Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

Home > Explore Content > All Issues > Article List

2015, Vol.20, No.9

  • 1.

    Variable latency L1 data cache architecture design in multi-core processor under process variation

    공준호 | 2015, 20(9) | pp.1~10 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a new variable latency L1 data cache architecture for multi-core processors. Our proposed architecture extends the traditional variable latency cache to be geared toward the multi-core processors. We added a specialized data structure for recording the latency of the L1 data cache. Depending on the added latency to the L1 data cache, the value stored to the data structure is determined. It also tracks the remaining cycles of the L1 data cache which notifies data arrival to the reservation station in the core. As in the variable latency cache of the single-core architecture, our proposed architecture flexibly extends the cache access cycles considering process variation. The proposed cache architecture can reduce yield losses incurred by L1 cache access time failures to nearly 0%. Moreover, we quantitatively evaluate performance, power, energy consumption, power-delay product, and energy-delay product when increasing the number of cache access cycles.
  • 2.

    Determining Attributes of Suicide Attempts in Korean Elderly People:

    배은찬 , LEE, KUN CHANG | 2015, 20(9) | pp.11~20 | number of Cited : 0
    Abstract PDF
    In order to prevent the elderly people from committing suicide attempts, it is necessary to verify attributes that affect the suicide attempts. It is noted that previous studies have focused on qualitative approaches, and simple correlation analyses to determine the attributes related to the suicide attempts in the elderly people. However, such previous approaches had led to insufficient performance when facing with complicated data sets. In this sense, this study suggests an alternative method in which attribute selection techniques are adopted to determine more relevant attributes of the suicide attempts occurring in Korean elderly people. To verify empirical validity of our proposed method, we used Korea National Health and Nutrition Examination Survey (KNHANES) from January 2007 to December 2012. Empirical results proved that the proposed attribute selection techniques showed better predictive effectiveness; 94.4% compared to the simple statistical methods. This study proposes a way to determining the elderly suicide and preventing it to happen.
  • 3.

    An Integer Programming-based Local Search for the Set Partitioning Problem

    Hwang Junha | 2015, 20(9) | pp.21~29 | number of Cited : 0
    Abstract PDF
    The set partitioning problem is a well-known NP-hard combinatorial optimization problem, and it is formulated as an integer programming model. This paper proposes an Integer Programming-based Local Search for solving the set partitioning problem. The key point is to solve the set partitioning problem as the set covering problem. First, an initial solution is generated by a simple heuristic for the set covering problem, and then the solution is set as the current solution. Next, the following process is repeated. The original set covering problem is reduced based on the current solution, and the reduced problem is solved by Integer Programming which includes a specific element in the objective function to derive the solution for the set partitioning problem. Experimental results on a set of OR-Library instances show that the proposed algorithm outperforms pure integer programming as well as the existing heuristic algorithms both in solution quality and time.
  • 4.

    An Acceleration Method for Symmetry Detection using Edge Segmentation

    원보환 , KOO JA YOUNG | 2015, 20(9) | pp.31~37 | number of Cited : 1
    Abstract PDF
    Symmetry is easily found in animals and plants as well as in artificial structures. It is useful not only for human cognitive process but also for image understanding by computer. Application areas include face detection and recognition, indexing of image database, image segmentation and detection, and analysis of medical images. The method used in this paper extracts edges, and the perpendicular bisector of any pair of selected edge points is considered to be a candidate axis of symmetry. The coefficients of the perpendicular bisectors are accumulated in the coefficient space. Axis of symmetry is determined to be the line for which the histogram has maximum value. This method shows good results, but the usefulness of the method is restricted because the amount of computation increases proportional to the square of the number of edges. In this paper, an acceleration method is proposed which performs  times faster than the original one. Experiment on 20 test images shows that the proposed method using level-3 image segmentation performs 63.9 times faster than the original method.
  • 5.

