Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2012, Vol.17, No.2

  • 1.

    Performance Improvement of Virtualization Sensitive Instruction Emulation by Instruction Decoding at Compile Time

    Shin Dong Ha | 윤경언 | 2012, 17(2) | pp.1~11 | number of Cited : 0
    Abstract PDF
    Recently, we have seen several implementations that virtualize the ARM architecture. Since the current ARM architecture is not possible to be virtualized using the traditional technique called "trap-and-emulation", we usually detect all virtualization sensitive instructions during the run-time of a guest kernel and emulate them virtually rather than executing them directly. The emulation for virtualization is usually implemented either by binary translation or interpretation. Our research is about how to improve the performance of emulation for virtualization based on interpretation. The interpretation usually requires a few steps: instruction fetching, instruction decoding and instruction executing. In this paper, we propose a method that decodes all virtualization sensitive instructions during the compilation time of a guest kernel and reduces the time required for interpretation during the run time of the guest kernel. Our method provides both implementation simplicity and performance improvement of emulation for virtualization based on interpretation.
  • 2.

    A mobile data caching synchronization strategy based on in-demand replacement priority

    Jihua Zhao | 하영 | Soon-Jo Lee and 1other persons | 2012, 17(2) | pp.13~21 | number of Cited : 0
    Abstract PDF
    Mobile data caching is usually used as an effective way to improve the speed of local transaction processing and reduce server load. In mobile database environment, due to its characters - low bandwidth, excessive latency and intermittent network, caching is especially crucial. A lot of mobile data caching strategies have been proposed to handle these problems over the last few years. However, with smart phone widely application these approaches cannot support vast data requirements efficiently. In this paper, to make full use of cache data, lower wireless transmission quantity and raise transaction success rate, we design a new mobile data caching synchronization strategy based on in-demand and replacement priority. We experimentally verify that our techniques significantly reduce quantity of wireless transmission and improve transaction success rate, especially when mobile client request a large amount of data.
  • 3.

    Development of Power Supply System and DC Lamp Module of all-in-one using the Solar Energy

    Insoo Ahn | 2012, 17(2) | pp.24~29 | number of Cited : 1
    Abstract PDF
    To recently, light of the sun and fuel cell etc. which is new and renewable energy is developed with the direct current energy source mostly. And it is necessary that the utilization plan which does supply it properly. In this case, the direct current illumination system can be a typical alternative of it. The system similar to the development system is composed of type which connects to each other the photovoltaic pannel, the charge kit, and the battery bank. I develop all-in-one system which the power supply system and photovoltaic pannel which can charge and use efficiently. Additionally, I exploit the DC lamp module of three wave which can separate the electronic ballasts from the module. Developed the DC Lamp module of all-in-one which can turn on or can turn off, by operation of ON/OFF button. It can be used semipermanently by changing just only electronic ballasts.
  • 4.

    Rotation-Invariant Iris Recognition Method Based on Zernike Moments

    최창수 | Seo Jeong-Man | Jun Byoung Min | 2012, 17(2) | pp.31~40 | number of Cited : 1
    Abstract PDF
    Iris recognition is a biometric technology which can identify a person using the iris pattern. It is important for the iris recognition system to extract the feature which is invariant to changes in iris patterns. Those changes can be occurred by the influence of lights, changes in the size of the pupil, and head tilting. In this paper, we propose a novel method based on Zernike Moment which is robust to rotations of iris patterns. we utilized a selection of Zernike moments for the fast and effective recognition by selecting global optimum moments and local optimum moments for optimal matching of each iris class. The proposed method enables high-speed feature extraction and feature comparison because it requires no additional processing to obtain the rotation invariance, and shows comparable performance to the well-known previous methods.
  • 5.

