Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2014, Vol.19, No.10

  • 1.

    Design Space Exploration of Many-Core Processor for High-Speed Cluster Estimation

    서준상 | Cheol Hong Kim | Jong Myon Kim | 2014, 19(10) | pp.1~12 | number of Cited : 0
    Abstract PDF
    This paper implements and improves the performance of high computational subtractive clusteringalgorithm using a single instruction, multiple data (SIMD) based many-core processor. In addition, thispaper implements five different processing element (PE) architectures (PEs=16, 64, 256, 1,024, 4,096) toselect an optimal PE architecture for the subtractive clustering algorithm by estimating execution time andenergy efficiency. Experimental results using two different medical images and three different resolutions(128x128, 256x256, 512x512) show that PEs=4,096 achieves the highest performance and energyefficiency for all the cases.
  • 2.

    An Integer Programming-based Local Search for the Set Covering Problem

    Hwang Junha | 2014, 19(10) | pp.13~21 | number of Cited : 4
    Abstract PDF
    The set covering problem (SCP) is one of representative combinatorial optimization problems,which is defined as the problem of covering the m-rows by a subset of the n-columns at minimalcost. This paper proposes a method utilizing Integer Programming-based Local Search (IPbLS) tosolve the set covering problem. IPbLS is a kind of local search technique in which the currentsolution is improved by searching neighborhood solutions. Integer programming is used to generateneighborhood solution in IPbLS. The effectiveness of the proposed algorithm has been tested onOR-Library test instances. The experimental results showed that IPbLS could search for the bestknown solutions in all the test instances. Especially, I confirmed that IPbLS could search for bettersolutions than the best known solutions in four test instances.
  • 3.

    The Design and Implementation of OWL Ontology Construction System through Information Extraction of Unstructured Documents

    DaeWoong Jo | ji Woong Choi | Myung Ho Kim | 2014, 19(10) | pp.23~33 | number of Cited : 3
    Abstract PDF
    The development of the information retrieval field is evolving to the research field searching accuratelyfor the information from thing finding rapidly a large amount of information. Personalization and thesemantic web technology is a key technology. The automatic indexing technology about the web documentand throughput go beyond the research stage and show up as the practical service. However, there is alack of research on the document information retrieval field about the attached document type of exceptthe web document. In this paper, we illustrate about the method in which it analyzed the text content of the unstructured documents prepared in the text, word, hwp form and it how to construction OWLontology. To build TBox of the document ontology and the resources which can be obtained from thedocument is selected, and we implement with the system in order to utilize as the instant of theconstructed document ontology. It is effectually usable in the information retrieval and documentmanagement system using the semantic technology of the correspondence document as the ontologyautomatic construction of this kind of the unstructured documents.
  • 4.

    Obstacle Avoidance of Indoor Mobile Robot using RGB-D Image Intensity

    Ki-Hyeon Kwon | Hyung-Bong Lee | 2014, 19(10) | pp.35~42 | number of Cited : 1
    Abstract PDF
    It is possible to improve the obstacle avoidance capability by training and recognizing the obstacleswhich is in certain indoor environment. We propose the technique that use underlying intensity value alongwith intensity map from RGB-D image which is derived from stereo vision Kinect sensor and recognize anobstacle within constant distance. We test and experiment the accuracy and execution time of the patternrecognition algorithms like PCA, ICA, LDA, SVM to show the recognition possibility of it. From the comparison experiment between RGB-D data and intensity data, RGB-D data got 4.2% better accuracy ratethan intensity data but intensity data got 29% and 31% faster than RGB-D in terms of training time andintensity data got 70% and 33% faster than RGB-D in terms of testing time for LDA and SVM,respectively. So, LDA, SVM have good accuracy and better training/testing time to use for obstacleavoidance based on intensity dataset of mobile robot.
  • 5.

    Gunnery Classification Method Using Profile Feature Extraction in Infrared Images

    김재협 | 조태욱 | 천승우 and 2other persons | 2014, 19(10) | pp.43~53 | number of Cited : 3
    Abstract PDF
    Gunnery has been used to detect and classify artilleries. In this paper, we used electro-optical data toget the information of muzzle flash from the artilleries. Feature based approach was applied; we firstdefined features and sub-features. The number of sub-features was 38~40 generic sub-features, and 2model-based sub-features. To classify multiclass data, we introduced tree structure with clustering theclasses according to the similarity of them. SVM was used for each non-leaf nodes in the tree, as asub-classifier. From the data, we extracted features and sub-features and classified them by the treestructure SVM classifier. The results showed that the performance of our classifier was good for ourmuzzle flash classification problem.
  • 6.

