Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2012, Vol.17, No.3

  • 1.

    A Study on the Construction of Parallel Multiplier over GF(2m)

    Han, Sung-il | 2012, 17(3) | pp.1~10 | number of Cited : 0
    Abstract PDF
    A low-complexity Multiplication over GF(2m) and multiplier circuit has been proposed by using cyclic-shift coefficients and the irreducible trinomial. The proposed circuit has the parallel input/output architecture and shows the lower-complexity than others with the characteristics of the cyclic-shift coefficients and the irreducible trinomial modular computation. The proposed multiplier is composed of 2-input AND gates and 2-input XOR gates without the memories and switches. And the minimum propagation delay is . The Proposed circuit architecture is well suited to VLSI implementation because it is simple, regular and modular.
  • 2.

    Inference of Context-Free Grammars using Binary Third-order Recurrent Neural Networks with Genetic Algorithm

    Jung,Soon-Ho | 2012, 17(3) | pp.11~25 | number of Cited : 1
    Abstract PDF
    We present the method to infer Context-Free Grammars by applying genetic algorithm to the Binary Third-order Recurrent Neural Networks(BTRNN). BTRNN is a multiple-layered architecture of recurrent neural networks, each of which is corresponding to an input symbol, and is combined with external stack. All parameters of BTRNN are represented as binary numbers and each state transition is performed with any stack operation simultaneously. We apply Genetic Algorithm to BTRNN chromosomes and obtain the optimal BTRNN inferring context-free grammar of positive and negative input patterns. This proposed method infers BTRNN, which includes the number of its states equal to or less than those of existing methods of Discrete Recurrent Neural Networks, with less examples and less learning trials. Also BTRNN is superior to the recent method of chromosomes representing grammars at recognition time complexity because of performing deterministic state transitions and stack operations at parsing process. If the number of non-terminals is p, the number of terminals q, the length of an input string k, and the max number of BTRNN states m, the parallel processing time is O(k) and the sequential processing time is O(km).
  • 3.

    Development of Balance Measurement and Training System

    Han young hwan | 2012, 17(3) | pp.27~32 | number of Cited : 0
    Abstract PDF
    Balance measurement is widely used in fields of physiotherapy, neurology, sport medicine and rehabilitation medicine. This paper presents the development of balance measurement and rehabilitation training system. To this end, we have developed a prototype system using an 3-axis accelerometer sensor attached to the under surface of balance board. As a results, the system is stable and shows a good degree of balance function. Also, the various patterns for rehabilitation training can be added easily. This system can be used for daily balance monitoring and will contribute to increasing the effectiveness of training.
  • 4.

    Gateway design and performance evaluation based on health information standards in multi-platform environment

    심우호 | 나현석 | Seokcheon Park | 2012, 17(3) | pp.33~40 | number of Cited : 3
    Abstract PDF
    Recently, to enhance the quality and efficiency of health care services, smart health care services utilizing a smart phone and tablet pc are mainly being introduced into the large hospital and the interest for personal health record service which manages personal medical information utilizing PC and smart phone and technology development is actively underway. In order to build a next generation hospital information systems, the interoperability of data between the different hospital information systems and UX consistency between the various user devices must be assured. Therefore, in this paper, medical information standard and the study for improving the performance is conducted to design the gateway system which converting and integrating the medical information under multi-platform environment. In this paper, CCR standard is adapted to the mapping method between the data which is the key feature of the gateway system and design the system utilizing multi-table-based mapping method. To evaluate the performance of the system, experiment was done and the result has been improved approximately 20 percent for response rate.
  • 5.

    Design and Implementation of USN Middleware using DTD Generation Technique

    Nam Si Byung | Ki-Hyeon Kwon | 유명한 | 2012, 17(3) | pp.41~50 | number of Cited : 1
    Abstract PDF
    In the monitoring system based on web service application, it is faced with the problems like code reproduction, difficult scalability and error recovery derived from the frequent change of data structure. So we propose a technique of monitoring system by DTD(Document Type Definition) automatic generation. This technique is to use dynamic server-side script to cope with the change of sensor data structure, generate the DTD dynamically. And it also adapt the AJAX(Asynchronous JavaScript and XML) for XML data parsing, it can support mass data transmission and exception processing for data loss and damage. This technique shows the result of recovery time is decreased about 44.8ms in case of temporary data failure by comparing to the conventional XML method.
  • 6.

