Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2011, Vol.16, No.11

  • 1.

    Implementation and Verification of JPEG Decoder IP using a Virtual Platform

    정용범 | 김용민 | 황철희 and 1other persons | 2011, 16(11) | pp.1~8 | number of Cited : 0
    Abstract PDF
    The requirement of a system-on-a-chip (SoC) design is increasing, which combines various and complex functional units on a single device. However, short time to market prohibits to release the device. To satisfy this shorter time-to-market, verification of both hardware and software at the same time is important. A virtual platform-based design method supports faster verification of these combined software and hardware by reusing pre-defined intellectual properties (IP). In this paper, we introduce the virtual platform-based design and redesign the existing ARM processor based S3C2440A system using the virtual platform-based method. In addtion, we implement and evaluate the performance of a JPEG decoder on the S3C2440A virtual platform. Furthermore, we introduce an optimized technique of the JPEG decoder using the ARM based inline assembly language, and then verify the performance improvement on the virtual platform. Such virtual platform-based design allows to verify both software and hardware at the same time and can meet the requirement of the shorter time-to-market.
  • 2.

    Gate Management System by Face Recognition using Smart Phone

    Ki-Hyeon Kwon | Hyung-Bong Lee | 2011, 16(11) | pp.9~16 | number of Cited : 6
    Abstract PDF
    In this paper, we design and implement of gate management system by face recognition using smart phone. We investigate various algorithms for face recognition on smart phones. First step in any face recognition system is face detection. We investigated algorithms like color segmentation, template matching etc. for face detection, and Eigen & Fisher face for face recognition. The algorithms have been first profiled in MATLAB and then implemented on the Android phone. While implementing the algorithms, we made a tradeoff between accuracy and computational complexity of the algorithm mainly because we are implementing the face recognition system on a smart phone with limited hardware capabilities.
  • 3.

    GGenre Pattern based User Clustering for Performance Improvement of Collaborative Filtering System

    최자현 | 하인애 | 홍명덕 and 1other persons | 2011, 16(11) | pp.17~24 | number of Cited : 0
    Abstract PDF
    Collaborative filtering system is the clustering about user is built and then based on that clustering results will recommend the preferred item to the user. However, building user clustering is time consuming and also once the users evaluate and give feedback about the film then rebuilding the system is not simple. In this paper, genre pattern of movie recommendation systems is being used and in order to simplify and reduce time of rebuilding user clustering. A Frequent pattern networks is used and then extracts user preference genre patterns and through that extracted patterns user clustering will be built. Through built the clustering for all neighboring users to collaborative filtering is applied and then recommends movies to the user. When receiving user information feedback, traditional collaborative filtering is to rebuild the clustering for all neighbouring users to research and do the clustering . However by using frequent pattern Networks, through user clustering based on genre pattern, collaborative filtering is applied and when rebuilding user clustering inquiry limited by search time can be reduced. After receiving user information feedback through proposed user clustering based on genre pattern , the time that need to spent on re-establishing user clustering can be reduced and also enable the possibility of traditional collaborative filtering systems and recommendation of a similar performance.
  • 4.

    Development of Integrated Design Methodology for Relational Database Application -Focusing on Object-Oriented Analysis and Design Methodology-

    Joo Kyung-Soo | 조도형 | 2011, 16(11) | pp.25~34 | number of Cited : 4
    Abstract PDF
    In this paper we present an integrated design methodology for relational database based on object-oriented analysis and design. The integrated design methodology is based on business profile and has six phases. In the first phase, business use cases are identified and described by macroactivity diagrams and then the macroactivity diagrams are transformed to detailed business activity diagrams by using objects, object flows and business worker's responsibilities. In the third phase, the detailed business activity diagrams are transformed to business class diagrams that describe the static structure of the entire business system based on detailed business activity diagrams. In the four phase, the business class diagrams are transformed to class diagrams that represent the initial conceptual model of the target relational database. In the five phase, we add additional transformations on the class diagrams with generalization and specialization of associations, roles, activities, additional classes and redundant associations. Eventually, the final class diagrams are transformed to relational database schema. The methodology presented in this paper by applying that proposal for organic connection between object-oriented analysis and design methodology and relational database design methodology. And it will be able to deal with integration management. By the integrated design methodology, we can make more easily software systems based on relational database. In the case study, proposal integrated design methodology applied for a visa issuing system.
  • 5.