    An Adaptive Background Formation Algorithm Considering Stationary Object

    Jeong, Jong Myeon | 2014, 19(10) | pp.55~62 | number of Cited : 0
    Abstract PDF
    In the intelligent video surveillance system, moving objects generally are detected by calculatingdifference between background and input image. However formation of reliable background is known to bestill challenging task because it is hard to cope with the complicated background. In this paper we proposean adaptive background formation algorithm considering stationary object. At first, the initial background isformed by averaging the initial N frames. Object detection is performed by comparing the current inputimage and background. If the object is at a stop for a long time, we consider the object as stationaryobject and background is replaced with the stationary object. On the other hand, if the object is a moving object, the pixels in the object are not reflected for background modification. Because the proposedalgorithm considers gradual illuminance change, slow moving object and stationary object, we can formbackground adaptively and robustly which has been shown by experimental results.
  • 7.

    Recognition of Partially Occluded Binary Objects using Elastic Deformation Energy Measure

    문영인 | KOO JA YOUNG | 2014, 19(10) | pp.63~70 | number of Cited : 0
    Abstract PDF
    Process of recognizing objects in binary images consists of image segmentation and pattern matching. If binary objects in the image are assumed to be separated, global features such as area, length ofperimeter, or the ratio of the two can be used to recognize the objects in the image. However, if such anassumption is not valid, the global features can not be used but local features such as points or line segments should be used to recognize the objects. In this paper points with large curvature along theperimeter are chosen to be the feature points, and pairs of points selected from them are used as localfeatures. Similarity of two local features are defined using elastic deformation energy for making thelengths and angles between gradient vectors at the end points same. Neighbour support value is definedand used for robust recognition of partially occluded binary objects. An experiment on Kimia-25 datashowed that the proposed algorithm runs 4.5 times faster than the maximum clique algorithm with samerecognition rate.
  • 8.

    Design of Microstrip Array Antenna for Satellite Reception

    Kim, Jang Wook | 전주성 | 2014, 19(10) | pp.71~79 | number of Cited : 0
    Abstract PDF
    In this paper, the microstrip array antenna is studied to replace the parabolic antenna in the directsatellite reception. A microstrip array antenna has been used in extremely limited area, but if it is appliedto practical life like a direct satellite reception antenna, we expect that it will be used in various way. First of all, if we use a microstrip array antenna for a direct satellite reception antenna, it should be guaranteedcharacteristics of broadband frequency. Therefore, the goal of this paper is designing technique an antennawhich guarantees broadband frequency band for a direct satellite reception. In this paper, the proposedmicrostrip antenna is fed by orthogonal two feed lines to a rectangular patch and a sequentially rotatedfeeding technique is designed proposed for a good axial ratio in broadband frequency band. Therectangular patch is designed to satellite reception band, and the width and length are W=L=8.9 mm (0.352λo) respectively. The antenna’s ground plane has dimensions of 250×250 mm. The experimental resultsverify that the proposed antenna had the axial ratio of above 1dB broader than that of the conventionalfeeding antenna. In order to verify the performance, a 8×8 array having two pairs was fabricated andtested. The maximum gain is 20.8 dB, the sidelobe level confirm less than .10 dB. It is verified by linkbudget calculation that C/N=6.7 dB can be obtained for domestic use if this proposed antenna is used inKoreasat reception system.
  • 9.

    Design of System for Avoiding upload of Identical-file using SA Hash Algorithm

    황성민 | Seog-Gyu Kim | 2014, 19(10) | pp.81~89 | number of Cited : 1
    Abstract PDF
    In this paper, we propose SA hash algorithm to avoid upload identical files and design server systemusing proposed SA hash algorithm. Client to want to upload file examines the value of SA hash and if thesame file is found in server system client use the existing file without upload. SA hash algorithm which is able to examine the identical-file divides original file into blocks of n bits. Original file’s mod i bit and output hash value’s i bit is calculated with XOR operation. It is SA hashalgorithm’s main routine to repeat the calculation with XOR until the end of original file. Using SA hashalgorithm which is more efficient than MD5, SHA-1 and SHA-2, we can design server system to avoid uploading identical file and save storage capacity and upload-time of server system.
  • 10.