    Hepatic Vessel Segmentation using Edge Detection

    서정주 | Jong Won Park | 2012, 17(3) | pp.51~57 | number of Cited : 2
    Abstract PDF
    Hepatic vessel tree is the key structure for hepatic disease diagnosis and liver surgery planning. Especially, it is used to evaluate the donors' and recipients' liver for the LDLT(Living Donors Liver Transplantation) and estimate the volumes of left and right hepatic lobes for securing their life in the LDLT. In this study, we propose a method to apply canny edge detection that is not affected by noise to the liver images for automatic segmentation of hepatic vessels tree in contrast abdominal MDCT image. Using histograms and average pixel values of the various liver CT images, optimized parameters of the Canny algorithm are determined. It is more time-efficient to use the common parameters than to change parameters manually according to CT images. Candidates of hepatic vessels are extracted by threshold filtering around the detected the vessel edge. Finally, using a system which detects the true-negatives and the false-positives in horizontal and vertical direction, the true-negatives are added in candidate of hepatic vessels and the false-positives are removed. As a result of the process, the various hepatic vessel trees of patients are accurately reconstructed in 3D.
  • 7.

    Business Model for the Condolence Service using the Images

    황수철 | 2012, 17(3) | pp.59~66 | number of Cited : 1
    Abstract PDF
    In daily life if a condoler receive a notice of a person’s death who he/she know, he/she generally have the deepest regret and offer condolence money. Also an enterpriser or private chairman send a floral tribute. But it has some problem to occur a abuse according in reuse and an environmental pollution in process of trash. In this paper it is suggested an business model for the condolence service using images, floral tributes and letters of condolence made of images, in the funeral place which is an alternation to reduce the problem. And it is structured and implemented a service model that displays floral tributes made of dynamic images to a large monitor installed on wall in condoler room of funeral place. As a result it is showed that a service of floral tributes made of images may be realized to be given web site of servicing images for the condolence.
  • 8.

    Traffic Classification based on Adjustable Convex-hullSupport Vector Machines

    Zhibin Yu | 최용도 | 길기범 and 1other persons | 2012, 17(3) | pp.67~76 | number of Cited : 0
    Abstract PDF
    Traffic classification plays an important role in traffic management. To traditional methods, P2P and encryption traffic may become a problem. Support Vector Machine (SVM) is a useful classification tool which is able to overcome the traditional bottleneck. The main disadvantage of SVM algorithms is that it’s time-consuming to train large data set because of the quadratic programming (QP) problem. However, the useful support vectors are only a small part of the whole data. If we can discard the useless vectors before training, we are able to save time and keep accuracy. In this article, we discussed the feasibility to remove the useless vectors through a sequential method to accelerate training speed when dealing with large scale data.
  • 9.

    Classification of Malicious Web Pages by Using SVM

    황영섭 | Jaechan Moon | 조성제 | 2012, 17(3) | pp.77~83 | number of Cited : 3
    Abstract PDF
    As web pages provide various services, the distribution of malware via the web pages is being also increased. Malware can make personal information leak, system mal-function and system be zombie. To protect this damages, we should block the malicious web pages. Because the malicious codes embedded in web pages are obfuscated or transformed, it is difficult to detect them using signature-based approaches which are used by current anti-virus software. To overcome this problem, we extracted features to classify malicious web pages and benign ones by analyzing web pages. And we propose a classification method using SVM which is widely used in machine learning. Experimental results show that the proposed method is better than other methods. The proposed method could classify malicious web pages correctly and be helpful to block the distribution of malicious codes
  • 10.

    Design of An Effective Resource Allocation System in the Satellite Network using MF-TDMA DAMA Method

    Heo Jun | 최용훈 | 2012, 17(3) | pp.85~93 | number of Cited : 2
    Abstract PDF
    In this paper, I designed the satellite system, using the MF-TDMA (Multi Frequency-Time Division Multiple Access) DAMA (Demand-Assigned Multiple Access) method, that allocates the satellite resources more effectively to prevent a large quantity data discard when Earth Terminals (ETs) request their satellite network resource to Network Controller (NC) by using their history information, such as traffic pattern or traffic class which have been receiving, and the network controller allocates the satellite network resource and send to earth terminals by using his history information that earth terminals have been requested already. The U.S. Military Warfighter Information Network-Tactical (WIN-T) community has selected the L-3 Linkabit MF-TDMA DAMA Network Centric Waveform (NCW) as the networking standard for full-mesh IP over SHF satellite communications.[1] In the MF-TDMA DAMA satellite network, network controller allocates the satellite network resources and enables maximum 255 earth terminals to communicate each other for periodic satellite network resource requests of earth terminals.
  • 11.

    A Study of the Prediction of Incidence of Crime using Markov process

    정영석 | 정진영 | 2012, 17(3) | pp.95~103 | number of Cited : 3
    Abstract PDF
    Modern society is experiencing a variety of crimes, and to prevent crime is being studied. Existing studies related to the crime of crimes that occur on spatial analysis and geographic information, or to analyze the type of criminal offense of studies have been conducted, However the existing studies of the geographical and psychological crime that occurs throughout the study area and by analyzing the motives for the crime prevention research is the most. In this paper, we introduce Markov processor model for predicting the crime is present. Of several crimes, murder, government official crimes, the incidence of violent crime has occurred over time by using the predicted incidence of crime. Presented in this paper, predictive modeling is used in a crime occurred in the average duration of the overall average number of crimes that occurred in the one-year average, which recently labeled as the average prediction was compared to if you can increase the likelihood, recent average to apply to increase the probability of the prediction that crime have been investigated.
  • 12.

