Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

http://journal.kci.go.kr/jksci
Home > Explore Content > All Issues > Article List

2013, Vol.18, No.8

  • 1.

    An Effective Parallel Implementation of Sound Synthesis of Guitar using GPU

    강성모 , Jong Myon Kim | 2013, 18(8) | pp.1~8 | number of Cited : 0
    Abstract PDF
    This paper proposes an effective parallel implementation of a physical modeling synthesis of guitar on the GPU environment. We used appropriate filter coefficients and adjusted the length of delay line for each open string to generate 44,100 six-polyphonic guitar sounds (E2, A2, D3, G4,B3, E4) by using physical modeling synthesis. In addition, we analyzed the physical modeling synthesis algorithm and observed that we can exploit parallelism inherent in the length of delay line. Thus, we assigned CUDA cores as many as the length of delay line and effectively implemented the physical modeling synthesis using GPU to achieve the highest performance. Experimental results indicated that synthetic guitar sounds using GPU were very similar to the original sounds when we compared their spectra. In addition, GPU achieved 68x and 3x better performance than high-performance TI DSP and CPU, respectively. Furthermore, this paper implemented and evaluated the performance of multi-GPU systems for the physical modeling algorithm.
  • 2.

    A Job Scheduling Scheme based on Analytic Hierarchy Process in Cloud Computing

    Kim Jeong-won | 2013, 18(8) | pp.9~15 | number of Cited : 0
    Abstract PDF
    As the resources of cloud computing are essentially heterogeneous and jobs have various characteristics, resource allocation to jobs is one of important problems. We define this issue as a multi-criteria decision-making problem. This paper proposes a priority-based job scheduling algorithm based on analytic hierarchy process (AHP). On the first step, jobs are classified based on their preferences. On the second step, response time, system utilization, and load becomes decision criteria based on the AHP algorithm. Jobs are allocated to adequate resources through their priorities that are calculated by the AHP algorithm. Through analysis and experiment of the proposed algorithm, we are to confirm that the scheme can schedule jobs as well as utilize its resource efficiently.
  • 3.

    Design and Implementation of an Automatic Scoring Model Using a Voting Method for Descriptive Answers

    허정만 , So-Young Park | 2013, 18(8) | pp.17~25 | number of Cited : 2
    Abstract PDF
    TIn this paper, we propose a model automatically scoring a student's answer for a descriptive problem by using a voting method. Considering the model construction cost, the proposed model does not separately construct the automatic scoring model per problem type. In order to utilize features useful for automatically scoring the descriptive answers, the proposed model extracts feature values from the results, generated by comparing the student's answer with the answer sheet. For the purpose of improving the precision of the scoring result, the proposed model collects the scoring results classified by a few machine learning based classifiers, and unanimously selects the scoring result as the final result. Experimental results show that the single machine learning based classifier C4.5 takes 83.00% on precision while the proposed model improve the precision up to 90.57% by using three machine learning based classifiers C4.5, ME, and SVM.
  • 4.

    Quantization of Lumbar Muscle using FCM Algorithm

    Kim, Kwang-baek | 2013, 18(8) | pp.27~31 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a new quantization method using fuzzy C-means clustering(FCM) for lumbar ultrasound image recognition. Unlike usual histogram based quantization, our method first classifies regions into 10 clusters and sorts them by the central value of each cluster. Those clusters are represented with different colors. This method is efficient to handle lumbar ultrasound image since in this part of human body, the brightness values are distributed to doubly skewed histogram in general thus the usual histogram based quantization is not strong to extract different areas. Experiment conducted with 15 real lumbar images verified the efficacy of proposed method.
  • 5.

    Android-Based Open Platform Intelligent Vehicle Services Middleware Application

    최병관 | 2013, 18(8) | pp.33~41 | number of Cited : 0
    Abstract PDF
    Intelligent automobile technology and IT convergence, the development of new imaging technology media applications based on open source Android installed on tracked, wheeled smart phone application technology and the development of intelligent vehicles as a new paradigm a lot of research and development being made. Android-based intelligent automotive applications,technology, and evolved into the center of a set of various multimedia technologies move beyond the limits of the means of each of multimedia platforms, services and applications that have been developed in such a distributed environment, has been developed according to a variety of services through technology mobile terminal device technology is an absolute requirement. In this paper,SVC Codec, real-time video and graphics processing and SoC design intelligent vehicles middleware applications with monolithic system specification through Android-based design of intelligent vehicles dedicated middleware research experiments on open platforms, and provides various terminal services functions SoC based on a newly designed and standardized interface analysis techniques in this study were verified through experiments
  • 6.

