Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2015, Vol.20, No.1

  • 1.

    Implementation and Performance Evaluation of a Video-Equipped Real-Time Fire Detection Method at Different Resolutions using a GPU

    손동구 | Cheol Hong Kim | Jong Myon Kim | 2015, 20(1) | pp.1~10 | number of Cited : 1
    Abstract PDF
    In this paper, we propose an efficient parallel implementation method of a widely used complexfour-stage fire detection algorithm using a graphics processing unit (GPU) to improve the performance ofthe algorithm and analyze the performance of the parallel implementation method. In addition, we use seven different resolution videos (QVGA, VGA, SVGA, XGA, SXGA+, UXGA, QXGA) as inputs of thefour-stage fire detection algorithm. Moreover, we compare the performance of the GPU-based approachwith that of the CPU implementation for each different resolution video. Experimental results using fivedifferent fire videos with seven different resolutions indicate that the execution time of the proposed GPUimplementation outperforms that of the CPU implementation in terms of execution time and takes a25.11ms per frame for the UXGA resolution video, satisfying real-time processing (30 frames per second,30fps) of the fire detection algorithm.
  • 2.

    Use of Support Vector Machines for Defect Detection of Metal Bellows Welding

    박민철 | Young Tae Byun | Dong W. Kim | 2015, 20(1) | pp.11~20 | number of Cited : 0
    Abstract PDF
    Typically welded bellows are checked with human eye and microscope, and then go through leakagetest of gas. The proposed system alternates these heuristic techniques using support vector machines. Image procedures in the proposed method can cover the irregularity problem induced from human being. To get easy observation through microscope, 3D display system is also exploited. Experimental resultsfrom this automatic measurement show the welding detection is done within one tenth of permitted errorrange.
  • 3.

    Supervised Rank Normalization with Training Sample Selection

    Heo Gyeongyong | Choi Hun | Youn Joo Sang | 2015, 20(1) | pp.21~28 | number of Cited : 2
    Abstract PDF
    Feature normalization as a pre-processing step has been widely used to reduce the effect of differentscale in each feature dimension and error rate in classification. Most of the existing normalization methods,however, do not use the class labels of data points and, as a result, do not guarantee the optimality ofnormalization in classification aspect. A supervised rank normalization method, combination of ranknormalization and supervised learning technique, was proposed and demonstrated better result than others. In this paper, another technique, training sample selection, is introduced in supervised feature normalization to reduce classification error more. Training sample selection is a common technique forincreasing classification accuracy by removing noisy samples and can be applied in supervisednormalization method. Two sample selection measures based on the classes of neighboring samples andthe distance to neighboring samples were proposed and both of them showed better results than previoussupervised rank normalization method.
  • 4.

    A Multi-Agent MicroBlog Behavior based User Preference Profile Construction Approach

    Kim, JeeHyun | Young Im Cho | 2015, 20(1) | pp.29~37 | number of Cited : 1
    Abstract PDF
    Nowadays, the user-centric application based web 2.0 has replaced the web 1.0. The users gain andprovide information by interactive network applications. As a result, traditional approaches that onlyextract and analyze users’ local document operating behavior and network browsing behavior to build theusers’ preference profile cannot fully reflect their interests. Therefore this paper proposed a preferenceanalysis and indicating approach based on the users’ communication information from MicroBlog, such asreading, forwarding and @ behavior, and using the improved PersonalRank method to analyze theimportance of a user to other users in the network and based on the users’ communication behavior toupdate the weight of the items in the user preference. Simulation result shows that our proposed methodoutperforms the ontology model, TREC model, and the category model in terms of 11SPR value.
  • 5.

