Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

Home > Explore Content > All Issues > Article List

2012, Vol.17, No.8

  • 1.

    Multimedia Extension Instructions and Optimal Many-core Processor Architecture Exploration for Portable Ultrasonic Image Processing

    강성모 , Jong Myon Kim | 2012, 17(8) | pp.1~10 | number of Cited : 6
    Abstract PDF
    This paper proposes design space exploration methodology of many-core processors including multimedia specific instructions to support high-performance and low power ultrasound imaging for portable devices. To explore the impact of multimedia instructions, we compare programs using multimedia instructions and baseline programs with a same many-core processor in terms of execution time, energy efficiency, and area efficiency. Experimental results using a 256x256 ultrasound image indicate that programs using multimedia instructions achieve 3.16 times of execution time, 8.13 times of energy efficiency, and 3.16 times of area efficiency over the baseline programs, respectively. Likewise, programs using multimedia instructions outperform the baseline programs using a 240x320 image (2.16 times of execution time, 4.04 times of energy efficiency, 2.16 times of area efficiency) as well as using a 240x400 image (2.25 times of execution time, 4.34 times of energy efficiency, 2.25 times of area efficiency). In addition, we explore optimal PE architecture of many-core processors including multimedia instructions by varying the number of PEs and memory size.
  • 2.

    Power-efficient Scheduling of Periodic Real-time Tasks on Lightly Loaded Multicore Processors

    Wan Yeon Lee | 2012, 17(8) | pp.11~19 | number of Cited : 6
    Abstract PDF
    In this paper, we propose a power-efficient scheduling scheme for lightly loaded multicore processors which contain more processing cores than running tasks. The proposed scheme activates a portion of available cores and inactivates the other unused cores in order to save power consumption. The tasks are assigned to the activated cores based on a heuristic mechanism for fast task assignment. Each activated core executes its assigned tasks with the optimal clock frequency which minimizes the power consumption of the tasks while meeting their deadlines. Evaluation shows that the proposed scheme saves up to 78% power consumption of the previous method which activates as many processing cores as possible for the execution of the given tasks.
  • 3.

    Ontology-based Machine Translation Mashup System for Public Information

    오경진 , 권기영 , Myungduk Hong and 1 other persons | 2012, 17(8) | pp.21~29 | number of Cited : 0
    Abstract PDF
    We have proposed an ontology-based translation mashup system for foreigner to enjoy Korean cultural information without any language barrier(linguistic problem). In order to utilize public information, we use a mobile public information open API of Seoul metropolitan city. Google AJAX language API is used for translations of public information. We apply an ontology to minimize errors caused by the translations. For ontology modeling, we analyze the public information domain and define classes, relations and properties of cultural vocabulary ontology. We generate ontology instances for titles, places and sponsors which are the most frequently occurring translation errors. We compare the accuracy of translations through our experiment. Through the experimental results using the proposed ontology-based translation mashup system, we verify the validity of the system.
  • 4.

    Synthesizing Faces of Animation CharactersUsing a 3D Model

    Jang Seok-Woo , Gye-young Kim | 2012, 17(8) | pp.31~40 | number of Cited : 4
    Abstract PDF
    In this paper, we propose a method of synthesizing faces of a user and an animation character using a 3D face model. The suggested method first receives two orthogonal 2D face images and extracts major features of the face through the template snake. It then generates a user-customized 3D face model by adjusting a generalized face model using the extracted facial features and by mapping texture maps obtained from two input images to the 3D face model. Finally, it generates a user-customized animation character by synthesizing the generated 3D model to an animation character reflecting the position, size, facial expressions, and rotational information of the character. Experimental results show some results to verify the performance of the suggested algorithm. We expect that our method will be useful to various applications such as games and animation movies.
  • 5.

    Development of a LBS-based Bicycle Monitoring System using GPS-CDMA Modem Combined Terminals

    Hyung-Bong Lee , 조승희 | 2012, 17(8) | pp.41~50 | number of Cited : 5
    Abstract PDF
    Most of the developed countries and Korea have continued to invest much money in developing low-carbon vehicles such as electric car, methanol car and hydrogen car to replace the conventional fossil fuel vehicles. Government and local governments of each country, however, grope to construct roads for bicycle and public bicycle rental systems because bicycle is the only ultimate and feasible non-pollution transportation. Most of the current bicycle monitoring systems have achieved automation of rental process in bicycle stations, but they can not monitor bicycles in use. This paper develops GPS-CDMA modem combined terminals and implements a LBS-based bicycle monitoring system using them for public bicycle rental system. The monitoring system collects location information from GPS-CDMA modem combined terminals attached on bicycles and presents the moving tracks of bicycles on a GIS map for easy return and redistribution of bicycles. Also, the system helps to prevent from theft and vandalism of bicycles and to recommend the nearest bicycle station.
  • 6.

