Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

Home > Explore Content > All Issues > Article List

2019, Vol.24, No.8

  • 1.

    Bandwidth-aware Memory Placement on Hybrid Memories targeting High Performance Computing Systems

    JONGMIN LEE | 2019, 24(8) | pp.1~8 | number of Cited : 0
    Abstract PDF
    Modern computers provide tremendous computing capability and a large memory system. Hybrid memories consist of next generation memory devices and are adopted in high performance systems. However, the increased complexity of the microprocessor makes it difficult to operate the system effectively. In this paper, we propose a simple data migration method called Bandwidth-aware Data Migration (BDM) to efficiently use memory systems for high performance processors with hybrid memory. BDM monitors the status of applications running on the system using hardware performance monitoring tools and migrates the appropriate pages of selected applications to High Bandwidth Memory (HBM). BDM selects applications whose bandwidth usages are high and also evenly distributed among the threads. Experimental results show that BDM improves execution time by an average of 20% over baseline execution.
  • 2.

    Block Unit Mapping Technique of NAND Flash Memory Using Variable Offset

    LEESEUNGWOO , RYU Kwan Woo | 2019, 24(8) | pp.9~17 | number of Cited : 1
    Abstract PDF
    In this paper, we propose a block mapping technique applicable to NAND flash memory. In order to use the NAND flash memory with the operating system and the file system developed on the basis of the hard disk which is mainly used in the general PC field, it is necessary to use the system software known as the FTL (Flash Translation Layer). FTL overcomes the disadvantage of not being able to overwrite data by using the address mapping table and solves the additional features caused by the physical structure of NAND flash memory. In this paper, we propose a new mapping method based on the block mapping method for efficient use of the NAND flash memory. In the case of the proposed technique, the data modification operation is processed by using a blank page in the existing block without using an additional block for the data modification operation, thereby minimizing the block unit deletion operation in the merging operation. Also, the frequency of occurrence of the sequential write request and random write request Accordingly, by optimally adjusting the ratio of pages for recording data in a block and pages for recording data requested for modification, it is possible to optimize sequential writing and random writing by maximizing the utilization of pages in a block.
  • 3.

    Online Video Synopsis via Multiple Object Detection

    JaeWon Lee , DoHyeon Kim , Yoon Kim | 2019, 24(8) | pp.19~28 | number of Cited : 2
    Abstract PDF
    In this paper, an online video summarization algorithm based on multiple object detection is proposed. As crime has been on the rise due to the recent rapid urbanization, the people’s appetite for safety has been growing and the installation of surveillance cameras such as a closed-circuit television(CCTV) has been increasing in many cities. However, it takes a lot of time and labor to retrieve and analyze a huge amount of video data from numerous CCTVs. As a result, there is an increasing demand for intelligent video recognition systems that can automatically detect and summarize various events occurring on CCTVs. Video summarization is a method of generating synopsis video of a long time original video so that users can watch it in a short time. The proposed video summarization method can be divided into two stages. The object extraction step detects a specific object in the video and extracts a specific object desired by the user. The video summary step creates a final synopsis video based on the objects extracted in the previous object extraction step. While the existed methods do not consider the interaction between objects from the original video when generating the synopsis video, in the proposed method, new object clustering algorithm can effectively maintain interaction between objects in original video in synopsis video. This paper also proposed an online optimization method that can efficiently summarize the large number of objects appearing in long-time videos. Finally, Experimental results show that the performance of the proposed method is superior to that of the existing video synopsis algorithm.
  • 4.

    Implementation of Educational UAV with Automatic Navigation Flight

    Myeong-Chul Park , Hwara Hur | 2019, 24(8) | pp.29~35 | number of Cited : 2
    Abstract PDF
    This paper proposes a UAV equipped with an automatic control system for educational purposes such as navigation flight or autonomous flight. The proposed UAV is capable of automatic navigation flight and it is possible to control more precisely and delicately than existing UAV which is directly controlled. And it has the advantage that it is possible to fly in a place out of sight. In addition, the user may arbitrarily change the route or route information to use it as an educational purpose for achieving the special purpose. It also allows you to check flight status by shooting a video during flight. For this purpose, it is designed to check the image in real time using 5.8GHz video transmitter and receiver. The flight information is recorded separately and used as data to judge the normal flight after the flight. The result of the paper can be flighted along the coordinates specified using GPS information. Since it can receive real-time video, it is expected to be used for various education purposes such as reconnaissance of polluted area, achievement of special purpose, and so on.
  • 5.