    A Design and Implementation of Mobile Game Based on Windows Phone Platform

    박진양 | 2014, 19(10) | pp.91~97 | number of Cited : 1
    Abstract PDF
    In this paper, we design and implement a mobile game based on windows phone platform. Visual Studioand the Windows Mobile software development kit(SDK) and developer tool kits (DTK) make it possible tocreate software for the Windows Mobile platform in Visual C#. Also The XNA Framework is the set of.NET libraries that developers will code against to build games. XNA Framework support PC and XBOXand a ZUNE HD multiplex platform environment and 2D and 3D games provides the necessary functions toa development. XNA Framework is to make it easier to develop games because the codes which aresucceeded creates with automatic, implements a game development relation resource and the game logic. The key idea of our game is that we use shooting and ranking system to raise fun.
  • 11.

    Contents Error and Security Analysis of 'Security Analysis and Improvements of a Biometrics-based User Authentication Scheme Using Smart Cards'

    Mi Og Park | Oh Gi Oug | 2014, 19(10) | pp.99~106 | number of Cited : 0
    Abstract PDF
    In this paper, we analyze weaknesses of the biometrics-based user authentication scheme proposed byAn. The result of analysis An’s authentication scheme by the login success scenario proposed in thispaper, if the attacker successes to get user’s random number, he/she can pass user authentication phaseof the legal server. Also the biometrics guessing scenario proposed in this paper shows the legal user’sthe biometric information is revealed in lost smart card. Since An’s authentication scheme submit user ID and biometrics in plain text to the server, it is very vulnerable to inner attack and it is not provide theuser anonymity to the server as well as the one to the third by user ID in plain text. Besides An’sauthentication scheme is contextual error too, due to this, it has weakness and so on that it did not checkthe validity of the smart card holder.
  • 12.

    The design of the expanded BYOD solutions for business mobile users

    박재경 | 김성진 | 2014, 19(10) | pp.107~115 | number of Cited : 1
    Abstract PDF
    In recent years, large companies and public institutions in the Smartphone business purposes has beenused a lot. Personal Smartphone are worried about security of personal information only. But if you are acorporate or business purposes requires a more cautious approach. It can destroy an organization'snetwork to hack Smartphones have very serious damage. For this purpose, the existing solution, and tryto solve security issues with MDM or MAM. However, Smartphone users discomfort and there is a limit oforganizational control. In this paper, we can propose with these issues more broadly would like to suggest. Secure mobile traffic management system enables companies or agencies the ease for users to use a Smartphone. And, for organizations that provide smart phones are more powerful and can provide a meansof control. In addition, wired/wireless integration and security measures that can provide new services to offer.
  • 13.

    Case Analysis of Legal System and Regulations according to the Needs of S/W Development Security

    SeongYoon Shin | Jeong,Kil Hyun | 2014, 19(10) | pp.117~124 | number of Cited : 1
    Abstract PDF
    Software Development Security is defined as a sequential procedure such as deleting potential securityvulnerability for secure software development, designing or implementing various functions withconsidering security, and so on. In this paper, we research on domestic or international hacking cases thatcould damage us mentally or financially. Seventy five percent of Web-site attacks abuses weak points ofapplication programs, or software. We also research on major issues related to software developmentsecurity with these demerits. And then, we propose public and private laws, regulations, or systems andgive some examples with detailed descriptions.
  • 14.

    A Development of Hotel Bankruptcy Prediction Model on Artificial Neural Network

    최성주 | Lee, Sangwon | 2014, 19(10) | pp.125~133 | number of Cited : 1
    Abstract PDF
    This paper develops a bankruptcy prediction model on an Artificial Neural Network for hotelmanagement. A bankruptcy prediction model has a specific feature to predict a bankruptcy of the wholehotel business after evaluate bankruptcy possibility on the basis of business performance data of eachbranch. here are many traditional statistical models for bankruptcy prediction such as MultivariateDiscriminant Analysis or Logit Analysis. However, we chose Artificial Neural Network because the methodhas accuracy rates of prediction better than those of other methods. We first selected 100 goodenterprises and 100 bankrupt enterprises as experimental data and set up a bankruptcy prediction modelby use of a tool for Artificial Neural Network, NeuroShell. The model and its experiments, which demonstrated high efficiency, can certainly provide great help in decision making in the field of hotelmanagement and in deciding on the bankruptcy or financial solidity of each branch of serviced residence hotel.
  • 15.

