Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

Home > Explore Content > All Issues > Article List

2013, Vol.18, No.7

  • 1.

    Parallel Branch Instruction Extension for Thumb-2 Instruction Set Architecture

    김대환 | 2013, 18(7) | pp.1~10 | number of Cited : 0
    Abstract PDF
    In this paper, the parallel branch instruction is proposed which executes a branch instruction and the frequently used instruction simultaneously to improve the performance of Thumb-2instruction set architecture. In the proposed approach, new 32-bit parallel branch instructions are introduced which combine 16-bit branch instruction with each of the frequently used 16-bit LOAD,ADD, MOV, STORE, and SUB instructions, respectively. To provide the encoding space of the new instructions, the register field in less frequently executed instructions is reduced, and the new instructions are encoded by using the saved bits. Experiments show that the proposed approach improves performance by an average of 8.0% when compared to the conventional approach.
  • 2.

    Fine Grained Resource Scaling Approach for Virtualized Environment

    이돈혁 , Sangyoon Oh | 2013, 18(7) | pp.11~21 | number of Cited : 0
    Abstract PDF
    Recently operating a large scale computing resource like a data center becomes easier because of the virtualization technology that virtualize servers and enable flexible resource provision. The most of public cloud services provides automatic scaling in the form of scale-in or scale-out and these scaling approaches works well to satisfy the service level agreement (SLA) of users. However, a novel scaling approach is required to operate private clouds that has smaller amount of computing resources than vast resources of public clouds. In this paper, we propose a hybrid server scaling architecture and related algorithms using both scale-in and scale-out to achieve higher resource utilization rate for private clouds. We uses dynamic resource allocation and live migration to run our proposed algorithm. Our propose system aims to provide a fine-grain resource scaling by steps. Thus private cloud systems are able to keep stable service and to reduce server management cost by optimizing server utilization. The experiment results show that our proposed approach performs better in resource utilization than the scale-out approach based on the number of users.
  • 3.

    An Effective Feature Extraction Method for Fault Diagnosis of Induction Motors

    Hung Nguyen , Jong Myon Kim | 2013, 18(7) | pp.23~35 | number of Cited : 1
    Abstract PDF
    This paper proposes an effective technique that is used to automatically extract feature vectors from vibration signals for fault classification systems. Conventional mel-frequency cepstral coefficients (MFCCs) are sensitive to noise of vibration signals, degrading classification accuracy. To solve this problem, this paper proposes spectral envelope cepstral coefficients (SECC) analysis,where a 4-step filter bank based on spectral envelopes of vibration signals is used: (1) a linear predictive coding (LPC) algorithm is used to specify spectral envelopes of all faulty vibration signals, (2) all envelopes are averaged to get general spectral shape, (3) a gradient descent method is used to find extremes of the average envelope and its frequencies, (4) a non-overlapped filter is used to have centers calculated from distances between valley frequencies of the envelope. This 4-step filter bank is then used in cepstral coefficients computation to extract feature vectors. Finally, a multi-layer support vector machine (MLSVM) with various sigma values uses these special parameters to identify faulty types of induction motors. Experimental results indicate that the proposed extraction method outperforms other feature extraction algorithms, yielding more than about 99.65% of classification accuracy.
  • 4.

    Context Dependent Fusion with Support Vector Machines

    Heo Gyeongyong | 2013, 18(7) | pp.37~45 | number of Cited : 1
    Abstract PDF
    Context dependent fusion (CDF) is a fusion algorithm that combines multiple outputs from different classifiers to achieve better performance. CDF tries to divide the problem context into several homogeneous sub-contexts and to fuse data locally with respect to each sub-context. CDF showed better performance than existing methods, however, it is sensitive to noise due to the large number of parameters optimized and the innate linearity limits the application of CDF. In this paper, a variant of CDF using support vector machines (SVMs) for fusion and kernel principal component analysis (K-PCA) for context extraction is proposed to solve the problems in CDF, named CDF-SVM. Kernel PCA can shape irregular clusters including elliptical ones through the non-linear kernel transformation and SVM can draw a non-linear decision boundary. Regularization terms is also included in the objective function of CDF-SVM to mitigate the noise sensitivity in CDF. CDF-SVM showed better performance than CDF and its variants, which is demonstrated through the experiments with a landmine data set.
  • 5.

