Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2014, Vol.19, No.1

  • 1.

    Cyclic Executive for Autonomous Driving with Real-Time Smart Cruise Control

    이재면 | Kyungtae Kang | Dong Kun Noh | 2014, 19(1) | pp.1~8 | number of Cited : 2
    Abstract PDF
    In recent years, much attention has been paid to the development of intelligent vehicles thatintegrate automotive technology into the information technology, with the aim of improving userfriendliness and stability. The representative function is a autonomous driving and a cruisecontrol. In designing such vehicles, it is critical to address the real-time issues (i.e., real-timevehicle control and timely response). However, previous research excluded the real-timescheduling. We develop a model car with unmanned cruise control, design the real-time schedulerusing cyclic executive to easily adapt the model car, and provide some insight into potentialsolutions based on various experiments.
  • 2.

    A Method of Auto Photography Composition Suggestion

    최용섭 | DaeHyun Park | Kim, yoon | 2014, 19(1) | pp.9~21 | number of Cited : 0
    Abstract PDF
    In this paper, we propose the auto correction technique of photography composition by whichthe eye line is concentrated and the stable image of the structure can be obtained in case thegeneral user takes a picture. Because the general user photographs in most case withoutbackground knowledge about the composition of the photo, the subject location is not appropriateand the unstable composition is contrasted with the stable composition of pictures which theexperts take. Therefore, we provide not the method processing the image after photographing, buthe method presenting automatically the stable composition when the general users take aphotograph. The proposed method analyze the subject through Saliency Map, Image Segmentation, Edge Detection, etc. and outputs the subject at the location where the stable composition can becomprised along with the guideline of the Rule of Thirds. The experimental result shows that thegood composition was presented to the user automatically.
  • 3.

    Filtering Feature Mismatches using Multiple Descriptors

    김재영 | 전희성 | 2014, 19(1) | pp.23~30 | number of Cited : 1
    Abstract PDF
    Feature matching using image descriptors is robust method used recently. However, mismatchesoccur in 3D transformed images, illumination-changed images and repetitive-pattern images. Inthis paper, we observe that there are a lot of mismatches in the images which have repetitivepatterns. We analyze it and propose a method to eliminate these mismatches. MDMF(MultipleDescriptors-based Mismatch Filtering) eliminates mismatches by using descriptors of nearestseveral features of one specific feature point. In experiments, for geometrical transformation likescale, rotation, affine, we compare the match ratio among SIFT, ASIFT and MDMF, and we showthat MDMF can eliminate mismatches successfully.
  • 4.

    A Virtual Mobile Ad-Hoc Network Model to Improve Internet Connectivity among Heterogeneous Mobile Devices

    Jia Uddin | Jong Myon Kim | 2014, 19(1) | pp.31~41 | number of Cited : 0
    Abstract PDF
    This paper proposes a virtual mobile ad-hoc network (VMANET) model that automaticallydivides heterogeneous mobile devices of a MANET into a number of network groups depending onthe communication capacity(data rate) of different network operational models such as IEEE802.11g, IEEE 802.11b, and Frequency Hopping. In addition, it supports a distinct routing protocol for each network group of VMANETs, resulting in running multiple routing protocolsconcurrently on different groups of VMANETs. To reduce the network congestion and improve thenetwork load balance, a default MANET gateway is configured in each VMANET and thesegateways are responsible for integrating the MANET and IP networks. Experiment results showthat the proposed model outperforms the conventional IMANET by significantly increasingthroughput and reducing network congestion and network delay.
  • 5.

    A Research on the Performance Analysis of SPDY Protocol in Mobile Networks

    김희정 | 이규선 | 이성원 | 2014, 19(1) | pp.43~55 | number of Cited : 0
    Abstract PDF
    SPDY is the new protocol proposed by Google to complement problems of HTTP(HypertextTransfer Protocol)/1.1 and to improve web speed. In this paper, we evaluated the performance ofSPDY protocol in a variety environment. By this evaluation, we examined the characteristics of theSPDY protocol and compared the differences between the existing protocol and SPDY protocol. Andwe took a closer look at the Flow Control of SPDY. Through this, we analyzed the problem ofSPDY. It improved performance at 3G network environment, but failed to improve performance athigh speed WLAN and mobility environments. We also verified that Flow Control does not work well. And finally we proposed directions for improvement of this protocol.
  • 6.

