Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

Home > Explore Content > All Issues > Article List

2014, Vol.19, No.9

  • 1.

    Task Balancing Scheme of MPI Gridding for Large-scale LiDAR Data Interpolation

    김선영 , 이희진 , 박승규 and 1 other persons | 2014, 19(9) | pp.1~10 | number of Cited : 0
    Abstract PDF
    In this paper, we propose MPI gridding algorithm of LiDAR data that minimizes thecommunication between the cores. The LiDAR data collected from aircraft is a 3D spatialinformation which is used in various applications. Since there are many cases where the LiDAR data has too high resolution than actually required or non-surface information is included in thedata, filtering the raw LiDAR data is required. In order to use the filtered data, the interpolationusing the data structure to search adjacent locations is conducted to reconstruct the data. Sincethe processing time of LiDAR data is directly proportional to the size of it, there have been manystudies on the high performance parallel processing system using MPI. However, previouslyproposed methods in parallel approach possess possible performance degradations such asimbalanced data size among cores or communication overhead for resolving boundary conditioninconsistency. We conduct empirical experiments to verify the effectiveness of our proposedalgorithm. The results show that the total execution time of the proposed method decreased up to4.2 times than that of the conventional method on heterogeneous clusters.
  • 2.

    Video Transcoding Scheme for N-Screen Service Based on Cloud Computing

    임헌용 , Won Joo Lee , Chang Ho Jeon | 2014, 19(9) | pp.11~19 | number of Cited : 1
    Abstract PDF
    In this paper, we propose a real-time video transcoding scheme for N-Screen service based oncloud computing. This scheme creates an intro-block and several playback blocks by splitting theoriginal video. And there is the first service request, after transmitting the intro-block, transmitsthe playback blocks that converting the blocks on real-time. In order to completing trans-codingwithin playback time of each block, we split and allocate the block to node according toperformance of each node. Also, in order to provide real-time video playback service, the previous scheme convert original video into all format and resolution. However we show that the proposedscheme can reduce storage usage by converting original video into format with proper resolutionsuitable to device and platform of client. Through simulation, we show that it is more effective toreal-time video playback for N-screen service than the previous method. We also show that theproposed scheme uses less storage usage than previous method.
  • 3.

    Exploration of an Optimal Two-Dimensional Multi-Core System for Singular Value Decomposition

    박용훈 , Cheol Hong Kim , Jong Myon Kim | 2014, 19(9) | pp.21~31 | number of Cited : 0
    Abstract PDF
    Singular value decomposition (SVD) has been widely used to identify unique features from adata set in various fields. However, a complex matrix calculation of SVD requires tremendouscomputation time. This paper improves the performance of a representative one-sided block Jacobyalgorithm using a two-dimensional (2D) multi-core system. In addition, this paper explores anoptimal multi-core system by varying the number of processing elements in the 2D multi-coresystem with the same 400MHz clock frequency and TSMC 28nm technology for each matrix-basedone-sided block Jacoby algorithm (128x128, 64x64, 32x32, 16x16). Moreover, this paper demonstrates the potential of the 2D multi-core system for the one-sided block Jacoby algorithmby comparing the performance of the multi-core system with a commercial high-performancegraphics processing unit (GPU).
  • 4.

    A Hybrid RBF Network based on Fuzzy Dynamic Learning Rate Control

    Kwang Baek Kim , Park Choong Shik | 2014, 19(9) | pp.33~38 | number of Cited : 0
    Abstract PDF
    The FCM based hybrid RBF network is a heterogeneous learning network model that appliesFCM algorithm between input and middle layer and applies Max_Min algorithm between middlelayer and output. The Max-Min neural network uses winner nodes of the middle layer as input butshows inefficient learning in performance when the input vector consists of too many patterns. To overcome this problem, we propose a dynamic learning rate control based on fuzzy logic. Theproposed method first classifies accurate/inaccurate class with respect to the difference betweentarget value and output value with threshold and then fuzzy membership function and fuzzydecision logic is designed to control the learning rate dynamically. We apply this proposed RBFnetwork to the character recognition problem and the efficacy of the proposed method is verifiedin the experiment.
  • 5.