    Jitter Correction of the Face Motion Capture Data for 3D Animation

    Junsang Lee , Han Soo Whan , Lee, Im Geun | 2015, 20(9) | pp.39~45 | number of Cited : 0
    Abstract PDF
    Along with the advance of digital technology, various methods are adopted for capturing the 3D animating data. Especially, in 3D animation production market, the motion capture system is widely used to make films, games, and animation contents. The technique quickly tracks the movements of the actor and translate the data to use as animating character’s motion. Thus the animation characters are able to mimic the natural motion and gesture, even face expression. However, the conventional motion capture system needs tricky conditions, such as space, light, number of camera etc. Furthermore the data acquired from the motion capture system is frequently corrupted by noise, drift and surrounding environment. In this paper, we introduce the post production techniques to stabilizing the jitters of motion capture data from the low cost handy system based on Kinect.
  • 6.

    Design and Implementation of Tangible Interface Using Smart Puck System

    박선희 , 이종배 , KIM JEONG HO and 1 other persons | 2015, 20(9) | pp.47~53 | number of Cited : 2
    Abstract PDF
    In this paper, we propose a novel tangible interface system whose system does not use the expensive hardware is introduced. This proposed tangible interface is used on the table top capacitive multi touch-screen. The tangible interface apparatus which is called smart puck has sanguine arduino compatible board. The board has a Cds photo-sensing sensor and the EPP8266 WiFi module. The Cds sensor decodes the photometric PWM signals from the system and sends corresponding information to the system via TCP/IP. The system has a server called MT-Server to communicate with the smart pucks. The tangible interface shows reliable operation with fast response that is compatible to the expensive traditional devices in the market.
  • 7.

    Game Design of Online Sutda using 3-Tier Structure

    SYUNGOG AN , 안성호 , Jin-Young Jung and 1 other persons | 2015, 20(9) | pp.55~60 | number of Cited : 0
    Abstract PDF
    This paper introduces a program structure that minimizes the client's business logic by reducing the client's specifications as a way of minimizing the limitations of online game platforms. The objective of this thesis is to design an online game that is based on a 3-tier client/server structure, and thus using this 3-tier structure to ultimately create an online Sutda game that anyone can enjoy. The progression of newly released games is highly based on the mobile market and the number of online games being launched is decreasing. As the mobile game market grows, more and more multi-platform games are being developed and target platforms within online games are greatly diversifying. Through these situations, this thesis minimizes the client's business logic through a 3-tier structure of application-middleware-database, and also proposes an online game client/server that allows three or more users to participate simultaneously through the server.
  • 8.

    Energy Optimal Transmission Strategy in CDMA System: Duality Perspective

    Oh Chang Yoon | 2015, 20(9) | pp.61~66 | number of Cited : 1
    Abstract PDF
    We investigate rate scheduling and power allocation problem for a delay constrained CDMA systems. Specifically, we determine an energy efficient scheduling policy, while each user maintains the short term (n time slots) average throughput. More importantly, it is shown that the optimal transmission strategy for the uplink is same as that of the downlink, called uplink and downlink duality. We then examine the performance of the optimum transmission strategy for the uplink and the downlink for various system environments.
  • 9.

    Logical Activity Recognition Model for Smart Home Environment

    Jung-in Choi , 임성주 , Hwanseung Yong | 2015, 20(9) | pp.67~72 | number of Cited : 0
    Abstract PDF
    Recently, studies that interact with human and things through motion recognition are increasing due to the expansion of IoT(Internet of Things). This paper proposed the system that recognizes the user’s logical activity in home environment by attaching some sensors to various objects. We employ Arduino sensors and appreciate the logical activity by using the physical activitymodel that we processed in the previous researches. In this System, we can cognize the activities such as watching TV, listening music, talking, eating, cooking, sleeping and using computer. After we produce experimental data through setting virtual scenario, then the average result of recognition rate was 95% but depending on experiment sensor situation and physical activity errors the consequence could be changed. To provide the recognized results to user, we visualized diverse graphs.
  • 10.