    Efficient Construction of Euclidean Steiner Minimum Tree Using Combination of Delaunay Triangulation and Minimum Spanning Tree

    Inbum Kim | 2014, 19(1) | pp.57~64 | number of Cited : 0
    Abstract PDF
    As Steiner minimum tree building belongs to NP-Complete problem domain, heuristics for theproblem ask for immense amount execution time and computations in numerous inputs. In thispaper, we propose an efficient mechanism of euclidean Steiner minimum tree construction fornumerous inputs using combination of Delaunay triangulation and Prim’s minimum spanning tree algorithm. Trees built by proposed mechanism are compared respectively with the Prim’s minimumspanning tree and minimums spanning tree based Steiner minimum tree. For 30,000 input nodes,Steiner minimum tree by proposed mechanism shows about 2.1% tree length less and 138.2%execution time more than minimum spanning tree, and does about 0.013% tree length less and18.9% execution time less than minimum spanning tree based Steiner minimum tree inexperimental results. Therefore the proposed mechanism can work moderately well to many usefulapplications where execution time is not critical but reduction of tree length is a key factor
  • 7.

    eFlowC: A Packet Processing Language for Network Management

    고방원 | Yoo,Jae-Woo | 2014, 19(1) | pp.65~76 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a high-level programming language for packet processing calledeFlowC and it supporting programming development environment. Based on the C language whichis already familiar and easy to use to program developers, eFlowC maintains the similar syntaxand semantics of C. Some features that are unnecessary for the packet processing has beenremoved from C, eFlowC is highly focused on performing packet data, database, string byteinformation checking and event processing. Design high-level programming languages and apply an existing language or compiler technology, language function and compilation process that isrequired for packet processing will be described. In order to use the DPIC device such as X11, wedesigned a virtual machine eFVM that takes into account the scalability and portability. We haveevaluated the utility of the proposed language by experimenting a variety of real applicationprograms with our programming environment such as compiler, simulator and debugger for eFVM. As there is little research that devoted to define the formats, meanings and functions of the packetprocessing language, this research is significant and expected to be a basis for the packetprocessing language.
  • 8.

    Hierarchical Network Synchronization of STAR Network based on TDMA

    윤주현 | 2014, 19(1) | pp.77~84 | number of Cited : 0
    Abstract PDF
    In this paper, we propose the hierarchical network synchronization scheme that is backwardcompatible for the existing commercial system, efficient for total system performance, and whosehardware modification is minimized. This system performance is, the relationship amongbandwidth efficiency, complexity and MODEM performance, and superiority of network systemapplicability. The proposed structure can remedy the high hardware complexity and the lower accuracy of network sychronization that the existing satellite communication terminal system inthe star network based on TDM/MF-TDMA of DVB-S2/RCS standards has. Besides, It has highefficiency in view of cost and system performance if the system designed for satellite broadcastrequires system upgrade. In the body section, its hardware complexity and system performance ofthe proposed algorithm is analysed theoretically and treated with the related parameters(symbolrate, spreading factor, etc.) and the BER performance of control channel through the computersimulation for its verification that it can be applied for communications system
  • 9.

    A Study on Similarity Comparison for File DNA-Based Metamorphic Malware Detection

    EunGyeom Jang | 이상준 | 이중인 | 2014, 19(1) | pp.85~94 | number of Cited : 3
    Abstract PDF
    This paper studied the detection technique using file DNA-based behavior pattern analysis inorder to minimize damage to user system by malicious programs before signature or security patchis released. The file DNA-based detection technique was applied to defend against zero day attackand to minimize false detection, by remedying weaknesses of the conventional network-basedpacket detection technique and process-based detection technique. For the file DNA-baseddetection technique, abnormal behaviors of malware were splitted into network-related behaviorsand process-related behaviors. This technique was employed to check and block crucial behaviorsof process and network behaviors operating in user system, according to the fixed conditions, to analyze the similarity of behavior patterns of malware, based on the file DNA which processbehaviors and network behaviors are mixed, and to deal with it rapidly through hazard warningand cut-off.
  • 10.