    A Study on Light Pen Emulator Implementation using Mouse and Touch Screen

    Youngseok,Cho | 2014, 19(9) | pp.39~44 | number of Cited : 0
    Abstract PDF
    In this paper, we study the light pen emulator implementation that can be used in industrialcomputer. For use in industrial control field, an input device of an industrial machine is anelectronic pen is usually used, but now many cases, a light pen cannot be used to the computer. In this study, the light pen emulator to substitute for the function that is available to theperipheral device on the PC, now. So we want to increase the utilization of industrial computer inthis research. The light pen emulator was designed by USB HOST, CPLD and MPU. Light pen signal, after interpret the input from the touch screen and mouse and USB system data, wasoutput by calculating screen coordinates. As a result, we showed that it is possible to use the computer in a variety of industrial devicessuch as a mouse, digitizer, touch screen, stylus, and designed emulator.
  • 6.

    Authoring Support Technique Using Text Analysis-based Dialogue History Tracking

    김현식 , Seung-Bo Park , O-Joun Lee and 2 other persons | 2014, 19(9) | pp.45~53 | number of Cited : 0
    Abstract PDF
    This paper suggests methods to chronicle and track the history of dialogues exchanged amongcharacters to prevent logical errors of a story. As for stories that are long with many characters,especially in full-length novels and co-written stories, cognitive burden is imposed on a writer. Ifthe writer has confused understanding of a character, then a logical error would enter the story. This would compromise completeness and integrity of writing. Against the backdrop, this paper shows how dialogues among characters are chronicled and tracked by using the aforementionedtracking methods through design of a writer support system that relieves a writer’s cognitiveburden while supporting the writing and through an analysis of existing novels. In addition, weshowed the accuracy results of average 68.5% through the performance evaluation of the queryused in the dialogue history tracking.
  • 7.

    Table-based Effective Estimation of Residual Energy for Battery-based Wireless Sensor System

    김재웅 , Dong Kun Noh | 2014, 19(9) | pp.55~63 | number of Cited : 0
    Abstract PDF
    Up to date, numerous studies on wireless sensor networks have been performed to overcome theEnergy-Constraint of the sensor system. Existing schemes for estimating the residual energy haveconsidered only voltage of sensor system. However battery performance in the real is affected bytemperature and load. In this paper we introduce more accurate scheme, for the use in wirelesssensor node, based on the interpolation of lookup tables which allow for temperature and loadcharacteristics, as well as battery voltage.
  • 8.

    An EIBS Algorithm for Wireless Sensor Network with Life Time Prolongation

    Bae,Shi-Kyu | 2014, 19(9) | pp.65~73 | number of Cited : 3
    Abstract PDF
    Since Time synchronization is also critical in Wireless Sensor Networks (WSN) like othernetworks, a time synchronization protocol for WSN called IBS(Indirect-Broadcast Synchronization)has been already proposed in 2012. As IBS operates in cluster tree topology, network lifetime maybe mainly shortened by cluster head node[s], which usually consumes more power than clustermember (i.e. non-cluster head) nodes. In this paper, I propose enhanced version of IBS (called EIBS)which saves overall energy and prolongs network lifetime by re-constructing partial cluster treelocally. Compared with other tree construction approaches, this tree reconstruction algorithm is notonly simpler, but also more efficient in the light of overall power consumption and network lifetime.
  • 9.