    Problems of Korean Mural Villages and Ways to Make Use of Digital Contents

    Eum Yeong-cheol | 2015, 20(1) | pp.39~48 | number of Cited : 2
    Abstract PDF
    In this research the problems and ways to improve the three mural villages and how to make use ofdigital contents have been sought. Three ways of solutions were searched for the problems. Firstly, Thegeographical and cultural advantages of the villages were not in practical use, so in long term, makingproper brands of the villages is recommended. Secondly, most of the paintings are wall paintings. So inthe aspects of esthetics, more wall paintings are encouraged to be made with ceramic works. Lastly,there should be various festivals in connection with the villages. Various smart phone applications shouldbe prepared for easier use of digital contents such as sights, foods, and accommodation, Mural villageshave become one of attractions for both local and foreign tourists. More tourists should feel free to visit the mural villages.
  • 6.

    Development of Augmented Reality Tool for Architectural Design

    Jae Ho Ryu | 2015, 20(1) | pp.49~62 | number of Cited : 1
    Abstract PDF
    In this study we have proposed the prototype of design support device for architectural designassessment using the building information modeling(BIM) data and the augmented reality(AR) technology. The proposed system consists of novel hardware composition with the transparent display, the mock-upmodel and the digital architectural model in the new shape of frame. The removal of background and the correction of viewer point in the capture video are proposed in order to use the transparent display in ARapplication. The BIM data formats are reviewed to be converted for using in AR application. Also theproposed system can be expanded to multi-user collaboration system from two user system through thesuggested hardware and software compositions. The results of this study will be applied to use themock-up model and digital architectural model in order to carry out the design assessment processefficiently and economically in the architectural design field.
  • 7.

    A quality improvement scheme of magnified image using effectively the various curved surface characteristics of Image

    Soo-Mok Jung | 2015, 20(1) | pp.63~73 | number of Cited : 0
    Abstract PDF
    In this paper, a quality improvement scheme is proposed for magnified image using the various curvedsurface characteristics of image. After testing horizontal and vertical directional surface characteristics ofsource image, interpolation value is calculated to have the surface characteristics such as simple convexsurface, simple concave surface, and compound surface. The calculated interpolation value become thevalue of the interpolated pixel of magnified image. The calculated interpolation value is closer to the pixelvalue of real image. So, the quality of the magnified image is improved. The PSNR value of the magnifiedimage using the proposed scheme is larger than the PSNR values of the magnified image using the existingtechniques.
  • 8.

    A Study on The Correlation Between Ego-state and Five Factor Model for Game Character’s Personality

    Misun Kim | Il Ju Ko | 2015, 20(1) | pp.75~83 | number of Cited : 1
    Abstract PDF
    As the importance of realistic game character in order to cause the interest of player is increased , itis necessary to develop the character that acts like a man by applying the human characteristics in thestep of game character design. Formerly, there is a limit to create the human-like character because thereis no set the character’s personality in the game developing level. In this paper, therefore, we propose the correlation between Five Factor Model and Ego-state for game character. Five Factor Model andEgo-state are theories about person’s characteristic. Five Factor Model is personality description method. Ego-state has an emphasis on internal mental processes directly from observable behaviors. In this regard,these theories could be used to the character defined its personality and designed to act by personality. To do this, it needs to determine the relations between Five Factor Model and Ego-state. Therefore weseek for the relations between two theories using Adjective Check List(ACL) and analysis their resultswith surveys. In the future, it is expected to construct a personality model using these analysis results,and develop the character based on realistic behavior.
  • 9.

    Design of Heuristics Using Vertex Information in a Grid-based Map

    김지혜 | 정예원 | Kyeonah Yu | 2015, 20(1) | pp.85~92 | number of Cited : 2
    Abstract PDF
    As computer game maps get more elaborate, path-finding by using A* algorithm in grid-based gamemaps becomes bottlenecks of the overall game performance. It is because the search space becomes largeas the number of nodes increases with detailed representation in cells. In this paper we propose anefficient pathfinding method in which the computer game maps in a regular grid is converted into thepolygon-based representation of the list of vertices and then the visibility information about vertices ofpolygons can be utilized. The conversion to the polygon-based map does not give any effect to thereal-time query process because it is preprocessed offline. The number of visited nodes during search can be reduced dramatically by designing heuristics using visibility information of vertices that make theaccuracy of the estimation enhanced. Through simulations, we show that the proposed methods reduce thesearch space and the search time effectively while maintaining the advantages of the grid-based method.
  • 10.