    A Study of Digital Music Element for Music Plagiarism Analysis

    신미해 , 조진완 , 이혜승 and 1 other persons | 2013, 18(8) | pp.43~52 | number of Cited : 1
    Abstract PDF
    The purpose of this paper is researching musical elements to analyze plagiarism between two sources. We first search digital music elements to analyze music source and examine how to use these in plagiarism analysis using compiler techniques. In addition we are used open source Java API JFugue to process complex MIDI music data simply. Therefore we designed music plagiarism analysis system by using MusicString which is supported in JFugue and construct AST after investigate MusicString's syntax processing elements to manipulate music plagiarism analysis efficiently. So far music plagiarism analysis is evaluated emotionally and subjectively. But this paper suggests first step to build plagiarism analysis systemically. If this research is well utilized,this is very meaningful to standardize systemically which music is plagiarized or not.
  • 7.

    A Study on the Design of Uniform Quality Guaranteed Streaming Video System

    박영환 , 박찬곤 | 2013, 18(8) | pp.53~64 | number of Cited : 0
    Abstract PDF
    The existing research on the QoS of the Streaming video system(SVS) adjust the video stream being sent from the network perspective, the focus is to prevent data loss and delay. The other hand, changing the quality of the video stream will not receive the guaranteed QoS from the perspective of the users who want uniform quality. In order to solve these problems, this paper applied to ensure that the benefits in the amount of bits per frame occurs Encoder CBR streaming video is kept constant and uniform picture quality advantages of VBR streaming video VBR to CBR Encoder and CBR to VBR Decoder, Video was designed to control the playback stream for And to ensure a uniform quality of the user based on the design and implementation of uniform quality guaranteed SVS. PSNR evaluated for several characteristics of the sample video to demonstrate the superiority of the SVS ensure uniform quality, the proposed Performance evaluation of the SVS ensure uniform quality CBW the ABR from 100% to ensure uniform image quality from 85% to environmental excellence is proved.
  • 8.

    Hand Region Tracking and Fingertip Detection based on Depth Image

    주성일 , 원선희 , HYUNG IL CHOI | 2013, 18(8) | pp.65~75 | number of Cited : 2
    Abstract PDF
    This paper proposes a method of tracking the hand region and detecting the fingertip using only depth images. In order to eliminate the influence of lighting conditions and obtain information quickly and stably, this paper proposes a tracking method that relies only on depth information, as well as a method of using region growing to identify errors that can occur during the tracking process and a method of detecting the fingertip that can be applied for the recognition of various gestures. First, the closest point of approach is identified through the process of transferring the center point in order to locate the tracking point, and the region is grown from that point to detect the hand region and boundary line. Next, the ratio of the invalid boundary, obtained by means of region growing, is used to calculate the validity of the tracking region and thereby judge whether the tracking is normal. If tracking is normal, the contour line is extracted from the detected hand region and the curvature and RANSAC and Convex-Hull are used to detect the fingertip . Lastly,quantitative and qualitative analyses are performed to verify the performance in various situations and prove the efficiency of the proposed algorithm for tracking and detecting the fingertip
  • 9.

    An Improved Vehicle Data Format of Digital Tachograph

    Joon-Gyu Kang , Yoowon Kim , 임웅택 and 1 other persons | 2013, 18(8) | pp.77~85 | number of Cited : 4
    Abstract PDF
    In this paper, we proposed the vehicle data format of digital tachograph to improve the vehicle data format of the MOLIT(Ministry of Land, Infrastructure and Transport). The vehicle data collection and analysis is currently available through digital tachograph mandatory installation for commercial vehicles. And public agency is used the vehicle data format as a transmission format defined by MOLIT's guideline for their vehicle data processing. However, Vehicle data format is different for each manufacturer and MOLIT's vehicle data format is also need to advance. We confirmed the proposed the vehicle data format improved based on the vehicle data format of MOLIT through the system implementation and experiment in this paper
  • 10.

