Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2015, Vol.20, No.5

  • 1.

    Index Management Method using Page Mapping Log in B⁺-Tree based on NAND Flash Memory

    Seon Hwan Kim | Kwak, Jong Wook | 2015, 20(5) | pp.1~12 | number of Cited : 0
    Abstract PDF
    NAND flash memory has being used for storage systems widely, because it has good features which are low-price, low-power and fast access speed. However, NAND flash memory has an in-place update problem, and therefore it needs FTL(flash translation layer) to run for applications based on hard disk storage. The FTL includes complex functions, such as address mapping, garbage collection, wear leveling and so on. Futhermore, implementation of the FTL on low-power embedded systems is difficult due to its memory requirements and operation overhead. Accordingly, many index data structures for NAND flash memory have being studied for the embedded systems. Overall performances of the index data structures are enhanced by a decreasing of page write counts, whereas it has increased page read counts, as a side effect. Therefore, we propose an index management method using a page mapping log table in B.-Tree based on NAND flash memory to decrease page write counts and not to increase page read counts. The page mapping log table registers page address information of changed index node and then it is exploited when retrieving records. In our experiment, the proposed method reduces the page read counts about 61% at maximum and the page write counts about 31% at maximum, compared to the related studies of index data structures.
  • 2.

    Hand Feature Extraction Algorithm Using Curvature Analysis For Recognition of Various Hand Gestures

    윤홍찬 | 조진수 | 2015, 20(5) | pp.13~20 | number of Cited : 5
    Abstract PDF
    In this paper, we propose an algorithm that can recognize not only the number of stretched fingers but also determination of attached fingers for extracting features required for hand gesture recognition. The proposed algorithm detects the hand area in the input image by the skin color range filter based on a color model and labeling, and then recognizes various hand gestures by extracting the number of stretched fingers and determination of attached fingers using curvature information extracted from outlines and feature points. Experiment results show that the recognition rate and the frame rate are similar to those of the conventional algorithm, but the number of gesture cases that can be defined by the extracted characteristics is about four times higher than the conventional algorithm, so that the proposed algorithm can recognize more various gestures.
  • 3.

    A shot change detection algorithm based on frame segmentation and object movement

    김승현 | Doosung Hwang | 2015, 20(5) | pp.21~29 | number of Cited : 1
    Abstract PDF
    This paper proposes a shot change detection algorithm by using frame segmentation and the object changes among moving blocks. In order to detect the rapid moving changes of objects between two consecutive frames, the moving blocks on the diagonal are defined, and their histograms are calculated. When a block of the current frame is compared to the moving blocks of the next frame, the block histograms are used and the threshold of a shot change detection is automatically adjusted by Otsu‘s threshold method. The proposed algorithm was tested for the various types of color or gray videos such as films, dramas, animations, and video tapes in National Archives of Korea. The experimental results showed that the proposed algorithm could enhance the detection rate when compared to the studied methods that use brightness, histogram, or segmentation.
  • 4.

    A Degree-Constrained Minimum Spanning Tree Algorithm Using k-opt

    Sang-Un, Lee | 2015, 20(5) | pp.31~39 | number of Cited : 2
    Abstract PDF
    The degree-constrained minimum spanning tree (d-MST) problem is considered NP-complete for no exact solution-yielding polynomial algorithm has been proposed to. One thus has to resort to an heuristic approximate algorithm to obtain an optimal solution to this problem. This paper therefore presents a polynomial time algorithm which obtains an intial solution to the d-MST with the help of Kruskal's algorithm and performs k-opt on the initial solution obtained so as to derive the final optimal solution. When tested on 4 graphs, the algorithm has successfully obtained the optimal solutions.
  • 5.

    A Brute-force Technique for the Stepping Stone Self-Diagnosis of Interactive Services on Linux Servers

    Koohong Kang | 2015, 20(5) | pp.41~51 | number of Cited : 0
    Abstract PDF
    In order to hide their identities, intruders on the Internet often attack targets indirectly by staging their attacks through intermediate hosts known as stepping stones. In this paper, we propose a brute-force technique to detect the stepping stone behavior on a Linux server where some shell processes remotely logged into using interactive services are trying to connect other hosts using the same interactive services such as Telnet, Secure Shell, and rlogin. The proposed scheme can provide an absolute solution even for the encrypted connections using SSH because it traces the system calls of all processes concerned with the interactive service daemon and their child processes. We also implement the proposed technique on a CentOS 6.5 x86_64 environment by the ptrace system call and a simple shell script using strace utility. Finally the experimental results show that the proposed scheme works perfectly under test scenarios.
  • 6.

