Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

Home > Explore Content > All Issues > Article List

2017, Vol.22, No.3

  • 1.

    Time-Aware Wear Leveling by Combining Garbage Collector and Static Wear Leveler for NAND Flash Memory System

    Hwang Sang-Ho , Kwak, Jong Wook | 2017, 22(3) | pp.1~8 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a new hybrid wear leveling technique for NAND Flash memory, called Time-Aware Wear Leveling (TAWL). Our proposal prolongs the lifetime of NAND Flash memory by using dynamic wear leveling technique which considers the wear level of hot blocks as well as static wear leveling technique which considers the wear level of the whole blocks. TAWL also reduces the overhead of garbage collection by separating hot data and cold data using update frequency rate. We showed that TAWL enhanced the lifetime of NAND flash memory up to 220% compared with previous wear leveling techniques and our technique also reduced the number of copy operations of garbage collections by separating hot and cold data up to 45%.
  • 2.

    Reuse Information based Thrashing Resistant Cache Management Scheme

    SIMGYUYEON , Cheol Hong Kim | 2017, 22(3) | pp.9~16 | number of Cited : 0
    Abstract PDF
    In recent computing systems, LRU replacement policy has been widely used because it can be simply implemented and applicable to most programs. However, if the working set size of the program is bigger than the actual cache size, LRU replacement policy may occur thrashing problem. Thrashing problem means that cache blocks are consistently replaced without re-referencing in the cache. This paper proposes a new cache management scheme to solve the thrashing problem in the second-level cache. The proposed scheme measures per set reuse frequency using EAF structure to find thrashing sets. When the cache miss occurs, it tests whether the address of the missed block is stored or not. If the address of the missed block is stored, it means that the recently evicted block is re-requested, so the reuse frequency is predicted high. In this case, the corresponding counter of the set is increased. When the counter value is bigger than the threshold value, we assume that the corresponding set shows high reuse frequency. The proposed scheme assigns the set with high reuse frequency to the additional small size cache to keep the blocks in the cache for a long time. Our experimental results show that the proposed scheme improves the IPC by 3.81% on average.
  • 3.

    Evaluation of Static Analyzers for Weakness in C/C++ Programs using Juliet and STONESOUP Test Suites

    Hyunji Seo , Younggwan Park , Kim Taehwan and 2 other persons | 2017, 22(3) | pp.17~25 | number of Cited : 0
    Abstract PDF
    In this paper, we compared four analyzers Clang, CppCheck, Compass, and a commercial one from a domestic startup using the NIST’s Juliet test suit and STONESOUP that is introduced recently. Tools showed detection efficacy in the order of Clang, CppCheck, the domestic one, and Compass under Juliet tests; and Clang, the domestic one, Compass, and CppCheck under STONESOUP tests. We expect it would be desirable to utilize symbolic execution for vulnerability analysis in the future. On the other hand, the results of tool evaluation also testifies that Juliet and STONESOUP as a benchmark for static analysis tools can reveal differences among tools. Finally, each analyzer has different CWEs that it can detect all given test programs. This result can be used for selection of proper tools with respect to specific CWEs.
  • 4.

    Lane Detection Using Biased Discriminant Analysis

    Tae Kyung Kim , Kwak, Nojun , CHOI, SANG-IL | 2017, 22(3) | pp.27~34 | number of Cited : 0
    Abstract PDF
    We propose a cascade lane detector that uses biased discriminant analysis (BDA) to work effectively even when there are various external factors on the road. The proposed cascade detector was designed with an existing lane detector and the detection module using BDA. By placing the BDA module in the latter stage of the cascade detector, the erroneously detected results by the existing detector due to sunlight or road fraction were filtered out at the final lane detection results. Experimental results on road images taken under various environmental conditions showed that the proposed method gave more robust lane detection results than conventional methods alone.
  • 5.