    Spatial-Sensor Observation Service for Spatial Operation of GeoSensor

    이혁 | LI YAN | WeoniI Jeong and 1other persons | 2011, 16(11) | pp.35~44 | number of Cited : 2
    Abstract PDF
    Advances in science and technology have made a lot of changes in our life. Especially, sensors have used in various ways to monitor in real time and analyze the world effectively. Traditional sensor networks, however, have used their own protocols and architecture so it had to be paid a lot of additional cost. In the past 8 years, OGC and ISO have been formulating standards and protocols for the geospatial Sensor Web. Although the OGC SWE initiatives have deployed some components, attempts have been made to access sensor data. All spatial operations had to calculate on the client side because traditional SOS architecture did not consider spatial operation for GeoSensor. As a result, clients have to implement and run spatial operations, and it caused a lot of overload on them and decreased approachableness. In this paper we propose S-SOS for in-situ and moving GeoSensor that extends 52 North SOS and provides spatialFilter and spatialFinder operations. The proposed S-SOS provides an architecture that does not need to edit already deployed SOSs and can add spatial operations as occasion. Additionally we explain how to express the spatial queries and to be used effectively for various location based services.
  • 6.

    Algorithm of GTS Time Slots Allocation Based on Weighted Fair Queuing in Environments of WBAN

    김경목 | 정원수 | 2011, 16(11) | pp.45~56 | number of Cited : 0
    Abstract PDF
    WBAN is short range wireless communication technology which is consists of several small devices close to, attached to or implanted into the human body. WBAN is classified into between medical and non-medical by applications based on technology and medical data with periodic characteristics is used the GTS method for transmitting data to guarantee the QoS. In this paper we proposed algorithm that resolve lack of GTSs while data transmit GTS method in superframe structure of WBAN. Coordinator dynamically allocates GTSs according to the data rate of devices and make devices share GTSs when lack of GTSs. We compared delay bounds, throughput for performance evaluation of the proposed algorithm. In other words, we proposed algorithm adaptive WFQ scheduling that GTS allocation support differential data rate in environments of WBAN. The experiment results show the throughput increased and the maximum delay decreased compared with Round Robin scheduling.
  • 7.

    Task Factoring to support reuse in Agile Methods

    김지홍 | 2011, 16(11) | pp.57~66 | number of Cited : 1
    Abstract PDF
    Since software reuse and agile development methods are seen as ways to shorten development time and accept frequent requirement changes, respectively, there has been growing interest and research on integrating these approaches. But despite the increasing number of software companies which have successfully adopted agile development methods, there has been little research on reuse in agile methods to further improve productivity. In this paper, we identify a new type of reuse asset and propose a task factoring technique by taking advantage of iteration characteristics to support reuse in agile software development methods. In addition, we can apply the proposed technique and show prototyping of task reuse in a video rental application.
  • 8.

    Development of Interactive 3D Volume Visualization Techniques Using Contour Trees

    손봉수 | 2011, 16(11) | pp.67~76 | number of Cited : 0
    Abstract PDF
    This paper describes the development of interactive visualization techniques and a program that allow us to visualize the structure of the volume data and interactively select and visualize the isosurface components using contour tree. The main characteristic of this technique is to provide an algorithm that draws the contour tree in 2D plane in a way that users easily understand the tree, and to provide an algorithm that can efficiently extract an isosurface component utilizing GPU's parallel architecture. The main characteristic of the program we developed through implementing the algorithms is to provide us with an interactive user interface based on the contour tree for extracting an isosurface component and visualization that integrates with previous isosurface and volume rendering techniques. To show the excelland vof our methods, we applied 3D biomedical volume data to our algorithms. The results show that we could interactively select the isosurface components that represent a polypeptide chain, a ventricle and a femur respectively using the user interface based on our contour tree layout method, and extract the isosurface components with 3x-4x higher speed compared to previous methods.
  • 9.

