Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2016, Vol.21, No.1

  • 1.

    New Approach to Optimize the Size of Convolution Mask in Convolutional

    Kwak Young Tae | 2016, 21(1) | pp.1~8 | number of Cited : 1
    Abstract PDF
    Convolutional neural network (CNN) consists of a few pairs of both convolution layer and subsampling layer. Thus it has more hidden layers than multi-layer perceptron. With the increased layers, the size of convolution mask ultimately determines the total number of weights in CNN because the mask is shared among input images. It also is an important learning factor which makes or breaks CNN's learning. Therefore, this paper proposes the best method to choose the convolution size and the number of layers for learning CNN successfully. Through our face recognition with vast learning examples, we found that the best size of convolution mask is 5 by 5 and 7 by 7, regardless of the number of layers. In addition, the CNN with two pairs of both convolution and subsampling layer is found to make the best performance as if the multi-layer perceptron having two hidden layers does.
  • 2.

    Computer Aided Diagnosis System based on Performance Evaluation Agent Model

    Hyun-Sook Rhee | 2016, 21(1) | pp.9~16 | number of Cited : 1
    Abstract PDF
    In this paper, we present a performance evaluation agent based on fuzzy cluster analysis and validity measures. The proposed agent is consists of three modules, fuzzy cluster analyzer, performance evaluation measures, and feature ranking algorithm for feature selection step in CAD system. Feature selection is an important step commonly used to create more accurate system to help human experts. Through this agent, we get the feature ranking on the dataset of mass and calcification lesions extracted from the public real world mammogram database DDSM. Also we design a CAD system incorporating the agent and apply five different feature combinations to the system. Experimental results proposed approach has higher classification accuracy and shows the feasibility as a diagnosis supporting tool.
  • 3.

    Indoor Localization Technology Survey

    김청미 | Jang, Beakcheol | 2016, 21(1) | pp.17~24 | number of Cited : 4
    Abstract PDF
    In this paper, we introduce indoor localization technologies categorizing them into ON/OFF switch and senor based, wireless communication based, and image based technologies. Then we describe several representative techniques for each of them, emphasizing their strengths and weaknesses. We define important performance issues for indoor localization technologies and analyze recent technologies according to the performance issues. Our analyses show that ON/OFF switch based technologies are difficult to install, but accurate and not limited by light. Wireless communication technologies are not limited by light nor distance (space) and do not need additional device. Image based technologies do not need additional device but are limited by light, and their accuracies are affected by light. We believe that this paper provide wise view and necessary information for recent indoor localization technologies.
  • 4.

    Analysis of Effect of an Additional Edge on Eigenvector Centrality of Graph

    Han Chi-Geun | Sang-Hoon Lee | 2016, 21(1) | pp.25~31 | number of Cited : 1
    Abstract PDF
    There are many methods to describe the importance of a node, centrality, in a graph. In this paper, we focus on the eigenvector centrality. In this paper, an analytical method to estimate the difference of centrality with an additional edge in a graph is proposed. In order to validate the analytical method to estimate the centrality, two problems, to decide an additional edge that maximizes the difference of all centralities of all nodes in the graph and to decide an additional edge that maximizes the centrality of a specific node, are solved using three kinds of random graphs and the results of the estimated edge and observed edge are compared. Though the estimated centrality difference is slightly different from the observed real centrality in some cases, it is shown that the proposed method is effective to estimate the centrality difference with a short running time.
  • 5.

    A Study on national responsibility to foster cultural contents and legal principles of vulgarity regulation

    Cho Man Hyeong | 2016, 21(1) | pp.33~38 | number of Cited : 0
    Abstract PDF
    Constitution declares culture is area that without any interference from the state space, and so creates each person creative energy. It is a typical movie in culture. The film will be referred to as an important expression form as well as high value-added industries of cultural creativity of ethnic communities. Intervention of the state is necessary that by competing mechanisms of diverse opinions and ideas caused harm. State intervention is only to be operated at a minimum. The vulgarity causes young people have impulsive tendencies and affects adults adversely on on issues, regulation is possible for children and youth protection. This paper aims to suggest a new legislative measure about the legal principles of vulgarity regulation to solve this kind of problem efficiently. Some standard allowed vulgarity regulation on the principles of control.
  • 6.