    A study to Predictive modeling of crime using Web traffic information

    박정민 | 정영석 | Park Koo Rack | 2015, 20(1) | pp.93~101 | number of Cited : 1
    Abstract PDF
    In modern society, various crimes is occurred. It is necessary to predict the criminal in order toprevent crimes, various studies on the prediction of crime is in progress. Crime-related data, is announcedto the statistical processing of once a year from the Public Prosecutor's Office. However, relative to thecurrent point in time, data that has been statistical processing is a data of about two years ago. It does notfit to the data of the crime currently being generated. In This paper, crime prediction data was apply with Naver trend data. By using the Web traffic Navertrend, it is possible to obtain the data of interest level for crime currently being generated. It was constructed a modeling that can predict the crime by using traffic data of the Naver web search. Therehave been applied to Markov chains prediction theory. Among various crimes, murder, arson, rape,predictive modeling was applied to target. And the result of predictive modeling value was analyzed. As aresult, it got the same results within 20%, based on the value of crime that actually occurred. In thefuture, it plan to advance research for the predictive modeling of crime that takes into the characteristicsof the season.
  • 11.

    Edge Restoration in Blurred Image using 1/4 Selective Filter

    Woojin Jeong | 이종민 | 김재영 and 1other persons | 2015, 20(1) | pp.103~110 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a deblurring method using 1/4 selective filter. Deblurring methods require alot of processing time for deblurring. In order to enhance execution speed, we propose a novel 1/4selective filter. The proposed 1/4 selective filter restores major edge, but it distorts minor edge andtexture. To solve this problem, we apply 1/4 selective filter to restore major edge and DOG(Difference ofGaussian) filter to restore minor edge and texture. Experimental results show that the proposed methodremoves the blur effectively.
  • 12.

    Independent Set Bin Packing Algorithm for Routing and Wavelength Assignment (RWA) Problem

    Sang-Un, Lee | 2015, 20(1) | pp.111~118 | number of Cited : 3
    Abstract PDF
    This paper deals with the routing and wavelength assignment problem (RWAP) that decides the bestlightpaths for multiple packet demands for   in optical communication and assigns the minimum numberof wavelengths to given lightpaths. There has been unknown of polynomial-time algorithm to obtain theoptimal solution for RWAP. Hence, the RWAP is classified as NP-complete problem and one can obtain theapproximate solution in polynomial-time. This paper decides the shortest main and alternate lightpath withsame hop count for all    for given network in advance. When the actual demands of communication forparticular multiple packet for  , we decrease the maximum utilized edge into  utilized number usingthese dual-paths. Then, we put these    into -wavelength bins without duplicated edge. This algorithmcan be get the optimal solution within  computational complexity. For two experimental data, the proposed algorithm shows that can be obtain the known optimal solution.
  • 13.

    Password-based user authentication scheme using a dual-display method

    slyong | 2015, 20(1) | pp.119~125 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a user friendly password input method for mobile devices which is secureagainst SSA. The proposed method is a numeric password input method such as a conventional PINmethod. One of the buttons, numbers and colors, so as to display the two pieces of information to double. The user can select one of the colors or numbers within one button to type in the password. Because anattacker does not know whether the user has entered any color and number, the proposed technique issafe from the SSA. Also to be secure for smudge attacks and password guessing attacks through randomchanges in the number and color information.
  • 14.