    A Study of Sensibility Recognition and Color Psychology from The Children's Pictures

    안은미 | SeongYoon Shin | 2012, 17(2) | pp.41~48 | number of Cited : 4
    Abstract PDF
    In modern society, the necessity of Color and Psychology Therapy is increasing for psychologically calm children who are less taken care by their parents in busy daily life, and helping them adapt to the environment. Therefore, we need to understand sensitivity status of children with paintings that they draw. Currently, most of empirical studies on their sensitivities are based on psychological and engineering perspectives. This study was designed to provide a system to extract psychological status of children from their pictures by distinguishing harmony of colors using information of solid colors and arrangement of colors in the image space. For achieving this research purpose, first of all, sensitivity database was constructed based on the image space of colors. Then, using the K-Means algorithm, the image was clustered and a wide amount of color values were divided into groups. After that, children's sensitivities were extracted by matching groups of color values with database, and color psychological status of children was observed using the color distribution chart in their paintings.
  • 6.

    An Enhanced Spatial Fuzzy C-Means Algorithm for Image Segmentation

    Tung X. Truong | 김종면 | 2012, 17(2) | pp.49~57 | number of Cited : 1
    Abstract PDF
    Conventional fuzzy c-means (FCM) algorithms have achieved a good clustering performance. However, they do not fully utilize the spatial information in the image and this results in lower clustering performance for images that have low contrast, vague boundaries, and noises. To overcome this issue, we propose an enhanced spatial fuzzy c-means (ESFCM) algorithm that takes into account the influence of neighboring pixels on the center pixel by assigning weights to the neighbors in a 3x3 square window. To evaluate between the proposed ESFCM and various FCM based segmentation algorithms, we utilized clustering validity functions such as partition coefficient (), partition entropy (), and Xie-Bdni function (). Experimental results show that the proposed ESFCM outperforms other FCM based algorithms in terms of clustering validity functions.
  • 7.

    Quality improvement scheme of magnified image by using gradient information between adjacent pixel values

    Soo-Mok Jung | 2012, 17(2) | pp.59~67 | number of Cited : 2
    Abstract PDF
    In this paper, an efficient interpolation scheme using gradient information between adjacent pixel values was proposed to estimate the value of interpolated pixel to have the locality which exists in real image and the characteristic of simple convex surface and simple concave surface which exist partially in the real image. PSNR(Peak Signal to Noise Ratio) was used to evaluate the performance of the proposed scheme. The PSNR values of the magnified images using the proposed scheme are greater than those of the magnified images using the previous interpolation schemes.
  • 8.

    Relationships among Learner’s Satisfaction, Self-Directedness and Flow Experience in Computer e-Learning

    Phil-Sik Jang | 2012, 17(2) | pp.69~77 | number of Cited : 14
    Abstract PDF
    The purpose of the study is to identify the relationship among the variables related learner’s satisfaction, flow experience and self-directedness and verify the path model of causal relationship among those variables in web based computer e-learning. Based on the theoretical rationale, we hypothesized the path model including learner’s satisfaction as outcome variable, flow experience and self-directedness as causal and mediating variables. A total of 193 students were participated in this study and the main results showed as follows: 1. Learner’s self-directedness showed significant (p<.01), indirect effect on learner’s satisfaction mediated by flow experience and the flow experience showed significant (p<.01), direct effect on learner’s satisfaction; 2. Among 7 constructs of self-directedness, ‘creative approach’, ‘love of learning’, ‘self-confidence as a learner' showed significant (p<.01), indirect effects on learner’s satisfaction mediated by ‘clear goals’ construct among flow experience.
  • 9.

    The Effects of STEAM-Based Integrated Subject Study on Elementary School Students’ Creative Personality

    권순범 | 남동수 | Lee Taewuk | 2012, 17(2) | pp.79~86 | number of Cited : 39
    Abstract PDF
    The purpose of this study is to improve creative personality of elementary school students with integrated subject study program based STEAM education. On this study, I analyzed integrated subject study and STEAM, developed contents using educational robot applied integrated subject study program model. And analyzed result after applied to elementary school students. After dividing two groups-experimental group, comparison group-for this study, tested t-test. Finally I got a meaningful result statistically. There was an postive effect to improving elementary school students’ creative personality by appling STEAM-based integrated subject study program.
  • 10.