    A Study on Encouragement Strategy of Electronic Commerce planned Event to Young Class of People

    박성진 | 이현창 | SeongYoon Shin | 2011, 16(11) | pp.77~84 | number of Cited : 5
    Abstract PDF
    With the development of online shopping and the rapid growth of IT technology, among various forms of online shopping the intense competition also more deepen. So in online shopping and offline shopping can get differentiation characteristics of competitiveness, so our marketing target is the couples and planning to couples’ activity is necessary. In this research, it is planning and implement an web site to design and implement sales strategies for the young people. For this, we analysis based on the existing commercial site’s event planning of couples, design and suggest strategy for increasing sales, construct a web site with couples’ birthday marketing strategy and various commemorative activities and customer visit web sites with activities more prominent as the goal, and with marketing planning and information configuration as the centre. This is expected to be through to increase effect of the part of the object by customer group activities to improve sales.
  • 10.

    An Electronic Keyboard Instrument Using PC MIDI and USB Interface

    임기정 | Jungchul Lee | 2011, 16(11) | pp.85~94 | number of Cited : 2
    Abstract PDF
    The music education improves the creative talent, social skills and academic achievement of the students. For the efficient music education, the learner centered study is highly recommended rather than the passive education, which supports self-control in selecting teaching materials, learning patterns and speed. For the successful self learning, it is requested to develop the collaborative educational learning tools, especially electronic collaborators such as H/W and S/W. Though there exist many commercialized electronic instruments and the PC MIDI based softwares, these tools have some limits and problems for the primary student to learn playing the musical instrument by himself. In this paper, we propose a supporting tool implementation method using an electronic keyboard instrument with USB Interface and PC-based software to help the primary student to learn playing the musical instrument. We implemented an electronic keyboard instrument module compactly and at low cost using a PIC18F4550 MCU. PC based software was developed to edit musical score, process the MIDI information, and interact with the electronic keyboard instrument module. This tool can offer a similar keyboard instrument environment and can be incorporated with self learning contents.
  • 11.

  • 12.

    A Dominant Feature based Nomalization and Relational Description of Shape Signature for Scale/Rotational Robustness

    Song Ho Keun | 구하성 | 2011, 16(11) | pp.103~112 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a Geometrical Centroid Contour Distance(GCCD) which is described by shape signature based on contour sequence. The proposed method uses geomertrical relation features instead of the absolute angle based features after it was normalized and aligned with dominant feature of the shape. Experimental result with MPEG-7 CE-Shape-1 Data Set reveals that our method has low time/spatial complexity and scale/rotation robustness than the other methods, showing that the precision of our method is more accurate than the conventional desctiptors. However, performance of the GCCD is limited with concave and complex shaped objects.
  • 13.

    Mobile Donation Application of User Participation Base

    MyoungBeom Chung | Il Ju Ko | 2011, 16(11) | pp.113~122 | number of Cited : 3
    Abstract PDF
    In this paper, we propose an iPhone application that allows the user to pay for donations using the camera, GPS and call functions of the iPhone. As iOS version 3.0 allows the iPhone camera to detect and read bar codes and QR codes, the proposed application uses such codes to identify a product the user wishes to donation. After determining the user’s location using the iPhone GPS function, the application can then perform a navigation task that guides the user to a suitable shop or store where the user can make his or her donation. In addition, the application offers an ARS call function that allows the user to make a direct donation, even if the user does not know the telephone number for making such donations. Therefore, the proposed application provides an easy means for the user to pay for donations directly or indirectly.
  • 14.

