Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

Home > Explore Content > All Issues > Article List

2013, Vol.18, No.4

  • 1.

    An Implementation of Dynamic Software Update System for C Application Programs

    Shin Dong Ha , 김지현 | 2013, 18(4) | pp.1~11 | number of Cited : 0
    Abstract PDF
    Dynamic Software Update(DSU) is a technique, which updates a new version of the software to a running process without stopping. Many DSU systems that update C application programs are introduced. However, these DSU systems differ in implementation method or in main features. In this paper, we propose a new DSU system that can solve some disadvantages of existing DSU systems. DSU system presented in this paper splits existing program to code, global data and local data and then updates each part of the program considering the characteristics of the respective parts. The proposed system in this paper is implemented and tested on Linux. Also, we compared our DSU system with other DSU systems and we could find some strength of our DSU system. First, the code memory usage of our DSU system can be efficient since our system does not need to maintain code of an old version. Second, the global data memory waste is small because our system does not need to allocate the global data again which is not modified in the new version. Finally, we restore local data of old version in stack area of the new version using stack reconstruction technique. This paper is meaningful since we proposed a new DSU method and we implemented a full DSU system using the method.
  • 2.

    Panoramic Image Reconstruction using SURF Algorithm

    Kim, Kwang-baek | 2013, 18(4) | pp.13~18 | number of Cited : 3
    Abstract PDF
    Panorama picturing is an elongated photographing technique that connects images with rotating and moving multiple images horizontally that are partly overlapped. However, for hand-operated photographs, it is difficult to adjust overlapped parts because of tilted angles. There has been a study comparing adjacent pictures using labeling technique but it was time-consuming and had angle dissonant cases in nature. In this paper, we propose a less time-consuming paranoiac scene reconstruction method. Our method is also based on labeling-and-comparing technique but uses only 1/3 of it. Then, if there exists angle dissonance, it tries to find characteristic points by SURF algorithm and adjusts them with homography. The efficacy of this method is experimentally verified by experiments using various images.
  • 3.

    Training Sample and Feature Selection Methods for Pseudo Sample Neural Networks

    Heo Gyeongyong , Park Choong Shik , 이창우 | 2013, 18(4) | pp.19~26 | number of Cited : 2
    Abstract PDF
    Pseudo sample neural network (PSNN) is a variant of traditional neural network using pseudo samples to mitigate the local-optima-convergence problem when the size of training samples is small. PSNN can take advantage of the smoothed solution space through the use of pseudo samples. PSNN has a focus on the quantity problem in training, whereas, methods stressing the quality of training samples is presented in this paper to improve further the performance of PSNN. It is evident that typical samples and highly correlated features help in training. In this paper,therefore, kernel density estimation is used to select typical samples and correlation factor is introduced to select features, which can improve the performance of PSNN. Debris flow data set is used to demonstrate the usefulness of the proposed methods.
  • 4.

    Mobile Robot Exploration in Unknown Environment using Hybrid Map

    Jung Kyu Park , Heung Seok Jeon , Sam H. Noh | 2013, 18(4) | pp.27~34 | number of Cited : 0
    Abstract PDF
    Mobile robot has the exploration function in order to perform its own task. Robot exploration can be used in many applications such as surveillance, rescue and resource detection. The workspace that robots performed in was complicated or quite wide, the multi search using the several mobile robots was mainly used. In this paper, we proposed a scheme that all areas are searched for by using one robot. The method to be proposed extract a area that can be explored in the workspace then the robot investigates the area and updates the map at the same time. The explored area is saved as a hybrid map that combines the nice attributes of the grid and topological maps. The robot can produce the safe navigation route without the obstacles by using hybrid map. The proposed hybrid map uses less memory than a grid map, but it can be used for complete coverage with the same efficiency of a topological map. Experimental results show that the proposed scheme can generate a map of an environment with only 6% of the memory that a grid map requires.
  • 5.

