Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

http://journal.kci.go.kr/jksci
Home > Explore Content > All Issues > Article List

2014, Vol.19, No.11

  • 1.

    A Virtual Machine Remapping Scheme for Reducing Relocation Time on a Cloud Cluster

    김창현 , 김준상 , Chang Ho Jeon | 2014, 19(11) | pp.1~7 | number of Cited : 1
    Abstract PDF
    In this paper, we propose a virtual machine(VM) remapping scheme that reduces VM relocation time ona cloud cluster. The proposed scheme finds VMs that should be migrated in sequence from a given VMmap, and exchanges destinations of some VMs among them to reduce the VM relocation time. The VMs,the destinations of which will be exchanged, are chosen based on the amount of physical machine'savailable resources and migration completion time. The exchange of destinations is repeated until the VMrelocation time cannot be shortened any further. Through a simulation, we show that the proposed schemereduces VM relocation time by 42.7% in maximum.
  • 2.

    A Block Relocation Algorithm for Reducing Network Consumption in Hadoop Cluster

    김준상 , 김창현 , Lee, Won Joo and 1 other persons | 2014, 19(11) | pp.9~15 | number of Cited : 2
    Abstract PDF
    In this paper, We propose a block reallocation algorithm for reducing network traffic in Hadoop cluster. The scheduler of Hadoop cluster receives a job from users. And the job is divided into multiple tasksassigned to nodes. At this time, the scheduler allocates the task to the node that satisfied data locality. Ifa task is assigned to the node that does not have the data(block) to be processed, the task is processedafter the data transmission from another node. There is difference of workload among nodes becauseblocks in cluster have different access frequency. Therefore, the proposed algorithm relocates blocks according to the task allocation pattern of Hadoop scheduler. Eventually, workload of nodes are leveled,and the case of the task processing in a node that does not have the block to be processing is reduced. Thus, the network traffic of the cluster is also reduced. We evaluate the proposed block reallocationalgorithm by a simulation. The simulation result shows maximum 23.3% reduction of network consumptionthan default delay scheduling for jobs processing.
  • 3.

    Bearing Faults Identification of an Induction Motor using Acoustic Emission Signals and Histogram Modeling

    장원철 , 서준상 , Jong Myon Kim | 2014, 19(11) | pp.17~24 | number of Cited : 0
    Abstract PDF
    This paper proposes a fault detection method for low-speed rolling element bearings of an inductionmotor using acoustic emission signals and histogram modeling. The proposed method performs envelopmodeling of the histogram of normalized fault signals. It then extracts and selects significant features ofeach fault using partial autocorrelation coefficients and distance evaluation technique, respectively. Finally,using the extracted features as inputs, the support vector regression (SVR) classifies bearing’s inner, outer, and roller faults. To obtain optimal classification performance, we evaluate the proposed methodwith varying an adjustable parameter of the Gaussian radial basis function of SVR from 0.01 to 1.0 and thenumber of features from 2 to 150. Experimental results show that the proposed fault identification methodusing 0.64-0.65 of the adjustable parameter and 75 features achieves 91% in classification performanceand outperforms conventional fault diagnosis methods as well.
  • 4.

    A Study on Improving the Computational Complexity of SLAM for Intelligent Robot Utilizing Smart Phone

    이철원 , Heung Seok Jeon | 2014, 19(11) | pp.25~31 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a new scheme for enhancing the computational SLAM overhead of intelligentrobots. The idea is to use the idle resource of Smart Phone as a SLAM processor. We designed a newmodel for incorporating the smart phone with robot. According to the experimental results, we found thatthe smart phone was very helpful for improving the SLAM performance and the gain from the smart phonewas increased as robot moves faster.
  • 5.