    Design of Smart Farm with Automatic Transportation Function

    Hwara Hur , Seok-Gyu Park , Myeong-Chul Park | 2019, 24(8) | pp.37~43 | number of Cited : 0
    Abstract PDF
    The existing smart farm technology has been systematized for the mass production rather than the consumer. There are many problems such as economical aspect to apply to actual rural environment due to aging. The purpose of this study is to apply smart farm technology based on the applicability of population aged in rural areas. Due to the heat wave, the crops in general greenhouse cultivation facilities suffered from damage such as sunlight damage. To minimize such damage, adjust the temperature and humidity environment or install a light-shielding film. However, the workers in the rural areas are aging and the elderly who are farming alone have a lot of difficulties in doing so. In the case of people with weak physical strength, there is a danger that they may lead to safety accidents when carrying heavy loads. In this paper, we propose 'Smart Palm capable of automatic transportation function’, applying small smart vehicles that follow workers to existing smart farms to improve and prevent these problems. It is a smart farm that performs the control functions of the existing smart greenhouse environment, installs the rail for each trough, and has a vehicle that follows the worker. The smart app can directly control the greenhouse and the vehicle remotely manually.
  • 6.

    Development of 3D Defense Space Game using Oculus

    Won-Gyu Iim , Byeong Cheol Lee , Soo Kyun Kim and 1 other persons | 2019, 24(8) | pp.45~50 | number of Cited : 0
    Abstract PDF
    Oculus Rift is the most universal VR (virtual Reality) headset for gamers and FPS (First Person Shooting) is the most suitable game genre to play with VR. Using VR can increase the player’s sense of reality and make them feel as though they are in direct contact with the enemy while battling. The suggested VR game is a first person game where the player must defend a specific target against the surging enemy all within the time limit. Many objects will need to be used in this method. Object pooling will be used in order to manage all the numerous objects. When an object is repeatedly created and deleted it typically overwhelms the memory. To resolve this issue the game initially summons the object at the beginning of the scene and afterwards only uses the object when needed, lessening the burden on the memory. A ranking system is implemented to keep the game records in order to stimulate a competitive spirit between the players, and the game has received positive response during test play among college students in their 20s.
  • 7.

    Research on the Influence of Interaction Factors of mobile Phone Dance Live Broadcast on User's Intention of Use -Centered on Perceived Usefulness and Perceived Accessibility

    Nuowa Wu | 2019, 24(8) | pp.51~58 | number of Cited : 0
    Abstract PDF
    In this paper, we propose to characteristics of mobile phone dance live broadcast platform and the second-generation technology acceptance model TAM2, this paper established the user acceptance model of mobile phone dance live broadcast platform, aiming to study the influencing factors of users' acceptance on mobile phone dance live broadcast platform. Based on the empirical analysis of user survey, the model is validated, and the relationship between variables in the model is clarified. It is also confirmed that human-computer interaction, scene interaction, relationship interaction and other factors will affect the user's acceptance on mobile phone dance live broadcast platform. At the same time, based on the relationship among variables obtained in the research, this paper tries to analyze how the variables affect each other based on the actual practice of mobile phone dance live broadcast platform. In addition, the video design strategy and marketing strategy for further development of mobile phone dance live broadcast platform are given to help the platform and dance creators to carry out better promotion on the mobile side. In the end, this paper summarizes the shortcomings of this study and points out further research directions in the future, providing a reference for researchers in the field of mobile phone dance live broadcast platform acceptance.
  • 8.

    Blockchain-Based Mobile Cryptocurrency Wallet

    Gwyduk Yeom | 2019, 24(8) | pp.59~66 | number of Cited : 2
    Abstract PDF
    As the monetary value of cryptocurrency increases, the security measures for cryptocurrency becomes more important. A limitation of the existing cryptocurrency exchanges is their vulnerability to threats of hacking due to their centralized manner of management. In order to overcome such limitation, blockchain technology is increasingly adopted. The blockchain technology enables decentralization and Peer-to-Peer(P2P) transactions, in which blocks of information are linked in chain topology, and each node participating in the blockchain shares a distributed ledger. In this paper, we propose and implement a mobile electronic wallet that can safely store, send and receive cryptocurrencies. The proposed mobile cryptocurrency wallet connects to the network only when the wallet actively is used. Wallet owner manages his or her private key offline, which is advantageous in terms of security. JavaScript based wallet apps were implemented to respectively run on Android and iOS mobile phones. I demonstrate the process of transferring Ethereum cryptocurrency from an account to another account through Ropsten, a test net for Ethereum. Hardware wallets, such as Ledger Nano S, provide a slightly higher level of security, yet have the disadvantages of added burden of carrying additional physical devices and high costs (about 80$).
  • 9.