    Singing Voice Synthesis Using HMM Based TTS and MusicXML

    Najeeb Ullah Khan | Jungchul Lee | 2015, 20(5) | pp.53~63 | number of Cited : 1
    Abstract PDF
    Singing voice synthesis is the generation of a song using a computer given its lyrics and musical notes. Hidden Markov models (HMM) have been proved to be the models of choice for text to speech synthesis. HMMs have also been used for singing voice synthesis research, however, a huge database is needed for the training of HMMs for singing voice synthesis. And commercially available singing voice synthesis systems which use the piano roll music notation, needs to adopt the easy to read standard music notation which make it suitable for singing learning applications. To overcome this problem, we use a speech database for training context dependent HMMs, to be used for singing voice synthesis. Pitch and duration control methods have been devised to modify the parameters of the HMMs trained on speech, to be used as the synthesis units for the singing voice. This work describes a singing voice synthesis system which uses a MusicXML based music score editor as the front-end interface for entry of the notes and lyrics to be synthesized and a hidden Markov model based text to speech synthesis system as the back-end synthesizer. A perceptual test shows the feasibility of our proposed system.
  • 7.

    Color matching application which can help color blind people based on smart phone

    MyoungBeom Chung | 2015, 20(5) | pp.65~72 | number of Cited : 1
    Abstract PDF
    In this paper, we proposed the color matching application based on smart phone which can help color blind people. For color blind people, the existing methods and applications supported color matching application which based on mobile. However, because the most research only showed the color value and color name through capture image of mobile camera, those cannot compare with capture image color of mobile camera and color of real object in real-time. To solve those problem, we proposed the color matching algorithm and developed the color matching application that can compare with color of mobile camera’s capture image and color of real object in real-time, because the proposed application divides screen of smart phone into two parts and it show one part as capture image of smart phone camera and the other part as real-time camera image of smart phone. Color matching algorithm calculate cosine similarity using Red, Green, Blue, and Hue value of each image for real-time comparing and show matching result according to similarity value in real-time. To evaluate the performance of the proposed application, we tested a color matching experiment using the proposed application and the matching result was 98% success rate. Therefore, the proposed application will be a useful application which can help color blind people.
  • 8.

    Software Quality Prediction based on Defect Severity

    Hong Euyseok | 2015, 20(5) | pp.73~81 | number of Cited : 5
    Abstract PDF
    Most of the software fault prediction studies focused on the binary classification model that predicts whether an input entity has faults or not. However the ability to predict entity fault-proneness in various severity categories is more useful because not all faults have the same severity. In this paper, we propose fault prediction models at different severity levels of faults using traditional size and complexity metrics. They are ternary classification models and use four machine learning algorithms for their training. Empirical analysis is performed using two NASA public data sets and a performance measure, accuracy. The evaluation results show that backpropagation neural network model outperforms other models on both data sets, with about 81% and 88% in terms of accuracy score respectively.
  • 9.

    User Oriented Autonomous Shopping Cart by Noncontacting User Interface

    Mi-kyeong Moon | Gwangsu Kim | 2015, 20(5) | pp.83~89 | number of Cited : 0
    Abstract PDF
    we suggest a shopping cart system following the wheelchairs autonomously for the disabled to do shop easily. This system have been developed in order for a cart to follow the disabled using wheelchairs automatically without pulling a cart directly. This system use kinnect and an radio control car (RC-car). The kinnect detect whether movement of disabled is right turn, left turn or straight and according to this result the RC-car can be controlled autonomously. By this system, the disabled using wheelchairs can do shopping more easily than before.
  • 10.