    Clock Pulse Synchronization of MCU Timers in Embedded Systems

    Hyung-Bong Lee , Ki-Hyeon Kwon | 2013, 18(7) | pp.47~55 | number of Cited : 1
    Abstract PDF
    Most of the applications implemented in embedded systems use timers equipped in MCU. The purposes of timer usage of the applications lie in a wide range of areas such as implementing software timers of real-time operating systems to measuring processing time of sensors. The elapsed times measured by the applications are various in length as well as in precision ranging from several us to several hundreds of ms. The paper analyzes the timing error factors caused by un- synchronizing timer clock pulse when timers are manipulated, and proposes a method of how to synchronize timer clock pulse to reduce the timing errors. As a result of an experiment, this paper shows that an error of 230us is reduced within 10us in case of appling the proposed method to a 4096Hz timer prescaled from 32768Hz by 8
  • 6.

    A study of Analysis Method of Human Factors for Operation Improvement

    Sung-Hak Chung | 2013, 18(7) | pp.57~67 | number of Cited : 1
    Abstract PDF
    This study suggests for effective operation of systematic analysis method for human factors which is based on the requirement architecture framework a requirement process to manage requirements for improvement is discussed, such as in requirements generation, database construction, management of experimental design, and management of the design traceability. For the objectives, we analyzed the method construct of the starting point views of user requirement which is adopted the requirement architecture concept to cover the whole activities required to do and the human factors guidelines and standards are suggested for verification and validation of the develop requirements. It is getting more attention as the operation of the enabling systems goes up these days. Throughout the propose of this study, human factors requirement database design presented in operational environment system for enabling system which is based on case study using a computer aided se tool. This study will be contributed to how the operational requirement database for the enabling system and operational human factors can be constructed in an integrated system design fashion
  • 7.

    The Analysis of Data Governance model for Business and IT Alignment

    김석수 | 2013, 18(7) | pp.69~78 | number of Cited : 2
    Abstract PDF
    This paper introduces the alignment background, analyzes some alignment issues. a practical the model of Data Governance for business and IT alignment is describes to implement the alignment so as to improve organizations innovation competency. Business and Information Technology alignment plays an important role in the business operation. Data Governance is an emerging approach which has been proven in some organizations to meet alignment demand. This paper proposes the model of Data Governance and proves the effective through implementation. This could be a good model of benchmarking for the best data quality management of all organizations.
  • 8.

    A Research on Multiple PS QAM for Channel Compensation in Frequency-Selective Rayleigh Fading Channels

    Jeong Su Kim | 2013, 18(7) | pp.79~84 | number of Cited : 2
    Abstract PDF
    In this paper, the method of multiple PS(pilot symbol) QAM channel compensation is suggested in order to analyze and improve occurring problems in case of delay waves in Frequency-Selective Rayleigh fading channels through Pilot Symbol Assisted Modulation(PSAM) which is a method predicting and compensating fading information, using Pilot Symbol in flat fading channels. This suggested method shows stable improvement in its performance even though it is effected by the level of delay on delay waves while the existing PSAM method has severe malfunction with a small amount of level of delay on delay waves regardless of signal-to-noise ratio(SNR)
  • 9.

    An Optimal Algorithmfor the Design of a Proxy Blind Signature Agent

    Hyun-Sook Rhee | 2013, 18(7) | pp.85~92 | number of Cited : 0
    Abstract PDF
    In this paper, on the basis of Guilin Wang's proxy signature scheme and the Schnorr blind signature, we propose a secure proxy blind signature scheme. A proxy blind signature scheme is a digital signature scheme which combines the properties of a proxy signature and a blind signature scheme. Guilin Wang proposed a provably secure proxy signature scheme, which is based on a two-party Schnorr signature scheme. Also, using the proposed proxy blind signature scheme, we propose the proxy agent system for the electronic voting. We show the proposed scheme satisfies the security properties of both the blind signature and the proxy signature scheme and is efficient and optimal proxy blind signature scheme.
  • 10.

    BCP utilizing Disaster Recovery-System for the Protection of the Information System Design

    HYUN-JOO KIM , 이수종 , SHIN IN CHUL | 2013, 18(7) | pp.93~100 | number of Cited : 5
    Abstract PDF
    The ensuing disaster brought by the massive earthquake and tsunami in the northeastern region of Japan in 2011 placed Japan, one of the three most advanced economic powers in the world, in a defenseless state. With the rising interest in disaster recovery, Korea is also making efforts to provide technological support for barrier-free system operation 24 hours a day, 365 days a year. To protect intelligence assets efficiently, this study draws a job performance plan to prepare for disasters, which systemizes methodical coping capabilities into business plans when disasters occur. Moreover, this study systemizes the job performance plan to allow members easy access to information that will help them proceed without confusion in emergencies. This plant is intended to protect intelligence assets of an organization clearly and promptly.
  • 11.