    A Vehicle SoC Fault Diagnosis Technique using FlexRay Protocol

    강승엽 | Ji Hun Jeong | Park Sung Ju | 2016, 21(1) | pp.39~47 | number of Cited : 0
    Abstract PDF
    In this paper, we propose vehicle SoC fault diagnosis platform using FlexRay protocol in order to detect the faults of semiconductor control chip even after vehicle production. Before FlexRay protocol by sending NFI (Null Frame Indicator) bit among the header segment and a specific identifier in the payload segment of FlexRay frame, this technique can be distinguishable from normal mode and test mode. By using this technique, it is possible to detect the faults such as performance degradation of vehicle network system caused by the aging or several problems of vehicle semiconductor chip. Also high reliability and safety of vehicle can be maintained by using structural test for vehicle SoC fault detection.
  • 7.

    Resource Allocation Based on the Type of Handovers in Overlaid Macro-Femto Networks

    Jongchan Lee | Lee Moonho | 2016, 21(1) | pp.49~57 | number of Cited : 0
    Abstract PDF
    In this paper we propose the resource allocation scheme for the overlaid macro-femtocell networks, which considers the type of handovers such as the inter-macrocell, macrocell-to-femtocell, femtocell-to-macrocell, or inter-femtocell in order to guarantee Quality of Service (QoS) and expand the accommodation capacity. Our proposed scheme takes into account the movement of mobile terminals, the QoS degradation, or the load control which trigger handovers in the overlaid networks, before it allocates resources dynamically. Moreover it considers QoS requirements of realtime or non-realtime mobile multimedia services such as video communication, Video on Demand (VoD) and dataa services. Simulation results show that our scheme provides better performances than the conventional one with respect to the outage probability, data transmission throughput and handover failure rate.
  • 8.

    Minimum Network Connection Cost Algorithm for Partially Survivable Networks Problem of Cellular Telecommunication Systems

    Sang-Un, Lee | 2016, 21(1) | pp.59~64 | number of Cited : 1
    Abstract PDF
    This paper suggests heuristic algorithm with   polynomial time complexity using Excel for partially survivable networks optimization problem of cellular telecommunication systems with  cells and  hubs. This problem only can be get the solution using linear programming or LINGO software package. The proposed algorithm connects the cell to hubs in ring network with minimum cost as the connection diversity of each cell. If the traffic of ring network (T) is    for ring capacity (K), we adjust the maximum cost hub to MTSO that has a ascending order of   cell with each cell traffic demand (D) and   (MTSO cost-maximum cost hub) than we get the  ≤  . Finally, we adjust MTSO to the removed maximum cost hub for the cell with   ≥   and max . While we using like this simple method, the proposed algorithm can be get the same optimal solution for experimental data as linear programing and LINGO software package.
  • 9.

    Implementation of an OpenFlow-based Access Point Virtual Switch for Monitoring and Virtualization of Legacy Wireless LAN

    Hyung-Bong Lee | 박지훈 | 2016, 21(1) | pp.65~72 | number of Cited : 1
    Abstract PDF
    Network virtualization is an emerging technology for solving the rigidity of the physical network infrastructure. The innovative technique virtualizes all resources in the network, including the network links and nodes, and provides a number of virtual networks on a single network infrastructure. In order to realize a virtual network, a thorough and complete monitoring of all resources in the network should be performed firstly. OpenFlow is an open source stack for network virtualization. However, it is impossible to apply OpenFlow to AP-based legacy wireless LAN environment because OpenFlow targets ethernet-based LAN environment. In this paper, we implement an adaptor-styled virtual switch for AP-based wireless LAN through customizing the Open vSwitch which is a virtual switch of OpenFlow. The evaluation test results show that the implemented OpenFlow stack operates successfully. The implemented OpenFlow stack can now be plugged immediately in existing AP-based wireless LAN environment and plays network resource monitoring. In the future, we can develop wireless LAN virtualization applications on the wireless OpenFlow stack.
  • 10.