    A Study on Software Dev. Project Management System Acquisition and Implementing on project site

    전형권 | park koo rack | 정진영 | 2015, 20(5) | pp.91~98 | number of Cited : 2
    Abstract PDF
    In this paper, we introduce PMS’s main function and main effect which implemented medium and large scale software development project site, and we propose importance and improvement nacessity of PMS implementation. PMS’s main functions are developed based on best practices which CMMI model and PMBOK. Also, each PMS has specialized unique function according to it’s target industry area or related I.T solutions which has infra dependency. The effectiveness of PMS implementation on project site is seperated two types, one is qualitative effect, the other quantitative effect. Representative qualitative effects are improvement of enterprise’s image and competency. Also representative quantitative effect is reduction of project management cost as a financial effect. As far as project size is increase, PMS’s needs and necessariness will be increase, so we need to improve PMS;s function according to project management’s global trend and software customer’s requisition.
  • 11.

    User control based OTT content search algorithms

    KIm | Yu Hwa Suh | PArk Byung Joon | 2015, 20(5) | pp.99~106 | number of Cited : 0
    Abstract PDF
    This research is focused on the development of the proprietary database embedded in the OTT device, which is used for searching and indexing video contents, and also the development of the search algorithm in the form of the critical components of the interface application with the OTT’s database to provide video query searching, such as remote control smartphone application. As the number of available channels has increased to anywhere from dozens to hundreds of channels, it has become increasingly difficult for the viewer to find programs they want to watch. To address this issue, content providers are now in need of methods to recommend programs catering to each viewer’s preference. the present study aims provide of the algorithm which recommends contents of OTT program by analyzing personal watching pattern based on one’s history.
  • 12.

    A Marriage Problem Algorithm Based on Duplicated Sum of Inter-Preference Moving Method

    Sang-Un, Lee | 2015, 20(5) | pp.107~112 | number of Cited : 1
    Abstract PDF
    This paper proposes a simplified algorithm devised to obtain optimal solution to the marriage problem. In solving this problem, the most widely resorted to is the Gale-Shapley algorithm with the time complexity of O(│V│2│E│)The proposed algorithm on the other hand firstly constructs a Pij matrix of inter-preference sum both sexes’ preference over the opposite sex. Secondly, it selects minPi from each row to establish│P.j│≥ 2, j∈S ,│P.j │= 1 , j∈H ,│P.j │= 0 , j∈T. Finally, it shifts min{minPST,PSH+PHT} for minPST of S→T and PSH+PHT ,PHT<minPST of S→H, H→T . The proposed algorithm has not only improved the Gale-Shapley’s algorithm’s complexity of O(│V│2│E│)to O(│V│2) but also proved its extendable use on unbalanced marriage problems.
  • 13.

    Electronic Security Control Center Building Process and Security and Management Measures

    하경수 | Cho Cheol Kyu | Pyongsoo Kim | 2015, 20(5) | pp.113~121 | number of Cited : 2
    Abstract PDF
    This research suggests construction processes and security solutions for security control center as management measures for security management improvement in domestic electronic security companies. Security control center (SCC) is the central nerve of electronic security service, and no matter how well the on-site response system has been built, if SCC ceases to work due to an incident or disaster or security control personnel are harmed, the electronic security system cannot perform its proper functions. It is divided to a spatial structure, the infrastructure, control equipment, control solutions and operating structure in a construction process in the security control center. And a solution can be presented for physical security, information security, and personnel security in the way to security solutions.
  • 14.

    Privacy protection of seizure and search system

    Kim, Woon-Gon | 2015, 20(5) | pp.123~131 | number of Cited : 1
    Abstract PDF
    Bright development of information communication is caused by usabilities and another case to our society. That is, the surveillance which is unlimited to electronic equipment is becoming a transfiguration to a possible society, and there is case that was able to lay in another disasters if manage early error. Be what is living on at traps of surveillance through the Smart phones which a door of domicile is built, and the plane western part chaps, and we who live on in these societies are installed to several places, and closed-circuit cameras (CCTV-Closed Circuit Television) and individual use. On one hand, while the asset value which was special of enterprise for marketing to enterprise became while a collection was easily stored development of information communication and individual information, the early body which would collect illegally was increased, and affair actually very occurred related to this. An investigation agency is endeavored to be considered the digital trace that inquiry is happened by commission act to the how small extent which can take aim at a duty successful of the inquiry whether you can detect in this information society in order to look this up. Therefore, procedures to be essential now became while investigating affair that confiscation search regarding employment trace of a computer or the telephone which delinquent used was procedural, and decisive element became that dividing did success or failure of inquiry whether you can collect the act and deed which was these electronic enemy. By the way, at this time a lot of, in the investigation agencies the case which is performed comprehensively blooms attachment while rummaging, and attachment is trend apprehension to infringe discretion own arbitrary information rising. Therefore, a lot of nation is letting you come into being until language called exile 'cyber' while anxiety is exposed about comprehensive confiscation search of the former information which an investigation agency does. Will review whether or not there is to have to set up confiscation search ambit of electronic information at this respect how.
  • 15.