    A Color-Texture Image Watermarking Algorithm Based on Texture Analysis

    강명수 , Truc Kim Thi Nguyen , Dinh Van Nguyen and 2 other persons | 2013, 18(4) | pp.35~43 | number of Cited : 0
    Abstract PDF
    As texture images have become prevalent throughout a variety of industrial applications,copyright protection of these images has become important issues. For this reason, this paper proposes a color-texture image watermarking algorithm utilizing texture properties inherent in the image. The proposed algorithm selects suitable blocks to embed a watermark using the energy and homogeneity properties of the grey level co-occurrence matrices as inputs for the fuzzy c-means clustering algorithm. To embed the watermark, we first perform a discrete wavelet transform (DWT) on the selected blocks and choose one of DWT subbands. Then, we embed the watermark into discrete cosine transformed blocks with a gain factor. In this study, we also explore the effects of the DWT subbands and gain factors with respect to the imperceptibility and robustness against various watermarking attacks. Experimental results show that the proposed algorithm achieves higher peak signal-to-noise ratio values (47.66 dB to 48.04 dB) and lower M-SVD values (8.84 to 15.6) when we embedded a watermark into the HH band with a gain factor of 42, which means the proposed algorithm is good enough in terms of imperceptibility. In addition, the proposed algorithm guarantees robustness against various image processing attacks, such as noise addition, filtering,cropping, and JPEG compression yielding higher normalized correlation values (0.7193 to 1).
  • 6.

    Development of Tongue Diagnosis System Using ASM and SVM

    박진웅 , Kang Sun-Kyung , 김영운 and 1 other persons | 2013, 18(4) | pp.45~55 | number of Cited : 1
    Abstract PDF
    In this study, we propose a tongue diagnosis system which detects the tongue from face image and divides the tongue area into six areas, and finally generates tongue fur ratio of each area. To detect the tongue area from face image, we use ASM as one of the active shape models. Detected tongue area is divided into six areas and the distribution of tongue coating of six areas is examined by SVM. For SVM, we use a 3-dimensional vector calculated by PCA from a 12-dimensional vector consisting of RGB, HSV, Lab, and Luv. As a result, we stably detected the tongue area using ASM. Furthermore, we recognized that PCA and SVM helped to raise the ratio of tongue coating detection.
  • 7.

    A Development of Metadata Integration Management System for Serious Game

    SeonJeong Yoon | 2013, 18(4) | pp.57~64 | number of Cited : 3
    Abstract PDF
    During the past 10 years, serious game industry has been growing steadily. But the system which could stably and reliably provide metadata information and quality information related to serious game remained unexploited. Existing systems only support the basic management functions of metadata search centered. Therefore, we have developed an integrated system to manage the quality information of serious game as well as to improve the inconvenient details of the existing systems. And we designed quality evaluation elements and quality information supply-methods,and linked up them to the system. Furthermore, we conducted user's satisfaction assessment survey on the use of the system. The advantage of the system is that the system provide a lot of useful information for general users and developers, and support a tool to manage all information related to serious game by easy and convenient method for managers.
  • 8.

    An Incentive mechanism for VOD Streaming Under Insufficient System Resources

    Kyuyong Shin , 이종덕 , 신진희 and 1 other persons | 2013, 18(4) | pp.65~77 | number of Cited : 0
    Abstract PDF
    Recently the ratio of the Internet traffic generated by video streaming applications including video-on-demand (VOD) is getting higher and higher, while P2P-based naive content distribution has been themain source of the Internet traffic in the past. As a result, the paradigmof cooperatively distributed systems (e.g., P2P) is changing to support streaming applications. Most P2P assisted approaches for video streaming today are based on BitTorrent thanks to its simplicity of implementation and easy adaptability. They, however, have immanent vulnerability to free-riding inherited fromBitTorrent, which inevitably hurts their performance under limited systemresources with free-riding. This paper studies the weakness to free-riding of existing BitTorrent-based video streaming applications and investigates the adaptability of T-Chain (which was originally designed to prevent free-riding in cooperatively distributed systems) to video streaming applications. Our experiment results showthat the video streaming approach based on T-Chain outperformsmost existing BitTorrent-based ones by 60% on average under limited system resources with free-riding.
  • 9.