    Space Syntax-based Application to Recommend Paths for Female's Safe Leisure Life

    임원준 | Kanghee Lee | 2015, 20(1) | pp.127~135 | number of Cited : 0
    Abstract PDF
    In this paper, we propose and implement an application that recommends safe paths for outdoor leisureactivity of women based on Space Syntax theory. Compared to general navigation systems which focuseson the shortest time or the shortest distance, the proposed application makes safe paths the first priority. It generates path recommendation with regard to accessibility of travel time and correlation of regions andconsiders various risk factors for searching for the safest path. Concludingly, the employed Space Syntaxalgorithm enables the women users to select their own customized paths.
  • 15.

    A study of determination probability function to the hidden inheritance in SR DEVS

    Sangjoon Park | Jongchan Lee | 2015, 20(1) | pp.137~142 | number of Cited : 0
    Abstract PDF
    In the object inheritance of SR DEVS, partial or overall asset inheritance can be possible. To a assetinherited from parent object, by respective dedicated function a child object can implement partial or wholeasset, or not. Even though a child has a inherited asset, if the asset is the hidden property itsimplementation will not be provided. A inherited asset cannot be showed in whole asset implementation, orit can be implemented by special system state. Here, the whole asset implementation means may includetime parameter. In this paper, we describe a determination probability scheme for partial or whole assetinherited from the parent object to determine the hidden inheritance. By the determination probabilityfunction it is decided that the inherited asset will be hidden or normal asset.
  • 16.

    A Framework of User Authentication for Financial Transaction based Multi-Biometrics in Mobile Environments

    SeungJin Han | 2015, 20(1) | pp.143~151 | number of Cited : 0
    Abstract PDF
    Biometric technology has been proposed as a new means to replace conventional PIN or passwordbecause it is hard to be lost and has the low possibility of illegal use. However, unlike a PIN, password,and personal information there is no way to modify the exposure if it is exposed and used illegally. Therefore, the existing single modality with single biometrics is critical when it expose. However in thispaper, we use a multi-modality and multi-biometrics to authenticate between users and TTP or betweenusers and financial institutions. Thereby, we propose a more reliable method and compared this paper withexisted methods about security and performance in this paper.
  • 17.

    A New Locomotor Evaluation System for Mouses Based on Continuous Shooting Images

    Ho Young Kwak | Jisoon Hu | Lee, Won Joo | 2015, 20(1) | pp.153~161 | number of Cited : 1
    Abstract PDF
    In this paper, we propose a locomotor evaluation System for mouse based on continuous shootingimages. In the field of veterinary medicine and animal studies are subjected to using the mouse for thequality of human life. In particular, during the experiments using the artificially created mice injury,through a variety of scoring and a lot of experiments to measure the extent of recovery from the injury. The traditional method of measuring the quantity of exercise while in this experiment was made of amethod for directly observing person. The proposed system performs the continuous shooting per unit oftime specified by the movement of the mouse is extracted from a continuous image shooting with theoutline of a mouse point cloud. And using the extracted point cloud to extract again the inner contour ofthe body of the mouse. So using the new point cloud obtained its center, Then, using the center pointcalculated by accumulating the distance between two points on locomotor evaluation system design andimplement to obtain the total distance the mouse moves over a unit of time.
  • 18.

    Optimal Inventory Level of Bicycle Sharing Service Considering Operation Costs

    김진식 | Lee, Chul Ung | 2015, 20(1) | pp.163~173 | number of Cited : 2
    Abstract PDF
    In this paper, it shows optimal inventory level of bicycle sharing service terminal by maintaining thelowest costs. As the interest to environment and exhaustion of resource increases globally, investment tosustainable transportation increases around advanced countries and interest to efficient transportation,managing and consuming of vehicle increases also. Vehicle sharing service is a model of rental car wherecustomer rent cars for short periods of time often by the hour and its users are increasing for the reasonthat it is more convenient than car rent. In addition, bicycle sharing service is one of the major parts invehicle sharing program and many of country are already managing it. This paper proposes optimal inventory levels of vehicle sharing service's terminal by using simulation calculating operation costs ofvehicle sharing service.
  • 19.