    Implementation of a Respiration Measurement System Based on a Nonrestraint Approach

    Seokhyang Cho , Cho Seung Ho | 2014, 19(11) | pp.33~41 | number of Cited : 1
    Abstract PDF
    In this paper, we implemented a system to measure respiration rate with nonrestraint sensorscomfortable for people to do their everyday life. The proposed system consists of a pad covered with aPiezoelectric sensor, a respiration measuring device able to send the signal data after amplifying andfiltering the source signals to the viewer, a viewer providing sensor data visualization and implementingthe respiration measuring algorithm. The algorithm is based on a breathing cycle with the local peak pointsextracted from threshold on sensor data. Respiration measurements on 3 subjects were performed bychanging moving averages and thresholds. The proposed system showed less than 5% error rate when proper moving averages are N=50 ∼ 60 and a range of thresholds is 800 ∼ 1300. The system willcontribute to preventing suffocation during sleep for infants and the elderly living alone.
  • 6.

    The Target Detection and Classification Method Using SURF Feature Points and Image Displacement in Infrared Images

    김재협 , 최봉준 , 천승우 and 2 other persons | 2014, 19(11) | pp.43~52 | number of Cited : 6
    Abstract PDF
    In this paper, we propose the target detection method using image displacement, and classificationmethod using SURF(Speeded Up Robust Features) feature points and BAS(Beam Angle Statistics) ininfrared images. The SURF method that is a typical correspondence matching method in the area of imageprocessing has been widely used, because it is significantly faster than the SIFT(Scale Invariant FeatureTransform) method, and produces a similar performance. In addition, in most SURF based objectrecognition method, it consists of feature point extraction and matching process. In proposed method, itdetects the target area using the displacement, and target classification is performed by using the geometry of SURF feature points. The proposed method was applied to the unmanned targetdetection/recognition system. The experimental results in virtual images and real images, we haveapproximately 73~85% of the classification performance.
  • 7.

    Indoor environment recognition based on depth image

    김수경 , HYUNG IL CHOI | 2014, 19(11) | pp.53~61 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a method using an image received by the depth camera in order to separatethe wall in a three-dimensional space indoor environment. Results of the paper may be used to providevaluable information on the three-dimensional space. For example, they may be used to recognize theindoor space, to detect adjacent objects, or to project a projector on the wall. The proposed method firstdetects a normal vector at each point by using the three dimensional coordinates of points. The normalvectors are then clustered into several groups according to similarity. The RANSAC algorithm is applied toseparate out planes. The domain knowledge helps to determine the wall among planes in an indoorenvironment. This paper concludes with experimental results that show performance of the proposed method in various experimental environment.
  • 8.

    Sign Language Recognition System Using SVM and Depth Camera

    김기상 , HYUNG IL CHOI | 2014, 19(11) | pp.63~72 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a sign language recognition system using SVM and depth camera. Especially,we focus on the Korean sign language. For the sign language system, we suggest two methods, one inhand feature extraction stage and the other in recognition stage. Hand features are consisted of thenumber of fingers, finger length, radius of palm, and direction of the hand. To extract hand features, weuse Distance Transform and make hand skeleton. This method is more accurate than a traditional methodwhich uses contours. To recognize hand posture, we develop the decision tree with the hand features. For more accuracy, we use SVM to determine the threshold value in the decision tree. In the experimentalresults, we show that the suggested method is more accurate and faster when extracting hand features arecognizing hand postures.
  • 9.

    Interactive Learning Tool Based on HTML5 Using Unplugged Contents

    Park Myeong Chul , Seok-Gyu Park , Hyun-Syug Kang | 2014, 19(11) | pp.73~79 | number of Cited : 2
    Abstract PDF
    In the period of rising the importance of software education, unplugged activities has drawn attention asone of the various educational approaches. It has a good reputation in educational effectiveness andusefulness in an aspect of learning the principle of computer science. This paper proposes the tool thatallows unplugged learning contents to be used in the web based on HTML5 in order to enhance its meritsand accessibilities. The proposed tool is easy to access because it is operated on the level of web browserwith no plug in or extra application programs. In addition, as a learner focused contents aiming atinteraction on the web environment, it is well organized for school class room.
  • 10.

