Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2016, Vol.21, No.2

  • 1.

    Correlated Locality Data Distribution Policy for Improving Performance in SSD

    Jung Kyu Park | 2016, 21(2) | pp.1~7 | number of Cited : 1
    Abstract PDF
    In this paper, we propose in this paper present a novel locality data allocation policy as COLD(Correlated Locality Data) allocation policy. COLD is defined as a set of data that will be updated together later. By distributing a COLD into a NAND block separately, it can preserve th locality. In addition, by handling multiple COLD simultaneously, it can obtain the parallelism among NAND chips. We perform two experiment to demonstrate the effectiveness of the COLD data allocation policy. First, we implement COLD detector, and then, analyze a well-known workload. And we confirm the amount of COLD found depending on the size of data constituting the COLD. Secondly, we compared the traditional page-level mapping policy and COLD for garbage collection overhead in actual development board Cosmos OpenSSD. Experimental results have shown that COLD data allocation policy is significantly reduces the garbage collection overhead. Also, we confirmed that garbage collection overhead vary depending on the COLD size.
  • 2.

    An IPC-based Dynamic Cooperative Thread Array Scheduling Scheme for GPUs

    손동오 | Jong Myon Kim | Cheol Hong Kim | 2016, 21(2) | pp.9~16 | number of Cited : 3
    Abstract PDF
    Recently, many research groups have focused on GPGPUs in order to improve the performance of computing systems. GPGPUs can execute general-purpose applications as well as graphics applications by using parallel GPU hardware resources. GPGPUs can process thousands of threads based on warp scheduling and CTA scheduling. In this paper, we utilize the traditional CTA scheduler to assign a various number of CTAs to SMs. According to our simulation results, increasing the number of CTAs assigned to the SM statically does not improve the performance. To solve the problem in traditional CTA scheduling schemes, we propose a new IPC-based dynamic CTA scheduling scheme. Compared to traditional CTA scheduling schemes, the proposed dynamic CTA scheduling scheme can increase the GPU performance by up to 13.1%.
  • 3.

    Design of OpenCV based Finger Recognition System using binary processing and histogram graph

    BAEK, Yeong Tae | SeHoon Lee | Ji-Seong Kim | 2016, 21(2) | pp.17~23 | number of Cited : 2
    Abstract PDF
    NUI is a motion interface. It uses the body of the user without the use of HID device such as a mouse and keyboard to control the device. In this paper, we use a Pi Camera and sensors connected to it with small embedded board Raspberry Pi. We are using the OpenCV algorithms optimized for image recognition and computer vision compared with traditional HID equipment and to implement a more human-friendly and intuitive interface NUI devices. comparison operation detects motion, it proposed a more advanced motion sensors and recognition systems fused connected to the Raspberry Pi.
  • 4.

    Design of a middleware for compound context-awareness on sensor-based mobile environments

    NakMyoung Sung | Yunseok Rhee | 2016, 21(2) | pp.25~32 | number of Cited : 0
    Abstract PDF
    In this paper, we design a middleware for context-awareness which provides compound contexts from diverse sensors on a mobile device. Until now, most of context-aware application developers have taken responsibility for context processing from sensing data. Such application-level context processing causes heavily redundant data processing and leads to significant resource waste in energy as well as computing. In the proposed scheme, we define primitive and compound context map which consists of relavant sensors and features. Based on the context definition, each application demands a context of interest to the middleware, and thus similar context-aware applications inherently share context information and procesing within the middleware. We show that the proposed scheme significantly reduces the resource amounts of cpu, memory, and battery, and that the performance gain gets much more when multiple applications which need similar contexts are running.
  • 5.

    An advanced reversible data hiding algorithm based on the similarity between neighboring pixels

    Soo-Mok Jung | 2016, 21(2) | pp.33~42 | number of Cited : 3
    Abstract PDF
    In this paper, an advanced reversible data hiding algorithm which takes the advantage of the spatial locality in image was proposed. Natural image has a spatial locality. The pixel value of a natural image is similar to the values of neighboring pixels. So, using the neighboring pixel values, it is possible to precisely predict the pixel value. Frequency increases significantly at the peak point of the difference histogram using the predicted values. Therefore, it is possible to increase the amount of data to be embedded. By using the proposed algorithm, visually high quality stego-image can be generated, the original cover image and the embedded data can be extracted from the stego-image without distortion. The embedding data into the cover image of the proposed algorithm is much lager than that of the previous algorithm. The performance of the proposed algorithm was verified by experiment. The proposed algorithm is very useful for the reversible data hiding.
  • 6.