    MBTI-based Recommendation for Resource Collaboration System in IoT Environment

    PARK JONGHYUN | 2017, 22(3) | pp.35~43 | number of Cited : 0
    Abstract PDF
    In IoT(Internet of Things) environment, users want to receive customized service by users’ personal device such as smart watch and pendant. To fulfill this requirement, the mobile device should support a lot of functions. However, the miniaturization of mobile devices is another requirement and has limitation such as tiny display. limited I/O, and less powerful processors. To solve this limitation problem and provide customized service to users, this paper proposes a collaboration system for sharing various computing resources. The paper also proposes the method for reasoning and recommending suitable resources to compose the user-requested service in small device with limited power on expected time. For this goal, our system adopts MBTI(Myers-Briggs Type Indicator) to analyzes user's behavior pattern and recommends personalized resources based on the result of the analyzation. The evaluation in this paper shows that our approach not only reduces recommendation time but also increases user satisfaction with the result of recommendation.
  • 6.

    Consecutive-Frame Super-Resolution considering Moving Object Region

    Cho SungMin , JEONG WOO JIN , Kyung Hyun Jang and 2 other persons | 2017, 22(3) | pp.45~51 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a consecutive-frame super-resolution method to tackle a moving object problem. The super-resolution is a method restoring a high resolution image from a low resolution image. The super-resolution is classified into two types, briefly, single-frame super-resolution and consecutive-frame super-resolution. Typically, the consecutive-frame super-resolution recovers a better than the single-frame super-resolution, because it use more information from consecutive frames. However, the consecutive-frame super-resolution failed to recover the moving object. Therefore, we proposed an improved method via moving object detection. Experimental results showed that the proposed method restored both the moving object and the background properly.
  • 7.

    Research on Application of Service Design Methodology in IOT Environment

    kim byung taek , Cho, Yun Sung | 2017, 22(3) | pp.53~60 | number of Cited : 1
    Abstract PDF
    The purpose of this study is to provide empirical and quantitative analysis on user 's perceived privacy, security, and user satisfaction when providing visualization information about objects and service provider behaviors that users can not perceive in internet service process. Through previous research, we have examined the importance of privacy and security factors as a key factor to be considered for the characteristics of the Internet of things and the Internet of things. In addition, service blueprint, which is one of the service design methodologies to examine the flow of service usage in providing Internet service of things, was examined. In the flow of things internet service utilization, it is found that the things that are out of the user 's cognitive area and the behavior of the service provider take up a large part. Therefore, the hypothesis that the trust of the Internet service security and the satisfaction of the user experience can be improved by providing the security visualization information about the behavior of the object and the invisible service provider in the non-contact aspect of the user and the object. In order to verify the hypothesis, we conducted experiments and questionnaires on the use of virtual objects' internet environment and conducted statistical analysis based on them. As a result, it was analyzed that visual information feedback on non - contact and invisible objects and service provider 's behaviors had a positive effect on user' s perceived privacy, security, and satisfaction. In addition, we conclude that it can be used as a service design evaluation tool to eliminate psychological anxiety about security and to improve satisfaction in internet service design. We hope that this research will be a great help for the research on application method of service design method in Internet environment of objects.
  • 8.

    Analysis of the network robustness based on the centrality of vertices in the graph

    ChangKwon Jeong , Han Chi-Geun , Sang-Hoon Lee | 2017, 22(3) | pp.61~67 | number of Cited : 1
    Abstract PDF
    This paper analyzes the robustness of the network based on the centrality of vertices in the graph. In this paper, a random graph is generated and a modified graph is constructed by adding or removing vertices or edges in the generated random graph. And then we analyze the robustness of the graph by observing changes in the centrality of the random graph and the modified graph. In the process modifying a graph, we changes some parts of the graph, which has high values of centralities, not in the whole. We study how these additional changes affect the robustness of the graph when changes occurring a group that has higher centralities than in the whole.
  • 9.

    Comparison and Analysis of P2P Botnet Detection Schemes

    Kyungsan CHO , Wujian Ye | 2017, 22(3) | pp.69~79 | number of Cited : 1
    Abstract PDF
    In this paper, we propose our four-phase life cycle of P2P botnet with corresponding detection methods and the future direction for more effective P2P botnet detection. Our proposals are based on the intensive analysis that compares existing P2P botnet detection schemes in different points of view such as life cycle of P2P botnet, machine learning methods for data mining based detection, composition of data sets, and performance matrix. Our proposed life cycle model composed of linear sequence stages suggests to utilize features in the vulnerable phase rather than the entire life cycle. In addition, we suggest the hybrid detection scheme with data mining based method and our proposed life cycle, and present the improved composition of experimental data sets through analysing the limitations of previous works.
  • 10.