    Efficient Construction of Emergency Network Using Delaunay Triangulation

    Kim, CHAE KAK , Inbum Kim , 김수인 | 2014, 19(11) | pp.81~90 | number of Cited : 0
    Abstract PDF
    For necessary information sharing or operation control via wire-wireless/mobile network connecting ofdevices at disaster area in greatest need of attention, an emergency network efficient construction methodquickly connecting nodes within specific range using Delaunay triangulation is proposed. The emergencynetwork constructed by proposed method shows the same aggregate network length, but does moreexcellent performance in term of network construction time the more long max length connectable toadjacent node as compared with the network by naive method. In experiment of 1000 input terminal nodes,5 max length connectable to adjacent node, our proposed method enhances 89.1% in execution time without network length increase compared to naive method. So our method can go well to many usefulapplications as shift construction of communication network of adjacent devices, internet of things andefficient routing in the sensor network in continuous improvement of communication capability.
  • 11.

    A weight-based cluster head replacement algorithm in the Internet of Things

    Kim Jeong-won | 2014, 19(11) | pp.91~96 | number of Cited : 1
    Abstract PDF
    Since the sensors of Internet of Things (IOT) collect various data, the lifetime of sensor network isvery important and the data should be aggregated efficiently. The contiguous collection by the certainsensors occurs an excessive battery consumption and successive transmission of same value of datashould be avoided. To solve these things, we propose an weight-based cluster head replacement methodthat divides whole network into several grids and cluster head is selected by remaining energy, density ofalive sensors and location of sensor. The aim of algorithm maximizes the lifetime of network. Oursimulation results shows that the proposed method is very simple as well as balances energy consumption.
  • 12.

    The Definitions of Security Requirements for Control Access on the Step of Analysis

    SeongYoon Shin | 2014, 19(11) | pp.97~103 | number of Cited : 1
    Abstract PDF
    The access control means the process to record and manage access restrictions and permits forprotecting information in records. This paper emphasizes the control of access and authorization based onthe roles and the data using activities of users as task performers. Also, it requires to gain the necessaryapproval in advance for important tasks such as mass inquiry and change on important information toinfluence the very existence of the whole organization. And then, it suggests that it is necessary to controlsome session of information with non-activity for certain time. Generally, this paper is to explain securityelements of access control through various cases.
  • 13.

    A Study on Legal Ontology Construction

    조대웅 , Myung Ho Kim | 2014, 19(11) | pp.105~113 | number of Cited : 7
    Abstract PDF
    In this paper, we propose an OWL DL mapping rules for construction legal ontology based on theanalyzed relationship between the structural features and elements of the statute. The mapping rule to beproposed is the method building the structure of the domestic statute, unique attribute of the statute, andreference relation between laws with TBox, and the legal sentence is analyzed, and the pattern type of thesentence is selected. It expresses with ABox. The proposed mapping rule is transformed to the informationin which the computer can process the domestic legal document. It is usable for the legal knowledge base.
  • 14.

    A Previous Study on Customized Visualization Expression of Personal Health Record

    양중기 , LEE,YONGJOON , Kim, Hae Na and 1 other persons | 2014, 19(11) | pp.115~126 | number of Cited : 0
    Abstract PDF
    In order to improvement of the perceptive of health state and the motivation, this study suggests theways and design forms which provide PHR information customizing individual attributes as well asguidelines through a decision support system and services which integrate medical informationvisualization. Expression methods using the color, form, position in order to visualization based on imagesimproved performance of information awareness by changing radar chart from existing information which provide only numerical figure. The methods providing a graphic figure which seems like beads of bloodwhich shows the result of blood tests would also arise patient’s attention. They gives the patient’sinformation which is able to compare their health status and normal status and visualizes the records as ahuman figure in order to perceiving their status as well. The visualization showing the position of humanbody figures marks in inspection elements located in position of relevant organs. The method also usesicons represent examination results so they improve attention of the results and shorten recognize times.
  • 15.