    Performance Analysis of 5Gbps/1.25Gbps WDM/TDM Hybrid Passive Optical Network with Inverse Return to Zero(RZ) coded Downstream and NRZ upstream re-modulation by Performing Simulation with MATLAB

    PARK SANGJO | 2012, 17(8) | pp.51~60 | number of Cited : 1
    Abstract PDF
    I propose the 5Gbps/1.25Gbps WDM/TDM hybrid Passive Optical Network(PON) with inverse RZ(Return to Zero) code coded downstream and NRZ(Non Return to Zero) upstream re-modulation and analyze its performance by performing simulation with MATLAB. The results have shown that an optical line termination (OLT) can be connected to 8, 16 optical network unit (ONU)s with the Bit Error Rate(BER) of when the distance between OLT and ONU is 10Km and transmitted optical powers are more than -3.8, -0.9dBm, respectively. The proposed WDM/TDM hybrid PON system can solve the problem of data rate limit in upstream which happened in the conventional TDM PON because the upstream data rate is proportional to ONU and does not require a light source in ONU and its control circuits in OLT, thus can be a useful technology for asymmetric optical subscriber networks.
  • 7.

    Generating Verification Conditions from BIRS Code using Basic Paths for Java Bytecode Verification

    김제민 , Seontae Kim , PARK JOONSEOK and 1 other persons | 2012, 17(8) | pp.61~69 | number of Cited : 0
    Abstract PDF
    BIRS is an intermediate representation for verifying Java program. Java program in the form of bytecode could be translated into BIRS code. Verification conditions are generated from the BIRS code to verify the program. We propose a method generating verification conditions for BIRS code. Generating verification conditions is composed of constructing control flow graph for BIRS code, depth first searching for the control flow graph to generate basic paths, and calculating weakest preconditions of the basic paths.
  • 8.

    A Standard Reference Model for Semantic Interoperability in Cloud Computing

    Dongwon Jeong | 2012, 17(8) | pp.71~80 | number of Cited : 5
    Abstract PDF
    Much research has been recently accomplished for standardization in cloud computing. However, little research on standardization of data sharing and exchanging has been studied. Most of all, the corresponding standardization organization suggests no specific standardization items and reference model. This paper defines the current standardization problems and proposes a set of specific standardization items and a reference model for supporting the semantic interoperability. To achieve the goal of this paper, the overall standardization trend in cloud computing is first analyzed. Especially, this paper describes the status of standard development for addressing the semantic interoperability of data. This paper also defines the potential standardization items based on the concepts of standards in the data exchanging and management field, which are used for developing standards in various fields. Finally, the reference model is describe to show the relationships between items and overall semantic interoperability process. This paper can be used as a guideline for development of standards and also can facilitate standardization of cloud computing.
  • 9.

    Semantics Environment for U-health Service driven Naive Bayesian Filtering for Personalized Service Recommendation Method in Digital TV

    Jaekwon Kim , Youngho Lee , 김종훈 and 2 other persons | 2012, 17(8) | pp.81~90 | number of Cited : 2
    Abstract PDF
    For digital TV, the recommendation of u-health personalized service of semantic environment should be done after evaluating individual physical condition, illness and health condition. The existing recommendation method of u-health personalized service of semantic environment had low user satisfaction because its recommendation was dependent on ontology for analyzing significance. We propose the personalized service recommendation method based on Naive Bayesian Classifier for u-health service of semantic environment in digital TV. In accordance with the proposed method, the condition data is inferred by using ontology, and the transaction is saved. By applying naive bayesian classifier that uses preference information, the service is provided after inferring based on user preference information and transaction formed from ontology. The service inferred based on naive bayesian classifier shows higher precision and recall ratio of the contents recommendation rather than the existing method.
  • 10.

    Reduction Algorithm of Environmental Noise by Multi-band Filter

    Jae Seung Choi | 2012, 17(8) | pp.91~97 | number of Cited : 1
    Abstract PDF
    This paper first proposes the speech recognition algorithm by detection of the speech and noise sections at each frame, then proposes the reduction algorithm of environmental noise by multi-band filter which removes the background noises at each frame according to detection of the speech and noise sections. The proposed algorithm reduces the background noises using filter bank sub-band domain after extracting the features from the speech data. In this experiment, experimental results of the proposed noise reduction algorithm by the multi-band filter demonstrate using the speech and noise data, at each frame. Based on measuring the spectral distortion, experiments confirm that the proposed algorithm is effective for the speech by corrupted the noise.
  • 11.