    A Data Migration Model and Case Study for Building Management System of Science and Technology Contents

    신성호 | MIN-HO LEE | 이원구 and 3other persons | 2011, 16(11) | pp.123~136 | number of Cited : 4
    Abstract PDF
    The domestic market of database in Korea is estimated to be over 3.663 trillion won. The data migration is getting to be more important along with the continuous growth of the database industry. g-CRM and private recommending function are examples of the service that can be given through coupling among customer database, product database, geographic information database, and others. The core infrastructure is also the database which is integrated, perfect, and reliable. There are not enough researches on efficient way of data migration and integrating process and investigation of migrated data though trends of database in IT environment as above. In connection with this issue, we have made a model for data migration on scientific and technological contents and suggest the result of data migration process adapting that model. In addition, we verified migration's exhaustiveness, migration's consistency, and migration's coherence for investigation of migrated data and database. From the result, we conclude data migration based on proper model has a significant influence on the database consistency and the data values correctness and is essential to maintain high qualified database.
  • 15.

    The Implementation of Visualization for Ski Jump Using OpenGL

    박명철 | 박석규 | 2011, 16(11) | pp.137~144 | number of Cited : 2
    Abstract PDF
    In this paper, we implement the ski jump visualization tool using the OpenGL graphics library. Among the evaluation elements of jump, the distance of jump is most important. Also, the distance of jump depends on Lift-to-Drag Ratio. In the previous studies, the visualization too according to the consequential changing of variety factors is insufficient. This study provides an easy style flying posture visualization tool to the user who using Lift-to-Drag Ratio. Furthermore, there is to implement an international standard jumping hill by virtue of entered five main data. The results of this study can be applied with reference data for better ski jump.
  • 16.

    Effects of the Problem-based Learning Utilizing Cognitive Algorithms in Elementary Mathematics Education

    Myung-geun Lee | 강수연 | 2011, 16(11) | pp.145~152 | number of Cited : 1
    Abstract PDF
    The study analyzed effects of the problem-based learning utilizing cognitive algorithms in elementary mathematics education in terms of academic achievement and math attitude changes. In order to solve the research questions, a cognitive algorithm-based PBL model was derived based on N. Landa’s algorithm-based instructional design theory. And the model was applied to a part of second semester math curriculum for 4th grade of an elementary school located in Seoul. The results showed that the PBL utilizing algorithms can be said to have effects on academic achievement. The PBL model is also considered to have positive effects in enhancing mathematical attitudes of the learners.
  • 17.

    Efficient Construction of Large Scale Grade of Services Steiner Tree Using Space Locality and Polynomial-Time Approximation Scheme

    김인범 | 2011, 16(11) | pp.153~162 | number of Cited : 2
    Abstract PDF
    As the problem of GOSST building belongs to NP compete domain, heuristics for the problem ask for immense amount execution time and computations in large scale inputs. In this paper, we propose an efficient mechanism for GOSST construction using space locality PTAS. For 40,000 input nodes with maximum weight 100, the proposed space locality PTAS GOSST with 16 unit areas can reduce about 4.00% of connection cost and 89.26% of execution time less than weighted minimum spanning tree method. Though the proposed method increases 0.03% of connection cost more, but cuts down 96.39% of execution time less than approximate GOSST method (SGOSST) without PTAS. Therefore the proposed space locality PTAS GOSST mechanism can work moderately well to many useful applications where a greate number of weighted inputs should be connected in short time with approximate minimum connection cost.
  • 18.

    Improved RFID Mutual Authentication Protocol using One-Time Pad and One-Time Random Number Based on AES Algorithm

    윤태진 | Sejin Oh | 안광선 | 2011, 16(11) | pp.163~172 | number of Cited : 0
    Abstract PDF
    Because RFID systems use radio frequency, they have many security problems such as eavesdropping, location tracking, spoofing attack and replay attack. So, many mutual authentication protocols and cryptography methods for RFID systems have been proposed in order to solve security problems, but previous proposed protocols using AES(Advanced Encryption Standard) have fixed key problem and security problems. In this paper, we analyze security of proposed protocols and propose our protocol using OTP(One-Time Pad) and AES to solve security problems and to reduce hardware overhead and operation. Our protocol encrypts data transferred between RFID reader and tag, and accomplishes mutual authentication by one time random number to generate in RFID reader. In addition, this paper presents that our protocol has higher security and efficiency in computation volume and process than researched protocols and S.Oh’s Protocol. Therefore, our protocol is secure against various attacks and suitable for lightweight RFID tag system.
  • 19.