    A Method to Decide the Number of Additional Edges to Integrate the Communities in Social Network by Using Modularity

    ByungHyun Jun , Han Chi-Geun | 2013, 18(7) | pp.101~109 | number of Cited : 4
    Abstract PDF
    In this paper, a method to decide the number of additional edges to integrate two communities in social network by using modularity is studied. The modularity is a measure to be used to describe the quality of the community. By adding additional edges to the communities, the quality of the communities is enhanced, To integrate two communities, we propose methods to decide the number of additional edges by calculating the modularity. Also, the conditions that the proposed method is valid is investigated in a simple test graph and the efficiency of the proposed method is approved by integrating two communities in Zachary Karate Club network.
  • 12.

    Constructing Software Structure Graph through Progressive Execution

    이혜련 , 신승훈 , Kyung-Hee Choi and 2 other persons | 2013, 18(7) | pp.111~123 | number of Cited : 1
    Abstract PDF
    To verify software vulnerability, the method of conjecturing software structure and then testing the software based on the conjectured structure has been highlighted. To utilize the method, an efficient way to conjecture software structure is required. The popular graph and tree methods such as DFG(Data Flow Graph), CFG(Control Flow Graph) and CFA(Control Flow Automata) have a serious drawback. That is, they cannot express software in a hierarchical fashion. In this paper, we propose a method to overcome the drawback. The proposed method applies various input data to a binary code, generate CFG’s based on the code output and construct a HCFG (Hierarchical Control Flow Graph) to express the generated CFG’s in a hierarchical structure. The components required for HCFG and progressive algorithm to construct HCFG are also proposed. The proposed method is verified through constructing the software architecture of an open SMTP(Simple Mail Transfer Protocol) server program. The structure generated by the proposed method and the real program structure are compared and analyzed.
  • 13.

    The Process of Brand Building: Seoul city ‘itourseoul’ brand case study

    Lee Jae Jin , Sung-Yong Yoon | 2013, 18(7) | pp.125~137 | number of Cited : 2
    Abstract PDF
    Seoul city provided u-tourism services for inbound tourists' convenience. These services began in April, 2010 and were completed in advanced way by the end of 2011. Seoul city developed a brand fit to the new services simultaneously for communicating it. Recently, there are so many cities in the world that steadily try to give favorable impression and images to people. In the study, we analyze the process of brand building to present a guideline for city brand and tourism service brand building. The study includes a series of brand making process such as environment of brand, customer analysis, design of brand platform, brand hierarchy, visualization of various brand factors, strategies of operation and performances of brand awareness and draw a conclusion and suggest an advice. As for implication, the study shows the necessity of service brand launching plus Seoul official brand(Hi, Seoul), the service brand including ubiquitous concept, development of brand factors with complementarity and observation of systematical methodology.
  • 14.

    A Study on the effect of platform, contents, and design constructs on the repurchase intention of Smartphone

    NAM SOOTAI , Lee Hyun Chang , Jin Chan Yong | 2013, 18(7) | pp.139~148 | number of Cited : 4
    Abstract PDF
    With the launch of Apple iPhone, platform and contents and design characteristics were highlights of the new factors. In addition, Smartphone users have increased explosively. In this research, we aim to analyze factors affecting on repurchase intention of a Smartphone based on Technology Acceptance Model(TAM). External factors such as platform, contents and design are identified through literature review and the influences of these factors on repurchase intention are assessed. A questionnaire survey was conducted to those who lived in Busan and Gyeongnam province. This research used Smart PLS(partial least squares) to analyze the structural relationship between those factors and repurchase intention. Analytical results show that all paths except path from platform to perceived ease of use are significant. This study suggests practical and theoretical implications based on the results.
  • 15.

