Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2017, Vol.22, No.2

  • 1.

    Hot Data Identification For Flash Based Storage Systems Considering Continuous Write Operation

    LEESEUNGWOO | RYU Kwan Woo | 2017, 22(2) | pp.1~7 | number of Cited : 0
    Abstract PDF
    Recently, NAND flash memory, which is used as a storage medium, is replacing HDD (Hard Disk Drive) at a high speed due to various advantages such as fast access speed, low power, and easy portability. In order to apply NAND flash memory to a computer system, a Flash Translation Layer (FTL) is indispensably required. FTL provides a number of features such as address mapping, garbage collection, wear leveling, and hot data identification. In particular, hot data identification is an algorithm that identifies specific pages where data updates frequently occur. Hot data identification helps to improve overall performance by identifying and managing hot data separately. MHF (Multi hash framework) technique, known as hot data identification technique, records the number of write operations in memory. The recorded value is evaluated and judged as hot data. However, the method of counting the number of times in a write request is not enough to judge a page as a hot data page. In this paper, we propose hot data identification which considers not only the number of write requests but also the persistence of write requests.
  • 2.

    Energy Use Coordinator for Multiple Personal Sensor Devices

    Yunseok Rhee | 2017, 22(2) | pp.9~19 | number of Cited : 0
    Abstract PDF
    Useful continuous sensing applications are increasingly emerging as a new class of mobile applications. Meanwhile, open, multi-use sensor devices are newly adopted beyond smartphones, and provide huge opportunities to expand potential application categories. In this upcoming environment, uncoordinated use of sensor devices would cause severe imbalance in power consumption of devices, and thus result in early shutdown of some sensing applications depending on power-hungry devices. In this paper, we propose EnergyCordy, a novel inter-device energy use coordination system; with a system-wide holistic view, it coordinates the energy use of concurrent sensing applications over multiple sensor devices. As its key approach, we propose a relaxed sensor association; it decouples the energy use of an application from specific sensor devices leveraging multiple context inference alternatives, allowing flexible energy coordination at runtime. We demonstrated the effectiveness of EnergyCordy by developing multiple example applications over custom-designed wearable senor devices. We show that EnergyCordy effectively coordinates the power usage of concurrent sensing applications over multiple devices and prevent undesired early shutdown of applications.
  • 3.

    Pupil Detection using PCA and Hough Transform

    Jang, Kyung Shik | 2017, 22(2) | pp.21~27 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a pupil detection method using PCA(principal component analysis) and Hough transform. To reduce error to detect eyebrows as pupil, eyebrows are detected using projection function in eye region and eye region is set to not include the eyebrows. In the eye region, pupil candidates are detected using rank order filter. False candidates are removed by using symmetry. The pupil candidates are grouped into pairs based on geometric constraints. A similarity measure is obtained for two eye of each pair using PCA and hough transform, we select a pair with the smallest similarity measure as final two pupils. The experiments have been performed for 1000 images of the BioID face database. The results show that it achieves the higher detection rate than existing method.
  • 4.

    Arduino IoT Studio based on 5W1H Programming Model for non Programmer

    lim hong gab | BAEK, Yeong Tae | SeHoon Lee and 2other persons | 2017, 22(2) | pp.29~35 | number of Cited : 1
    Abstract PDF
    In this paper, we present a 5W1H programming model for IT non-experienced people who are not familiar with computer programming and those who need programming education. Based on this model, we can design a development tool that can be easily programmed by beginners. This development tool is a programming method applying the 5W1H concept and constructs a sentence to satisfy the control condition of 'Who, When, Where, What, and How', which is the sentence element of 5W1H. Therefore, the user can easily develop the target system as if constructing the sentence without learning the programming language of the target system. In this paper, to verify the effectiveness of the 5W1H programming model proposed in this paper, we applied the concept of 5W1H programming to Arduino and developed the development tool and performed the first verification and applied the second verification to the speech recognition smart home development platform.
  • 5.