    An Analysis of the Impact of Different Types of Sensors on Wireless Sensor Networks

    Dongmin Choi , Chung, Il Yong , Kim, Seong-yeol | 2014, 19(9) | pp.75~84 | number of Cited : 0
    Abstract PDF
    In this paper, we constructed a sensor network environment where various sensors are used. Then, we evaluated the performance when this environment adopted existing clustering algorithmsthat are designed for only single type sensors network. In our experiments, we considered twodifferent types of the networks. In the first, all nodes are equipped with identical sensors. In thesecond, all nodes are equipped with three different types of sensors. We measured performancevariations of several clustering schemes in accordance with sensor data accuracy, sensor node resource depletion timing, amount of available energy, node isolation ratio, and network lifetime. According to our performance analysis, we proved that existing clustering algorithms are partiallyinefficient to maintain the various-sensor network. Consequently we suggest that a new algorithmis required to take aim at the various sensor network.
  • 10.

    A Study of Definition of Security Requirements on Encryption and Audit Logging

    Seong-Yoon Shin , KangHo-Lee | 2014, 19(9) | pp.85~91 | number of Cited : 2
    Abstract PDF
    Encryption is a method to convert information to no-sense code in order to prevent data frombeing lost or altered by use of illegal means. Audit logging creates audit log of users’ activities,exceptions, and information security events, and then conserves it for a certain period forinvestigation and access-control auditing. Our paper suggests that confidentiality and integrity ofinformation should be guaranteed when transmitting and storing important information inencryption. Encryption should consider both one-way encryption and two-way one and thatencryption key should assure security. Also, all history related to electronic financial transactions should be logged and kept. And, it should be considered to check the details of application accesslog and major information. In this paper, we take a real example of encryption and log audit forsafe data transmission and periodic check.
  • 11.

    Development of Collaborative Script Analysis Platform Based on Web for Information Retrieval Related to Story

    Seung-Bo Park , 김현식 , BAEK, Yeong Tae and 1 other persons | 2014, 19(9) | pp.93~101 | number of Cited : 0
    Abstract PDF
    Movie stories can be retrieved efficiently by analyzing a script, which is a blueprint of themovie. Although the movie script is described in the formatted structure of Final Draft, it is hardto restore the type without analyzing the story of the sentences since the scripts open on thewebsite are mostly broken. For this purpose, it is necessary to develop and provide the web-basedscript analysis software so that users collaboratively and freely check and correct the errors in the results after automatically parsing the script. Hence, in this paper we suggest the structure of theweb-based collaborative script analysis platform that enables users to modify and filter the typeerror of the script for high level of film data accumulation and performance evaluation for theimplementation results is conducted. Through the experiment, accuracy of automatically parsingappears to be 64.95% and performance of modification by collaboration showed 99.58% of accuracyof parsing with errors mostly corrected after passing through 5 steps of modification.
  • 12.

    Designing a Repository Independent Model for Mining and Analyzing Heterogeneous Bug Tracking Systems

    Lee Jaekwon , Woosung Jung | 2014, 19(9) | pp.103~115 | number of Cited : 0
    Abstract PDF
    In this paper, we propose UniBAS(Unified Bug Analysis System) to provide a unified repositorymodel by integrating the extracted data from the heterogeneous bug tracking systems. The UniBASreduces the cost and complexity of the MSR(Mining Software Repositories) research process andenables the researchers to focus on their logics rather than the tedious and repeated works such asextracting repositories, processing data and building analysis models. Additionally, the system notonly extracts the data but also automatically generates database tables, views and storedprocedures which are required for the researchers to perform query-based analysis easily. It can also generate various types of exported files for utilizing external analysis tools or managingresearch data. A case study of detecting duplicate bug reports from the Firfox project of the Mozillasite has been performed based on the UniBAS in order to evaluate the usefulness of the system. The results of the experiments with various algorithms of natural language processing and flexiblequerying to the automatically extracted data also showed the effectiveness of the proposed system.
  • 13.