    Selection of Monitoring Nodes to Maximize Sensing Area in Behavior-based Attack Detection

    Kyun Rak Chong | 2016, 21(1) | pp.73~78 | number of Cited : 0
    Abstract PDF
    In wireless sensor networks, sensors have capabilities of sensing and wireless communication, computing power and collect data such as sound, movement, vibration. Sensors need to communicate wirelessly to send their sensing data to other sensors or the base station and so they are vulnerable to many attacks like garbage packet injection that cannot be prevented by using traditional cryptographic mechanisms. To defend against such attacks, a behavior-based attack detection is used in which some specialized monitoring nodes overhear the communications of their neighbors(normal nodes) to detect illegitimate behaviors. It is desirable that the total sensing area of normal nodes covered by monitoring nodes is as large as possible. The previous researches have focused on selecting the monitoring nodes so as to maximize the number of normal nodes(node coverage), which does not guarantee that the area sensed by the selected normal nodes is maximized. In this study, we have developed an algorithm for selecting the monitoring nodes needed to cover the maximum sensing area. We also have compared experimentally the covered sensing areas computed by our algorithm and the node coverage algorithm.
  • 11.

    CoAP-based Reliable Message Transmission Scheme in IoT Environments

    Youn Joo Sang | Choi Hun | 2016, 21(1) | pp.79~84 | number of Cited : 2
    Abstract PDF
    In this paper, we propose reliable message transmission scheme based on CoAP, considering the constrained feature of IoT device, such as low power, the limited memory size and low computing capacity. Recently, the various kinds of application protocol has been studied to support IoT environments. In particular, CoAP protocol was developed as application protocol for IoT at the IETF core WG. However, because CoAP protocol is deigned to be used in constrained node, this protocol uses UDP at transport layer. Thus, data loss may occur frequently in network congestion environments. The proposed scheme, in this paper, is to overcome the problem of frequent data loss with low overhead. Also it includes the function which is to minimize the data loss in sleep mode of IoT device.
  • 12.

    A Study on the Security Technology of Real-time Biometric Data in IoT Environment

    신윤환 | 2016, 21(1) | pp.85~90 | number of Cited : 2
    Abstract PDF
    In this paper, the biometric data is transmitted in real time from the IoT environment is runoff, forgery, alteration, prevention of the factors that can be generated from a denial-of-service in advance, and the security strategy for the biometric data to protect the biometric data secure from security threats offer. The convenience of living in our surroundings to life with the development of ubiquitous computing and smart devices are available in real-time. And is also increasing interest in the IOT. IOT environment is giving the convenience of life. However, security threats to privacy also are exposed for 24 hours. This paper examines the security threats to biological data to be transmitted in real time from IOT environment. The technology for such security requirements and security technology according to the analysis of the threat. And with respect to the biometric data transmitted in real time on the IoT environment proposes a security strategy to ensure the stability against security threats and described with respect to its efficiency
  • 13.

    A Regional Certificate Revocation List Distribution Method based on the Local Vehicle Location Registration for Vehicular Communications

    홍휘승 | HYUNGON KIM | 2016, 21(1) | pp.91~99 | number of Cited : 3
    Abstract PDF
    A certificate revocation list(CRL) should be distributed quickly to all the vehicles in the network to protect them from malicious users and malfunctioning equipments as well as to increase the overall security and safety of vehicular networks. However, a major challenge is how to distribute CRLs efficiently. In this paper, we propose a novel Regional CRL distribution method based on the vehicle location registration locally to manage vehicle mobility. The method makes Regional CRLs based on the vehicles' location and distributes them, which can reduce CRL size and distribution time efficiently. According to the simulation results, the proposed method's signaling performance of vehicle's registration is enhanced from 22% to 37% compared to the existing Regional CRL distribution method. It's CRL distribution time is also decreased from 37% to 67% compared to the existing Full CRL distribution method.
  • 14.

