Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2013, Vol.18, No.2

  • 1.

    Cache memory system for high performance CPU with 4GHz

    JUNG BOSUNG | Lee Jung Hoon | 2013, 18(2) | pp.1~8 | number of Cited : 2
    Abstract PDF
    TIn this paper, we propose a high performance L1 cache structure on the high clock CPU of 4GHz. The proposed cache memory consists of three parts, i.e., a direct-mapped cache to support fast access time, a two-way set associative buffer to exploit temporal locality, and a buffer-select table. The most recently accessed data is stored in the direct-mapped cache. If a data has a high probability of a repeated reference, when the data is replaced from the direct-mapped cache, the data is selectively stored into the two-way set associative buffer. For the high performance and low power consumption, we propose an one way among two ways set associative buffer is selectively accessed based on the buffer-select table(BST). According to simulation results, Energy * Delay product can improve about 45%, 70% and 75% compared with a direct mapped cache, a four-way set associative cache, and a victim cache with two times more space respectively.
  • 2.

    Design of High-Speed Parallel Multiplier with All Coefficients 1’s of Primitive Polynomial over Finite Fields GF(2m)

    성현경 | 2013, 18(2) | pp.9~17 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a new multiplication algorithm for two polynomials using primitive polynomial with all 1 of coefficient on finite fields GF(2m), and design the multiplier with high-speed parallel input-output module structure using the presented multiplication algorithm.The proposed multiplier is designed ㎡ same basic cells that have a 2-input XOR gate and a 2-input AND gate. Since the basic cell have no a latch circuit, the multiplicative circuit is very simple and is short the delay time DA+AX per cell unit. The proposed multiplier is easy to extend the circuit with large m having regularity and modularity by cell array, and is suitable to the implementation of VLSI circuit.
  • 3.

    The Sub-Peres Functions for Random Number Generation

    배성일 | 2013, 18(2) | pp.19~30 | number of Cited : 0
    Abstract PDF
    We study sub-Peres functions that are defined recursively as Peres function for random number generation. Instead of using two parameter functions as in Peres function, the sub-Peres functions uses only one parameter function. Naturally, these functions produce less random bits, hence are not asymptotically optimal. However, the sub-Peres functions runs in linear time, i.e., in O(n )time rather than O(n logn) as in Peres's case. Moreover, the implementation is even simpler than Peres function not only because they use only one parameter function but because they are tail recursive, hence run in a simple iterative manner rather than by a recursion, eliminating the usage of stack and thus further reducing the memory requirement of Peres's method. And yet, the output rate of the sub-Peres function is more than twice as much as that of von Neumann's method which is widely known linear-time method. So, these methods can be used, instead of von Neumann's method, in an environment with limited computational resources like mobile devices. We report the analyses of the sub-Peres functions regarding their running time and the exact output rates in comparison with Peres function and other known methods for random number generation. Also, we discuss how these sub-Peres function can be implemented.
  • 4.

    Probabilistic Power-saving Scheduling of a Real-time Parallel Task on Discrete DVFS-enabled Multi-core Processors

    Wan Yeon Lee | 2013, 18(2) | pp.31~39 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a power-efficient scheduling scheme that stochastically minimizes the power consumption of a real-time parallel task while meeting the deadline on multicore processors. The proposed scheme applies the parallel processing that executes a task on multiple cores concurrently, and activates a part of all available cores with unused cores powered off, in order to save power consumption. It is proved that the proposed scheme minimizes the mean power consumption of a real-time parallel task with probabilistic computation amount on DVFS-enabled multicore processors with a finite set of discrete clock frequencies. Evaluation shows that the proposed scheme saves up to 81% power consumption of the previous method.
  • 5.

    Development and Implementation of Monitoring System for Management of Virtual Resource Based on Cloud Computing

    조대균 | Seokcheon Park | 2013, 18(2) | pp.41~47 | number of Cited : 7
    Abstract PDF
    In this paper, for this open system-based virtual resource monitoring system was designed.Virtual resources, CPU, memory, disk, network, each subdivided into parts, each modular implementation. Implementation results in real time CPU, memory, disk, network information,confirmed the results of monitoring. System designed to implement the Windows, Linux, Xen was used for the operating system, implementation language, C++ was used, the structure of the system, such as the ability to upgrade and add scalability and modularity by taking into account the features available in cloud computing environments applicable to cloud computing, virtual resource monitoring system has been implemented.
  • 6.