    A Mechanism of Finding QoS Satisfied Multi-Path in Wireless Sensor Networks

    Yonghyeog Kang | 2017, 22(2) | pp.37~44 | number of Cited : 0
    Abstract PDF
    Wireless sensor networks are composed of many wireless sensor nodes that are sensing the environments. These networks have many constraints that are resource constraints, wireless communication, self-construction, etc. But they have many applications that are monitoring environment, tracking the object, etc. In this paper, a mechanism of finding QoS Satisfied multi-path is proposed in wireless sensor networks. In order to satisfy the QoS requirement, the proposed mechanism extends the AODV protocol to find multiple paths from a source node to a destination node by using the additional AODV message types that are proposed. This mechanism will be used to support many QoS applications such as minimum delay time, the better reliability and the better throughput by using the QoS satisfied multi-path. Overheads of the proposed mechanism are evaluated using simulation, and it is showed that QoS satisfied multiple paths are found with a little more overhead than the AODV mechanism.
  • 6.

    Resource Allocation for Guaranteeing QoE in Mobile Communication Networks

    Lee Moonho | Jongchan Lee | 2017, 22(2) | pp.45~50 | number of Cited : 0
    Abstract PDF
    This paper proposes a novel resource allocation scheme which allows to guarantee the user-perceived service quality for various high-quality mobile multimedia service such as interactive game, tactile internet service, remote emergency medical service or remote disaster handling robot control to a certain level in the mobile networks. In our proposed scheme, Mean Opinion Score(MOS), which represents the degree of user satisfaction for perceived quality, is determined based on the delay limit allowable to each service. Moreover resources are allocated in consideration of this MOS. Simulation results show that our proposed scheme can decrease the outage probability in comparison with existing schemes Moreover it can increase the total throughput as well.
  • 7.

    A Study on Selection of Core Services for Deciding ISMS Scope

    Kang Hyunsik | Kim Jungduk | 2017, 22(2) | pp.51~57 | number of Cited : 0
    Abstract PDF
    The first thing to be prioritized is to set the scope of the management system when establishing an information security management system for systematic and effective information security management. It is important to set the scope for an organization’s information security goals due to the scope affects the organization’s overall information security activities. If the scope is set incorrectly, it might become impossible to protect important services and therefore, the scope of the management system should be determined in consideration of the core business services of the organization. We propose a core service selection model based on the organization’s mission-critical service and high risk service in order to determine the effective information security management system scope in this paper. Core service selection criteria include the type of service, contribution to sales, socio-economic impact, and linkage with other services
  • 8.

    A Study on secure authentication system using integrated authentication service

    Hyung Soo Lee | 2017, 22(2) | pp.59~63 | number of Cited : 0
    Abstract PDF
    Recently, Certificate has been loosed 100 times in a four years as Phising or hacking. The service that use certificate in financial services occurs practical and secure issues. Therefore, the Korea government abolished the mandatory system used in the certificate service. However, they did not provide a replacing method for a certificate. And is not to fill the gaps of the certificate with one time password or secure card. Therefore this paper is propose the alternative method with total authentication service, that is lead the more secure electronic commercial.
  • 9.

    A Study on the Terminology Standardization for Integrated Management System of Disaster Safety Standards

    Sunghak Chung | Dugkeun Park | 2017, 22(2) | pp.65~73 | number of Cited : 0
    Abstract PDF
    The objective of this study is to suggest the templates for the terminology standardization cases of safety standard on integrated management system, so that integrated management of safety standards is introduced to replace redundant, or conflicting functions and performance of these standards. And to carry out the terminology standardization enables management efficiently. Therefore this study suggests and analyzes cases of terminology standardization of domestic and international research trends. In addition to proposes a architectural schema for disaster safety standard and writing disaster safety standardizations of the International Organization for Standardization. For the objectives, the guidelines on standard terminology policy, terminology publication and guide development proposed by the International Organization for Standardization. Disaster safety standards were applied in order to build and utilize integrated management system of disaster safety standards through domestic and foreign cases. Throughout the result of this study, this study will contribute to the analysis and application of semantic knowledge based analysis throughout the ontology information linked the vocabulary to vocabulary by making the template of the disaster safety standards for easy to use and simple etc. This study is to expect traceability for the principle national disaster safety standards resource elements.
  • 10.