    Design and Implementation of Interactive-typed Bluetooth Device interact with Android Platform-based Contents Character

    ParkByoungSeob , Choi Hyo Hyun | 2014, 19(11) | pp.127~135 | number of Cited : 0
    Abstract PDF
    Interactive-typed devices and contents that have been often applied in the field of entertainment andgame are the technology that allows you to maximize the enjoyment and participation of users through theinteraction of each. In this paper, we designed an interactive-typed smartphone app that is based on theAndroid platform, implemented the wearable Bluetooth device to control via a interactive interface with avibration sensor and three-axis acceleration sensor. We tested the functionality and 3-axis motion’soperability by using smartphone app, interface interactive-typed device that has been developed, prove useful as a wearable Bluetooth device that has the convenience of the user. Further, it is shown that byimplementing the optimized protocol of the sensor data transfer over Bluetooth, it is possible to reduce themalfunction of the content of the smart phone.
  • 16.

    An Efficient Dynamic Workload Balancing Strategy

    Hyo Kim | 2014, 19(11) | pp.137~147 | number of Cited : 2
    Abstract PDF
    The study aims at exploring motivation, rationale, and values in twitter users' retweet behavior. Itproposes that diffusion of message is based on the complex interactional relationships among attributes oforiginal message, user's rationale, and values. Based on a pilot study, we constructed a total of 34questions asking message attributes, motivation, and values of retweeting. Then, twitter users participatedin an online survey, in which they evaluate their own 5 retweet messages based on the constructedquestions(5 messages x 34 questions = 170). Then, a factor analysis is done in order to see thedimensions of the concepts in retweet behavior; and understand how message attributes, motivations, andvalues are inter-related with each other. The main factors extracted were: (1) public fairness, (2) fun and playfulness, (3) communal help, (4) news and information, etc. Factor 2 and 4 show the traditionaljournalism characteristics; while factor 1 and 3 do alternative journalistic values. The latter may work asa rectifying factors for traditional journalism; however, backfiring mechanism for group polarization. Inaddition, (1) users’ internal identities, (2) communal unity and (3) belongness were identified as rationalesand values for retweet behavior.
  • 17.

    Classification of the Diagnosis of Diabetes based on Mixture of Expert Model

    Lee, Hongki , Myoung, Sungmin | 2014, 19(11) | pp.149~157 | number of Cited : 0
    Abstract PDF
    Diabetes is a chronic disease that requires continuous medical care and patient-self managementeducation to prevent acute complications and reduce the risk of long-term complications. The worldwideprevalence and incidence of diabetes mellitus are reached epidemic proportions in most populations. Earlydetection of diabetes could help to prevent its onset by taking appropriate preventive measures andmanaging lifestyle. The major objective of this research is to develop an automated decision supportsystem for detection of diabetes using mixture of experts model. The performance of the classification algorithms was compared on the Pima Indians diabetes dataset. The result of this study demonstrated thatthe mixture of expert model achieved diagnostic accuracies were higher than the other automateddiagnostic systems.
  • 18.

    How to Express Emotion: Role of Prosody and Voice Quality Parameters

    Sangmin Lee , 이호준 | 2014, 19(11) | pp.159~166 | number of Cited : 3
    Abstract PDF
    In this paper, we examine the role of emotional acoustic cues including both prosody and voice qualityparameters for the modification of a word sense. For the extraction of prosody parameters and voicequality parameters, we used 60 pieces of speech data spoken by six speakers with five different emotionalstates. We analyzed eight different emotional acoustic cues, and used a discriminant analysis technique inorder to find the dominant sequence of acoustic cues. As a result, we found that anger has a close relationwith intensity level and 2nd formant bandwidth range; joy has a relative relation with the position of 2nd and 3rd formant values and intensity level; sadness has a strong relation only with prosody cues such asintensity level and pitch level; and fear has a relation with pitch level and 2nd formant value with itsbandwidth range. These findings can be used as the guideline for find-tuning an emotional spokenlanguage generation system, because these distinct sequences of acoustic cues reveal the subtlecharacteristics of each emotional state.
  • 19.