    An efficient quality improvement scheme of magnified image by using the information of adjacent pixel values

    Soo-Mok Jung | Byung-Won On | 2013, 18(2) | pp.49~57 | number of Cited : 2
    Abstract PDF
    To improve the quality of magnified image, two schemes were proposed. The one is used to estimate simple convex surface and simple concave surface using the information of adjacent pixel values, and the other scheme is used to produce magnified image using the characteristics of simple convex surface and simple concave surface. The magnified image using the proposed scheme is more similar to real image than the magnified image using the previous schemes. The PSNR values of the magnified images using the proposed scheme are greater than those of the magnified images using the previous interpolation schemes.
  • 7.

    A QoS Provisioning Based on Load Balancing for Hand-over in OFDMA System

    Jongchan Lee | Lee Moonho | 2013, 18(2) | pp.59~68 | number of Cited : 13
    Abstract PDF
    Efficient resource management and hand-over schemes are necessary to maintain consistent QoS because it may be severely defected by some delay and information loss during hand-over in LTE-Advanced networks. This paper proposes a resource management scheme based on the load control to support consistent QoS for heterogeneous services during hand-over in OFDMA based systems. Various multimedia services with different requirements for resource are able to be serviced simultaneously because service continuity can be provided by our proposed scheme.Simulation results show that it provides better performances than the conventional one with the measure of hand-over failure rate and packet loss rate.
  • 8.

    Channel Assignment for RFID Readers in Dense Reader Environments

    손석원 | 2013, 18(2) | pp.69~76 | number of Cited : 0
    Abstract PDF
    Reader-to-reader interference in RFID system is occurred due to the use of limited number of frequencies, and this is the main cause of read rate reduction in the passive RFID tags. Therefore,in order to maximize the read rate under the circumstances of limited frequency resources, it is necessary to minimize the frequency interference among RFID readers. This paper presents a hybrid FDM/TDM constraint satisfaction problem models for frequency interference minimization problems of the RFID readers, and assigns optimal channels to each readers using conventional backtracking search algorithms. A depth first search based on backtracking are accomplished to find solutions of constraint satisfaction problems. At this moment, a variable ordering algorithm is very important to find a solution quickly. Variable ordering algorithms applied in the experiment are known as efficient in the graph coloring. To justify the performance of the proposed constraint satisfaction problem model, optimal channels for each readers in the passive UHF RFID system are allocated by using computer simulation satisfying various interference constraints.
  • 9.

    Virtual Location Information based Routing Scheme in Wireless Ad-Hoc Networks

    Youn Joo Sang | 2013, 18(2) | pp.77~85 | number of Cited : 2
    Abstract PDF
    Recently, location information based routing protocol has been studied to estimate end-to-end path in wireless ad-hoc network. This protocol assumes all nodes can get heir location information via GPS devices and floods only limited area with routing message through acquired location information. Therefore, this protocol has advantage that can reduce the number of routing message than the existing IP-based routing protocols. In addition, all nodes enabling this protocol must acquire their own location information to participate in the location-based routing. However, recent because of the miniaturization of sensor node, sensor node without GPS function has been launched. Therefore in case of the sensor node that does not know location information, it is impossible to participate in the ad hoc network configuration and location information based routing. In this paper, a virtual location information based routing scheme is proposed for wireless nodes without GPS function to be able to participate in location information based routing within ad hoc network environments consisting of wireless nodes with GPS function and wireless nodes without GPS function. Therefore, the proposed protocol has the advantage that a wireless node without a GPS function is able to participate in ad hoc network configuration and the location information based routing.
  • 10.

    Weaknesses Cryptanalysis of Khan's Scheme and Improved Authentication Scheme preserving User Anonymity

    박미옥 | 2013, 18(2) | pp.87~94 | number of Cited : 1
    Abstract PDF
    In this paper, we analyse the weaknesses of authentication scheme preserving user anonymity proposed by Khan et al in 2011 and we propose a new authentication schemes preserving user anonymity that improved these weaknesses. Khan et al's authentication scheme is vulnerable to insider attack and doesn't provide user anonymity to the server. Also, this scheme is still a weakness of wrong password input by mistake in spite of proposing the password change phase. In this paper,we will show that Khan et al's scheme is vulnerable to the stolen smart card attack and the strong server/user masquerade attack. The proposed authentication scheme propose the improved user anonymity, which can provide more secure privacy to user by improving these weaknesses.
  • 11.