    A study on electronic braking expansion simulation of synchronous motor applied by Matlab & PSPICE

    나승권 | 구기준 | 2012, 17(2) | pp.87~94 | number of Cited : 0
    Abstract PDF
    Mechanical break system used in train, that mixed air break & electronic break system. this system suggest lots of ways for modify efficiency and solution of environmental problems due to recently intend to green growth. The mechanical break system has environmental & economical problem. Environmental sides(problem) are dust and noise etc and economical sides(problem) are replaced the spare parts that are breaking shoe and lining ect. For compensate those kind of weak points, we needs a wide territories of electronic break which is from high speed range to stop. This research is estimated the load torque due to an incline and stop the train method also check the characteristic of stop the train to estimate a torque follow the sharp drop.
  • 11.

    A Mobile P2P Streaming Architecture for Efficient Handover

    김상진 | 김은삼 | HoYoung Hwang | 2012, 17(2) | pp.95~103 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an efficient mobile P2P streaming architecture to minimize playback jitters in P2P overlay networks based on wired/wireless networks even though mobile peers experience the handover. In this architecture, mobile peers receive data in a push manner to maximize the data receiving speed before and after the handover. In addition, they can maintain the buffering above a specific level through handover prediction and re-selection of neighbor peers. By simulation experiments, we show that our proposed architecture can improve the performance significantly when the handover occurs compared to the existing mesh structure.
  • 12.

    A Managed Hybrid Web implementation for a .NET Smart Web development.

    장승영 | 오정진 | Jung Byeong Soo | 2012, 17(2) | pp.105~112 | number of Cited : 1
    Abstract PDF
    The purpose of this paper is to suggest a method that .NET smart web development is enhanced through Managed Hybrid Web to improve the problems of UI development and representation in Hybrid Web. Improvement of structured system design of Managed Hybrid Web can enhance the efficiency and extendability of the interface objects. In particular, Source convenience is further enhanced regarding to coexistence of the objects if a client and server technique is applied to the class generation ways. It comes to the conclusion that the application of the user interface has the free representation ways, and the extension of representation ways can be achieved by each part independence.
  • 13.

    The Implementation of DDC for the WLAN Receiver

    Jeong,Kil Hyun | 2012, 17(2) | pp.113~118 | number of Cited : 2
    Abstract PDF
    In this paper, we discuss the design of the Digital Down Converters for the IEEE 802.11 wireless LAN receiver, which can be used for the customized receiver. The customized receiver can be used for special puropsed services which cannot be realized using the general custom chip. In the OFDM receiver, DDC receives the up sampled Inphase/Quadrature signal from the AD converter and process down sampling and filtering procedures using the Cascaded Intergrator Filter and FIR filters. We discuss the structure and design methodology of DDC's and analyze the simulation results.
  • 14.

    A Sextant Cluster Based Monitoring on Secure Data Aggregation and Filtering False Data in Wireless Sensor Networks

    Anuparp Boonsongsrikul | 박승규 | Shin, Seung-Hun | 2012, 17(2) | pp.119~126 | number of Cited : 0
    Abstract PDF
    Local monitoring is an effective technique in securing data of wireless sensor networks. Existing solutions require high communication cost for detecting false data and this results in a network lifetime being shortened. This paper proposes novel techniques of monitoring based secure data aggregation and filtering false data in wireless sensor networks. The aim is to reduce energy consumption in securing data aggregation. An aggregator and its monitoring node perform data aggregation in a 60o sextant cluster. By checking Message Authentication Codes (MAC), aggregation data will be dropped by a forward aggregator if data aggregated by the aggregator and data monitored by the monitoring node are inconsistent. The simulation shows that the proposed protocol can reduce the amount of average energy consumption about 64% when comparing with the Data Aggregation and Authentication protocol (DAA)[1]. Additionally, the network lifetime of the proposed protocol is 283% longer than that of DAA without any decline in data integrity.
  • 15.