    A Study on Life-log Analysis and Monitoring System for Disabled Person Using Smart Media

    황명구 , 이상문 , 서정민 | 2012, 17(8) | pp.99~106 | number of Cited : 3
    Abstract PDF
    In recent years, many researchers studies to promote the welfare of disabled people using IT technology. In particular, their suggestions are used a lot of mobile sensor installed on the street. These systems are acquired and to store the data sent to the server over the network, and by analyzing the users life log to judge of their risk state. In particular, persons with disabilities are exposed to various risks. So, they must need to the guardians if he go out. Thus, this study is a method for alleviating these so much pressure to smart appliances and impaired life log analysis system.
  • 12.

    Step Counts and Posture Monitoring System using Insole Type Textile Capacitive Pressure Sensor for Smart Gait Analysis

    Min, Se Dong , Chunki Kwon | 2012, 17(8) | pp.107~114 | number of Cited : 6
    Abstract PDF
    We have developed a textile capacitive pressure sensor for smart gait analysis. The proposed system can convert sensor signal into step counts and pressure levels by different posture. To evaluate the performance of insole type textile capacitive sensor, we measured capacitance change by increment of weights from 10 kg to 100 kg with 10 kg increment using M1 class rectangular weights (four 20kg weights and two 10 kg weights) which have ± 10% tolerance. The result showed non-linearity characteristic of a general capacitive pressure sensor. The test was performed according to a test protocol for four different postures (sitting, standing, standing on a left leg and standing on a right leg) and different walking speeds (1 km/h and 4 km/h). Five healthy male subjects were participated in each test. As we expected, the pressure level was changed by pressure distribution according to posture. Also, developed textile pressure sensor showed higher recognition rate (average 98.06 %) than commercial pedometer at all walking speed. Therefore, the proposed step counts and posture monitoring system using conductive textile capacitive pressure sensor proved to be a reliable and useful tool for monitoring gait parameters.
  • 13.

    An Empirical Study on Factors Influencing Non-Work Related Use Behavior of Smartphone

    Jong Man Lee | 2012, 17(8) | pp.115~121 | number of Cited : 6
    Abstract PDF
    The main objective of this study was determine why employees conduct non-work related smartphone use at work. To do this, this study developed the research model of non-work related smartphone use behavior consisting of factors such as habit, intention, social effect, task interdependence, and behavior. And it was tested via a survey of employees using smartphones. The results of this study reveal, first, that habit and social influence are significant predictors of non-work related smartphone use behavior. Secondly, task interdependence has a positive moderating effect between intention and behavior in non-work related smartphone use.
  • 14.

    Exploring the Relationship between Software Capability Level and Software Project Productivity

    김승권 , Jong-soo Yoon | 2012, 17(8) | pp.123~133 | number of Cited : 2
    Abstract PDF
    Recently, as IT convergence has seen rapid growth the role and scope of software has been extended. many software companies are trying to improve the software quality and project outcome using software process improvement approach to cope with increasing software demands and software quality. Although software process improvement is difficult task which requires a lot of cost and time, there is still insufficient objective evidence on business benefits by its deployment. The purpose of this study is to analyze the relationship between software process improvement and software project productivity. That is, we investigated whether there is difference in software development productivity depends on software engineering level using statistical methods. We found that the software development productivity is different across the software engineering levels and the higher software engineering level can lead to improved software development productivity.
  • 15.

    The Improvements of Preferred Right on the Housing Lease Protection Act

    Jong-Ryeol Park , Joung Soon Hyoung | 2012, 17(8) | pp.135~144 | number of Cited : 2
    Abstract PDF
    The Preferred Right that recognized in Housing Lease Protection Act Article 8 Paragraph 1 is a legal security right. The case of a small tenant whose security deposit is less than a specific sum of money to lease housing, he can get preferential payment about his a specific sum of money of security deposit in an auction procedure. Like this the Preferred Right can protect the homeless commoner also it ignores the existing legal system. But the Preferred Right has the right function that contribute to stability of homeless people's housing, on the other hand, it has the adverse function that damages to several interested parties in an auction procedure by using legal preferential protection. So, about these problems, the improvement way will propose in this study.
  • 16.

    The effects of the degree of education related to information systems on online transaction intention and security concerns - Comparative analysis of the use of the Internet and smartphone

    Seung-Min Jung | 2012, 17(8) | pp.145~161 | number of Cited : 7
    Abstract PDF
    This study aims to explore how the degree of education related to information systems and the Internet literacy affect perceived security risk and how these three variables affect online transaction intention based on the Technology Acceptance Model (TAM). Since using smartphone to purchase necessary products is increasing, the study provided two different cases of using the existing Internet and smartphone to buy products. As a result of an empirical test, the degree of information system education, internet literacy, and perceived security risk had significant effects on online transaction intention mediating perceived usefulness and perceived ease of use. Unlike the expectation, the more people have education related to information systems, the more they have knowledge about hacking or cases of privacy infringement, leading to even more concerns about security, thereby believing the Internet transactions require much effort. The more the education about information system, the more we have concerns about security; therefore, perceived security risk have a positive(+) effect on perceived usefulness not a negative(-) effect. Lastly, while the degree of education related to information systems has relations with the recognition of the usefulness of the Internet transaction, the study showed that there are no relations of recognizing the usefulness and the ease of use of smartphone.
  • 17.