    Development of PC based flute performance learning software

    김재영 | Jungchul Lee | 전희성 | 2013, 18(2) | pp.95~105 | number of Cited : 1
    Abstract PDF
    The music education improves the creative talent, social skills and academic achievement of the students. For the efficient music education, it is requested to develop the collaborative educational learning tools, especially electronic collaborators suitable to the leaner’s study patterns and speed. In this paper, we propose a new method to develop a PC-based self learning software for the flute performance using templates and descriptors to make the contents form and substance. Our proposed method can allow user to modify the descriptors to match the contents to his level. We implemented a PC-based self learning software for the flute performance compactly and a feasibility test showed the efficiency of our proposed method to construct a self learning tool to play the flute and the tool can be utilized for the beginner to learn playing flute
  • 12.

    A Hybrid Music Recommendation System Combining Listening Habits and Tag Information

    Hyon Hee Kim | Dong-Geon Kim | Cho Jin Nam | 2013, 18(2) | pp.107~116 | number of Cited : 3
    Abstract PDF
    In this paper, we propose a hybrid music recommendation system combining users’ listening habits and tag information in a social music site. Most of commercial music recommendation systems recommend music items based on the number of plays and explicit ratings of a song.However, the approach has some difficulties in recommending new items with only a few ratings or recommending items to new users with little information. To resolve the problem, we use tag information which is generated by collaborative tagging. According to the meaning of tags, a weighted value is assigned as the score of a tag of an music item. By combining the score of tags and the number of plays, user profiles are created and collaborative filtering algorithm is executed.For performance evaluation, precision, recall, and F-measure are calculated using the listening habit-based recommendation, the tag score-based recommendation, and the hybrid recommendation, respectively. Our experiments show that the hybrid recommendation system outperforms the other two approaches.
  • 13.

    Path-Planning for Group Movement in Dynamic Environments

    Kyeonah Yu | 조수진 | 2013, 18(2) | pp.117~126 | number of Cited : 1
    Abstract PDF
    Path planning is an essential problem to make virtual characters navigate in many applications including computer games. In many cases, multiple characters move in a group and qualitative aspects of planned paths are emphasized rather than optimality unlike Robotics. In this paper, we propose a two-level path planning algorithm in which the global path is planned for a single character specified as a leader and then the local path is planned to avoid dynamic obstacles while the group following this path. The space for group movement is achieved in the form of square grid array called a grid window. Member characters are located relatively to the leader within a space and moved. The static environment is reduced to the configuration space of this grid window to generate a roadmap on which a grid window can move. In local path planning, only the leader avoids dynamic obstacles by using an artificial potential field and the rest of members are located relatively to the leader in the grid window, which reduces computational load. Efficient algorithms to implement the proposed planning methods are introduced. The simulation results show that a group can handle with dynamic obstacles effectively while moving along the planned path for a static environment.
  • 14.

    SW Process improvement and Organization Change Management

    김승권 | Sung-Hyun Cho | Jongsoo Yoon | 2013, 18(2) | pp.127~140 | number of Cited : 1
    Abstract PDF
    We explored the relationship between the level of change awareness and deployment of software process improvement (SPI) approaches using a competing values framework. To measure awareness level of organization's change, we used DICE framework provides means for predicting the outcome of change management initiatives. The four factors for organizaton's change: duration,integrity, commitment, and effort are evaluated and a score is calculated. The DICE® score is used to classify projects into win, worry, or woe zones. In this paper, we apply the DICE® score as an independent variable to predict the outcome of a software process improvement. Our results indicated that the Organization have a higher chance of success have the better outcome in software process improvement.
  • 15.

    A Method to Deal with Free Riding in Team Project

    Jonghyuk Park | 2013, 18(2) | pp.141~147 | number of Cited : 25
    Abstract PDF
    Teams are used often in the workplace and in educational institute. Despite the advantages of students teams, the two most common problems are social loafing and free riding. I suggest that 'You are fired' method can be used successfully in students team project, especially in our cultural mood. The 'You are fired' method is very simple to execute into business classes using team assignments. Students can fire team members who will not do the necessary work or will not attend meetings with a simple two-step processes. To fire a student of the team must send an e-mail listing specific work that he or she is not doing and/ or meetings he or she is not attending.And a copy of the e-mail must be sent to the faculty member. If the free-rider fails to accomplish the required work, then a second e-mail is sent notifying the student that he or she is fired along with a copy to the faculty member. Data from 257 undergraduate students are analyzed for usefulness of 'You are fired' method.Students are highly supportive of all components parts of the 'You are fired' method. They strongly support the effectiveness of this method to prevent free riding on performing team projects.
  • 16.