    Vulnerability Analysis and Threat Mitigation for Secure Web Application Development

    Jaechan Moon | SEONG JE CHO | 2012, 17(2) | pp.127~137 | number of Cited : 10
    Abstract PDF
    Recently, as modern Internet uses mashups, Web 3.0, JavaScript/AJAX widely, the rate at which new vulnerabilities are being discovered is increasing rapidly. It can subsequently introduce big security threats. In order to efficiently mitigate these web application vulnerabilities and security threats, it is needed to rank vulnerabilities based on severity and consider the severe vulnerabilities during a specific phase of software development lifecycle (SDLC) for web applications. In this paper, we have first verified whether the risk rating methodology of OWASP Top 10 vulnerabilities is a reasonable one or not by analyzing the vulnerability data of web applications in the US National Vulnerability Database (NVD). Then, by inspecting the vulnerability information of web applications based on OWASP Top-10 2010 list and CWE (Common Weakness Enumeration) directory, we have mapped the web-related entries of CWE onto the entries of OWASP Top-10 2010 and prioritized them. We have also presented which phase of SDLC is associated with each vulnerability entry. Using this approach, we can prevent or mitigate web application vulnerabilities and security threats efficiently.
  • 16.

    Probabilistic filtering for a biological knowledge discovery system with text mining and automatic

    이희진 | Jong-Cheol Park | 2012, 17(2) | pp.139~147 | number of Cited : 2
    Abstract PDF
    In this paper, we discuss the structure of biological knowledge discovery system based on text mining and automatic inference. Given a set of biology documents, the system produces a new hypothesis in an integrated manner. The text mining module of the system first extracts the ‘event’ information of predefined types from the documents. The inference module then produces a new hypothesis based on the extracted results. Such an integrated system can use information more up-to-date and diverse than other automatic knowledge discovery systems use. However, for the success of such an integrated system, the precision of the text mining module becomes crucial, as any hypothesis based on a single piece of false positive information would highly likely be erroneous. In this paper, we propose a probabilistic filtering method that filters out false positives from the extraction results. Our proposed method shows higher performance over an occurrence-based baseline method.
  • 17.

    A Study on the Efficiency of Join Operation On Stream Data Using Sliding Windows

    양영휴 | 2012, 17(2) | pp.149~157 | number of Cited : 0
    Abstract PDF
    In this thesis, the problem of computing approximate answers to continuous sliding-window joins over data streams when the available memory may be insufficient to keep the entire join state. One approximation scenario is to provide a maximum subset of the result, with the objective of losing as few result tuples as possible. An alternative scenario is to provide a random sample of the join result, e.g., if the output of the join is being aggregated. It is shown formally that neither approximation can be addressed effectively for a sliding-window join of arbitrary input streams. Previous work has addressed only the maximum-subset problem, and has implicitly used a frequency based model of stream arrival. There exists a sampling problem for this model. More importantly, it is shown that a broad class of applications for which an age-based model of stream arrival is more appropriate, and both approximation scenarios under this new model are addressed. Finally, for the case of multiple joins being executed with an overall memory constraint, an algorithm for memory allocation across the join that optimizes a combined measure of approximation in all scenarios considered is provided.
  • 18.

    Security Analysis and Improvements of a Biometrics-based User Authentication Scheme Using Smart Cards

    Younghwa An | 2012, 17(2) | pp.159~166 | number of Cited : 3
    Abstract PDF
    Many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2010, Chang et al. proposed an improved biometrics-based user authentication scheme without concurrency system which can withstand forgery attack, off-line password guessing attack, replay attack, etc. In this paper, we analyze the security weaknesses of Chang et al.’s scheme and we have shown that Chang et al.’s scheme is still insecure against man-in-the-middle attack, off-line biometrics guessing attack, and does not provide mutual authentication between the user and the server. And we proposed the improved scheme to overcome these security weaknesses, even if the secret information stored in the smart card is revealed. As a result, the proposed scheme is secure for the user authentication attack, the server masquerading attack, the man-in-the-middle attack, and the off-line biometrics guessing attack, does provide the mutual authentication between the user and the remote server. And, in terms of computational complexities, the proposed scheme is more effective than Chang et al.’s scheme.
  • 19.