    The effect of Multicultural Acceptability of Multicultural Family Support Center Workers on Multicultural Attitude

    Kim, Young-Kyo | 2014, 19(9) | pp.117~124 | number of Cited : 3
    Abstract PDF
    This study aimed to analyze a relationship between a cognitive level of multiculturalacceptability and multicultural attitude of Multicultural Family Support Center workers. As aresult of the research with regard to this study purpose, there was a difference between variablesafter analyzing whether it is different between multicultural acceptability depending on socialstatistics characteristic of Multicultural Family Support Center workers, and multiculturalattitude. In addition, it was shown that there was a significant relationship between variables inthe result of analyzing the effect of Multicultural Family Support Center workers' multiculturalperception, ability to form multicultural relationship, and factors of multicultural sympathy onopenness, receptiveness, and flexibility of multicultural attitude. From the result, this research has significance that it suggests a politic alternative to improve the level of multicultural attitudeof Multicultural Family Support Center workers.
  • 14.

    Response Modeling with Semi-Supervised Support Vector Regression

    Dongil Kim | 2014, 19(9) | pp.125~139 | number of Cited : 0
    Abstract PDF
    In this paper, I propose a response modeling with a Semi-Supervised Support Vector Regression(SS-SVR) algorithm. In order to increase the accuracy and profit of response modeling, unlabeleddata in the customer dataset are used with the labeled data during training. The proposed SS-SVRalgorithm is designed to be a batch learning to reduce the training complexity. The labeldistributions of unlabeled data are estimated in order to consider the uncertainty of labeling. Then, multiple training data are generated from the unlabeled data and their estimated labeldistributions with oversampling to construct the training dataset with the labeled data. Finally, adata selection algorithm, Expected Margin based Pattern Selection (EMPS), is employed to reducethe training complexity. The experimental results conducted on a real-world marketing datasetshowed that the proposed response modeling method trained efficiently, and improved theaccuracy and the expected profit.
  • 15.

    The Effect of Community Service Users’ Intention to Repurchase Social Services

    Lee Hyoung Ha , 최한수 | 2014, 19(9) | pp.141~150 | number of Cited : 1
    Abstract PDF
    This study was conducted as an attempt to explain social service users’ intention to repurchasesocial services. For this purpose, it analyzed variables affecting intention to repurchase social services, focusing on service satisfaction and service effect. The subjects of this study were usersparticipating in community service investment programs and local development projects(city/district) in G Metropolitan City. For the survey, the researcher visited institutions providingsocial services and had the subjects answer a self‐administered questionnaire. A total of 607questionnaires were recovered and 553 of them were used in the final analysis. The survey periodwas from the 9th to 24th of September, 2013. According to the results of analysis, intention torepurchase social services was relatively high as 3.62 out of 5. Service satisfaction was 3.97 out of5, and service effect was as high as 4.11 out of 5. According to the results of regression analysison intention to repurchase social services, intention to repurchase services was affectedsignificantly by ‘service accessibility’ (B=.100, p<.01) among the factors of service satisfaction, and‘More adaptable to daily life after getting services’ (B=.206, p<.001) and ‘The current services arenecessary for my family’ (B=.475, p<.001) among the factors of service effect. Based on theseresults, practical suggestions were made for enhancing users’ intention to repurchase socialservices.
  • 16.

    Design and Implementation of the Menu Navigation using Social Network Analysis among the Menus of Management Information System

    MIN JUNG LEE , KIM JUNWOO | 2014, 19(9) | pp.151~160 | number of Cited : 2
    Abstract PDF
    Recently enterprises, which posses high-speed internet and high-performance computers, havetried to use MIS(management information systems) to deal with whole task efficiently. This studyconsiders design of menu navigation using SNA(social network analysis) to be able to movebetween menus of MIS efficiently. We extracted the important menu lists through the high SNA measures such as degree centrality, betweenness centrality and closeness centrality, developedweb-pages and investigated its application. The findings will be used for design of web menunavigation and guide of strategic planning for MIS.
  • 17.