    A Study on The Controllability Function and Sevice Design for Disaster Damage Reduction in the IoT Environment

    Jung-Mo Yang | KIM JEONG HO | 2016, 21(2) | pp.43~49 | number of Cited : 0
    Abstract PDF
    In this paper, we propose the controllability function and service design to efficiently implement the control of the disaster communication network, using Internet of Things(IoT) Technology. In accordance with the spread of Information Communication Technology(ICT), the era for building a disaster communications system without exclusion over the entire areas has emerged. National wireless mesh networks for public safety and disaster relief have been evolving to strengthen the pre-disaster response system using the latest technologies through the convergence of various technologies and services from the viewpoint of the command and control between disaster response agencies. In line with such a technological paradigm shift, the controllability of the objects in the IoT has been emerging as a key quality requirement of a disaster communications system. In this study, the objects are classified by the subject of control according to the IoT component, such as data, network resources and services in order to effectively implement their controllability. In addition, based on the destination of this controllability, technologies and services have been designed that can reduce the damage caused by disasters. Technologies and services that were derived from this study must be implemented in the current disaster safety network systems together with the establishment of an infrastructure for the networks in order that all persons are able to effectively utilize the disaster communications system for their safety.
  • 7.

    Hierarchical Routing Algorithm for Improving Survivability of WSAN

    조지용 | 최승권 | Yonghwan Cho | 2016, 21(2) | pp.51~60 | number of Cited : 0
    Abstract PDF
    This paper proposes a hierarchical routing algorithm for enhancing survivability of sensor nodes on WSAN. Proposed algorithm has two important parts. The first is a clustering algorithm that uses distance between sensor and actor, and remaining energy of sensor nodes for selecting cluster head. It will induce uniform energy consumption, and this has a beneficial effect on network lifetime. The second is an enhanced routing algorithm that uses the shortest path tree. The energy efficient routing is very important in WSAN which has energy limitation. As a result, proposed algorithm extends network and nodes lifetime through consuming energy efficiently. Simulation results show that the proposed clustering algorithm outperforms conventional routing algorithms such as VDSPT in terms of node and network life time, delay, fairness, and data transmission ratio to BS.
  • 8.

    Design and Implementation of the Authentication System for In-app Billing in Mobile Environments

    석호준 | Seog-Gyu Kim | 2016, 21(2) | pp.61~69 | number of Cited : 0
    Abstract PDF
    In this paper, we propose the authentication server system that prevent hacking in In-app billing applications. And we also propose the methods to verify electronic receipt for the payment of internal app payments and to check the integrity of the applications. Then we designed the payment metabolic system that checks between products-offer list and paid subscription if payment system is hacked with new hacking technologies different from existing ones. And then we implemented proposed authentication system and experimented with about 10,000 average internal application payments per an hour. It shows that proposed system has defensive techniques that counter attacks against in-app billing but it takes more than 0.8916 seconds than no-certification system that is considered as relatively short time.
  • 9.

    A Cellular Formation Problem Algorithm Based on Frequency of Used Machine for Cellular Manufacturing System

    Sang-Un, Lee | 2016, 21(2) | pp.71~77 | number of Cited : 0
    Abstract PDF
    There has been unknown polynomial time algorithm for cellular formation problem (CFP) that is one of the NP-hard problem. Therefore metaheuristic method has been applied this problem to obtain approximated solution. This paper shows the existence of polynomial-time heuristic algorithm in CFP. The proposed algorithm performs coarse-grained and fine-grained cell formation process. In coarse-grained cell formation process, the cell can be formed in accordance with machine frequently used that is the number of other products use same machine with special product. As a result, the machine can be assigned to most used cell. In fine-grained process, the product and machine are moved into other cell that has a improved grouping efficiency. For 35 experimental data, this heuristic algorithm performs better grouping efficiency for 12 data than best known of meta-heuristic methods.
  • 10.