    Design and Implementation of a Hybrid Equipment Data Acquisition System(HEDAS) for Equipment Engineering System(EES) Framework

    Gyoung-Bae Kim | 2012, 17(2) | pp.167~176 | number of Cited : 0
    Abstract PDF
    In this paper we design and implement a new Hybrid Equipment Data Acquisition System (HEDAS) for data collection of semiconductor and optoelectronic manufacturing equipments in the equipment engineering system(EES) framework. The amount of the data collected from equipments have increased rapidly in equipment engineering system. The proposed HEDAS efficiently handles a large amount of real-time equipment data generated from EES framework. It also can support the real-time ESS applications as well as non real-time ESS applications. For the real-time EES applications, it performs high-speed real-time processing that uses continuous query and filtering techniques based on memory buffers. The HEDAS can optionally store non real-time equipment data using a HEDAS-based database or a traditional DBMS-based database. In particular, The proposed HEDAS offers the compression indexing based on the timestamp of data and query processing technique saving the cost of disks storage against extremely increasing equipment data. The HEDAS is efficient system to collect huge real-time and non real-time equipment data and transmit the collected equipment data to several EES applications in EES framework.
  • 20.

    Real-time Optimized Composition and Broadcasting of Multimedia Information

    SangYeob Lee | Park, Seongwon | 2012, 17(2) | pp.178~185 | number of Cited : 0
    Abstract PDF
    In this paper, we developed the composition system that it can efficiently edit camera recording data, images, office document such as powerpoint data, MS word data etc in real-time and broadcasting system that the file is made by the composition system. In this Study, we developed two kinds of algorithm; Approximate Composition for Optimization (ACFO) and Sequence Composition using Memory Que (SCUMQ). Especially, the system is inexpensive and useful because the system is based on mobile devices and PCs when lectures hope to make video institutional contents. Therefore, it can be contributed for e-learning and m-learning. In addition, the system can be applied to various fields, different kinds of multimedia creation, remote conferencing, and e-commerce.
  • 21.

    A Study of Advertising Model based on Hybrid User Context in Smart Space

    Yongik Yoon | 이수지 | 2012, 17(2) | pp.187~195 | number of Cited : 3
    Abstract PDF
    Smart phone allows advertisers to estimate customers behavior by selecting user context awareness information and gives users instant feed back about their behavior. Electronic equipments such as smart phone enable advertisers to advertise interesting product for each customers at the point of purchase. In this paper, we deal with the trends of Smart phone and internet based TV in the spotlight as the upcoming advertising media and propose the effective way of advertising, Smart Advertising model, which can give users advertising contents of their interesting product by collecting user context information from a variety of devices including N-screen in smart space. This model will induce modern people who live in flood of advertisements to buy products by providing interesting advertising contents.
  • 22.

    Personalized Recommendation System using FP-tree Mining based on RFM

    조영성 | 류근호 | 2012, 17(2) | pp.197~206 | number of Cited : 3
    Abstract PDF
    A exisiting recommedation system using association rules has the problem, such as delay of processing speed from a cause of frequent scanning a large data, scalability and accuracy as well. In this paper, using a Implicit method which is not used user's profile for rating, we propose the personalized recommendation system which is a new method using the FP-tree mining based on RFM. It is necessary for us to keep the analysis of RFM method and FP-tree mining to be able to reflect attributes of customers and items based on the whole customers' data and purchased data in order to find the items with high purchasability. The proposed makes frequent items and creates association rule by using the FP-tree mining based on RFM without occurrence of candidate set. We can recommend the items with efficiency, are used to generate the recommendable item according to the basic threshold for association rules with support, confidence and lift. To estimate the performance, the proposed system is compared with existing system. As a result, it can be improved and evaluated according to the criteria of logicality through the experiment with dataset, collected in a cosmetic internet shopping mall.
  • 23.