    A study on the Relationship between Cyberloafing Characteristic and Cognitive Dissonance

    Chang Hwalsik , Jung Dae Hyun | 2015, 20(9) | pp.73~80 | number of Cited : 3
    Abstract PDF
    Cyberloafing is a term used to describe the actions of employees who use their Internet access at work for personal use while pretending to do legitimate work. This research that this puts the foundation on the general deterrence theory, social control theory, and Triandis model compares the individual characteristic including the group norm, self-control, perceived value among many factors having an effect on the personal ethical decision-making besides the general principles of ethics and stipulated regulation like the severity of sanction together. It was exposed to have the effect that the severity of punishment, self control, and perceived value notes to the internet abuse action. Therefore, the education and rules of punishment which is consistent along with the theoretical thesis supporting the groping of the preparation plan that is active in the various ethic problems has to be built. It is necessary that the company devises the internet application in the appropriate range, that is the partial the affirmation feeling which and it can allow officially. According to the cognitive dissonance, since this will have to allow with the positive direction can move to the misuse action with the intention differently, it can draw a conclusion.
  • 11.

    Complete Time Algorithm for Stadium Construction Scheduling Problem

    Sang-Un, Lee | 2015, 20(9) | pp.81~86 | number of Cited : 0
    Abstract PDF
    This paper suggests heuristic algorithm with linear time complexity to decide the normal and optimal point at minimum loss/maximum profit maximum shortest scheduling problem with additional loss cost and bonus profit cost. This algorithm computes only the earliest ending time for each node. Therefore, this algorithm can be get the critical path and project duration within O(n) time complexity and reduces the five steps of critical path method to one step. The proposed algorithm can be show the result more visually than linear programming and critical path method. For real experimental data, the proposed algorithm obtains the same solution as linear programming more quickly.
  • 12.

    A Framework for Legal Information Retrieval based on Ontology

    DaeWoong Jo , Myung Ho Kim | 2015, 20(9) | pp.87~96 | number of Cited : 3
    Abstract PDF
    Professional knowledge such as legal information is commonly not accessible or cannot be easily understood by the public. By using the legal ontology which is previously established, the legal information retrieval based on ontology is to use for the information retrieval. In this paper, we propose the matters required for the design and develop of the framework for the legal information retrieval based on ontology. The framework is composed of the query conversion engine of SPARQL base for query to OWL ontology and user query type engine and return value refinement engine and web interface engine. The framework does the role as the infrastructure which retrieval the legal ontology effectually and which it serves and can be used in the semantic legal information retrieval service.
  • 13.

    Study on Web Services Middleware for Real-Time Monitoring in the IoT Environment

    Shin,Seung-Hyeok | 2015, 20(9) | pp.97~104 | number of Cited : 2
    Abstract PDF
    Recently, the need for real-time systems which are providing various types of information that occur in large quantities in IoT environment is increasing. In this paper, we propose a middleware system which can monitor in real time on a web environment. The proposed system is designed to be integrated by using communication functions provided by a network operating system and external sensors. The proposed system is compared with an existing system and analysed by the server performance testing tool.
  • 14.

    Maximum Options-Equiped Class First-Production Algorithm for Car Sequencing Problem

    Sang-Un, Lee | 2015, 20(9) | pp.105~111 | number of Cited : 1
    Abstract PDF
    1)This paper suggests O(n) linear-time algorithm for car sequencing problem (CSP) that has been classified as NP-complete because of the polynomial-time algorithm to solve the solution has been unknown yet. This algorithm applies maximum options-equiped car type first production rule to decide the car sequencing of n meet the γ:β constraint. This paper verifies thirteen experimental data with the six data are infeasible. For thirteen experimental data, the proposed algorithm can be get the solution for in all cases. And to conclude, This algorithm shows that the CSP is not NP-complete but the P-problem. Also, this algorithm proposes the solving method to the known infeasible cases. Therefore, the proposed algorithm will stand car industrial area in good stead when it comes to finding a car sequencing plan.
  • 15.

    The Effects of Social Worker’s Job Embeddedness on Job Burnout

    Hwie- Seo, Park | 2015, 20(9) | pp.113~119 | number of Cited : 1
    Abstract PDF
    The purpose of tis study is to analyze the effects of job embeddedness on job burnout related with social worker's turnover. This study suggests some implications for decreasing the level of social worker's job burnout. In this study, embeddedness is composed of three sub-variables like fit, links, and sacrifice. Job burnout is also composed of emotional exhaustion, depersonalization, and decrease of personal accomplishment. Thereafter, research model is established, and study hypothesis is tested through the survey. As a result, it showed that the components of job embeddedness have significant effects on the components of job burnout. Based on the result of this empirical analysis, this study suggested some theoretical and political implications.
  • 16.