    A Polynomial Time Algorithm for Aircraft Landing Problem

    Sang-Un, Lee | 2014, 19(9) | pp.161~168 | number of Cited : 1
    Abstract PDF
    The optimal solution ofminimumcost for aircraft landing problem(ALP) is very difficult problembecause theapproached aircraft are randomtime interval. Therefore this problemhas been applied by variousmetaheuristicmethods. This paper suggests O(nlogn) polynomial time heuristic algorithm to obtain the optimalsolution for ALP. This algorithm sorts the target time of aircraft into ascending order. Then weapply the optimization of change the landing sequence take account of separation time and the costof landing. For the Airland1 through Airland8 of benchmark data of ALP, we choose 25 data untilthe number of runway m that the total landing cost is 0. We can be obtain the optimal solution forall of the 25 data. Especially we can be improve the known optimal solution for m=1 of Airland8.
  • 18.

    The Impacts of Local Public Servant's Performance Oriented Values on Job Attitude - Focusing on Trust in the Leader-

    Hwie- Seo, Park | 2014, 19(9) | pp.169~176 | number of Cited : 1
    Abstract PDF
    This study is to suggest the theoretical and policy implications by analysing the moderatingeffects of trust for senior in the causal relationships among the research variables. For this study,273 of the local public servants were sampled and surveyed. The results of this study showed thatlocal public servants' performance oriented values affect job attitude through their acceptance forperformance management system. And this study showed that trust in the leader moderates the relationships among individual orientation, performance orientation and job attitude. This studysuggested some theoretical and practical implications on the base of the results.
  • 19.

    A study on the local government's Sustainable expansion plan of volunteer

    김성현 | 2014, 19(9) | pp.177~184 | number of Cited : 0
    Abstract PDF
    This study suggested the necessity of efficient volunteer management plan and continuousvolunteer expansion plan to enhance the continuity of volunteer activity by local government andinduce more systematic and stable volunteer activity. As a prior concrete plans for volunteerexpansion, this study suggested establishing the incentive for expanding continuous volunteersthrough coexisting and cooperation, enhancing the propulsion will and providing an institutionalstrategy of local and metropolitan government heads, improving volunteer's internal capability,and reinforcing administrative support and financial aid. Also this study emphasized theeffectiveness of various volunteer-related matters such as daring support and investment todrastically expand continuous volunteers and their activities.
  • 20.

    Analysis about Learning Objectives of Informatics Textbooks in High School using Anderson’s and Fuller’s Taxonomy of Educational Objectives

    Choe Hyun-Jong | 2014, 19(9) | pp.185~196 | number of Cited : 4
    Abstract PDF
    This study has analyzed the learning objectives in 6 Informatics textbooks that were publishedthis year in the basis of 2009 revised curriculum using Anderson’s taxonomy of EducationalObjectives that was a revision of Bloom’s taxonomy and Fuller’s taxonomy that was presented forprogramming activities. Some dimensions of Anderson’s taxonomy, such as conceptual andprocedural knowledge, understand and apply in cognitive process are much more used in learningobjectives in 6 Informatics textbooks. Interpreting and producing dimensions of taxonomy are wellpresented to balance in 6 Informatics textbooks by analysis of Fuller’s taxonomy. This results will be a good case study in research about taxonomy of educational objectives and development ofInformatics textbooks.
  • 21.

    The Case Study for Path Selection Verification of IGP Routing Protocol

    No-Whan Kim | 2014, 19(9) | pp.197~204 | number of Cited : 2
    Abstract PDF
    RIP, EIGRP, OSPF are the interior gateway protocol for sending and receiving routinginformation among routers in AS(Autonomous System). Various path selection methods using themetric in regard to them have been studied recently but there are few examples that the contentslearners understand theoretically are verified by the practice. The Best Path is determined bycalculating the Cost value based on the relevant topology of each routing protocol. Afterimplementing the virtual network, it is certain that the results tracking and verifying the relevantpath selection of each routing protocol are consistent with the Best Path. If methods suggested in this paper are applied properly, the relevant path selection process ofrouting protocol can be understood systematically. And it is expected that the outstanding results of learning will be able to be achieved.