    Classification of Diagnostic Information and Analysis Methods for Weaknesses in C/C++ Programs

    Han, Kyung sook , Damho Lee , PYO CHANG WOO | 2017, 22(3) | pp.81~88 | number of Cited : 1
    Abstract PDF
    In this paper, we classified the weaknesses of C/C++ programs listed in CWE based on the diagnostic information produced at each stage of program compilation. Our classification identifies which stages should be responsible for analyzing the weaknesses. We also present algorithmic frameworks for detecting typical weaknesses belonging to the classes to demonstrate validness of our scheme. For the weaknesses that cannot be analyzed by using the diagnostic information, we separated them as a group that are often detectable by the analyses that simulate program execution, for instance, symbolic execution and abstract interpretation. We expect that classification of weaknesses, and diagnostic information accordingly, would contribute to systematic development of static analyzers that minimizes false positives and negatives.
  • 11.

    Trend Analysis of Unmanned Technology Using Patent Information

    Jaeyong Park , Dongsu Kang | 2017, 22(3) | pp.89~96 | number of Cited : 5
    Abstract PDF
    Artificial intelligence and robot technology have been received attention as core technologies of the 4th industrial revolution. This paradigm change of science technology raises the importance of unmanned technology field. This paper categorizes unmanned technology as unmanned ground system, unmanned maritime system, and unmanned aircraft system, And it analyzes 557 cases of open patents and classifies each sort of specific technology elements. After then patent information, which were classified by technology, by patent assignees, and by IPC codes, covers unmanned technology maturity, development direction of research and core technology trends. This research provides directions of unmanned technology research and diverse field technology development through cooperation with various perspectives of quantitative analysis of patents.
  • 12.

    A study on Machine-Printed Korean Character Recognition by the Character Composition form Information of the Graphemes and Graphemes using the Connection Ingredient and by the Vertical Detection Information in the Weight Center of Graphemes

    Lee, Kyung-Ho | 2017, 22(3) | pp.97~105 | number of Cited : 0
    Abstract PDF
    This study is the realization study recognizing the Korean gothic printing letter. This study defined the new grapheme by using the connection ingredient and had the graphemes recognized by means of the feature dots of the isolated dot, end dot, 2-line gathering dots, more than 3 lines gathering dots, and classified the characters by means of the arrangement information of the graphemes and the layers that the graphemes form within the characters, and made the character database for the recognition by using them. The layers and the arrangement information of the graphemes consisting in the characters were presumed by using the weight center position information of the graphemes extracted from the characters to recognize and the information of the graphemes obtained by vertically exploring from the weight center of each grapheme, and it recognized the characters by judging and comparing the character groups of the database by means of the information which was secured this way. 350 characters were used for the character recognition test and about 97% recognition result was obtained by recognizing 338 characters.
  • 13.

    Effective Thematic Words Extraction from a Book using Compound Noun Phrase Synthesis Method

    Hee-Jeong Ahn , Kim Keewon , Seung-Hoon Kim | 2017, 22(3) | pp.107~113 | number of Cited : 0
    Abstract PDF
    Most of online bookstores are providing a user with the bibliographic book information rather than the concrete information such as thematic words and atmosphere. Especially, thematic words help a user to understand books and cast a wide net. In this paper, we propose an efficient extraction method of thematic words from book text by applying the compound noun and noun phrase synthetic method. The compound nouns represent the characteristics of a book in more detail than single nouns. The proposed method extracts the thematic word from book text by recognizing two types of noun phrases, such as a single noun and a compound noun combined with single nouns. The recognized single nouns, compound nouns, and noun phrases are calculated through TF-IDF weights and extracted as main words. In addition, this paper suggests a method to calculate the frequency of subject, object, and other roles separately, not just the sum of the frequencies of all nouns in the TF-IDF calculation method. Experiments is carried out in the field of economic management, and thematic word extraction verification is conducted through survey and book search. Thus, 9 out of the 10 experimental results used in this study indicate that the thematic word extracted by the proposed method is more effective in understanding the content. Also, it is confirmed that the thematic word extracted by the proposed method has a better book search result.
  • 14.

