number of Cited : 1
    Abstract PDF
    This paper introduces design space exploration of many-core processors that meet high performance and low power required by the beamforming algorithm of image signals of mobile ultrasound. For the design space exploration of the many-core processor, we mapped different number of ultrasound image data to each processing element of many-core, and then determined an optimal many-core processor architecture in terms of execution time, energy efficiency and area efficiency. Experimental results indicate that PE=4096 and 1024 provide the highest energy efficiency and area efficiency, respectively. In addition, PE=4096 achieves 46x and 10x better than TI DSP C6416, which is widely used for ultrasound image devices, in terms of energy efficiency and area efficiency, respectively.
  • 15.

    A Study on Multi Target Elevation Angle Estimation of Hight Directivity using Multi Stacked Beam Forming

    Kwan Hyeong, Lee | Woo-Young Song | LEE MYUNG HO | 2011, 16(8) | pp.129~136 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a multi target's elevation angle estimation method using multi beam forming technique. This method make a stacked beam to digital processing a received signal in array element. There can be desired receiving beam to application weight value at antenna element in beam forming. Currently, we are to make multi stacked beam using fast fourier transform in stead of phase shifter to be a computer performance much improvement. Also, we improve multi beam directivity using beam steering error correction technique in order to beam steering to desired direction in receiver. Through simulation, we show that the proposed elevation estimation method based on fast fourier transform and beam steering error correction technique, improves th performance of target estimation compared to previous method.
  • 16.

    Monitoring and Prediction of Appliances Electricity Usage Using Neural Network

    정경권 | CHOI , WOO SEUNG | 2011, 16(8) | pp.137~146 | number of Cited : 0
    Abstract PDF
    In order to support increased consumer awareness regarding energy consumption, we present new ways of monitoring and predicting with energy in electric appliances. The proposed system is a design of a common electrical power outlet called smart plug that measures the amount of current passing through current sensor at 0.5 second. To acquire data for training and testing the proposed neural network, weather parameters used include average temperature of day, min and max temperature, humidity, and sunshine hour as input data, and power consumption as target data from smart plug. Using the experimental data for training, the neural network model based on Back-Propagation algorithm was developed. Multi layer perception network was used for nonlinear mapping between the input and the output data. It was observed that the proposed neural network model can predict the power consumption quite well with correlation coefficient was 0.9965, and prediction mean square error was 0.02033.
  • 17.

    Implementation of an Indoor Location Based Contents Displaying System Using Web Services

    YIM JAE GEOL | 김민수 | 2011, 16(8) | pp.147~156 | number of Cited : 1
    Abstract PDF
    Map rendering, positioning, database managements are key elements of location based services. Google map and GPS (Global Positioning System) have become a very popular solution for map rendering and positioning, respectively. They are very effective and yet free of charge. However, they cannot be used for an indoor location based service system. We cannot render a building drawing with Google map, we cannot determine a moving object's position when it is indoor. This paper introduces our web services of rendering drawings, indoor positioning, and multimedia contents up-loading and playing so that any programmers can use them in developing indoor location based service systems. In order to experimentally show the efficiency of our web services, we have built a location based contents displaying system for museum visitors with them.
  • 18.

    A study on Internet user‘s protection

    박종렬 | 2011, 16(8) | pp.157~164 | number of Cited : 2
    Abstract PDF
    As a computer technology is combined with communication technology, information and communication technology developed rapidly. As a result, The number of internet users increased quickly. Ability of human in using information was epoch-making, and it was increased through the Internet on behalf of an information-oriented society. As an Internet user hereby spreads explosively, legislations were established and revised to protect Internet users and consumers however, it is certain that the damages of Internet users are still increasing day by day. The purpose of this paper is to protect internet users and to reform the system. Also each portal site should provide fair information, and be responsible for conclusion of a contract. After they subdivide into personal service style, and analyze every situation and problems, they should improve problems.
  • 19.

    Decision of optimal incentives and total order quantity with consideration of return rate of remanufacturing product

    이용현 | Lee, Chul Ung | 2011, 16(8) | pp.165~176 | number of Cited : 1
    Abstract PDF
    In this paper, we develop the cost minimization model to select two incentives and total order quantity with consideration of remanufacture company's return incentive. Return rate is sensitive to the incentive that the manufacture company offers. Using a EOQ(Economic Order Quantity) model of a cost minimization, we show concavities of the model about two incentives and total order quantity respectively. According to the proposed algorithm using the concavities, we find out the optimized incentive prices and total order quantity. Through numerical study, we examine sensitive analysis of the incentive price and order quantity for each parameter when the return rate is sensitive to incentive. Company lessens incentive to reduce total price. However, this makes the total price increase due to a diminution of return quantity. We expect that domestic or overseas remanufacture businesses are able to decide optimal incentive and total order quantity by this research.
  • 20.

    The Effect of Stress and Impulsiveness on Academic Achievement and Social Competence of Adolescents : Focusing on Control Effect by Type of Schools

    김효순 | 2011, 16(8) | pp.177~188 | number of Cited : 5
    Abstract PDF
    The purpose of this study was to prepare empirical baselinedata supporting for adolescents by researching the control effects by type of schools related between academic achievement and social competence mediating the oiettolie propensity by stress and impulsiveness of adolescents. For this study, 400 high school students in Gwangju metropolitan city were interviewed using self-reporting questionnaire. As the result of study, stress and impulsiveness of adolescents have significant influences on their oiettolie propensity partially, and oiettolie propensity affect academic achievement and social competence meaningfully. and, stress and impulsiveness of adolescents play roles on their oiettolie propensity partially as control factors by type of schools. and. oiettolie propensity affects academic achievement and social competence by type of schools. This study suggests some policy programs for reduction of oiettolie propensity and improvement of academic achievement and social competence based on the analysis results.
  • 21.

    A Study on Comparative Amount of Idea Thinking between Brainstorming and Webstorming

    한경돈 | Dea-woo Park | 2011, 16(8) | pp.189~196 | number of Cited : 5
    Abstract PDF
    To develop a creative design concept, amount of idea thinking between team members is important. In the process of planning to proposal brainstorming helps clarification of problems and allows a creative solution. Here, idea generation is to express thinking into words, and greater amount of idea is more valued than to choose one fine idea at first. This paper studies actual processes of brainstorming, and we utilize network services upgraded in Web and multimedia techniques to develop idea with arrangement. We compare the amount of idea generation by groups and topics with Brainwriting and Braindrawing of Webstorming, without limitation of space and time. Then, we propose a creative idea thinking by analyzing the characteristics of design team members in various aspects. This result will contribute in improving national potential value and design competitiveness by the help of design and IT, on product research and marketing.