    The Design and fabrication of food waste system

    여석기 | Kim Kye Kook | Chang Ok Seo | 2016, 21(1) | pp.101~105 | number of Cited : 2
    Abstract PDF
    After a weight-rate disposal system for food waste has been implemented we have to install the food waste system at all apartment. In this paper, we supplied electric energy to the food waste system using solar heat panels. The weight of the food waste is displayed on the LCD panel, and its price is calculated based on its weight. Since there would be some cases that touch-typed card can't be well recognized if it is contaminated by foreign material, we designed a recognition device by no-touch sensitive card reader to embody the food waste system. The food waste system was designed using a GUI(graphical user interface) so that users can easily understand it.
  • 15.

    Bio-vector Generation Framework for Smart Healthcare

    신윤환 | 2016, 21(1) | pp.107~113 | number of Cited : 0
    Abstract PDF
    In this paper, by managing the biometric data is changed with the passage of time, a systematic and scientifically propose a framework to increase the bio-vector generation efficiency of the smart health care. Increasing the development of human life as a medicine and has emerged smart health care according to this. Organic and efficient health management becomes possible to generate a vector when the biological domain to the wireless communication infrastructure based on the measurement of the health status and to take action in accordance with the change of the physical condition. In this paper, we propose a framework to create a bio-vector that contains information about the current state of health of the person. In the proposed framework, Bio vectors may be generated by collecting the biometric data such as blood pressure, pulse, body weight. Biometric data is the raw data from the bio-vector. The scope of the primary data can be set to active. As the collecting biometric data from multiple items of the bio-recognition vectors may increase. The resulting bio-vector is used as a measure to determine the current health of the person. Bio-vector generating the proposed framework, it can aid in the efficiency and systemic health of healthcare for the individual.
  • 16.

    Extraction of specific common genetic network of side effect pair, and prediction of side effects for a drug based on PPI network

    황유현 | 오민 | Youngmi Yoon | 2016, 21(1) | pp.115~123 | number of Cited : 0
    Abstract PDF
    In this study, we collect various side effect pairs which are appeared frequently at many drugs, and select side effect pairs that have higher severity. For every selected side effect pair, we extract common genetic networks which are shared by side effects’ genes and drugs’ target genes based on PPI(Protein-Protein Interaction) network. For this work, firstly, we gather drug related data, side effect data and PPI data. Secondly, for extracting common genetic network, we find shortest paths between drug target genes and side effect genes based on PPI network, and integrate these shortest paths. Thirdly, we develop a classification model which uses this common genetic network as a classifier. We calculate similarity score between the common genetic network and genetic network of a drug for classifying the drug. Lastly, we validate our classification model by means of AUC(Area Under the Curve) value.
  • 17.

    Bayesian Regression Modeling for Patent Keyword Analysis

    Choi.Jun-Hyeog | Sung-Hae Jun | 2016, 21(1) | pp.125~129 | number of Cited : 3
    Abstract PDF
    In this paper, we propose an efficient dynamic workload balancing strategy which improves the performance of high-performance computing system. The key idea of this dynamic workload balancing strategy is to minimize execution time of each job and to maximize the system throughput by effectively using system resource such as CPU, memory. Also, this strategy dynamically allocates job by considering demanded memory size of executing job and workload status of each node. If an overload node occurs due to allocated job, the proposed scheme migrates job, executing in overload nodes, to another free nodes and reduces the waiting time and execution time of job by balancing workload of each node. Through simulation, we show that the proposed dynamic workload balancing strategy based on CPU, memory improves the performance of high-performance computing system compared to previous strategies.
  • 18.