    Adaptive Data Aggregation and Compression Scheme for Wireless Sensor Networks with Energy-Harvesting Nodes

    JEONGSEMI , Kim Hyeok , Dong Kun Noh and 1 other persons | 2017, 22(3) | pp.115~122 | number of Cited : 2
    Abstract PDF
    In this paper, we propose an adaptive data aggregation and compression scheme for wireless sensor networks with energy-harvesting nodes, which increases the amount of data arrived at the sink node by efficient use of the harvested energy. In energy-harvesting wireless sensor networks, sensor nodes can have more than necessary energy because they harvest energy from environments continuously. In the proposed scheme, when a node judges that there is surplus energy by estimating its residual energy, the node compresses and transmits the aggregated data so far. Conversely, if the residual energy is estimated to be depleted, the node turns off its transceiver and collects only its own sensory data to reduce its energy consumption. As a result, this scheme increases the amount of data collected at the sink node by preventing the blackout of relay nodes and facilitating data transmission. Through simulation, we show that the proposed scheme suppresses the occurrence of blackout nodes and collect the largest amount of data at the sink node compared to previous schemes.
  • 15.

    A Study on Influence of Internet Media Pornography Exposure in Adolescents on Sexual Awareness

    Kang-Hun Seo | 2017, 22(3) | pp.123~129 | number of Cited : 3
    Abstract PDF
    This study intends examine the relevance of factors with negative influences on anti-social sexual awareness formation in adolescents as per the concern of the parents of families with adolescents, as internet pornography exposure in adolescents lead to excessive indulgence in pornographic photographs, cartoons, videos, or fictions, or in video chatting with exposure of one's own body parts. For this, the factors of internet pornography exposure in the study subjects of adolescents were constructed into a multilateral model, and the structural equation model was analyzed. As the result of the study, the following conclusion were drawn. First, the most powerful factor influencing the anti-social sexual awareness in adolescents was, contrary to the concern of many, not the exposure to pornography through internet media, but personal characteristics such as sensation-seeking tendency and socio-environmental characteristic of differential association. Second, it is worth noting that the most major factor influencing intentional internet pornography exposure by adolescents is another form of pornography exposure. Third, whether intentional or unintentional, the internet-related variable influencing the internet pornography exposure was found to be the amount of internet usage. Fourth, the unintended internet pornography exposure was found to have no direct influence on the sexual awareness of adolescents, but it did have an indirect influence on sexual awareness mediated by intentional internet pornography exposure and existing-media pornography exposure. Based on these study results, the conclusion was drawn regarding the influence of internet pornography on sexual awareness in adolescents.
  • 16.

    Identifying literature-based significant genes and discovering novel drug indications on PPI network

    Minseok Park , Giup Jang , Taekeon Lee and 1 other persons | 2017, 22(3) | pp.131~138 | number of Cited : 0
    Abstract PDF
    New drug development is time-consuming and costly. Hence, it is necessary to repurpose old drugs for finding new indication. We suggest the way that repurposing old drug using massive literature data and biological network. We supposed a disease-drug relationship can be available if signal pathways of the relationship include significant genes identified in literature data. This research is composed of three steps-identifying significant gene using co-occurrence in literature; analyzing the shortest path on biological network; and scoring a relationship with comparison between the significant genes and the shortest paths. Based on literatures, we identify significant genes based on the co-occurrence frequency between a gene and disease. With the network that include weight as possibility of interaction between genes, we use shortest paths on the network as signal pathways. We perform comparing genes that identified as significant gene and included on signal pathways, calculating the scores and then identifying the candidate drugs. With this processes, we show the drugs having new possibility of drug repurposing and the use of our method as the new method of drug repurposing.
  • 17.