    A New Multiple Presence Servers Architecture in SIP Environment

    Jang,Choon-Seo | 2013, 18(4) | pp.79~85 | number of Cited : 0
    Abstract PDF
    In SIP(Session Initiation Protocol) environment, the presence server should process SIP SUBSCRIBE request messages including multiple presence resources addresses from users, and also precess massive notification messages from the subscribed presence resources. The load of the presence server increases as number of users increase, and it limits system extendability. Therefore a new multiple presence servers architecture has been suggested in this research. In this architecture presence servers can be added dynamically and each server's load can be controlled effectively as number of users increase. Each presence server can monitor current load status of entire presence system by using presence event notification package which newly has been suggested in this paper. When a particular presence server's load increases over predefined limit, the presence service processing is distributed by selecting a server which has the smallest load, or by generating a new server dynamically. In this system the overall load of the entire system can be controlled optimally and extendability of the system can be increased. For this purpose a new presence event notification package and presence information data format have been suggested. The performance of the proposed system has been evaluated by experiments. They shows 44.3% increase in SUBSCRIBE message processing time, and 43.1% increase in Notification message processing time.
  • 10.

    Redesign and Performance Analysis of RTP(Real-time Transport Protocol) for Encryption of VoIP Media Information between Different Communication Networks

    Oh,Hyung-Jun , 박재경 , Yoo-Heon Won | 2013, 18(4) | pp.87~96 | number of Cited : 0
    Abstract PDF
    In this paper, we suggest redesigned RTP protocol that is able to perform encryption of VoIP media information for single private network and between the different private networks. And we conduct a test for performance analysis. Such as SRTP or ZRTP methods have been used for VoIP media encryption. But, the existing encryption techniques have problem that can not perform end-to-end encryption between different private networks. In order to solve this problem, in this paper, we redesign RTP protocol. Redesigned RTP includes all information for encryption of VoIP media. Therefore the encryption is not affected by modification of SIP and SDP information that occurred in gateway. Also, redesigned RTP includes code for whether or not to apply encryption. By using the code, modification of RTP header from gateway prevents. As a result, redesigned RTP maintain the integrity and the RTP is able to perform encryption between the different private networks. Also, we conduct a test for performance analysis of SRTP, ZRTP and redesigned RTP.
  • 11.

    Study on the Selection Model CTQ data

    Kim Seung Hee , Woo-Je Kim | 2013, 18(4) | pp.97~112 | number of Cited : 6
    Abstract PDF
    The quality of the data is the most basic prerequisite for effective use of data. Problems and the resulting loss due to error data has emerged using case studies and a number of, to a national,quality certification system of the data has been enforced, you must manage to generate data study on the method for selecting the point of view of an organization's data CTQ is a very unsatisfactory state of affairs. Selected CTQ main data is subject to quality control in the organization, to develop criteria for CTQ data side of the business and IT so that it can be managed in a systematic manner, the proposed model, to filter the data accordingly presented in detail how to manage enterprise-wide CTQ data that can be quantified Te. By utilizing SPSS,factor analyzes, for which I used the AHP method for quantification. In particular, we present a framework of management measures along the maturity of the data in the organization due to the enforcement of authentic quality certification system of DB, utilizing the CTQ-DSMM model readily applicable to practice.
  • 12.

    A Simulation to Find Rotation Efficiency according to the Draft Changes of Waterwheel in Open Rectangular Channel

    Lee, Kyung-Ho , HEE WAN PARK | 2013, 18(4) | pp.113~121 | number of Cited : 0
    Abstract PDF
    In this paper, simulations were carried out to determine the efficiency of the rotation efficiency according to the draft of waterwheel in open rectangular channel. In the small hydroelectric generators to get the highest efficiency of waterwheel is very important. But the presence of various elements(free water surface flow, non-uniform velocity distribution because of the waterways wall friction etc) makes it difficult to create a mathematical formula. In this paper, we made a scale model and perform a physical simulation where the draft, gradient and flux is variable. Scale modelling with 10-step draft, 3-step gradients and 2-step flux, as well were constructed then computerized automatic experimental system were configured to acquire the rotational efficiency vs. draft of itself. Rotational efficiency is analyzed as for the draft of waterwheel using the acquired data by varying the gradient and flux of canal. Reviewing the analyzed data, it is confirmed that phenomena of efficiency shown at previous and present experiment is similar and revealed that computerized system shows more sophisticated numerical figures.
  • 13.