    The Heart Rate Monitoring System using Inverted Photoplethysmography

    Lee Jun Yeon | 2012, 17(3) | pp.105~111 | number of Cited : 1
    Abstract PDF
    Photoplethysmogram is widely used to measure heart rate and arterial blood oxygen saturation in human. This paper describes implementation a photoplethysmography monitoring system that uses 780nm and 940nm length infrared light in radial artery. That system used combinations of 8 LEDs and 2 photoelectricities. When recorded on the skin over radial artery, the radial pulse wave was inverted. The mechanism of inverted pulse wave skin, which was reduced during systolic period and increase during diastolic period of the cardiac cycle. Through this system, we discovered optimal environments and combinations of sensors in both penetration type and reflection type.These results suggest that radial arterial wall way reflect infrared ray.
  • 13.

    A Design of Encryption Method for Strong Security about Tapping/Interception of VoIP Media Information between Different Private Networks

    오형준 | Yoo-Heon Won | 2012, 17(3) | pp.113~120 | number of Cited : 2
    Abstract PDF
    VoIP provides voice data service using existing IP networks and has received much attention recently. VoIP service has a variety of security vulnerabilities. Types of main attacks on VoIP service are tapping/interception, DoS attacks, spam, misuse of service attacks and the like. Of these, confidential information leak because of tapping/interception has been considered as a critical problem. Encryption techniques, such as SRTP and ZRTP, are mostly used to prevent tap and intercept on VoIP media information. In general, VoIP service has two service scenarios. First, VoIP service operates within a single private network. Second, VoIP service operates between different private networks. Both SRTP and ZRTP for VoIP media information within a single private network can perform encryption. But they can not perform encryption between different private networks. In order to solve this problem, in this paper, we modify SRTP protocol. And then, we propose an encryption method that can perform encryption of VoIP media information between the different private networks.
  • 14.

    A Study on Data Analysis Approach based on Granular Concept Hierarchies

    강유경 | Suk-Hyung Hwang | 김응희 and 1other persons | 2012, 17(3) | pp.121~133 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a novel data analysis approach that extracts granules suitable for various perspectives by introducing scaling level into formal concept analysis in order to control the level of granularity. Based on our approach, we can extract various granules from the given data set and constructs granular concept hierarchies based on the relations between the granules. Therefore, we can classify the given data with respect to the purpose or the intention of user's viewpoints. And, we developed G-Tool that supports our approach. In order to verify the usefulness of our proposed approach and G-Tool, we have done some experiments for real data set and reported about results of our experiments. From the experiments' results, we can verify our approach with G-Tool can be useful and suitable for classifying the given data with various scaling levels. The traditional formal concept analysis cannot control the level of granularity and can only classify for a particular perspective. However, our proposed approach can classify the given data with respect to user's purpose or intention by combining of diverse scale information and scaling levels.
  • 15.

    Research of Verifying the Remote Test Answer Sheets Authentication

    Kihong Park | Haesuk Jang | 2012, 17(3) | pp.135~141 | number of Cited : 0
    Abstract PDF
    Development of the Internet has brought many changes in methods of education and assesment. When enforcing the on-line distance education, the tests to check the outcomes of the learning are taken on the Internet. The current trends of education evaluation are focused on the types of questions and the detachments of exam proctor but verifying the authentication of answer sheet. There are several forms to make answers; selection type, short-answer type, write-out answer type, practical exercise type, etc. All the forms can be done on the Internet except the practical exercise type because the source of the examinee’s answer sheet is unreliable. In this paper, we made the verification system to solve the doubt by setting the proved information on the answer sheet. Putting the information down to confirm the authenticity during the exam on the server is distinct character of this system. After the test finished, the system will operate when examinee turn in the answer sheet.
  • 16.

    A Study on the Meanings and Types of Married Immigrant Women’s Community Participation

    Lee Hyoung Ha | 2012, 17(3) | pp.143~155 | number of Cited : 6
    Abstract PDF
    This study explored the essential meanings of experiences that married immigrant women living in rural communities have in their community participation process and analyzed the situations and types of their community participation in order to support immigration women’s community participation and develop strategies for social welfare by type of community participation. For these purpose, we analyzed story outlines, meanings, types and situations of community participation among married immigrant women who had been over 5 years since their immigration. According to the results of this study, the meaning of married immigrant women’s community participation was “Recognize myself as the pioneer of my life and participate in social activities continuously.” In the results of analyzing the types of participation, the subjects were classified into ‘self‐directed growth type,’ ‘self‐content type,’ and ‘social support expectation type.’ The results of this study are expected to be helpful to understand the life of married immigrant women in rural areas not as ‘individuals’ otherized in a foreign country but as ‘participants’ of community that are encountered naturally in daily life, and to develop community‐level services suitable for such women.
  • 17.