    Implementation of an Automatic Observation System for Cloud Observations

    KWON JUNG JANG | 2016, 21(2) | pp.79~88 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an efficient automatic observation system for cloud amount and height observations. Observation system consists of clouds observations machinery, operational programs, cloud amount extraction program, cloud height extraction program, expert support programs. The experiment was conducted at the Daegwallyeong and Busan, through experimental observation confirmed the usefulness of the proposed system.
  • 11.

    Case Studies and Derivation of Course Profile in accordance with NCS-based Video Graphics Job

    Park hea-sook | Lee, Soon-mi | 2016, 21(2) | pp.89~96 | number of Cited : 2
    Abstract PDF
    This study analyzed with the case analysis of a series of processes from job analysis survey. And results analysis, and academic achievement in order to transform the curriculum of existing courses into the curriculum of NCS-based courses. Also this study analysed of the existing curriculum. Also analyzed the trend of workforce trends and needs of the broadcasting content industry. Through a needs analysis for the industry and alumni and students, video graphics, video editing and video directing were selected. In this paper, it dealt mainly with respect to the video graphics in a dual job. Modeling capability into the unit through a job analysis, animation, effects and lighting were chosen accordingly based introduction of 3D Graphics. Application of 3D Graphics were derived two courses and selected profiles and performance criteria. This training according to the NCS curriculum for students was evaluated based on the student's job was to investigate the learning ability. Academic achievement were the result satisfaction.
  • 12.

    An Assignment-Balance-Optimization Algorithm for Minimizing Production Cycle Time of a Printed Circuit Board Assembly Line

    Sang-Un, Lee | 2016, 21(2) | pp.97~103 | number of Cited : 1
    Abstract PDF
    This paper deals with the cycle time minimization problem that determines the productivity in printed circuit board (PCB) with  components using the  placement machines. This is known as production cycle time determination problem (PCTDP). The polynomial time algorithm to be obtain the optimal solution has been unknown yet, therefore this hard problem classified by NP-complete. This paper gets the initial assignment result with the machine has minimum unit placement time per each component firstly. Then, the balancing process with reallocation from overhead machine to underhead machine. Finally, we perform the swap optimization and get the optimal solution of cycle time  ∗ within   computational complexity. For experimental data, the proposed algorithm can be obtain the same result as integer programming+branch-and-bound (IP+B&B) and B&B.
  • 13.

    Suitable Health Pattern Type Mapping Techniques in Body Mass Index

    신윤환 | 2016, 21(2) | pp.105~112 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a technique that can be mapped to the most appropriate type of health patterns, depending on the health status of health promotion measures to establish a body mass index (BMI). When used as a mapping scheme proposed in this paper it is possible to contribute to effective healthcare and health promotion. BMI is widely used as a simple way to assess obesity because body fat increases the status and relevance. Despite normal weight determined by this and because of the social atmosphere has increased prefer the skinny tend to try to excessive weight loss. Since health can affect the health maintenance and promotion of the rest of your life, depending on whether and how much weight perception and health can be considered as very important. Therefore, this paper identifies the differences in perception and in this respect for the body mass index (BMI). And physical, mental and map the appropriate type of pattern in the relationship between body mass index (BMI) in order to facilitate the social and health conditions. Proposal to give such a mapping technique provides the opportunity to increase the efficiency of health care and health promotion.
  • 14.

    Major Predictors of User's Continuance Intention to Provide information: In the Context of Online Community and Social Media

    Kang Jae Jung | Yoojung Kim | 2016, 21(2) | pp.113~122 | number of Cited : 0
    Abstract PDF
    This study investigates how anticipated value(attainment value, intrinsic value, utility value, and reward value) and self-efficacy in providing information have an influence on continuance intention to provide information in the context of online community or social media. We propose a conceptual model for examining the framework for the effect of anticipated value on attitude toward providing information, and the effect of attitude toward providing information and self-efficacy in providing information on continuance intention to provide information. Proposed research model is empirically assessed using the survey data obtained from 221 respondents in Korea. Results show that attainment value and intrinsic value have a significant impact on attitude toward providing information, whereas utility value and reward value are found to be insignificant. In addition, attitude toward providing information and self-efficacy in providing information are positively and significantly related to continuance intention to provide information.
  • 15.