    The effects of the Partnership in Supply Chain Management with Appling Social Business on the outcome of the SCM

    김소천 | WangKyu Lim | 2014, 19(1) | pp.95~110 | number of Cited : 3
    Abstract PDF
    The purpose of this research is to further investigate the influence of partnership between withthe mediator effect of the social business on the outcome of SCM. IT technology fusion electronictags, mobile phone, such as cloud computing is also activated in supply chain management ofrecently, business is faster, if social business is applied here that are smarter, customers orsuppliers, there may be communication directly and to further improve the relationshippartnership. 150 questionnaires were sent to companies that have introduced SCM to theirsystems and are operating it. Among 150 questionnaires, 127 collected data were analyzedexcluding incomplete 23 data. Statistical methods used in this study were frequency analysis,factor analysis, reliability analysis, t-test, ANOVA, path analysis, Scheffe test and Sobel test withAmos 18.0. and SPSS 21.0. The analytical results are as follows. First, the more the reliability,information share, continuous transaction, effects on the social business are getting higher, theinterdependence has little impact on it. Second, the impact on the outcome of SCM, partnershipsbetween companies, showed a significant influence the reliability, the share of information, thecontinuous transaction , but the interdependence was analysed as an uninfluential factor. Third,the social business is analyses to have a mediator effect in relationship between the partnershipand the outcome of SCM.
  • 11.

    Follower classification system based on the similarity of Twitter node information

    계용선 | Youngmi Yoon | 2014, 19(1) | pp.111~118 | number of Cited : 0
    Abstract PDF
    Current friend recommendation system on Twitter primarily recommends the most influentialtwitter. However, this way of recommendation has drawbacks where it does not recommend theusers of which attributes of interests are similar to theirs. Since users want other users of whichattributes are similar, this study implements follower recommendation system based on thesimilarity of twitter node informations. The data in this study is from SNAP(Stanford NetworkAnalysis Platform), and it consists of twitter node information of which number of followers is over10,000 and twitter link information. We used the SNAP data as a training data, and generated a classifier which recommends and predicts the relation between followers. We evaluated theclassifier by 10-Fold Cross validation. Once two twitter node informations are given, our model canrecommend the relationship of the two twitters as one of following such as: FoFo(FollowerFollower), FoFr(Follower Friend), NC(Not Connected).
  • 12.

    Genetic Algorithm based Pathfinding System for Analyzing Networks

    KIM JUNWOO | 2014, 19(1) | pp.119~130 | number of Cited : 1
    Abstract PDF
    This paper proposes GAPS, a practical genetic algorithm based pathfinding system forconveniently analyzing various networks. To this end, the GAPS is developed through integrationof the intuitive graphic user interface for network modeling, the database management system formanaging the data generated in modeling and exploring procedures, and a simple genetic algorithmfor analyzing a wide range of networks. Especially, previous genetic algorithms are not appropriatefor analyzing the networks with many dead-ends where there are few feasible paths between thegiven two nodes, however, GAPS is based on the genetic algorithm with the fitness function appropriate for evaluating both feasible and infeasible paths, which enables GAPS to analyze awide range of networks while maintaining the diversity of the population. The experiment resultsreveal that GAPS can be used to analyze both networks with many dead-ends and networks withfew dead-ends conveniently, and GAPS has several advantages over the previous geneticalgorithms for pathfinding problems.
  • 13.

    Extract and Analysis System for CT/MRI Images

    Ho Young Kwak | Jisoon Hu | 2014, 19(1) | pp.131~140 | number of Cited : 5
    Abstract PDF
    TMost of the medical images that are being used today are to confirm the existence of lesions. These kind of medical images can not only be used to confirm lesions but if we could use it foracademic studies or for analysis and reference materials for surgical operations, it could offer greathelp in medical studies. Furthermore, we could reduce the number of errors in treatment throughsimulations in the surgical operations and treatments. In this paper, the necessary parts regarding the medical image visuals were extracted throughthe point cloud and by using the information obtained through it, it manufactures the necessaryinformation for academic studies, diagnoses or operations. By designing and realizing the system which makes simulation possible with the manufactured information, the paper attempts to providea more effective way to approach academic studies or giving appropriate diagnoses in the treatmentof patients
  • 14.