    A Hedonic Model Effects for Consumer-oriented Retargeting Advertising Based on Internet of Things

    kim boram | Yongik Yoon | Mansoo Chung | 2017, 22(2) | pp.75~80 | number of Cited : 2
    Abstract PDF
    In this study, we developed a Hedonic Model for Retargeting Advertising Based on Consumer-centerd IoT space for offering useful, interest, and interactive information to consumer. And most existing relative researches about Internet of Things but, this paper focusing on the Type of information, humor, and interactive and analyze the attitude and clicks intention to Retargeting Advertising Based on Consumer-centerd Internet of Things. According to the results, humor Advertising is positively related to attitude and click intention toward Internet of Things Advertising. But information Ad and interactive Ad affect positive to click intention. This is mean that click intention is more immediate reaction of consumers in the IoT space. Therefore Future research will be designed in a more interactive elements that can lead to positive reaction of consumers on the Internet of Things be more effective if you advertise advertising.
  • 11.

    Wine Quality Assessment Using a Decision Tree with the Features Recommended by the Sequential Forward Selection

    Lee seunghan | Kyungtae Kang | Dong Kun Noh | 2017, 22(2) | pp.81~87 | number of Cited : 0
    Abstract PDF
    Nowadays wine is increasingly enjoyed by a wider range of consumers, and wine certification and quality assessment are key elements in supporting the wine industry to develop new technologies for both wine making and selling processes. There have been many attempts to construct a more methodical approach to the assessment of wines, but most of them rely on objective decision rather than subjective judgement. In this paper, we propose a data mining approach to predict human wine taste preferences that is based on easily available analytical tests at the certification step. We used sequential forward selection and decision tree for this purpose. Experiments with the wine quality dataset from the UC Irvine Machine Learning Repository demonstrate the accuracies of 76.7% and 78.7% for red and white wines respectively.
  • 12.

    Development of Augmented Reality Walking Navigation App using Dijkstra Algorithm

    Jeong ChoHui | Lee Myungsuk | 2017, 22(2) | pp.89~95 | number of Cited : 0
    Abstract PDF
    There are a variety of apps that are finding their way. And in car navigation, we launched a product that reflects Augmented Reality technology this year. However, existing apps have problems. It is implemented in 2D or 3D, has a large error range because it has been modified in most vehicles, is not updated in real time, and car augmented reality navigation is a vehicle, and a separate device is required, etc. In this study, we implemented a smartphone app for walking directions using augmented reality, and made it possible to intuitively use a route service from a user 's location to a destination. The Dijkstra algorithm is applied to calculate the shortest path to solve the problem of finding the route with the least cost. By using this application, it is possible to use the route search service even in a data-free environment, to solve the inconvenience of the language barrier, and to update in real time, so that the latest information can be always maintained. In the future, we want to develop an app that can be commercialized by using a character in the path to promote it.
  • 13.

    SPARQL Query Automatic Transformation Method based on Keyword History Ontology for Semantic Information Retrieval

    DaeWoong Jo | Myung Ho Kim | 2017, 22(2) | pp.97~104 | number of Cited : 0
    Abstract PDF
    In semantic information retrieval, we first need to build domain ontology and second, we need to convert the users’ search keywords into a standard query such as SPARQL. In this paper, we propose a method that can automatically convert the users’ search keywords into the SPARQL queries. Furthermore, our method can ensure effective performance in a specific domain such as law. Our method constructs the keyword history ontology by associating each keyword with a series of information when there are multiple keywords. The constructed ontology will convert keyword history ontology into SPARQL query. The automatic transformation method of SPARQL query proposed in the paper is converted into the query statement that is deemed the most appropriate by the user’s intended keywords. Our study is based on the existing legal ontology constructions that supplement and reconstruct schema and use it as experiment. In addition, design and implementation of a semantic search tool based on legal domain and conduct experiments. Based on the method proposed in this paper, the semantic information retrieval based on the keyword is made possible in a legal domain. And, such a method can be applied to the other domains.
  • 14.