    Efficient Seamless Handover Protocol in Network Mobility (NEMO) Environment

    김종영 | 2011, 16(11) | pp.173~178 | number of Cited : 1
    Abstract PDF
    In this paper, we propose an efficient seamless handover protocol in NEMO environment. Yokoda et al 4. proposed fast handover method with collaboration of access routers in local network and Teraoka et al. 1 showed fast handover method with collaboration of layers in mobile network. These methods can delay the time of overall binding update and increase packets loss when link of router is unstable because they transport packets through only one path or link of router. And they don't also mention redirection method of packets in their protocol in case of unstable link state of routers. The proposed protocol can execute fast binding update and reduce packets loss with collaboration of routers in mobile network.
  • 20.

    A study of artifact model using quality evaluation case based on SDLC

    Dalsoo Weon | 2011, 16(11) | pp.179~188 | number of Cited : 0
    Abstract PDF
    Though any method in various software development methodology is selected and used in performing IT project, there are quite a few problems in applying it to the project environment, thus customizing effort as a reasonable method is continuously demanded. Therefore, the study attempted to track a basic frame formation process of quality management model applying the software development methodology based on SDLC that is widely used. The study analyzes and modelized an empirical cases of a financial company that is relatively highly rated by expert groups through a variety of trial and error and continued supplementation for it for a long time. And in addition to it, it analyzes cases of public institute project, derives problems, and also proposes a guideline related to creating artifact.
  • 21.

    Design of Personal Information Security Model in U-Healthcare Service Environment

    이봉근 | Jeong Yoon Su | Lee, Sang-ho | 2011, 16(11) | pp.189~200 | number of Cited : 2
    Abstract PDF
    With rapid development and contribution of IT technology IT fushion healthcare service which is a form of future care has been changed a lot. Specially, as IT technology unites with healthcare, because delicate personal medical information is exposed and user's privacy is invaded, we need preperation. In this paper, u-healthcare service model which can manage patient's ID information as user's condition and access level is proposed to protect user's privacy. The proposed model is distinguished by identification, certification of hospital, access control of medical record, and diagnosis of patient to utilize it efficiently in real life. Also, it prevents leak of medical record and invasion of privacy by others by adapting user's ID as divided by user's security level and authority to protect privacy on user's information shared by hospitals.
  • 22.

    A Study on Framework Development of Weather Information Services on New-Media

    김진태 | 윤용인 | KangHo-Lee | 2011, 16(11) | pp.201~208 | number of Cited : 0
    Abstract PDF
    The aim of this paper is to develop a framework of weather information services which is for processing contents and providing proper contents to new-media such as outdoor electronic display, DID (digital information display), and terrestrial multi-channel broadcasting, etc. By introducing the analysis of media use and perception science of human intelligence, the contents producing method to improve recognizing rate for weather information is provide and the layered framework of weather information services for new-media is designed. It integrates many different services to the framework. It can prevent duplicate investment for services and serve a major momentum to technical progress.
  • 23.