    An Linear Bottleneck Assignment Problem (LBAP) Algorithm Using the Improving Method of Solution for Linear Minsum Assignment Problem (LSAP)

    Sang-Un, Lee | 2016, 21(1) | pp.131~138 | number of Cited : 1
    Abstract PDF
    In this paper, we propose a simple linear bottleneck assignment problems (LBAP) algorithm to find the optimal solution. Generally, the LBAP has been solved by threshold or augmenting path algorithm. The primary characteristic of proposed algorithm is derived the optimal solution of LBAP from linear sum assignment problem (LSAP). Firstly, we obtains the solution for LSAP from the selected minimum cost of rows and moves the duplicated costs in row to unselected row with minimum increasing cost in direct and indirect paths. Then, we obtain the optimal solution of LBAP according to the maximum cost of LSAP can be move to less cost. For the 29 balanced and 7 unbalanced problem, this algorithm finds optimal solution as simple.
  • 19.

    Understanding Information Asymmetry among Investors in Online Trading Environment

    posang lee | 2016, 21(1) | pp.139~146 | number of Cited : 4
    Abstract PDF
    In this paper, we analyze the information asymmetry among investors in online trading environment using rumors which are collected in the Korean stock market for the eleven-year period between January 2004 and December 2014. We find that cumulative abnormal return of sample firms is negative and statistically significant, indicating that a significant fall of the stock price starts before the online disclosure, suggesting that the rumors were reflected in the stock price to a significant extent. Furthermore, individual investors show net purchases on firms prior to disclosure while institutional investors show net sales, showing that individual investors trade unfavorably vis-à-vis institutional investors. This phenomenon is more evident for the KOSDAQ. This result confirms that the information asymmetry exists between individual and institutional investors in online trading environment.
  • 20.

    Study on the Relationship between Adolescents' Self-esteem and their Sociality -Focusing on the Moderating Effect of Gender -

    Kyung-Suk Kim | leedn | 2016, 21(1) | pp.147~153 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an efficient dynamic workload balancing strategy which improves the performance of high-performance computing system. The key idea of this dynamic workload balancing strategy is to minimize execution time of each job and to maximize the system throughput by effectively using system resource such as CPU, memory. Also, this strategy dynamically allocates job by considering demanded memory size of executing job and workload status of each node. If an overload node occurs due to allocated job, the proposed scheme migrates job, executing in overload nodes, to another free nodes and reduces the waiting time and execution time of job by balancing workload of each node. Through simulation, we show that the proposed dynamic workload balancing strategy based on CPU, memory improves the performance of high-performance computing system compared to previous strategies.
  • 21.

    Strategies for Connecting Volunteer Service Activities in Universities with Communities

    Cho Woo Hong | 2016, 21(1) | pp.155~160 | number of Cited : 0
    Abstract PDF
    This study aims to develop strategies to reinforce the roles of universities and volunteer service activities centering on promotion of their connections to communities and community-oriented volunteer service activities. First, for autonomous and continuing development of volunteer services, universities should have active connections with service organizations. Second, more specialized volunteer service programs should be developed. Third, as volunteer service activities are somewhat forced on college students, recognition for them should be improved. Fourth, as the quality of the service and academic achievement decrease, conditions for volunteer service education and programs should be made available. Fifth, for continuing participation in volunteer service activities, organized systems should be established
  • 22.

    Problem and Improvement of the Computerization Practice Real - estate Registration

    Sungho Youn | 김문성 | 2016, 21(1) | pp.161~168 | number of Cited : 3
    Abstract PDF
    It has become the information medium that mediate between individuals of marketing with the new information media that use of the Internet in accordance with the progress of the IT industry- real estate marketing, real estate leasing, real estate auctions, etc. The real estate registration services should be disclosed to outside that include a schedule details the public book-register and problems caused by it should be reasonably resolved by handling a large amount of real estate registration work quickly, accurately handling to utilize Information Technology(IT) through the information system construction as the feature to process the information of register entries. Computerization of real estate registration will raise the efficiency of the registration as well as people can see the information related to real estate on the basis of published content without limitation the time and place and will pursue the ideal and reliability of the registration -web accessibility improving of the Internet Registry and permanent storage of preserving documents by electronic means. It is very large that impact on the real estate transaction if the accuracy of legal registration choosing formalism in the processing of real estate registration business through the Internet than written application is highly probable to occur incorrect registration. Also, It is necessary to manage it effectively -if you do not quickly and exactly respond to it, there is problems such as delays or poor registration service because real estate business activated and real estate registration services also increased sharply. In this paper, we will identify the problems of the real estate registration work and suggest improvements about it.
  • 23.