    A Study on Relationship between Interpersonal Relation, Communication Skills and Work-related Stress in Physical Therapists

    Myoung, Sungmin | 2016, 21(2) | pp.123~129 | number of Cited : 5
    Abstract PDF
    In this research, we performed to investigate the relationship between interpersonal relation, communication skills and work-related stress in physical therapists. The subjects of this study were consist of 388 physical therapists from general hospitals and medical rehabilitation centers in Gyeonggi region. Data were analyzed using the PASW 18.0. Work-related stress showed statistically significant differences according to the demographic characteristics of clinical experience. Interpersonal relation found significant negative correlation for work-related stress except job-demand stress. Also, this study found negative correlation between communication skills and work-related stress, and significantly correlated interpersonal relation with communication skill. The results of this study suggest that in developing programs to manage work-related stress for improving interpersonal relations and communication skills in physical therapists.
  • 16.

    The Influence of customer orientation on the Social Welfare Hall workers of internal marketing

    Cho Woo Hong | 2016, 21(2) | pp.131~136 | number of Cited : 5
    Abstract PDF
    This study aims to present suggestions on the causes and effects between internal marketing and customer-oriented trends of social welfare halls based on the issue that internal marketing should be activated based on previous studies on the relationship between internal marketing and customer-oriented trends. For this purpose, as a result of analysing the research hypothesis through a questionnaire, this study has meaning in that it supported the results of previous studies on internal marketing and customer-oriented trends as theoretical suggestions and analysed the relationship between internal marketing and customer-oriented trends. It was politically suggested and emphasized that internal marketing is needed in social welfare halls and to encourage social welfare workers to be customer-oriented, components of internal marketing should be established in an organic and systematic manner.
  • 17.

    Control of International Cyber Crime

    park | Sang-Ouk Noe | 2016, 21(2) | pp.137~144 | number of Cited : 0
    Abstract PDF
    The followings are required to establish uniform principle of criminal jurisdiction for international cyber crime into customary international law; ① clear guideline of UN for promoting national practice ② formation of general practices based on these guidelines ③ these general practices should obtain legal confidence. International society is in close cooperation for investigating and controlling cyber threat. The US FBI has closed down the largest online crime space called ‘Darkcode’ and prosecuted related hackers based on joint investigation with 19 countries including England, Australia, Canada, Bosnia, Croatia, Israel, and Rumania. More and more people in Korea are raising their voices for joining cyber crime treaty, ‘Budapest Treaty.’ Budapest Treaty is the first international treaty prosecuting cyber crime by setting out detailed regulations on internet criminal act. Member countries have installed hotline for cyber crime and they act together. Except European countries, America, Canada, and Japan have joined the treaty. In case of Korea, from few years before, it is reviewing joining with Ministry of Foreign affairs, Ministry of Justice and the National Police but haven’t made any conclusion. Different from offline crime, cyber crime is planned in advance and happens regardless of border. Therefore, international cooperation based on position of punishing criminals and international standards. Joining of Budapest international cyber crime treaty shall be done as soon as possible for enhancing national competence.
  • 18.

    Comparative Study of Informatics Subject Curriculums and Textbooks in Middle School Between Korea and England

    Choe Hyun-Jong | Song Tae Ok | Lee Taewuk | 2016, 21(2) | pp.145~152 | number of Cited : 5
    Abstract PDF
    In this paper, we propose a comparative study of Informatics subject curriculums and textbooks in middle school between Korea and England because both countries have similar national curriculums about software education which has computational thinking as objectives of education and good-qualified textbooks for teachers and students. we looked through the Informatics and Computing curriculums and textbook of both countries in order to give good reference case to Informatics textbook manufacturer. In addition, we verified the validity of this study through FGI. The results of this study will be a good case study about designing Informatics curriculum and making Informatics textbooks in middle school.