    System Access Control Technique for Secure Cloud Computing

    Eun-Gyeom Jang | 2019, 24(8) | pp.67~76 | number of Cited : 0
    Abstract PDF
    Along with the diversification of digital content services using wired/wireless networks, the market for the construction of base systems is growing rapidly. Cloud computing services are recognized for a reasonable cost of service and superior system operations. Cloud computing is convenient as far as system construction and maintenance are concerned; however, owing to the security risks associated with the system construction of actual cloud computing service, the ICT(Information and Communications Technologies) market is lacking regardless of its many advantages. In this paper, we conducted an experiment on a cloud computing security enhancement model to strengthen the security aspect of cloud computing and provide convenient services to the users. The objective of this study is to provide secure services for system operation and management while providing convenient services to the users. For secure and convenient cloud computing, a single sign-on (SSO) technique and a system access control technique are proposed. For user authentication using SSO, a security level is established for each user to facilitate the access to the system, thereby designing the system in such a manner that the rights to access resources of the accessed system are not abused. Furthermore, using a user authentication ticket, various systems can be accessed without a reauthorization process. Applying the security technique to protect the entire process of requesting, issuing, and using a ticket against external security threats, the proposed technique facilitates secure cloud computing service.
  • 10.

    Safe Web Using Scrapable Headless Browser in Network Separation Environment

    Jung won chi , Jeonghun Park , PARK NAMJE | 2019, 24(8) | pp.77~85 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a "Safe Web Using Scrapable Headless Browse" Because in a network separation environment for security, It does not allow the Internet. The reason is to physically block malicious code. Many accidents occurred, including the 3.20 hacking incident, personal information leakage at credit card companies, and the leakage of personal information at “Interpark”(Internet shopping mall). As a result, the separation of the network separate the Internet network from the internal network, that was made mandatory for public institutions, and the policy-introduction institution for network separation was expanded to the government, local governments and the financial sector. In terms of information security, network separation is an effective defense system. Because building a network that is not attacked from the outside, internal information can be kept safe. therefore, "the separation of the network" is inefficient. because it is important to use the Internet's information to search for it and to use it as data directly inside. Using a capture method using a Headless Web browser can solve these conflicting problems. We would like to suggest a way to protect both safety and efficiency.
  • 11.

    Recommendation system using Deep Autoencoder for Tensor data

    Jina Park , Hwanseung Yong | 2019, 24(8) | pp.87~93 | number of Cited : 0
    Abstract PDF
    These days, as interest in the recommendation system with deep learning is increasing, a number of related studies to develop a performance for collaborative filtering through autoencoder, a state-of-the-art deep learning neural network architecture has advanced considerably. The purpose of this study is to propose autoencoder which is used by the recommendation system to predict ratings, and we added more hidden layers to the original architecture of autoencoder so that we implemented deep autoencoder with 3 to 5 hidden layers for much deeper architecture. In this paper, therefore we make a comparison between the performance of them. In this research, we use 2-dimensional arrays and 3-dimensional tensor as the input dataset. As a result, we found a correlation between matrix entry of the 3-dimensional dataset such as item-time and user-time and also figured out that deep autoencoder with extra hidden layers generalized even better performance than autoencoder.
  • 12.

    Intelligent Pattern Recognition Algorithms based on Dust, Vision and Activity Sensors for User Unusual Event Detection

    Jung-Eun Song , JungJuHo , Ahn Junho | 2019, 24(8) | pp.95~103 | number of Cited : 2
    Abstract PDF
    According to the Statistics Korea in 2017, the 10 leading causes of death contain a cardiac disorder disease, self-injury. In terms of these diseases, urgent assistance is highly required when people do not move for certain period of time. We propose an unusual event detection algorithm to identify abnormal user behaviors using dust, vision and activity sensors in their houses. Vision sensors can detect personalized activity behaviors within the CCTV range in the house in their lives. The pattern algorithm using the dust sensors classifies user movements or dust-generated daily behaviors in indoor areas. The accelerometer sensor in the smartphone is suitable to identify activity behaviors of the mobile users. We evaluated the proposed pattern algorithms and the fusion method in the scenarios.
  • 13.

    Development of A System for Registration of Korean Terminology on The Electropedia

    Bonghee Moon | 2019, 24(8) | pp.105~111 | number of Cited : 1
    Abstract PDF
    In this paper, I introduce the development of a system to register Korean standard technical terms which are corresponded with English electronical terminologies on the Electropedia of the International Electronical Committee(IEC). In 2016, this project was started with the permission of registration at the Technical Committee 1 of the 80th IEC General Meeting in Frankfurt, Germany. The work was consisted of 3 parts, the 1st step was gathering Korean vocabularies and building a databse for the translation of English terms of International Electronical Vocabulary(IEV) into Korean terms, the 2nd step was to find correct or proper Korean term which is in accord with each English term of IEV on the Electropedia. In this step, members of Korean TC 1 worked for search proper Korean terms using developed computer programs and databases which were made of Korean electronical dictionaries. After selection of proper terms, they did the cross-checking work for Korean terms each other. The last step was to register all of these Korean terms on the Electropedia. As a result, 20,766 Korean electronical terms were registered on the Electropedia in 2017. In the future, it is needed that the definition of English technical terms are translated into Korean.
  • 14.