    Design and Implementation of Android-based Open U-Learning System for Improve Learning Effect : Focusing on 2009 revised science education courses

    김윤수 | JUHONG LEE | 2014, 19(10) | pp.135~149 | number of Cited : 4
    Abstract PDF
    This study proposed the ubiquitous learning system by finding the difficulties which students have in learning the course of science and analyzing the current learning applications that are used commercially. Through case studies, we found 4 problems. First, the request of long learning time by most of theexisting video-based learning applications. Second, it is impossible to know their level of learning due tothe lack of open learning contents. Third, it is difficult for learners to participate in interactive learning. Fourth, there are educational contents without considerations on the level of learners. To refine thedifficulties due to these problems, we designed and implemented a new ubiquitous learning system whichapplies the small learning contents for short-term learning, open learning system and enhancedhierarchical learning contents. The system was implemented based on Android. It provides learners withuseful science education. We conducted a questionnaire for third grade middle school students in order toshow that the proposed system has a good educational effects. The questionnaire asks for the differencesbetween the proposed ubiquitous learning system and the existing learning application. We concluded thatthe proposed system is better than the existing application by using t-test for improvement of learningeffects using feedback with which students participate in interactive learning but not in unidirectionallearning, and share the learning result.
  • 16.

    Implementation of N-screen based solar power monitoring system

    Lee, Kyung-Ho | HEE WAN PARK | 2014, 19(10) | pp.151~158 | number of Cited : 2
    Abstract PDF
    In this paper, we have designed and implemented the ‘N-screen based solar power monitoring system’using N-screen technology by improving the existing monitoring system that can only be accessed orcontrolled by PC. The HW of the system is consists of solar power modules, inverter, and relay server. And SW isimplemented in consideration of the following three points. First, we applied the N-screen technology inorder to support various devices. Second, we applied 1:N communication technology that multiple devicescan be connected simultaneously to the relay server. Third, we also considered the security proble between server and devices. The final system has been evaluated through the operational test and received good reviews from thetechnical and economic point. In the future, we are expecting that this technology will replace the existingmonitoring systems in various fields, like smart home, smart building, smart city, smart industry, and smartagriculture, etc.
  • 17.

    Design and Implementation of Real-time Audio and Video System Using Red5 and Node.js

    Kim, Hyeock-Jin | 곽우영 | 2014, 19(10) | pp.159~168 | number of Cited : 0
    Abstract PDF
    The Web is a way to share documents and communicate. However, voice and video data can betransmission in real time and currently being developed by the objects and the objects that interact tofurther develop the Internet. Existing video and audio programs to transmission data to the interface ofdifferent types of systems a lot of constraint condition on the cost of the interface, extensibility. In this paper, voice and audio transmission system a different operating system, improve the constraints of the ERP system compatibility and extensibility is a open source based system developed by theresearch. The program is different types of systems and interface, extensibility with program design anddevelopment methodologies, and open source-based system composed This system is good for cost savingand extensibility. Therefore, systems research and development, Extensibility and excellent on theinterface, system design and development methodologies, such as real-time video conferencing, HMI, andtake advantage of your video available from SNS.
  • 18.

    Maximum Profit Priority Goods First Loading Algorithm for Barge Loading Problem

    Sang-Un, Lee | 2014, 19(10) | pp.169~173 | number of Cited : 1
    Abstract PDF
    Nobody has yet been able to determine the optimal solution conclusively whether NP-completeproblems are in fact solvable in polynomial time. Guéret et al. tries to obtain the optimal solution usinglinear programming with O(m⁴) time complexity for barge loading problem a kind of bin packing problemthat is classified as nondeterministic polynomial time (NP)-complete problem. On the other hand, this papersuggests the loading rule of profit priority rank algorithm with O(mlogm) time complexity. This paperdecides the profit priority rank firstly. Then, we obtain the initial loading result using the rule of loadingthe good has profit priority order. Finally, we balance the loading and capability of barge swap the goodsof unloading in previously loading in case of under loading. As a result of experiments, this algorithmreduces the O(m⁴) of linear programming to O(mlogm) time complexity for NP-complete barge loading problem.
  • 19.