    Modified Baby-Step Giant-Step Algorithm for Discrete Logarithm

    Sang-Un, Lee | 2013, 18(8) | pp.87~93 | number of Cited : 1
    Abstract PDF
    A baby-step giant-step algorithm divides  by blocks that possess ⌈ ⌉ elements,and subsequently computes and stores modfor elements in the 1st block. It then calculates mod for  blocks and identifies each of them with those in the 1st block of an identical elemental value. This paper firstly proposes a modified baby-step giant-step algorithm that divides⌈ ⌉blocks with elements applying ≡ mod and mod ≡ mod principles. This results in a 50% decrease in the process of the giant-step. It then suggests a reverse baby-step giant step algorithm that performs and saves⌈ ⌉blocks firstly and computesmod for elements. The proposed algorithm is found to successfully halve the memory and search time of the baby-step giant step algorithm
  • 11.

    One-time Session Key based HTTP DDoS Defense Mechanisms

    최상용 , 강익선 , KIM YONG MIN | 2013, 18(8) | pp.95~104 | number of Cited : 1
    Abstract PDF
    DDoS attacks have became as a social threat since 2009 7.7 DDoS turmoil. Even though defence techniques have been developing to provide against those threats, they become much more sophisticate. In recent years, the attack form of DDoS is changing from high amount of traffic attack of network layers to highly sophisticate small amount of application layers. To make matters worse, attack agent for the attack has became very intelligent so that it is difficult to be blocked since it can’t be distinguished from normal PCs. In the user authentication system(such as CAPTCHA) User intervention is required to distinguish normal PCs and intelligent attack agents and in particular, in a NAT environment, IP-based blocking method can be cut off the normal users traffic at the same time. This research examined defense techniques which are able to distinguish between agent and normal PC and effectively block ways the HTTP DDoS offense applying one-time session key based authentication method using Cookie which is used in HTTP protocol to protect web sever from sophisticate application layer of DDoS.
  • 12.

    An Effective Method of Testing Application Software of Smart Sensors

    조장우 , 정환철 | 2013, 18(8) | pp.105~111 | number of Cited : 1
    Abstract PDF
    This paper presents a virtual sensor system that is an effective method to test application software of smart sensors. The common way of testing sensor application is to build a test board,connect sensors to the board, and test sensor applications on the board with sensor's measurements as inputs. The problem of testing sensor application software with sensor's measurements as inputs is the restriction of test data. In other words, software testers cannot manipulate test data, because test data is generated by sensors. To solve this problem a virtual sensor system is presented in this paper. The virtual sensor system enables software testers to manipulate measurements of sensors. In the virtual sensor system, generation of virtual sensors comprises three stages - sensor selection, sensor characterization, and determination of output patterns. Sensor's measurements that can be manipulated through the virtual sensor system make the process of testing efficient. To show the usefulness of our virtual sensor system, it is applied to sensor applications in Android platform and the result of experiments is shown
  • 13.

    Recognition of Physical Rehabilitation on the Upper Limb Function using 3D Trajectory Information from the Stereo Vision Sensor

    Ki-Hyeon Kwon , Hyung-Bong Lee | 2013, 18(8) | pp.113~119 | number of Cited : 1
    Abstract PDF
    The requirement of rehabilitation is increasing from the stroke, spinal cord injury. One of the most difficult part is the upper limb rehabilitation because of its nervous complexity. A rehabilitation has effectiveness when a professional therapist treats in work at facility, but it has problems of an accessibility, a constant availability, a self-participation and taking lots of cost and time. In this paper, we test and experiment the accuracy and execution time of the pattern recognition algorithms like PCA, ICA, LDA, SVM to show the recognition possibility of it on the upper limb function from the 3D trajectory information which is gathered from stereo vision sensor(Kinect). From the result, PCA, ICA have low accuracy, but LDA, SVM have good accuracy to use for physical rehabilitation on the upper limb function.
  • 14.

    A Study of Modeling and Utilization for Software Enhancement Process Based on Business scenarios

    김형목 , RHEW SUNG YUL | 2013, 18(8) | pp.121~129 | number of Cited : 0
    Abstract PDF
    As more than 80 percent of tasks within corporations are performed through information systems, they have become large in scale and complicated, which make the range of the system users diverse and specialized. and as recent corporate strategies focus on the real-time environment in businesses, the organizational structure within companies tend to show frequent changes. In order to ensure the business continuity in this environment, the most important aspect is to prevent incompleteness of business by narrowing the gap of understanding of business process between the system users and the maintenance managers. In order to address this problem, this study suggests a modeling method that utilizes business scenarios reflecting actual business rules and procedures which ultimately transforms the optimized and standardized form of business scenarios into the actual software maintenance activities. This modeling method improves reusability and usability through the repeated feedback mechanism for modified software by leading to gradual fine-grained process. The feasibility of this is to be proven by applying the modeling method to the real business environment
  • 15.