    Criminal liability of Internet Service Provider who leave illegal positing to take its own course

    in chang yoo | 2012, 17(8) | pp.163~170 | number of Cited : 1
    Abstract PDF
    Nowadays Internet is the greatest and most participating media of prompting expression with 37 million users in Korea. Internet enables collective communications between social members and contributes to form sound public opinions and to develop democracy while it has negative aspect to distribute massively crime by illegal posting which is forbidden by the Criminal Act. Criminal actors who involve to diffuse information on Internet consist of three categories of information provider, user and internet service provider. Illegal posting generated on Internet is originated from IP and the criminal regulation on it is useless and meaningless because of its countless of users and ambiguous boundary with liberty for expression. Accordingly, the only criminal policy means to prevent danger by illegal posting on Internet is to regulate ISP which saves illegal posting and mediates contacts among users. In spite of it, legislation to regulate ISP is unprepared. The prudent legislative review should be done. And it should be accordance with the doctrines of propriety and vagueness of the principle of "nulla poena sine lege".
  • 18.

    The Effects of Experienced violence in school on Suicidal Impulse in Adolescents for Policy Implications - Focusing on Moderating Effects of Family Support, Friend's Support and Teacher's Support -

    노윤채 , Hwie- Seo, Park , 신정숙 | 2012, 17(8) | pp.171~179 | number of Cited : 14
    Abstract PDF
    This study is to test moderating effects of family support, friend's support and teacher's support in the relationship between experienced violence in school and adolescent suicidal impulse. For the purpose of this study, 298 adolescents who were experienced violence in school were sampled and surveyed. The analytical results are the followings: Moderating effects of family support, friend support and teacher support are significant in the relationship between experienced violence and depression. They are also significant in the relationship between experienced violence and suicidal impulse. On the other hand, only family support is significant in the relationship between depression and suicidal impulse. This study suggests some policy implications based on this findings.
  • 19.

    A Strategy using Writing based on STEAM Instructionfor Information Gifted Students' Creative Problem-Solving

    전수련 , Lee Taewuk | 2012, 17(8) | pp.181~188 | number of Cited : 8
    Abstract PDF
    In this paper, we propose an a strategy using writing based on STEAM Instruction for information gifted students' creative problem-solving. It is needed a complex and dynamic interaction of variety elements for creative problem solving. And it should be provided experience encompassing various disciplines thorough convergence education for leading to the these interactions and developing the ability to solve complex problems. Writing has already been verified educational effects in a variety subjects. And writing gives a positive impact on creative problem solving by helping awareness of the problem and encouraging critical thinking. In addition, writing can be used as an effective tool for improving problem solving based on similarities between problem-solving process. Learners will find algorithm thorough the process analyzing and writing experience with high-tech products like vending machines, mobile phones and can learn naturally the principles of various disciplines used in real life. Furthermore, learners will experience interaction, convergence of various thinking and cultivate creative problem- solving skills.
  • 20.

    Development of Teaching Model for ‘Problem-solving methods and procedures’ section in the 2012’s revised Informatics curriculum

    현태익 , CHOI JAE HYUK , 이종희 | 2012, 17(8) | pp.189~201 | number of Cited : 1
    Abstract PDF
    The purpose of this study is to develop an effective teaching model for the "Problem solving methods and procedures" section in the revised academic high school informatics curriculum, verify its effectiveness, make the subject more effective and appealing to teachers as well as students. The model includes a middle school level informatics curriculum for the students who have yet to learn the section. This development follows the ADDIE model, and the Python programming language is adopted for the model. Using the model, classes were conducted with two groups: high school computer club students and undergraduate students majoring in computer education. Of the undergraduate students 75% responded positively to the model. This model was applied in the actual high school classroom teaching for 23 class-hours in the spring semester 2012. The Pearson correlation coefficient that verifies the correspondence between the PSI score and the informatics midterm exam grade is .247, which reflects a weak positive correlation. The result of the study showed that the developed teaching model is an effective tool in educating students about the "problem solving methods and procedures". The model is to be a cornerstone of teaching/learning plans for informatics at academic high school as well as training materials for pre-service teachers.