    Energy Effective Tag Anti-collision Protocol for Mobile RFID System

    Cho Yang-Hyun | 국중각 | 2012, 17(2) | pp.207~214 | number of Cited : 2
    Abstract PDF
    This paper is to improve an identification ratio of tags by analyzing Slotted ALOHA, Dynamic Slotted ALOHA, Binary-tree and Query-tree and shortening the tag identification time in mobile RFID. Also, it enables the stable information transmission of tags by saving backscattering power of tags through shortening of identification time. As a result, this increases the available time of the battery and accessibility to a RFID service. For this, we proposed the energy-efficient tag anti-collision protocol for mobile RFID. The proposed scheme shows advanced result in identification time and collision counts. This scheme may be the first attempt for the mobile anti-collision.
  • 24.

    An Exploratory Study for Analyzing the Needs of the Customers Who Use Academic Information Service

    Jongwook Yoon | 2012, 17(2) | pp.215~224 | number of Cited : 1
    Abstract PDF
    This study performs an exploratory investigation of the needs of the customers who use academic information service from a research institute, K, that provides information services for domestic academic institutions of natural science and technology. K institute is planning customized services in order to improve customer satisfaction on the academic information service. And therefore, the institute begins the research on customer needs analysis and customer segmentation. The research is regarded as well-timed, because CRM implementation in public organizations has been activated recently. Data mining and data warehousing techniques were used for pilot analyses. For the purpose of customer segmentation, a mixed segmentation model, which adds product life cycle concept to the 'balanced customer segmentation' model, which in turn considers the value of customers from the organizational viewpoint and the value of organizations from the customer's viewpoint, simultaneously, was applied. The result of investigation indicated that, in the case of K, 'balanced customer segmentation' and 'contents reach approach' which uses data warehouse/OLAP, rather than those customer segmentation techniques that are often used within the industry, are the more potent ways of approach. This exploratory case study is expected to provide a useful guideline for 'deriving an organizationally unique CRM model' that recently is one of the hot topics in the CRM area.
  • 25.

    Exploratory research on the moderating effect of Smart Work environment between cognition and performance of work for SM employe

    Docsung Jang | 2012, 17(2) | pp.225~230 | number of Cited : 13
    Abstract PDF
    With a wide spread of smart phone, Smart society has been progressed through nationwide that changed way of personal daily life rapidly. As smart work has been introduced and utilized at the office, it is possible that the person in charge can handle remote transaction without restriction of time and place. Smartlization throughout the society has been progressed, member of work and system related can be linked mutually and took personalized services. This study identifies explorative moderating effect of smart environment at performance of work with employee cognition. As a result, found that smart work environment with complexity of work has increased moderating effect over collaborative work.
  • 26.

    Development of Performance Evaluation System for Plant Management Appling BSC Concept

    김광만 | 2012, 17(2) | pp.231~239 | number of Cited : 1
    Abstract PDF
    A company's reliance on plants is growing in the area of production and service. Therefore, the importance of the work on plants in order to manage them efficiently is growing. Effective plant management increases the durability and efficiency of the plant. An organized BSC also increases the workers' will to work harder which is to bring the higher quality of plant management. In this way, however, it has studied with variety ways to assess plant management task for performance evaluation, there is a little deficiency that the study of methodical performance evaluation that based on the some strategies. The BSC, the very way, and it has been utilized in balanced and methodical performance evaluation means in widespread fields with strategy as the center to get visions. In this study, I have developed the performance evaluation system for plant management, appling BSC concept.