    A Study on the Predictive Causal Model of Codependency for introducing Implications in Family Welfare Policy - Basing on the application of Triple ABC-X Model -

    Sun-Young, Ju , Kweon Seong Ok , Hwie- Seo, Park | 2017, 22(3) | pp.139~145 | number of Cited : 0
    Abstract PDF
    The purpose of this study is to establish a predictive causal model of codependency that is a main issue of family problem on the base of Triple ABC-X model which is a kind of family stress model. For the purpose of this study, we reviewed the concept and characteristics of codependency, affecting factors of codependency, and then reviewed the basic concept and logic of Triple ABC-X Model as theoretical viewpoint for the purpose of establishing a predictive causal model of codependency. We established it through examining main variables of codependency from Triple ABC-X Model. Main ingredients of the predictive causal model include boundary ambiguity, internal working model, internal and external locus of control, self-regard, social support, individual maladjustment etc. We established a predictive model of codependency basing on logic inferences among the variables. This study is expected to be used basic data to introduce some implications and for hereafter research.
  • 18.

    Research on legal improvement measurements on drone use

    Jong-Ryeol Park , Sang-Ouk Noe | 2017, 22(3) | pp.147~153 | number of Cited : 0
    Abstract PDF
    The main subject of year 2016 Davos forum was “The 4th Industrial Revolution.” Recently, interests and investment in drone market, so called industrial revolution in the sky is growing in many countries around the world. Before, drone was used for military purpose such as reconnaissance or attacking but today, it is used in various private sectors such as unmanned delivery service, agriculture, leisure activities, etc. Presently, many major countries in the world are already involved in the ‘war without gunfire’ to be dominant in this drone industry. Korean government also has announced an extreme relaxation of regulations for growing drone industry by opening a conference with Ministers related to economics. During the conference, business scope of drone which was limited to agriculture, photographing, and observation was expanded to all the fields except for cases hindering national safety and security. In terms of shooting purpose drone its process of receiving approval for flight and shooting is simplified to online registration. What is more, drone delivery service will be allowed in island areas such as Goheung, Yeongwol, etc from first term of year 2017. Finding the way to apply drone in criminal investigation is also speeding up. Recently, Public Safety Policy Research Center in Korean National Police University has inquired for research service and its result will be out around November. Likewise, although more and stronger foundation for supporting drone industry is made but there are still, some opinions saying that we should take a careful approach in consideration to the side effect such as abuse in crime. One may also try terror by placing a dangerous substance. If drone falls, it may hurt any civilians. Moreover, if shopping purpose drone is hacked, it may result in violation of privacy. Compared to America, Europe, and China, we are at the very beginning stage of drone industry and it is necessary to reorganize legal issues to grow this industry. This can be thought from two perspectives; first, the growth of drone industry is blocked by difficult regulations on Aviation Law and Radio Regulation Law. The second issue is the safety and privacy that are required for operating drone. For the advanced technologies to make human life more profitable, more active and proactive actions are required by criminal law side. In preparation to the second mechanical era where man and machines should go together, I hope that responsible preparation is required in all fields including the criminal law.
  • 19.

    A Comparative Study on the Innovation Strategy of User Experience and Life Satisfaction between Korea and China

    RHO, HYUNG JIN | 2017, 22(3) | pp.155~162 | number of Cited : 0
    Abstract PDF
    The purpose of this paper is to study renovation plan of value chain from a user's viewpoint by making practical application of digital technology in Korea and China. And it is surely meaningful to investigate the important motivation factors of continuous using smart-phone in two countries, and to analyze the improving effect toward to the quality of life in continuous using smart-phone. By this study we can expect the value improving effect of user experience. The results of hypothesis testing can be summarized as follows: First, the hypothesis that positive affect has a plus effect on pragmatic value is accepted in Korea and China. Secondly, the hypothesis that positive affect has a plus effect on hedonic value is accepted in two countries. Thirdly, the hypothesis that negative affect has a minus effect on pragmatic value is accepted in Korea, but rejected in China. Fourthly, the hypothesis that negative affect has a minus effect on hedonic value is accepted in two countries. Fifthly, the hypothesis that pragmatic value has a plus effect on life satisfaction is rejected in two countries. Sixthly, the hypothesis that hedonic value has a plus effect on life satisfaction is accepted in Korea, but rejected in China. Seventhly, the hypothesis that there is a difference in positive affect, negative affect, pragmatic value, hedonic value and life satisfaction between Korea and China is rejected in positive affect and negative affect, but accepted in pragmatic value, hedonic value and life satisfaction. In the competition among enterprises, user experience instead of goods themselves became influential as a differential factor. And many advanced enterprises began taking a serious view of customer's happiness and user experience improvement.