    The Effect of Using a Assistant Pad when Doing Chest Compression During Cardiopulmonary Resuscitation

    Seong-Woo Yun | 2017, 22(2) | pp.105~110 | number of Cited : 4
    Abstract PDF
    We propose a effectiveness of the assistant pad during cardiopulmonary resuscitation and provide basic data for high quality cardiopulmonary resuscitation. The subjects of the study were 28 students in the emergency department who completed the BLS Health Care-Provider under the experimental study by the randomized crossover design. Data were analyzed by using SPSS 20.0 Version. The results of this study showed that chest compressions using assistant pads decreased pain and fatigue than normal chest compressions, and the depth of chest compressions was deeper than normal depth. The results of this study shows that the use of assistant pads between the one hand and the other hand during cardiopulmonary resuscitation may increase accuracy and depth were improved. Therefore intensive indicator also improved. However, with regard to the use of assistant pads, further studies will be needed to identify the potential for clinical use.
  • 15.

    A Study on Influence of Corporate Factor and ITO Range Factor on Outsourcing Performance -Moderating Effect of Supplier Suitability

    Yi, Seon Gyu | 2017, 22(2) | pp.111~117 | number of Cited : 1
    Abstract PDF
    This study analyzes the relative importance of the introducing factors for the critical success factors in the implementation stage of the lifecycle of ERP system using Delphi technique and Analytic Hierarchy Process(AHP). In the 1st layer of the hierarchy, technical factor is evaluated as the most important factor among organizational, technical, and supplier factors. In the 2nd layer, choosing a proper ERP package is evaluated as the most important factor within 15 factors followed by process-oriented approach, technical suitability, minimized customization, integration and association of system with trading parter, association with legacy systems, and support and involvement of top management. As a result of this analysis enterprise should choose an ERP package that is suitable to its business environment, and make the best use of(take full advantage of) best practice that ERP package provides to optimize the existing business procedure or process(to approach the existing business procedure or process). This study also shows the range of customization of the features provided by the ERP package should be minimized.
  • 16.

    Performance Evaluation of National R&D Investment in Information Technology Areas

    Kim, Heung-Kyu | 2017, 22(2) | pp.119~125 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an approach to evaluating the performance of the national R&D investment in IT(Information Technology) areas in terms of paper, patent and commercialization, and seeking ways to improve the efficiency of the national R&D investment. This is because the government has focused the national R&D investment on IT areas for some time. For that purpose, we gather data on investments, papers, patents, and commercializations for the government sponsored R&D projects in IT areas through National Science & Technology Information Service. From which, we summarize the investment and performance in terms of papers, patents, and commercializations for each IT area, evaluate efficiency per R&D investment for each IT area, and compare the efficiencies among IT areas. Finally, we drive implications for efficiency enhancement and strategic R&D budget allocation for each IT area.
  • 17.

    Participation by Community Volunteers and Strategies for the Efficient Use of Human Resources

    Cho Woo Hong | 2017, 22(2) | pp.127~132 | number of Cited : 0
    Abstract PDF
    Volunteer services in communities work to provide human and material resources needed in social welfare centers and help the centers efficiently and effectively respond to diverse needs in society as well as provide quality services to clients. With this in mind, this study presents a few political suggestions on their utilization. First, potential volunteer development should be done in communities. Second, users of diverse volunteering services should be developed. Third, centers should pay attention to promotion of volunteers and the volunteers should be completely educated before services are rendered.
  • 18.

    A study on procedures of search and seize in digital data

    Kim, Woon-Gon | 2017, 22(2) | pp.133~139 | number of Cited : 0
    Abstract PDF
    Today, the activities of individuals and corporations are dependent not only on digital technology but also on the future of society, which is referred to as the fourth industrial revolution. Since the traces that arise from the crimes that occur in the digital society are also inevitably developed into a society that should be found in the digital, the judicial dependence of judging by the digital evidence is inevitably increased in the criminal procedure. On the other hand, considering the fact that many users are using virtual shared computing resources of service providers considering the fact that they are being converted into a cloud computing environment system, searching for evidence in cloud computing resources is not related to crime. The possibility of infringing on the basic rights of the criminal procedure is increased, so that the ability of evidence of digital data which can be used in the criminal procedure is limited. Therefore, considering these two aspects of digital evidence, this point should be fully taken into account in judging the evidence ability in the post-seizure warrant issuance and execution stage as well as the pre-emptive control. There is a view that dictionary control is useless, but it needs to be done with lenient control in order to materialize post-modern control through judging ability of evidence. In other words, more efforts are needed than ever before, including legislation to ensure proper criminal procedures in line with the digital age.