    A Context-Aware Treatment Guidance System

    정화영 | 박재욱 | YONG KYU LEE | 2014, 19(1) | pp.141~148 | number of Cited : 4
    Abstract PDF
    As the quality of the medical treatment service provided by large hospitals grow, the number ofpatients utilizing the facilities is increasing dramatically. Various studies such as ordercommunication system and treatment guidance system are under their process in order to shortenthe waiting time for patients. However, the existing methods assign the treatments in successiveorder without recognizing the situation of each treatment, therefore increasing a patient's standby time at a hospital. This paper proposes a context-aware treatment guidance system, whichrecognizes the previously undermined estimated waiting time of each treatment for a patient andrecommends a treatment with shorter estimated sojourn time first. This context-aware treatmentguidance system provides detailed information of treatment services based on the recommendedorder of treatments to a patient's smartphone. By utilizing the context-aware treatment guidancesystem introduced in this paper, patients can reduce their standby time at hospitals to theminimum while hospitals can efficiently service more patients at the same amount of time. Theproposed context-aware treatment guidance system proves to be outstanding in treatment orderrecommendation through comparisons to previously used methods.
  • 15.

    A dominant hyperrectangle generation technique of classification using IG partitioning

    Hyeong-Il Lee | 2014, 19(1) | pp.149~156 | number of Cited : 0
    Abstract PDF
    NGE(Nested Generalized Exemplar Method) can increase the performance of the noisy data atthe same time, can reduce the size of the model. It is the optimal distance-based classificationmethod using a matching rule. NGE cross or overlap hyperrectangles generated in the learning hasbeen noted to inhibit the factors. In this paper, We propose the DHGen(Dominant HyperrectangleGeneration) algorithm which avoids the overlapping and the crossing between hyperrectangles,uses interval weights for mixed hyperrectangles to be splited based on the mutual information. TheDHGen improves the classification performance and reduces the number of hyperrectangles byprocessing the training set in an incremental manner The proposed DHGen has been successfully shown to exhibit comparable classificationperformance to k-NN and better result than EACH system which implements the NGE theoryusing benchmark data sets from UCI Machine Learning Repository.
  • 16.

    A Study on the Influence of Perceived Organizational Support on Organization Commitment

    Lee, Hongki | 장명복 | 2014, 19(1) | pp.157~168 | number of Cited : 7
    Abstract PDF
    In general, there are three factors which compel employees to leave their position at a company:duties in organization, perception related to organization, and attitude built through the previousfactors. The purpose of this study is to investigate the influence of the factors on the turnoverintention and the decreasing achievement affected by the turnover. For this study, the perceived organizational support and organization commitment were chosen as worker's attitude variables which affects turnover intention. The results through the actual analysis are as follows:1. Worker's emotional commitment is on the increase when the organization values theirincreased efforts as precious and makes efforts to improve welfare system. 2. Worker's turnover intention decreases as the stronger emotional commitment enables them togain more consciousness to stay longer at the company. 3. The worker who possesses stronger lasting commitment tends to have some inclination toleave his current position if other organization offers compensation enough to make up forthe current investment. 4. Worker's turnover intention decreases when they perceive that the organizationacknowledges employees' value and supports them. 5. Worker's turnover intention at the small-middle sized companies is higher than at majorcompanies. In this study, four out of five hypotheses, which are based on theoretical examinations andbackgrounds, gain verified results. In the end, it is showed that the perceived organization support can increase the emotionalcommitment which makes it possible to decrease turnover intention. Consequently, it can be said that the appropriate human resources management is to explorethe ways to decrease worker's turnover intention by improving labor environment and searching forthe way to promote worker's commitment to their organization through the perceived organizationsupports
  • 17.

