Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

Home > Explore Content > All Issues > Article List

2011, Vol.16, No.9

  • 1.

    Thermal Pattern Comparison between 2D Multicore Processors and 3D Multicore Processors

    최홍준 , 안진우 , 장형범 and 2 other persons | 2011, 16(9) | pp.1~10 | number of Cited : 1
    Abstract PDF
    Unfortunately, in current microprocessors, increasing the frequency causes increased power consumption and reduced reliability whereas it improves the performance. To overcome the power and thermal problems in the singlecore processors, multicore processors has been widely used. For 2D multicore processors, interconnection is regarded as one of the major constraints in performance and power efficiency. To reduce the performance degradation and the power consumption in 2D multicore processors, 3D integrated design technique has been studied by many researchers. Compared to 2D multicore processors, 3D multicore processors get the benefits of performance improvement and reduced power consumption by reducing the wire length significantly. However, 3D multicore processors have serious thermal problems due to high power density, resulting in reliability degradation. Detailed thermal analysis for multicore processors can be useful in designing thermal-aware processors. In this paper, we analyze the impact of workload distribution, distance to the heat sink, and number of stacked dies on the processor temperature. We also analyze the effects of the temperature on overall system performance. Especially, this paper presents the guideline for thermal-aware multicore processor design by analyzing the thermal problems in 2D multicore processors and 3D multicore processors.
  • 2.

    An Automated Planning Method for Autonomous Behaviors of Computer Generated Forces in War games

    최대회 , Junho, Cho , 김익현 and 2 other persons | 2011, 16(9) | pp.11~18 | number of Cited : 1
    Abstract PDF
    This paper proposes a novel planning method for computer generated forces (CGFs) in war games that plans the behaviors of CGFs according to a given mission and situations. CGFs which are received their missions first plan their tasks for accomplishing the mission and then plan their behaviors for accomplishing each task. After that, they execute their planned behaviors considering the conditions of environments (in other words situations). The tasks and behaviors are hierarchically composed and include start conditions for beginning those and termination conditions for stopping those. CGFs first check whether the start condition of the planned behavior for accomplishing a task is satisfied or not in some degree and perform the behavior if satisfied continuously until the termination condition of the behavior will be met. If the termination condition is satisfied, then they check the start condition of the next planned behavior. This process will be repeated for accomplishing the mission. If the situations of CGFs are different by changing the environments from those of planning time, it may cause the start condition of the planned behavior to be dissatisfied. In this case, CGFs can decide a new behavior using fuzzy rule base. We realized our planning system and tested CGFs with a scenario. Experimental results showed that our system worked well and actively coped with situation changes. It will be possible to make CGFs that can do more autonomous behaviors if we continually develop our method.
  • 3.

    Personalized Recommendation based on Context-Aware for Resource Sharing in Ubiquitous Environments

    PARK JONGHYUN , Kang, Ji-Hoon | 2011, 16(9) | pp.19~26 | number of Cited : 2
    Abstract PDF
    Users want to receive customized service using users' personal device. To fulfill this requirement, the mobile device has to support a lot of functions. However, the mobile device has limitations such as tiny display screens. To solve this limitation problem and provide customized service to users, this paper proposes the environment to provide services by sharing resources and the method to recommend user-suitable resources among sharable resources. For the resource recommendation, This paper analyzes user's behavior pattern from usage history and proposes the method for recommending customized resources. This paper also shows that the approach is reasonable one for resource recommendation through the satisfaction evaluation.
  • 4.

    Online Handwritten Digit Recognition by Smith-Waterman Alignment

    문원호 , 최연석 , Lee Sang-Geol and 1 other persons | 2011, 16(9) | pp.27~34 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an efficient on-line handwritten digit recognition base on Convex-Concave curves feature which is extracted by a chain code sequence using Smith-Waterman alignment algorithm. The time sequential signal from mouse movement on the writing pad is described as a sequence of consecutive points on the x-y plane. So, we can create data-set which are successive and time-sequential pixel position data by preprocessing. Data preprocessed is used for Convex-Concave curves feature extraction. This feature is scale-, translation-, and rotation-invariant. The extracted specific feature is fed to a Smith-Waterman alignment algorithm, which in turn classifies it as one of the nine digits. In comparison with backpropagation neural network, Smith-Waterman alignment has the more outstanding performance.
  • 5.

    Modified Software Equation for Software Cost-Schedule Tradeoff

    Sang-Un, Lee , MyeongBok Choi | 2011, 16(9) | pp.35~44 | number of Cited : 0
    Abstract PDF
    To develop a software, there is a relationship between development organization's productivity, effort, development schedule, and software size . It is software equation that motive these relations. Basically, relationship between size-effort and size-schedule is applied. If this relationship is not proper, there would be no effect of the cost-schedule tradeoff equation that is derived from software equation, and the manpower profile analysis, etc. To solve these unwanted problems, we presented a modified software equation and a cost-schedule tradeoff model based on the modified software equation. To improve software development success rate, applying proposed model will help in contract negotiation or bid.
  • 6.