    A Polynomial-Time Algorithm for Linear Cutting Stock Problem

    Sang-Un, Lee | 2013, 18(7) | pp.149~155 | number of Cited : 0
    Abstract PDF
    Commonly, one seeks a particular pattern suitable for stock cutting and the number of such patterns through linear programming. However, since the number of the patterns increases exponentially, it is nearly impossible to predetermine all the existing patterns beforehand. This paper thus proposes an algorithm whereby one could accurately predetermine the number of existing patterns by applying Suliman’s feasible pattern method. Additionally, this paper suggests a methodology by which one may obtain exact polynomial-time solutions for feasible patterns without applying linear programming or approximate algorithm. The suggested methodology categorizes the feasible patterns by whether the frequency of first occurrence of all the demands is distributed in 0 loss or in various losses. When applied to 2 data sets, the proposes algorithm is found to be successful in obtaining the optimal solutions.
  • 16.

    The Relationship between Job-stress and Psychological-exhaustion of Counselors at Multicultural Family Support Center

    선국진 | 2013, 18(7) | pp.157~164 | number of Cited : 10
    Abstract PDF
    This study analyzed how job stress of counselors at Multicultural Family Support Center effects on their psychological exhaustion. The purpose of this research is on suggesting efficient human resource administration plan by mitigating job stress using the result of analysis. In the result of analysis, MFSC counselors’ job stress had an effect on emotional exhaustion, impersonalization, and a factor of decline in sense of self-perfection. Applying this result, this research proposed a necessity of realistic plan preparation to prevent job stress and psychological exhaustion of MFSC counselors.
  • 17.

    A Study of Model on the Optimal Allocation of Budget for the Efficiency of the University Evaluation

    최범순 , WangKyu Lim | 2013, 18(7) | pp.165~174 | number of Cited : 1
    Abstract PDF
    Recently, many universities in Korea have been faced with critical crisis such as the decrease in the number of freshmen, the pressure for tuition cuts, M&A between universities and so on. Nobody has expected that universities will have this kind of difficulties. The universities are making attempts to innovate the quality of education to secure high level of education and to meet social needs to overcome these internal and external environment of crisis. For this innovation, the universities have sought to reduce the budget as well as conducted the self-evaluation to figure out their relative positions annually. Innovations cannot have having the limitation without education funds. Budget spent in universities have influences directly or indirectly on the structural improvement of the finance and on the growth of universities. The purpose of this study is to explore the decision-making method to find the optimal budget allocation so as to minimize the execution budget and to maximize the management evaluation by taking the advantage to analyse the relationship between the evaluation and the budget. Therefore, in this paper, we implement the development of the mathematical model for the University Evaluation and Budget Allocation Optimization in the form of the linear programming.
  • 18.

    The Effects of Social Welfare Center Worker's Public Service Motivation on Organizational Performance

    Hwie- Seo, Park | 2013, 18(7) | pp.175~182 | number of Cited : 6
    Abstract PDF
    The purpose of this study was to analyse the effects of public service motivation on organizational performance and suggest the theoretical and policy implications. For this purpose,this study measured the public service motivation and organizational performance of social welfare center workers, set up the study model to analyze the relationships between the public service motivation and organizational performance, and tested hypothesis through questionnaire analysis. The analytical results show that the public service motivation and organizational performance of social welfare center workers are relatively high on the whole. And attraction to policy making,commitment to public interest, compassion, and self-sacrifice as the elements of public service motivation appear to have significant effects on organizational performance. In this study, some theoretical and policy implications are introduced basing on the analytical results.
  • 19.

    The Relationships among Factors that Effects on Acceptance Intention in Smart Education

    강혜영 , 김성완 | 2013, 18(7) | pp.183~190 | number of Cited : 7
    Abstract PDF
    This study aims to analyze the relationships among factors which influence acceptance intention of smart education. Based on literature reviews related with previous technology acceptance models, a potential model and seven hypotheses were suggested. Questionnaire was carried out among 132 students from elementary and secondary schools. They have experiences of utilizing applications of mobile devices for instructional goal. Cronbach alpha of the questionnaire was .78. The collected data were analyzed through path analysis. The results of this research are as follows. Seven hypotheses were adopted: Interaction will affect on perceived usefulness, Interaction will affect on perceived ease of use, Interaction will affect on acceptance intention, Interaction will affect on social influence, Social influence will affect on perceived usefulness, Perceived usefulness will affect on acceptance intention, Perceived ease of use will affect on acceptance intention. The model revised through the results of path analysis had good-fitness. That is, overall fit measures (RMSEA, CFI, NNFI), indexes that show the suitability of the model were quite good.