    A Study on Customized Employment Strategy for Utilizing Big Data

    Koo Gun Seo | 2015, 20(1) | pp.175~183 | number of Cited : 6
    Abstract PDF
    In this paper, we propose a analyses the big data of students who are willing to find employment andthus presents strategy for their higher success rate of employment. The experiment covered in this paperis based on female two-year community college students who are yet unsure about their futureemployment. The primary flaw of pervious employment strategy was job opportunity was only based onsimple factors such as student's grade, appearance, and personality due to employers and firms's demand. Therefore, students were less satisfied and often resign. In order to prevent these failures, this paperplans a strategy by analyzing the big data. Furthermore, this is proven by the comparison between 2014 employment statistics and those of previous years, and employment request has been 21.3 percentincreased along with 81.4 percent increase in match rate between firms and graduating students. Mostimportantly, the final success rate of employment presented 63.1 percent increase compared to theprevious year.
  • 20.

    An Improvement of Hospital Reception System using Web Socket

    손만근 | 박기성 | YONG HAE KONG | 2015, 20(1) | pp.185~195 | number of Cited : 2
    Abstract PDF
    During hospital peak times of outpatients, an effective mechanism that informs the newly receiptedpatient information to corresponding medical departments is lacking in current hospital reception systems. Since every department repeatedly searches entire patient reception database in sequential manner toacquire its reception information, this is a significant performance degradation factor in hospitalinformation system. To improve hospital reception system efficiency, we developed two web socket basedsystems, a primary key transmitting batch system and a reception information transmitting real timesystem. The former reduced database access time compared to sequential search system as well as keptsearch time low regardless of receipted patient number. The latter effectively reduced waiting list updating time in request/response patient reception system by eliminating database access.
  • 21.

    A Metrics Set for Measuring Software Module Severity

    Hong Euyseok | 2015, 20(1) | pp.197~206 | number of Cited : 1
    Abstract PDF
    Defect severity that is a measure of the impact caused by the defect plays an important role insoftware quality activities because not all software defects are equal. Earlier studies have concentrated ondefining defect severity levels, but there have almost never been trials of measuring module severity. Inthis paper, first, we define a defect severity metric in the form of an exponential function using thecharacteristics that defect severity values increase much faster than severity levels. Then we define anew metrics set for software module severity using the number of defects in a module and their defectseverity metric values. In order to show the applicability of the proposed metrics, we performed ananalytical validation using Weyuker’s properties and experimental validation using NASA open data sets. The results show that ms is very useful for measuring the module severity and msd can be used to compare different systems in terms of module severity.
  • 22.

    Rule-Based Engine to support Warships' Text Communication

    김규환 | Lee Sang Hoon | 2015, 20(1) | pp.207~216 | number of Cited : 0
    Abstract PDF
    The development of IT technology has brought many changes in military operations. For example, theway of transmitting and receiving information from one another has changed. Partiicularly, in the case ofthe ROK Navy, they utilize encrypted real-time chattig over wireㆍwireless network in operations andtranings. However, text communication is being utilized more in exanging of simple informations, and notfor the partical informations required in the operations and exercises, doctrines and guidebooks are stillbeing used in these cases. Therefore, I have designed a rule-based engine which can provide real-timeinformations by linking ECA rules to text communication, and it has been verified by running virtualscenarios. As a rusult, this engine showed an accuracy of 83% .
  • 23.

    The effects of Perceived Organizational Support on Job Commitment and Organizational Citizenship

    Lee, Hongki | Myoung, Sungmin | 2015, 20(1) | pp.217~225 | number of Cited : 2
    Abstract PDF
    The purpose of this study is to investigate the influence and effects of perceived organizational supporton the organizational citizenship on the basis of perception of the importance of organizational support. Inmodern society, the perception of perceived organizational support and the manufacturing industry as wellhave been becoming more important, and, if, besides the manufacturing industry, the interest in the supportto and the welfare of the employees could be taken in the service and distribution industries, too, theemployees come to realize the organizational support, which causes them to be immersed in their duties and show more organizational citizenship for their organizations and colleagues. Accordingly, in order toenhance the employees’ outcome, the organizations should support their employees and provide help more,letting the employees perceive the support of the organization more actively. Consequently, it can be saidthat the perceived organizational support is able to strengthen the employees’outcome and motivate theorganizational citizenship as well.
  • 24.