    Through SNS and freedom of election Publicized criminal misrepresentation

    Lee, Ju-il | 2013, 18(2) | pp.149~156 | number of Cited : 2
    Abstract PDF
    In this paper, the Constitutional Court's ruling through the SNS was virtually guaranteed the freedom of election campaign through, though, still a large portion of campaign restrictions on public election law provisions exist to this forward in the election is likely to cause a lot of legal problems. In this paper, the Constitutional Court's ruling through the SNS was virtually guaranteed the freedom of election campaign through, though, still a large portion of campaign restrictions on public election law provisions exist to this forward in the election is likely to cause a lot of legal problems. Moreover, in the mean time the campaign and which in the course of the election campaign through the SNS, the infinite potential of the growing point than any point spread from the SNS and freedom of election campaign through public election law with regard to the limitation of the diffusion of false facts, awards, a number of problems are likely to occur. You've been in this business and disseminate false guilt disparage precandidacy for true-false, as well. He should be able to reach a specific goal you want to defeat through the dissemination of information which is specified as a crime for this strictly for the fact that disseminate false, rather than to interpret it is the judgment of the Court in that judgment against have been made. Therefore, this strict interpretation of the law and the need to revise or delete before I would like to discuss about. The legislation would repeal the cull of Ron sang first of all point out the issue through analytics. First, the purpose of the data protection Act provides limited interpretation to fit in this world of sin. Secondly, this sin is committed for the purpose of prevention, since the purpose of the objective in this case of sin and the need to interpret strictly. Why I am the Internet space in the case of so-called tweets from followers, this means in some cases done without a lot of the stars because of this, there will be a limit to the punishment of sin, this is obvious. And, in the long-awaited Constitutional Court ensures the freedom of election campaign through SNS and free election in the country, even in the limited sense interpretation opens the chapter of communication is needed. This ensured the freedom of expression will be highly this is a mature civil society that will be imperative.
  • 17.

    A Study on Self efficacy Difference between User and Nonuser of Smartphone

    JangHyung Lee | 김종원 | baekchun sung and 1other persons | 2013, 18(2) | pp.157~164 | number of Cited : 13
    Abstract PDF
    Self efficacy is a term used in psychology, roughly corresponding to a person's belief in their own competence. It has been defined as the belief that one is capable of performing in a certain manner to attain certain goals. It is believed that our personalized ideas of self-efficacy affect our social interactions in almost every way. Understanding how to foster the development of self-efficacy is a vitally important goal for positive psychology because it can lead to living a more productive and happy life. The objective of this study is to show difference of the relationship between user and non-user in smartphone by self efficacy. For this purpose, we propose a research model which consists of 3type' self efficacy. For empirical test of this model, the sample data is collected from employee in a company and divided into two groups by user and nonuser. By multi-group analysis, we show two groups are different from each other in the relationship between user and nonuser of smartphone. Results show difference of the relationship smartphone user and non-user's self-efficacy(self-control self-efficiacy and problem difficulty preference).
  • 18.

    Development of the Job Mapping Diagram for a Service Design

    Oh Hyung Sool | Yoo Jung Sang | 2013, 18(2) | pp.165~174 | number of Cited : 0
    Abstract PDF
    Depending on point of view, a service can be defined as interactions between customers and service providers or service delivery processes or customer's experiences. To develop and design a new service, the most of approaches presented in the previous researches represent a service mainly by the interactive activities or functions between customers and providers. The critical features of services which differentiate services from physical products are the inseparability that production and consumption occur at the same time and the heterogeneity that each customer ask their requirements to providers. To reflect the characteristics on the service model, we have to include contextual features in the service model. For the purpose, we define a service as the process of solving the customer's problems and a service is structured into three components:contacts, informations, and activities. We suggest the job mapping diagram to model a service process by the three components and then apply it to a hotel service process and compare the result with it of a blueprint
  • 19.

    Analysis of Factors Hindering Learners’ Participation in Cyber Home Study in Elementary Education

    신현정 | Kim Sung Wan | 2013, 18(2) | pp.175~182 | number of Cited : 3
    Abstract PDF
    The purpose of this study was to investigate the factors that influence elementary school learners’ participation in cyber home study, and to suggest possible solutions to problem of the participation rates. To identify the factors, we analyzed the literature and developed a questionnaire consisting of 8 possible factors and 33 items. Data gathered from 429 elementary school learners were analyzed in a logistic regression model, which was utilized to determine the probability of the learner’s participation in cyber home study because of any of the identified variables. We studied the following variables: problem from learning motivation &attitude, burden from computer, difficulty of new learning method, problem from instructional design, difficulty of interaction, problem from screen design, and problem from learning environment. The results indicated that two factors were important: burden from computer, difficulty of new learning method. That is to say, having a low level of burden of computer and difficulty of new learning method helps improve the rate of elementary school learners’ participation in cyber home study.