    A Study on the Correctional Policy through Comparison of Juvenile Delinquents and Normal Adolescents: Focusing on Self-esteem and Sociality

    leedn | 2014, 19(1) | pp.169~179 | number of Cited : 7
    Abstract PDF
    This study conducted a comparison analysis of the differences by scope between juveniledelinquents, under sentence of juvenile protective disposition, and normal middle․high schoolboys’ self-esteem and sociality; it aims to search for the correctional policy to prevent juveniledelinquency. I conducted a survey, as a sampling target, of students (84) at DaedeokJuvenile Reformatory, located in Daejeon-si, Korea, and the normal middle․high school boys(230). The results of analysis showed that in the analysis of self-esteem difference, juvenile delinquents were found high in the global self-esteem and school-academic self-esteem, butthe normal adolescents were found high only in the scope of family-parents self-esteem. Inleadership, a subordinate scope of sociality, juvenile delinquents showed the high result, andin independence and cooperativity, normal adolescents were found high. In conclusion, as thedistinction between self-esteem and sociality is different by scope, depending on theindividual’s characteristic and environment, it suggests that the correctional policy throughthe customized plan is effective at preventing delinquency.
  • 18.

    The Effects of Teenagers' Brand Perceptions on their Sociability -Focusing on Policy Implications-

    Kim, Kyeongsook | Hwie- Seo, Park | 2014, 19(1) | pp.181~189 | number of Cited : 2
    Abstract PDF
    The purpose of this study is to suggest some policy implications for the youth through empiricalstudy about the effects of middle school students' brand perception on their sociability. For thepurpose of this study, this study established a causal model about the relationships between brand perception and sociability through review of previous studies and surveyed for empirical research. The results of this study are presented as follows: Preference, imitation, and relevance as brandpurchase elements of teenagers affected their self-esteem and empathy for others significantly. Self-esteem that is meditating variable in this study did not have a significant effect on sociability,while empathy for others had a great effect on it. This study suggested policy implications forteenagers to have good standards and a sense of value in a brand purchase.
  • 19.

    The Analysis of Informatics Gifted Elementary Students’ Computational Problem Solving Approaches in Puzzle-Based Learning

    Eunkyoung Lee | Jeongwon Choi | Lee Youngjun | 2014, 19(1) | pp.191~201 | number of Cited : 4
    Abstract PDF
    The purpose of this study is to propose strategies of puzzle-based learning for Informatics giftededucation through analyzing Informatics gifted elementary students’ computational problem solvingapproaches in puzzle-based learning contexts. Six types of educational puzzles, which areconstraints, optimization, probability, statistically speaking, pattern recognition, and strategy, were used in teaching 14 Informatics gifted students for 8 sessions. The results of pre and posttest and each students’ answers were analyzed to identify why students were not able to solve thepuzzles. We also analysed what essential computational strategies are needed to solve each type ofpuzzles, and what students did not know in solving puzzle problems. We identified some problemscaused by puzzle representation methods, and various students’ intuitions that disturb puzzlesolving. Also, we identified essential computational strategies to solve puzzles: backtracking,dynamic programming, abstraction, modeling, and reduction of big problem. However, students haddifficulties in applying these strategies to solve their puzzle problems. We proposed the revisedpuzzle-based learning strategies, which is based on the improved problem representation,just-in-time cognitive feedbacks, and web-based learning system.
  • 20.

    User Satisfaction Analysis on Similarity-based Inference Insect Search Method in u-Learning Insect Observation using Smart Phone

    전응섭 | 2014, 19(1) | pp.203~213 | number of Cited : 2
    Abstract PDF
    In this study, we proposed a new model with ISOIA (Insect Search by Observation based onInsect Appearance) method based on observation by insect appearance to improve user satisfaction,and compared it with the ISBC and ISOBC methods. In order to test these three insect searchsystems with AHP method, we derived three evaluation criteria for user satisfaction and three sub-evaluation criteria by evaluation criterion. In the ecological environment, non-experts needinsect search systems to identify insect species and to get u-Learning contents related to theinsects. To assist the public the non-experts, ISBC (Insect Search by Biological Classification)method based on biological classification to search insects and ISOBC (Insect Search byObservation based on Biological Classification) method based on the inference that identifies theobserved insect through observation according to biological classification have been provided. Inthe test results, we found the order of priorities was ISOIA, ISOBC, and ISBC. It shows that theISOIA system proposed in this study is superior in usage and quality compared with the previousinsect search systems.