    Maximum Degree Vertex-Based Algorithm for Maximum Clique Problem

    Sang-Un, Lee | 2015, 20(1) | pp.227~235 | number of Cited : 0
    Abstract PDF
    In this paper, I propose a linear time algorithm devised to produce exact solution to NP-complete maximum clique problem. The proposed algorithm firstly, from a given graph G=(V,E), sets vertex vi of the maximum degree Δ(G) as clique’s major vertex. It then selects vertex vj of Δ(G) among verticesNG(vi) that are adjacent to vi , only to determine NG(vi)∩ NG(vj) as candidate cliques ω and vk . Next it obtainsω=ω∩ NG(vk) by sorting dG(vk) in the descending order. Lastly, the algorithm executes the same procedure on , G╲ω graph to compare newly attained cliques to previously attained cliques so as to choose the lower. With this simple method, multiple independent cliques would also be attainable. When applied to various regular and irregular graphs, the algorithm proposed in this paper has obtained exact O(n).
  • 25.

    The Estimation of Productivity Considering New Technology Port- Equipment By Using Simulation

    김동원 | 2015, 20(1) | pp.237~246 | number of Cited : 1
    Abstract PDF
    n this paper, Improved productivity models of container terminal are provided by utilizing a simulationconsidering Tandem-lift Quay Crane and transport vehicle of container’s high productivity ‘Alternativeship-to-yard vehicles.’ Feature of this method is deriving the data of tandem-lift Quay Crane andAlternative ship-to-yard vehicles, estimating the productivity model of tandem-lift Quay Crane by usingregression analysis. Tandem-lift Quay Crane is equipment of loading and unloading to increase productivityapproximately by 2 time existing (single, twin) Quay Crane by dealing with four 20ft containers or two 40ft containers at the same. Alternative ship-to-yard vehicles can transfer containers(4TEU) more thanexisting Yard Tractor. This paper is deriving the optimal combination showing the highest productivity byusing simulation considering Tandem-lift Quay Crane and Alternative ship-to-yard vehicles on containerterminals and developing estimating model of productivity by using regression analysis using data ofsimulation.
  • 26.

    A study on the moderation effects of parents and adolescent’s communication in the causal relationships between adolescent’s stress and juvenile’s delinquents

    임금옥 | Gil-hyun Kang | Hwie- Seo, Park | 2015, 20(1) | pp.247~254 | number of Cited : 16
    Abstract PDF
    This study is to explore the effects of adolescent’s stress on juvenile delinquents and the moderatingeffects of communication between adolescent and the parents. For this study, we sampled and surveyed middleschool students. The analytical results are the followings. Juvenile’s stress has a significant effects on juvenile’sdelinquents and the level of communication between juveniles and the parents is an important factor concerned with juvenile’s delinquents. This study suggested some policy implications based on this results.
  • 27.

    A study on the efficient extraction method of SNS data related to crime risk factor

    이종훈 | Ki-Sung Song | 강진아 and 1other persons | 2015, 20(1) | pp.255~263 | number of Cited : 8
    Abstract PDF
    In this paper, we suggest a plan to take advantage of the SNS data to proactively identify theinformation on crime risk factor and to prevent crime. Recently, SNS(Social Network Service) data havebeen used to build a proactive prevention system in a variety of fields. However, when users are collectingSNS data with simple keyword, the result is contain a large amount of unrelated data. It may possiblyaccuracy decreases and lead to confusion in the data analysis. So we present a method that can beefficiently extracted by improving the search accuracy through text mining analysis of SNS data.