    Square-and-Divide Modular Exponentiation

    Sang-Un, Lee | 2013, 18(4) | pp.123~129 | number of Cited : 2
    Abstract PDF
    The performance and practicality of cryptosystem for encryption, decryption, and primality test are primarily determined by the implementation efficiency of the modular exponentiation of ab(mod m) .To compute ab(mod m) , the standard binary squaring (square-and-multiply) still seems to be the best choice.the standard binary squaring (square-and-multiply) still seems to be the best choice. However, in large b bits,the preprocessed n-ary,(n≥2)method could be more efficient than binary squaring method. This paper proposes a square-and-divide and unpreprocessed n-ary square-and-divide modular exponentiation method.Results confirmed that the square-and-divide method is the most efficient of trial number in a case where the value of b is adjacent to 2k+2k-1 or to 2k+1. It was also proved that for b out of the beforementioned range, the unpreprocessed n-ary square-and-divide method yields higher efficiency of trial number than the general preprocessed n-ary method.
  • 14.

    Design and Implementation of DEVSim++ and DiskSim Interface for Interoperation of System-level Simulation and Disk I/O-level Simulation

    HAESANG SONG , 이순주 | 2013, 18(4) | pp.131~139 | number of Cited : 0
    Abstract PDF
    This paper deals with the design and implementation of an interface for interoperation between DiskSim, a well-known disk simulator, and a system-level simulator based on DEVSim++. Such inter-operational simulation aims at evaluation of an overall performance of storage systems which consist of multiple computer nodes with a variety of I/O level specifications. A well-known system-level simulation framework, DEVSim++ environment is based on the DEVS formalism,which provides a sound semantics of modular and hierarchical modeling methodology at the discrete event systems level such as multi-node computer systems. For maintainability we assume that there is no change of the source codes for two heterogeneous simulation engines. Thus, we adopt a notion of simulators interoperation in which there should be a means to synchronize simulation times as well as to exchange messages between simulators. As an interface for such interoperation DiskSimManager is designed and implemented. Various experiments, comparing the results of the standalone DiskSim simulation and the interoperation simulation using the proposed interface of DiskSimManager, proved that DiskSimManager works correctly as an interface for interoperation between DEVSim++ and DiskSim.
  • 15.

    Developed Type in the Managed Structured System Programming of Hybrid Web in .NET Framework Environment-Centric of Smart Web

    장승영 | 2013, 18(4) | pp.141~152 | number of Cited : 0
    Abstract PDF
    The current web implementation largely falls into process-oriented and object-oriented methods. Both ways implement the programs to be used for simple design of external outfit and auxiliary function of hybrid webs and it might lead to cost problems arising from waste of time and man-power to develop with it. Therefore, managed structural system programming which can be applied under .NET framework is suggested in a bid to solve these problems. The structural system design method under .NET environment by applying CS concept prefers to adopting the optimized design configuration suited to proper interfaces of UI configuration, which offers the environment to maintain the inheritance relationship by taking form of the balanced class allotment by domain, and continue to keep the connectivity between UX and UI which leads to application of interface of UX objects as form of objects through connection with objects in class design process. This development method enables programs to be implemented focused on representation methods of UI and UX, and helps relieve much of the burden on development costs
  • 16.

    Reinterpretation on Propertiness of Online Game Item

    in chang yoo | 2013, 18(4) | pp.153~160 | number of Cited : 5
    Abstract PDF
    Online game provides a kind of cyber money aden and game instruments, items in order to attract game users. Game users want stronger, better and higher-leveled items with competition. Demands and supplies on items are formed and the transactions are made. The problem is there happen frequently illegal behaviors in the process of transactions. Among these illegal behaviors,for using other's id and password without authorization and stealing items, rejecting to return assigned items, providing stolen item to other who knows the fact or destroying others' items, it is difficult to apply provisions on properties in the criminal code on them. Because the criminal code has a duty to prevent separation between substantial criminal behavior and regulations, it should reflect substantial cultures and values of the times. Therefore, property like items in cyber space can be considered as new property to need to be protect under the criminal code and it may be not an interpretation of expansion. The reason is it is practical and reasonable to judge whether propertiness can be established considering cyber space's unique characteristics. It is time to review propertiness of Article No. 346 according to the request of times of the digital age.
  • 17.