    Situation-awareness White Cane Using a Mobile Device

    전동희 , 전준욱 , 백화현 and 1 other persons | 2014, 19(11) | pp.167~173 | number of Cited : 4
    Abstract PDF
    A white cane is used by many people who are blind or visually impaired. The studies and developmentsin the field of smart electronic white cane have been progressed to improve walking safety of the visuallyhandicapped person. In this paper, we describe a situation-awareness white cane which support and guidewalking of the visually handicapped person by giving information of surrounding situation throughconnection of a white cane and a mobile device. There are easily accessible buttons in thesituation-awareness white cane. These buttons is connected with the mobile device by blue-tooth, so bypushing these buttons, the visually handicapped person can receive sound-guidance. As a result, thevisually handicapped person can walk more safely by getting more information of situation.
  • 20.

    Swap-Insert Algorithm for Driver Scheduling Problem

    Sang-Un, Lee | 2014, 19(11) | pp.175~181 | number of Cited : 0
    Abstract PDF
    This paper suggests O(m) polynomial time heuristic algorithm to obtain the solution for the driverscheduling problem, DSP, that has been classified as NP-complete problem. The proposed algorithm getsthe initial assignment of n minimum number of drivers from given m schedules. Nextly, this algorithmgets the minimum total time (TC) using 5 rules of swap and insert for decrease of over times (OT) and idletimes (IT). Although this algorithm is a heuristic polynomial time algorithm with O(m)time complexityrules to be find a optimal (or approximate) solution, this algorithm is equal to metaheuristic methods forthe 5 experimental data. To conclude, this paper shows the DSP is not NP-complete problem butPolynomial time (P)-problem with polynomial time rules.
  • 21.

    Factors Affecting the Purchase Intention of Mobile Advertising : Focusing on the Comparison between Korea and Russia

    김승권 , Jong-soo Yoon | 2014, 19(11) | pp.183~192 | number of Cited : 4
    Abstract PDF
    With the rapid mobile phones and global diffusion of mobile marketing it is very important to understandcross-national consumer attitude and behavioral intentions toward mobile marketing as a promotionalchannel. Some areas of mobile advertising still need more investigation. Especially, the topic aboutconsumer attitude toward mobile advertising has been received a considerable amount of attention. Basedon the Technology Acceptance Model (TAM), this study investigates the relationship betweencharacteristic of mobile advertising and purchase intention toward mobile advertising, and analyzesmoderating effect of country type. The result of this study could help researchers and practitioners tounderstand which factors should be managed to increase the effectiveness of mobile advertising.
  • 22.

    The Relationship between Korean People’s Social Capital and Multicultural Acceptance

    Hyoung-Ha Lee | 2014, 19(11) | pp.193~202 | number of Cited : 19
    Abstract PDF
    This study was attempted in order to measure the level of Korean people’s social capital and theirmulticultural acceptance, and to explain the relationship between the sub.factors of social capital(trust,reciprocity, and participation) and the multicultural acceptance. Furthermore, this study aimed to examinethe relative influence of the sub.factors of social capital on the multicultural acceptance and to suggestwhich social capitals should be reinforced. Data on ‘social capital’ and ‘multicultural acceptance’ used inthis study were obtained from the data of the 8th Korean General Social Survey (KGSS) in 2010. The results of analyses are as follows. First, social capital was lower with increase in age (F=28.18, p<.001),and higher with increase in academic qualification (F=15.49, p<.001), and total household income (F=8.85,p<.001). Second, the multicultural acceptance was higher in men (t=9.98, p<01) and lower with increase inage (F=27.29, p<.001), and higher with increase in academic qualification (F=28.99, p<.001), and totalhousehold income (F=11.92, p<.001). Third, among the three social capital factors influencing themulticultural acceptance, ‘trust’ was found to have a significant positive (+) effect. Based on these resultswere suggested various strategies for enhancing Korean people’s multicultural acceptance.