    A Study on the Relationship of Job Satisfaction Factors, Job Satisfaction, Organizational Commitment and Turnover Intention of Call Center Agent

    Park, Deuk | 2011, 16(11) | pp.209~218 | number of Cited : 12
    Abstract PDF
    Recently, As it takes charge of the customer service in many enterprises, the importance of call center has been emphasized more and more. The growth of call center industry is leading lots of call center agents. But, Call center agent's frequent turnover deteriorates the labor productivity and quality. Also, This turnover increases training cost and recruit cost. For these reasons, management turnover in call center is emerging as an important issue. The purpose of this study is to analyze the relationship of job satisfaction factors, job satisfaction, organizational commitment and turnover intention of call center agent. To achieve these objective, as a conceptual model of the study, job satisfaction factors, job satisfaction, organizational commitment and turnover intention were reviewed and the model could be estimated through path analysis. According th the finding of this study, job satisfaction factors have positively impact on the job satisfaction, organizational commitment but have not directly impact on the turnover intention. Also job satisfaction and organizational commitment have negatively impact on the turnover intention. As a result, the meaningful implication of this study suggests that the increase of both job satisfaction and organizational commitment through the improvement of job satisfaction factors should be regard as important dimensions to decrease of turnover intention of call center agents.
  • 24.

    Communication Network Analysis of General Corporate IT Staff : A Case Study of Company "K"

    Jeong Cheonsu | 신길환 | Han Woo Chul | 2011, 16(11) | pp.219~232 | number of Cited : 3
    Abstract PDF
    The purpose of this study is to give implications for cooperative network building for general corporate IT staffs as well as operational improvement of the IT organization which is a specialized unit in general company though analysis of characteristics of communication networks of the IT organization. 39 IT employees of company “A” were surveyed and interviewed, and the data collected were analyzed in a network analysis method. The analysis shows that a variety of networks were built across employees – e.g. strong/weak ties or centralized/decentralized structure – by each communication area. IT competency network was found weak ties. Career-rela ted network showed centralized and hierarchical characteristics. At the center of each network was positioned manager of each team. To address improvement of the findings, I presented the followings: more active networking over IT competency, enhancement of work centralization and collection of research data as to communication network of IT organization.
  • 25.

    Transforming Non-distributive Hierarchy Schemas into the Distributive Hierarchy Schema

    오미화 | 최인수 | 2011, 16(11) | pp.233~244 | number of Cited : 2
    Abstract PDF
    Online analytical processing (OLAP) architecture performs only well on the facts that are summarizable along each dimension, where all hierarchy schemas are distributive, and consequently many kinds of non-distributive hierarchy schemas arising in real-world situations are not addressed by current OLAP implementations. In previous work, we presented the classification of hierarchy schemas in aggregation, including one distributive and seven non-distributive hierarchy schemas. This paper presents a transforming approach of seven non-distributive hierarchy schemas into the distributive hierarchy schema. The first thing in the approach is cutting complex non-distributive hierarchy schemas into more simpler ones, and the next is the transformation of those simpler ones into the distributive hierarchy schema. This approach will let complex hierarchy schemas arising in real world situations be addressed by current OLAP implementations. It is thought that this approach will be useful one from an implementation and schema design point of view.
  • 26.

    Predicting Power Generation Patterns Using the Wind Power Data

    서동혁 | 김규익 | KwangDeuk Kim and 1other persons | 2011, 16(11) | pp.245~253 | number of Cited : 1
    Abstract PDF
    Due to the imprudent spending of the fossil fuels, the environment was contaminated seriously and the exhaustion problems of the fossil fuels loomed large. Therefore people become taking a great interest in alternative energy resources which can solve problems of fossil fuels. The wind power energy is one of the most interested energy in the new and renewable energy. However, the plants of wind power energy and the traditional power plants should be balanced between the power generation and the power consumption. Therefore, we need analysis and prediction to generate power efficiently using wind energy. In this paper, we have performed a research to predict power generation patterns using the wind power data. Prediction approaches of datamining area can be used for building a prediction model. The research steps are as follows: 1) we performed preprocessing to handle the missing values and anomalous data. And we extracted the characteristic vector data. 2) The representative patterns were found by the MIA(Mean Index Adequacy) measure and the SOM(Self-Organizing Feature Map) clustering approach using the normalized dataset. We assigned the class labels to each data. 3) We built a new predicting model about the wind power generation with classification approach. In this experiment, we built a forecasting model to predict wind power generation patterns using the decision tree.