    The Legislative Directions about Surrogacy Contract on Civil law

    Jong-Ryeol Park | 2013, 18(4) | pp.161~169 | number of Cited : 0
    Abstract PDF
    Currently, there is no bill about Maternal Inference and the Family Law about surrogate birth in Korea. Also, Problems of surrogate mother were reported by media socially, but these discussions did not discuss continuously. Early in the course that establishing process of Bioethics and Safety Act, there was a discussion. But it cannot acceptance as Act, it issued legally and ethically. Despite the difficult of legal interpretation and ethical problem, the surrogate birth practiced covertly and frequently. And about this, our law just declared its invalidity because it is contrary to public order and good moral until recently. Therefore, if it leaves as invalidation, the problem about right of surrogate mother and the baby from her it may occur a serious social problem. From now, about the issue of surrogacy contracts the legal and medical countermeasures to be taken. Therefore, to solve many problems about surrogacy contract, consider the problem of surrogacy contract, also suggest legislative study about Korean surrogate mother based on legislative cases of foreign countries.
  • 18.

    Study on Acceptance Factors of Information Technology in Construction Industries according to Individual’s Features

    박은수 | 2013, 18(4) | pp.171~181 | number of Cited : 0
    Abstract PDF
    In the recent information-oriented age, various information technologies (ITs) have been introduced in construction industries. However, since construction ITs tend to be employed by the demand of the government or owners rather than the demand of information accepters (users), this tendency inhibits the spread of user-friendly construction ITs. In order to find these inhibitive factors, this research conducted practical studies, based on Davis' technology acceptance model, for construction ITs' acceptance according to the information accepters' (users) features. This study was hypothesized whether or not each inner and outer factors with respect to construction ITs are influential to the information accepters (users). As a result of this study, the primary factors which can maximize the usefulness and ease of use and should be considered when developing new information technologies were suggested
  • 19.

    Designing of Block-Type Puzzle Assembly Robot Education System without Computer

    Jeong-Beom Song | 2013, 18(4) | pp.183~190 | number of Cited : 6
    Abstract PDF
    Many researchers in the 21st century has found that robot education is effective to develop the learners’ creativity and problem-solving ability. However, the robot education can only be applied to the students whose computer skills are high. Also it can be taught in the well-prepared computer classroom. Students have to learn machine language to control their robots, and robots are controlled by different types of software. Therefore this study has constructed command-based programming blocks to do a robot programming without computers. It also presents a prototype of the programming process and a technological method to combine the command and the programming blocks. We used the blocks which are similar with something in flow chart: to support intuition , and to help students transfer what they learned. And types of blocks and details are described for the Robot Programing Education. Combination of command blocks is made by RS-485 connection method and, it is designed to intercommunicate with connected blocks. It also presents a prototypes: of the programming process using designed command blocks, and of the possibility of Unplugged Robot Education System
  • 20.

    A Study on the Factors Affecting Smart Phone Use Behavior of University Students in Class

    Jong Man Lee | 2013, 18(4) | pp.191~199 | number of Cited : 9
    Abstract PDF
    The main objective of this paper is to investigate why university students use their smart phones in class and to develop a predictive model of smart phone use behavior that consisted of perceived benefit, perceived cost, attitude, social effect, intention, and habit. The proposed model is tested using survey data collected from 120 university student smart phone users. PLS analysis show as following: At first, intention and habit are significant predictors of smart phone use behavior in class. Secondly, perceived benefit and perceived cost as well as attitude and social effect are the factors affecting smart phone usage in class
  • 21.

    The effects of the whole language approach through ICT Education on reading ability of children with intellectual disorders

    장오선 , KANG CHANG WOOK | 2013, 18(4) | pp.201~211 | number of Cited : 4
    Abstract PDF
    The purpose of this study is to identify the educational effects of Whole language approach through ICT Education to see children with intellectual disorders's change after praticing this program. It's specially meant determine specially, It's impact on reading ability. by focusing reading comprehension. (comprehension of detail contents and memorizing of detail contents.) that is differences of other existing research. The subjects are 14-16 years old who are with intellectual disorders and This study utilized a single case. (1) Is there any effects of the whole language approach through ICT Education on comprehension of detail contents, (2) Is there any effects of the whole language approach through ICT Education on memorizing of detail contents. The result showed the following: First, the Whole language approach served to increased comprehension of detail contents of children with intellectual disorders. Second, the Whole language approach served to increased memorizing of detail contents of children with intellectual disorders. Third, the Whole language approach given to positive influence about maintenance that comprehension of detail contents and memorizing of detail contents of children with intellectual disorders.