    The Test of Gender Difference on the Causal Relationships between Adolescent’s Academic Stress and Suicidal Thoughts

    노윤채 | Kyung-Suk Kim | Hwie- Seo, Park | 2015, 20(5) | pp.133~140 | number of Cited : 12
    Abstract PDF
    This study is to examine the causal relationship between adolescents' academic stress and suicidal thoughts via depression and gender differences of causal relationships in each causal paths. The purpose of this study is to suggest some implications based on this analytical results. For this purpose, we conducted interviews using a questionnaire targeting high school students. The analytical results shows that adolescent’s academic stress has a significant effects on their depression and suicidal thoughts, and adolescent’s depression also has a significant effects on suicidal thoughts. This study suggests some implications based on this results.
  • 16.

    A Study on The Impact of Perceived Crowding on Emotional Response and Revisit Intention

    김승리 | In ok nam | 2015, 20(5) | pp.141~150 | number of Cited : 4
    Abstract PDF
    The object of this study is finding out the relational effect of perceived crowding of international airport on emotional response and revisit intention. The data of this study was collected by questionnaire and based on Incheon international airport visitors. A total 260 validity sample was analyzed a frequency analysis, reliability analysis, exploratory factor analysis and correlation coefficient analysis from SPSS 21, a hypothesis through out confirmatory factor analysis and structural equation modeling from AMOS 7.0. As a result of this study, visitors' human perceived crowding of international airport and positive emotional response showed a significant effects on revisit intention.
  • 17.

    Educational Application of Puzzles for Algorithm Learning of Informatics Gifted Elementary School Students

    최정원 | Lee Youngjun | 2015, 20(5) | pp.151~159 | number of Cited : 5
    Abstract PDF
    The algorithm in computer science includes skills to design a problem solving process for solving problems efficiently and effectively. Therefore all learners who learn computer science have to learn algorithm. Education for algorithm is effective when learners acquire skills to design algorithm as well as ability to use appropriate design skills solving problems. Especially since it is heightened people awareness to cultivating informatics gifted students who have potential of significant impact on society, many studies on how to teach them have been in progress. Therefore in this study we adopted puzzles to help informatics gifted students learn skills to design algorithm and how to use them to solve problems. The results of pre and post test compared to traditional algorithm learning, we identified that puzzled based algorithm learning gave a positive impact to students. Students had various problem solving experience applying algorithm design skills in puzzle based learning. As a result, students of learning and learning transfer has been improved.
  • 18.

    An Analysis of the Difference of Perception on IT Convergence Learning after the Smart Device based Robot Programming Education According to Elementary Gifted Students’ Level

    Yoon Il Kyu | 장윤재 | JungSoonYoung and 1other persons | 2015, 20(5) | pp.161~169 | number of Cited : 4
    Abstract PDF
    In this paper, we propose an smart device based robot programming education program and analyzing students’ perceptions such as satisfaction, Expectancy-Value of IT convergence learning after the robot education program according to elementary gifted students’ level. Smart device based robot programming education program designed based on schematic of the convergence suggested by WTEC and consist of creative phase, integration/fusion phase, innovation phase, outcome phase for learning practical process of the IT convergence. We are conducting a smart device based robot programming education class to consist of 126 gifted students and analysing the difference of perception. According to analysis of the result, core and advanced students’ perception on satisfaction score shows also high. However, advanced level students’ satisfaction score shows higher than core students’ satisfaction score. Also, advanced level students’ expectancy-value score on IT convergence learning shows higher than core students’ score.