    A Study on Internet Addiction of Teenagers and College Students, and Development of Therapeutic Techniques

    Lee Hun Jae | 2012, 17(3) | pp.157~165 | number of Cited : 3
    Abstract PDF
    The purpose of this study is to treat the students addicted to the internet by implementing a program using computers. In order to accomplish the purpose, the program was created by combining the game making activities using scratch programming, self-examination activities, and future occupation search activities. This treatment program will have major positive effects on the students who are addicted to the internet. First, it will be effective for reducing the time for using the internet and it will also improve the addictiveness such as being immersed in playing games. Second, there will be a change in attitude toward the internet and an improvement in intellectual capacity of the students. They will realize the fun of making and sharing the programs with friends, and their thinking skills will be improved by getting training for algorithmic and creative thinking. Third, this treatment program will have positive effects on the students' affective domain. They will have deeper and wider perspective on occupation by searching their future occupation, and discover the meta-ego through self-examination., which in turn, help them gain confidence and feel a sense of accomplishment.
  • 18.

    A Information Data-based Analysis of Robbery Crimes in America

    park | 노상욱 | 2012, 17(3) | pp.167~174 | number of Cited : 0
    Abstract PDF
    This study focused on the people harmed by violent offenders, especially by rubberies. Trends capture changes in victimization rates overtime, while patterns indicate connections between the attributes of victims and the frequency with which they are targeted. Data from the UCR and the NCVS indicate that many types of victimization are taking place less frequently since their peak years in the late 1980s and early 1990s. Cumulative risks indicate the odds of being victimized over the course of a lifetime. Differential risks underscore which categories of people are victimized more often than others.
  • 19.

    Contextual Factors and Rating Behavior in the Peer Evaluation System

    박종혁 | 2012, 17(3) | pp.175~183 | number of Cited : 2
    Abstract PDF
    The study investigates peer rating, one of the most commonly used sources of performance rating other than those of supervisors. On the whole, both field and laboratory studies indicate that peer assessment is a valid and reliable evaluation procedure, but on average, peer rating is not usually accurate. The aim of the investigation is to explore the relationship of beliefs and attitude about the performance appraisal system as well as a dispositional characteristic as self-monitoring with rating behavior. In particular, the study tests whether the relationship between rating context variables-appraisal self efficacy and appraisal validity- and rating behavior depends in part on the personality of the rater. Data from 445 undergraduate students are analyzed for hypotheses testing. The study finds evidences that the high on appraisal self efficacy and appraisal validity are more likely to affect discriminating rating tendency and to reduce rating level. Results also show that self-monitoring make the moderating effects between contextual factors and rating behaviors. Some implications, future research directions, and limitations are discussed
  • 20.

    The Improvement on the current law about Mutual aid service and information useq

    김규종 | 2012, 17(3) | pp.185~191 | number of Cited : 6
    Abstract PDF
    The essence of Mutual aid service is looking into the general commerce about its goods and services that is a general viewpoint. Through the contract that the contractor related with the Mutual aid associations and Mutual aid companies. provide the goods and services to future member's demanding point. and members are pay out money, and pay for that on the installment plan. This Mutual aid business had been increased rapidly after 2005, it is expanded huge business, even its scale alone, the cost is estimated at over three trillion won. But because of Mutual aid business's prepayment installment plan, stipulated substance of the Law on hire-purchase systems were more actualized than in the past, but it leave much to be desired. for example, the obligation of explanation to Mutual aid associations and members of Mutual aid company, the consumer protection about the contract of advance received deposit, upward problem of capital, when establish the Mutual aid company etc. in this paper will review these problems and improvement about legal details that for the customers of Mutual aid service and development of Mutual aid industry, and claimed about Mutual aid law's singular legislation.
  • 21.

    Empirical Study on Management Strategy about Improving Corporate Image

    Gu, Kyoung Young | 김청수 | 2012, 17(3) | pp.193~201 | number of Cited : 8
    Abstract PDF
    For the competition of current corporations, the necessity of image-making strategy differentiating themselves from others are more highlighted than simple technology development or previous sales technique. Thus the corporations need more advanced management measures of corporate image to secure new capabilities. This study figured out previous studies on corporate image, deduced factors to be considered for improving continuous corporate image, analyzed structural relationships among them, and suggested political implications through systematic management strategy about improving corporate image that current corporations need.