    A Design of Transducer Interface Protocol for Context-aware Middleware

    장동욱 , 손석원 , Han Kwang Rok and 1 other persons | 2011, 16(9) | pp.45~56 | number of Cited : 1
    Abstract PDF
    Context awareness technologies are based on efficient sharing of environment information of ubiquitous sensors in everyday life, and users require this awareness technologies to get quality of services. However, the application has been restricted due to its varieties of sensors and many different methods of communications. Therefore, IEEE 1451 standard has been published to interface between sensors and network layer. But it does not connect to a middleware because IEEE 1451 is for transducer standards. This paper presents a transducer and application interface protocol which connect to the context-aware middleware by defining a protocol to obtain context information using XML. We have implemented a bridge health monitoring system and railroad monitoring system in which different sensors and users' application are used to prove the efficacy of proposed interface protocols.
  • 7.

    An Approach to Generation Monitoring Module using UML Model

    박정민 , 정옥란 | 2011, 16(9) | pp.57~68 | number of Cited : 1
    Abstract PDF
    Self-healing is an approach to evaluating constraints defined in target system and to applying an appropriate strategy when violating the constrains. Today, the computing environment is very complex, so researches that endow a system with the self-healing's ability that recognizes problem arising in a target system are being an important issues. However, most of the existing researches are that self-healing developers need much effort and time to analyze and model constraints. Thus, in order to improve these problems, this paper proposes the method that automatically generates monitoring module by using UML models for self-healing. The approach proposes: 1) defining system knowledge required for self-healing from UML model, 2) process for generating monitor, by using monitor generated, and process for monitoring the problems. Through these, we can reduce the efforts of self-healing developers to analyze target system, and secure monitoring scope based on information of system knowledge. Also we can minimize the efforts to develop the monitoring environment automatically. to evaluate the proposed approach, we apply proposed approach to ATM prototype system for qualitative result, and perform quantitative evaluation through video conference system in our existing research.
  • 8.

    Object Detection Algorithm Using Edge Information on the Sea Environment

    정종면 , Park, Gyei-Kark | 2011, 16(9) | pp.69~76 | number of Cited : 3
    Abstract PDF
    According to the related reports, about 60 percents of ship collisions have resulted from operating mistake caused by human factor. Specially, the report said that negligence of observation caused 66.8 percents of the accidents due to a human factor. Hence automatic detection and tracking of an object from an IR images are crucial for safety navigation because it can relieve officer’s burden and remedies imperfections of human visual system. In this paper, we present a method to detect an object such as ship, rock and buoy from a sea IR image. Most edge directions of the sea image are horizontal and most vertical edges come out from the object areas. The presented method uses them as a characteristic for the object detection. Vertical edges are extracted from the input image and isolated edges are eliminated. Then morphological closing operation is performed on the vertical edges. This caused vertical edges that actually compose an object be connected and become an object candidate region. Next, reference object regions are extracted using horizontal edges, which appear on the boundaries between surface of the sea and the objects. Finally, object regions are acquired by sequentially integrating reference region and object candidate regions.
  • 9.

    Walking assistance system using texture for visually impaired person

    원선희 , HYUNG IL CHOI , Gye-young Kim | 2011, 16(9) | pp.77~86 | number of Cited : 2
    Abstract PDF
    In this paper, we propose an region segmentation and texture based feature extraction method which split the pavement and roadway from the camera which equipped to the visually impaired person during a walk. We perform the hough transformation method for detect the boundary between pavement and roadway, and devide the segmented region into 3-level according to perspective. Next step, split into pavement and roadway according to the extracted texture feature of segmented regions. Our walking assistance system use rotation-invariant LBP and GLCM texture features for compare the characteristic of pavement block with various pattern and uniformity roadway. Our proposed method show that can segment two regions with illumination invariant in day and night image, and split there regions rotation and occlution invariant in complexed outdoor image.
  • 10.

    A Real-Time Messaging System for Twitter Users and Their Followers

    박종은 , 권오진 , 이홍창 and 1 other persons | 2011, 16(9) | pp.87~96 | number of Cited : 2
    Abstract PDF
    Recently, as smartphones have rapidly come into wide use and various social networking services have grown, people perform a variety of interactions through the virtual and real world based on them. Usually, such services focus on easy formation of social links among users, supporting the exchange of simple messages among users on the networks. Twitter, one of such services used worldwide, supports short message service named Tweet and has over 200 million members signed up. n this paper, we propose techniques for supporting real-time group messaging based on the social network of Twitter and describe a smartphone group messaging system developed with the techniques. The system automatically forms a group that include a Twitter user and the followers of the user, supporting real-time group messaging among the group members. The developed system is composed of an XMPP protocol-based messaging server and smartphone client applications which perform real-time messaging based on the social network of Twitter. Twitter users can easily use the system utilizing Tweet messages, exchanging real-time messages with their followers within the groups instantly established on the XMPP server.
  • 11.