    Effective Automatic Foreground Motion Detection Using the Statistic Information of Background

    Hyung-Hoon Kim , Jeong-Ran Cho | 2015, 20(9) | pp.121~128 | number of Cited : 3
    Abstract PDF
    In this paper, we proposed and implemented the effective automatic foreground motion detection algorithm that detect the foreground motion by analyzing the digital video data that captured by the network camera. We classified the background as moving background, fixed background and normal background based on the standard deviation of background and used it to detect the foreground motion. According to the result of experiment, our algorithm decreased the fault detection of the moving background and increased the accuracy of the foreground motion detection. Also it could extract foreground more exactly by using the statistic information of background in the phase of our foreground extraction.
  • 17.

    The Effects of Self-esteem and Social Capital on Self-support Program Participants’ Will of Self-reliance

    Hyoung-Ha Lee | 2015, 20(9) | pp.129~135 | number of Cited : 0
    Abstract PDF
    This study was conducted in order to identify factors that influence the will of self‐reliance among workers participating in self‐support programs. For this purpose, data were collected from self‐support program participants in 2012 (1,301 participants in self‐supporting labor programs and 128 in selfsupport community programs). Input variables analyzed as factors influencing the will of self‐reliance were socio‐demographic variables, self‐esteem, and social capital. According to the results, first, self‐supporting labor program participants’ self‐esteem was 2.328 out of 4 (S.M= .402) and it was somewhat lower than 2.406 (S.M=.404) in self‐support community participants, but the difference was not significant. Self‐supporting labor program participants’ social capital was 2.980 out of 5 (S.M=.844), significantly lower than 3.356 (S.M=.815) in self‐support community program participants. Self‐supporting labor program participants’ will of self‐support was 4.150 out of 5 (S.M=.602), lower than 4.314 (S.M=.521) in self‐support community program participants. Second, according to the results of regression analysis on self‐support program participants’ will of self‐reliance, age (B=‐.198, p<.001), self‐esteem (B=.236, p<.001), and social capital (B=.166, p<.001) were found to have a significant effect. That is, the will of self‐support was higher when age was young, when self‐esteem was high, and when social capital was high. Based on these findings, this study suggested self‐support policies, education systems, differentiated programs, etc. for enhancing self‐support program participants’ will of self‐reliance.
  • 18.

    A Study on the Object of the Fraud by Use of Computer

    Lim Jonghui | 2015, 20(9) | pp.137~145 | number of Cited : 0
    Abstract PDF
    The Criminal Law of South Korea has needed to cope with new kinds of crimes such as the fraud by use of computer efficiently in a legislative way because the society has witnessed the rapid progress of the industrialization and informatization after established in 1953. As a result, the Criminal Law revised on December 29, 1995, created the regulations of the crimes related to fraud by use of computer, work disturbance, and secret piracy by using information processing units. The regulation stipulated in Clause 347, Article 2 of Criminal Law is the most typical one against the new crimes. However, the new regulation of fraud by use of computer, established and revised to supplement the lacking parts of the current rules of the punishment of fraud, limits its object to “any benefits to property.” not to “property” itself, and so cannot achieve the purpose of the revision of the law. This paper aims to suggest a new legislative measure about the object of the regulation of fraud by use of computer to solve this kind of problem efficiently.
  • 19.

    The Effects of Student’s Stress and Personal Relationship on Smart Phone Addiction

    Gil-hyun Kang | 2015, 20(9) | pp.147~153 | number of Cited : 0
    Abstract PDF
    This Study is to test the causal relationships among university student’s stress, personal relationships and psychological anxiety, and then suggest some theoretical and policy implications basing on the analytical results. For the purpose of this study, survey targeting on 416 university students was conducted. The analytical results of this study showed that psychological anxiety moderates the relation between the stress, personal relationship and smart phone addiction. This study suggested some implications basing on this analytical results.