    Development and Application of CT-SPI Model for Improving Computational Thinking for Elementary School Students

    YOUNG-HOON SUNG | 2016, 21(1) | pp.169~180 | number of Cited : 9
    Abstract PDF
    In this paper, we propose a CT-SPI Model based on a physical computing for improving Computational Thinking(CT) for elementary students. This study analyzes the results obtained from applying the CT-SPI model to fourth-grade class. The model is designed to embrace the learning activities and CT elements for three different stages: System thinking, Prototyping and Interaction. For providing curriculum with CT-SPI model, physical SW educational module is developed, so that learners could focus on internalizing CT. The study results indicate that a learning satisfaction and a degree of learner interest improve significantly. Comprehensive CT capability assessment results in three levels show that the capability in lowest level (score is below 4 out of 10) has decreased by 46.6% but capability in highest level (over 7 out of 10) has increased by 20%
  • 24.

    Educational Objectives in Computing Education: A Comparative Analysis

    안상진 | Lee Youngjun | 2016, 21(1) | pp.181~189 | number of Cited : 4
    Abstract PDF
    This study examined three elementary school computing curriculum – the CSTA K-12 computer science standards, the computing programme of the national curriculum in England, and the 2015 national curriculum in Korea – focusing on the educational objectives with the perspective of the revision of Bloom’s Taxonomy of Educational Objectives. The CSTA K-12 computer science standards mainly addressed applying procedural knowledge and using digital technology is the main theme. The computing programme in England concentrated on understanding factual and conceptual knowledge of computer science, such as algorithms. The 2015 national curriculum also addressed applying procedural knowledge, but the main focus is making softwares and robots. The findings of this comparative analysis suggest that it is needed to set up concrete educational objectives for lower grade and make them related to the secondary education to make more coherent elementary-level learning objectives. And elementary-level computing learning objectives are needed to be organized with the perspective of knowledge and cognitive process level.
  • 25.

    A Multimedia Tutorial system for Learning the French Language

    Gookhyung Jho | 장재혁 | Gabsig Sim | 2016, 21(1) | pp.191~198 | number of Cited : 1
    Abstract PDF
    This paper aims to present how to design and implement a multimedia tutorial system for the self-learning French language using Director with additional tools. To implement a multimedia tutorial system we need to design several steps. First, we should choose the level of the users and design tutorial. Second, we should prepare all materials such as sounds, graphics, text and video. Finally, we should implement the selected elements and control the educational software. Due to the nature of the paper, it must emphasize French basic conversation to make environment that be used in each scene and the scene of the context dialog. In view of the fact that the fitness of each content utilization field of multimedia authoring tool is high, it is possible as part of the system sizing process of the manufacturing process, to impart its meaning. This learning-contents are composed of 10 units each situation, and we anticipate there are the several effects of this system on basic French students. This system helps lecturer get French students interested in lessons, and enables learner to learn French of the role of iterative practice by linking image and sound. Also this system helps learners to prepare and review French studying after a lesson and allows leaners to maximize their efficiency. The future of this work is to implement this system on the app.
  • 26.

    Development of Convergence Education Program of the ‘Life and Electricity․Electron’ Unit in Practical Arts Textbook to Enhance Computational Thinking

    김명중 | Lee Taewuk | 2016, 21(1) | pp.199~205 | number of Cited : 3
    Abstract PDF
    In this paper, we propose a analysis of electric and electronic’s unit in paratical arts and convergence education program to enhance computational thinking. In the current practical arts curriculum of Korean elementary school 6th graders, the ‘information’ related chapter is Chapter 3. However, educational contents mainly consist of making activities according to the specified manual such as electrical and electronic products, learning about robots, etc. It is very insufficient to develop the computational thinking required by the software-centered society. Therefore, we are to study development of convergence education program of the ‘Life and Electricity․Electron’ unit in practical arts textbook to enhance computational thinking.