    Live Book Service System Mixed Analog and Digital Contents

    Lim Cheol Su , 최종호 , 최재완 | 2011, 16(9) | pp.97~106 | number of Cited : 2
    Abstract PDF
    This paper proposes a new "Live Book Service" that is combined the analog contents such as paper books and digital contents with various digital multimedia elements, and this service can project the additional digital multimedia contents on the analog paper. Also, we developed a monolithic stand type system which is composed of camera and pico projector, so that it can demonstrate the proposed contents. We also devised the low computational cost algorithm in bare-hands recognition which can be used as the interface between the system and users. In addition, to recognize the bare-hands which can be used as the interface between the digital and users, we make the low cost algorithm. Therefore this can be the interaction between the system and users. As a result, our proposed system can be used as a useful tool for various e-book or u-learning fields that requires high efficiency and much immersion.
  • 12.

    SGOSST Mechanism for Quality of Service In Network

    김인범 | 2011, 16(9) | pp.107~114 | number of Cited : 1
    Abstract PDF
    Because of boost of communications devices furnishing diverse services and rapid expansion of mobile business, good use and management of the existing network system become very important. Also, offering service corresponding with user communication requirement grades which vary widely in each person, is vital for communication service provider. In this paper, SGOSST, a mechanism of efficient network construction with minimum cost for network QoS is proposed. In experiments, though spending 252.97% more execution times, our SGOSST QoS network consumed 5.11% less connecting costs than the network constructed by weighted minimum spanning tree method. Therefore our mechanism can work well for efficient operation and service providing in the network formed with users and communication devices of various service requirement grade as smart/mobile equipment.
  • 13.

    Research on An Energy Efficient Triangular Shape Routing Protocol based on Clusters

    Nurhayati , 이경오 | 2011, 16(9) | pp.115~122 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an efficient dynamic workload balancing strategy which improves the performance of high-performance computing system. The key idea of this dynamic workload balancing strategy is to minimize execution time of each job and to maximize the system throughput by effectively using system resource such as CPU, memory. Also, this strategy dynamically allocates job by considering demanded memory size of executing job and workload status of each node. If an overload node occurs due to allocated job, the proposed scheme migrates job, executing in overload nodes, to another free nodes and reduces the waiting time and execution time of job by balancing workload of each node. Through simulation, we show that the proposed dynamic workload balancing strategy based on CPU, memory improves the performance of high-performance computing system compared to previous strategies.
  • 14.

    A New Distributed Conference Architecture using Resource Lists

    Jang,Choon-Seo , Lee,Ki-Su | 2011, 16(9) | pp.123~130 | number of Cited : 2
    Abstract PDF
    In this paper, We have proposed a new distributed conference architecture which can reduce largely SIP(Session Initiation Protocol) messages exchanged between servers and participants in distributed conference environment by using resource lists which consist of conference participants URIs. This architecture can also reduce processing time and loads of conference servers. In our proposed method, the number of SIP messages required for participating in the conference can be largely reduced, and the number of SIP messages required for subscription of conference event package and maintaining sessions can also be largely reduced by using resource lists. Therefore expandibility of the conference system increases and network traffic can be reduced by using our conference architecture. And We also have proposed in this paper a new conference information data format with some added elements that are necessary for processing resource lists. Furthermore the procedure for dynamically adding conference servers to the conference environment has been suggested, and the exchanging process of SIP messages and conference information data between conference servers and conference participants has been also suggested. The performance of our proposed system has been evaluated by experiments.
  • 15.

    Active Disaster Alerting Service System based on App of Smart Moving Object

    한기태 | 2011, 16(9) | pp.131~144 | number of Cited : 0
    Abstract PDF
    Previous alerting service based on LBS was caused severe overload problem of server by using the method to confirm the location of each moving object on server. In this paper, by loading an App on smart moving object, we proposed a novel algorithm named ADAS(Active Disaster Alert Service) for accessing to the server site with oneself location information as needed and implemented the disaster alerting service system with visualization for user. In the proposed method, running App access to the server periodically with the present location coordinate gained from GPS module or network module and the ID of moving object. Then, the server compare the present location coordinate of moving object and the coordinates of disasters registered in DIDB and transmit the n NDIs existed in near distance orderly from the coordinate of present moving object to the client. The App compares the coordinate of present location for moving object and the coordinates of NDI is transmitted from server by real time and executes the service with classifying levels of alert into three steps such as danger, carefulness and safety. And new NDIs are gained by accessing DIDB on Server periodically during running App. Therefore, this will be become a novel method for reducing fundamentally the server overload problem in comparison with previous alerting service that the career of moving object is managed on server.
  • 16.