    Effect of Purchase Intention of Location-Based Services : Focused on Privacy-Trust-Behavioral Intention Model

    Sung-Hee Jang | 2014, 19(10) | pp.175~184 | number of Cited : 4
    Abstract PDF
    The purpose of this study is to examine the factors influencing purchase intention of Location-BasedServices (LBS) using privacy-trust-behavioral intention model. This model tests various theoreticalresearch hypotheses relating to LBS, privacy-trust-behavioral intention model, and Concern forInformation Privacy(CFIP). The target population of this study was LBS users. Data for this study werecollected from January 21 to March 20, 2014. The data were gathered from 231 questionnaire respondentswith experience using LBS. Among these reponses, 21 were excluded because of missing or inappropriate data. After removing the unsuitable questionnaires, a total of 210 surveys were considered for analysis. The results of hypothesis testing are as follows. First, location awareness positively influence privacyconcerns. Second, privacy concerns negatively influence trust. Finally, trust positively influence purchaseintention. The results of this study will provide various implication to improve purchase intention of LBS.
  • 20.

    A Design Of Role-based Emergency Medical Information Security System REMISS

    KIMHYEONGHOON | Cho Jeong Ran | 2014, 19(10) | pp.185~195 | number of Cited : 1
    Abstract PDF
    In this paper, we designed a role-based emergency medical information security system REMISS addedthe security concept to the existing emergency medical information system. Also we suggested a REMISSprotocol based on HL7 for using the emergency medical information and the security information. Theprocedure of security consists of user authentication phase and role/permission assign phase in theREMISS. The REMISS can supply proper security service since the REMISS assign proper permissions toeach users of emergency medical information system and allow the user to access the permittedemergency medical information by using security information of the REMISS. There are some advantagesthat REMISS can adapt to the changing of the role of each user by dynamic exchanging the securityinformation and assigning permissions to each user.
  • 21.

    A Study on the Efficiency of Logistics Systems through the Operation of a Freight Car Sharing Information System among Companies

    Kim Byeong-Chan | 2014, 19(10) | pp.197~205 | number of Cited : 3
    Abstract PDF
    This study set out to develop a logistics rationalization model to reduce logistics costs including returnroute costs by using open information systems that overcame the limitations of the old closed logisticssystems by the corporations and applying the principle of freight car sharing among them. In recent years,information infrastructure that can be easily shared by many such as information networks, however, Oneof the causes of rising logistics costs is high empty transfer rates on return routes after goods aretransported from the distribution center of each company to consumption sites, It is propose to promote logistic efficiency and innovation. The study especially identified a logistics rationalization plan by examining and analyzing the stages oftransportation on the circulation route of a distribution system from the distribution center of a corporationto consumption sites and the empty transfer rates and their current state.
  • 22.

    Effect of socal media use motive and credibility on social capital

    박진우 | 김덕중 | 2014, 19(10) | pp.207~219 | number of Cited : 11
    Abstract PDF
    The purpose of this study was to investigate the effect of social media use motive and credibility onsocial capital. In particular, it explored the motivations for the use of most influential SNS in Korea,Facebook. The result of analysis showed that the use motive, information exchange and makingrelationship, influenced significantly on social capital. Second, the credibility of social media influencedsignificantly on social capital(bonding social capital and bridging capital).
  • 23.

    Development of Multi-Disciplinary Learning Program for 21st Century Learning Skills

    송정범 | Lee Taewuk | 2014, 19(10) | pp.221~230 | number of Cited : 0
    Abstract PDF
    In this study, we propose a learning method that can be extended to take advantage of the knowledgeof the various disciplines in the project related to the subject to perform the process of restoring stork. The development program is grade 3.4 Group 4 class hours, grade 5.6 Group 4 class hours, total 8 classhours, and in each class hour, it was designed to be extended such creativity, problem solving skills,communication skills and ability to learn, based on knowledge and concepts of the elementary curriculumrelated to storks . Content validity was verified using a method consisting of 12 experts to verify the validity of the program. Feasibility evaluation of Lawshe (1975) content validity ratio for the analysis: weused (Content Validity Ratio CVR) calculation formula. As a result of a feasibility study in total 8 classhours, It was analyzed that match with the development effect except for program of grade 3.4 group 4class hours. grade 3.4 group 4 class hours program was raised this issue for the academic linkage region,was fixed. Later, It is necessary to measure the degree of learning skills improves effectiveness byapplying it to the elementary school students in the proposed research program.