    Arrhythmia Detection Using Rhythm Features of ECG Signal

    Sungoan Kim | 2013, 18(8) | pp.131~139 | number of Cited : 6
    Abstract PDF
    In this paper, we look into previous research in relation to each processing step for ECG diagnosis and propose detection and classification method of arrhythmia using rhythm features of ECG signal. Rhythm features for distribution of rhythm and heartbeat such as identity, regularity,etc. are extracted in feature extraction, and rhythm type is classified using rule-base constructed in advance for features of rhythm section in rhythm classification. Experimental results for all of rhythm types in the MIT-BIH arrhythmia database show detection performance of 100% for arrhythmia with only normal rhythm rule and applicability of classification for rhythm types with arrhythmia rhythm rules
  • 16.

    Cost Analysis of On·OFF-Line Blended Learning

    Hijean Kim , Sung-Yong Yoon , Jonghyuk Park | 2013, 18(8) | pp.141~148 | number of Cited : 2
    Abstract PDF
    Traditional face-to-face university education has shifted its course to combine the advantages of both online and offline education in a blended-learning approach. However, there is still much that is unknown about the actual effect of blended learning, particularly it's learning outcomes in terms of cost effectiveness. This study qualitatively examines the costs and the learning outcomes of blended learning at an on-line college and off-line university. Online college level English pedagogy courses and blended with offline operations at an online university were studied across two semesters in terms of the quality of education, and both direct and indirect cost savings. Other causes for various learning outcomes and cost implications are proposed and validated
  • 17.

    Marketing service activation strategies for the floral market products in the cyber shopping mall environment

    SeongYoon Shin , Lee Hyun Chang | 2013, 18(8) | pp.149~156 | number of Cited : 3
    Abstract PDF
    TAmong various forms of online shopping with the development of online shopping and the rapid growth of IT technology, the intense competition also more deepen. The strategies for differentiated marketing and features for competitiveness of businesses in the online and offline shopping areas are required that our marketing target be settled the flower marketing by analyzing. In case of the flower market, the movement of the market from offline market to online market has been occurred and processed concurrently. Market entry and competitiveness of small companies is becoming very difficult because larger companies have been formed national market networks. Therefore, in this research, we suggest ways to enhance flower delivery service to the market from the top ranked site analysis, market situation analysis and service strategy plan for the activation of the online flower market. Also, we describe how to realize the above mentioned strategies through a site building. We can expect to strengthen flower market activation and competitiveness through the flower delivery service enhancement
  • 18.

    A Study on the Social Worker's Job Satisfaction and Self-efficacy

    Jonghwan Kim | 2013, 18(8) | pp.157~165 | number of Cited : 6
    Abstract PDF
    This paper provides theoretical background on the relationship between social worker's Job satisfaction and Self-efficacy for Empirical Search. According to previous researches, the more social workers feel self-efficacy the better they select their jobs actively and work very hard. In addition, they are more likely to challenge constantly and have more possibility to carry out their tasks successfully. However, it is assumed that there are theoretical differences in Social Welfare Area compared with other Social Science Area due to the particularity of Social Worker's Job and tasks. Therefore, the aims of this paper is to review theoretical background on the relationship between Job Satisfaction and Self-efficacy in other Social Science Area and provide the groundwork for the expansion of Social Work Practice Research Area through Empirical Analysis in the future.
  • 19.

    Design and Development of Convergence Education Programs for Expansion of Learning Ability in the 21st Century

    정재훈 , Lee Taewuk | 2013, 18(8) | pp.167~174 | number of Cited : 5
    Abstract PDF
    The objectives of this study are to investigate core learning ability necessary for the 21st century and to develop core human resources required for social and national development in the future. The '21st Century Learning Ability Project' is to approach the existing knowledge and learning multidisciplinary and interactively based on the learning ability of each learner and individually and socially valuable themes. Even in Korea, a variety of intersubject integrative educational curriculum was attempted to cultivate learning ability. However, there are not enough teachers who can teach the differences between the content and characteristics for each subject by fully understanding them. Thus, it is difficult to apply them easily to the field of education. Thus,this study develops the multidisciplinary customized educational curriculum in order to develop the learning ability necessary for the 21st century, analyzes the reality of the educational curriculum integrating the academic knowledge in order to support this effectively. As a result, this study offers the interdisciplinary customized integrated model applicable to elementary and middle schools