    An Implementation of the Career Management System Based on the Android Platform

    Lee, Won Joo , Chi-woon Joo | 2011, 16(9) | pp.145~154 | number of Cited : 3
    Abstract PDF
    In this paper, we propose a CMS(Career Management System) based on the Android Platform, which is able to manage the result of MBTI, an aptitude test and English skills such as TOEIC, conversation, writing, etc. and to deal with the performance of the on-the-job practice, internship, project participation, graduation exhibition, contest exhibition, etc. during the period of attendance at school, This system is divided into the server module and the client one. First, the server module is used to build up the web site of the CMS that can serve to save the data related to each student's career. Second, the client module is to develop the application based on the Android Platform. This application can easily access the career-related information and always function as maintaining and managing the new data. If we make good use of the CMS proposed in this study, the relevant departments and bureaus in colleges and universities can activate the service capacity and also enhance the employment competitiveness by adding value to the students.
  • 17.

    A Study on Look Error Estimation and Adaptive Array Angle Estimation

    Kwan Hyeong, Lee , Woo-Young Song , LEE MYUNG HO | 2011, 16(9) | pp.155~162 | number of Cited : 1
    Abstract PDF
    It is using to incident angle estimation technique in order to target estimation in radar. This paper was estimated incident angle estimation for target using adaptive array incident angle and single look error incident angle estimation technique. We estimated signal incident angle of target to removal main lobe and side lobe to adaptive array incident angle technique. It is difficult to correctly target estimation because single look technique increase direction error of signal incident angle. In order to receive a desired target signal must be not almost look error between signal incident angle and look angle. we had decreased to occur a look error using delay time and single look condition to calculation a covariance when incident angle estimate. Through simulation, we show that the proposed incident angle estimation technique improves the performance of target estimation compared to previous method.
  • 18.

    The Effects of Factors Related with Drinking of University Students on Drinking Behavior for Public Policy Implications

    정명숙 | 2011, 16(9) | pp.163~174 | number of Cited : 0
    Abstract PDF
    This study is to analyze positively the effect of related with drinking of university students on drinking behavior public policy implications. By reviewing the theory and preceding research, I assumed that the elements related with drinking such as stress, friend relationship, drinking expectation, self-control, family effect have effects on drinking attitude and drinking behavior. As the result of the study, the stress, friend relationship, drinking expectation, self-control, and family effect which are drinking elements show the meaningful difference on drinking attitude and drinking behavior. In this study, I researched the relative influence of various variables in drinking behavior as elements related with drinking of university students. Based upon these study results, I would like to suggest the political implications as the alternatives.
  • 19.

    A Model of implementation Data Architecture for Enterprise Architecture

    김석수 , 이화식 | 2011, 16(9) | pp.175~184 | number of Cited : 2
    Abstract PDF
    Data is the kernel of IT. We can apply to other architectures are refer to technology and advanced method. Data architecture is our's native that must be implement ourself. It will suggest to the best method to implement for a sound information system that likes to framework of building because data is not sensitive field of evolution and change of technology. Well implemented data architecture can be effectively management and operation. Also this is easily to implement of enterprise architecture. This paper propose a model of implementation data architecture for enterprise architecture.
  • 20.

    Design and Implementation of National Language Ability Test System using Korean Style Internet-Based Test added Middle-Server

    Chang, Young-Hyun , Dea-woo Park | 2011, 16(9) | pp.185~192 | number of Cited : 1
    Abstract PDF
    The purpose of this paper is to propose the design and implementation of a korean style internet-based test system on the basis of efficiency and stability for middle server. The current assessment system has some unstable elements with regard to transmission procedure, cost, system load and stability. This paper proposes a series of activities for the performance improvement of korean style internet-based test system which finally produced various excellent results in the administration of expense control, human resources, and special operational affairs. The proposed system's technological factors using middle server have been tested through a basic simulation pilot system. Actual development procedure starts from the analysis required by improving the shortcomings of existing internet-based test systems. A efficiency comparison with existing system and newly developed system was made in the area of number of operators, abnormal processing, system maintenances. Korean style internet-based test system using middle server has shown great efficiency increased to the maximum of 2 times about the effectiveness of processing for various parts. The korean style internet-based test system using middle server have been given good evaluations with regard to the convenience of their use and the management system for operators and supervisors