    Analysis of Ingredients and biological activities confirm Process for Personalized Diet Offering Service: Basic ingredients Analysis and biological Activities of Grifola frondosa

    SEOKCHAN HONG , Hwang You Jin , Un Gu Kang | 2019, 24(8) | pp.113~121 | number of Cited : 0
    Abstract PDF
    The personalized meal service is being developed to prevent and alleviate illnesses according to the individual's health condition. However, the current meal does not provide a fully customized service to individuals and a diet that meets the consumer's information needs. The cause is the lack of information on the ingredients and the difficulty of comparative analysis between the materials. Therefore, in this study, we propose basic analysis process for basic information acquisition and database construction for food composition before providing personalized food. In this study, we investigated the content of carbohydrate, reducing sugar and protein as basic components of Grifola frondosa and investigate the content of polyphenol as a biological active ingredients. Respectively. Studies on the hypoglycemic effect of the diabetic rat model have been carried out in relation to the prevention of diseases. Based on the results of this study, it is also possible to obtain information on the basic ingredients of the food and to analyze the information on the content and activity of the biological active ingredients. Using animal models, information on disease prevention and mitigation was also available. The process introduced in this study is applied to various food materials, accumulating data, and utilizing Database, this results will be an excellent tool for providing more efficient service by providing a proper dietary composition for consumers.
  • 15.

    A Characteristics Analysis of Pre-hospital Acute Poisoning in The Elderly

    IL-Soon Choi , Seon-Rye Kim , BYUNG-JUN CHO | 2019, 24(8) | pp.123~129 | number of Cited : 0
    Abstract PDF
    This study selected all patients with acute poisoning carried by the 119 emergency services in K-Province from January 1 to December 31, 2015 for complete enumeration. The subjects were 1,627 patients who were classified as poisoning suspected in chemicals and animal/insect poisoning by Rescue Emergency Activity Information System(Emergency Statistics) in fire-fighting portal system of K-province fire-fighting officers. The 119 activity journals were analyzed retrospectively. The major results are as follows. Regarding the demographic characteristics of the elderly and the non-elderly, the most people were unemployed in the elderly group, other job, the non elderly group about their occupations and in both groups, the most people lived in rural areas about their living places. Regarding the poisoning characteristics of the elderly and the non-elderly, the most causing substance was bee sting about the poisoning causing substances and most of patients didn't get drunken about drunken state in both group. Regarding the time factors of the elderly and the non-elderly, both groups had the most accidents in afternoon about the poisoning time and in summer about the seasonal distribution.
  • 16.

    Fire Detection Method Using IoT and Wireless Sensor Network

    Jung Kyu Park , Young-Hwa Roh , Nam Ki Hun and 1 other persons | 2019, 24(8) | pp.131~136 | number of Cited : 3
    Abstract PDF
    A wireless sensor network (WSN) consists of several sensor nodes and usually one base station. In this paper, we propose a method to monitor topics using a wireless sensor network. Fire threatens people, animals, and plants, and it takes a lot of recovery time when a fire occurs. For this reason, it is necessary to use a fire monitoring system that is easy to configure and fast to avoid fire. In this paper, we propose a fast and easily reliable fire detection system using WSN. The wireless node of the WSN measures the temperature and brightness around the node. The measured information is transferred to the workstation and to the base station. The workstation analyzes current and historical data records to monitor the fire and notify the manager.
  • 17.

    Bit-map-based Spatial Data Transmission Scheme

    Oh Gi Oug | 2019, 24(8) | pp.137~142 | number of Cited : 0
    Abstract PDF
    This paper proposed bitmap based spatial data transmission scheme in need of rapid transmission through network in mobile environment that use and creation of data are frequently happen. Former researches that used clustering algorithms, focused on providing service using spatial data can cause delay since it doesn’t consider the transmission speed. This paper guaranteed rapid service for user by convert spatial data to bit, leads to more transmission of bit of MTU, the maximum transmission unit. In the experiment, we compared arithmetically default data composed of 16 byte and spatial data converted to bitmap and for simulation, we created virtual data and compared its network transmission speed and conversion time. Virtual data created as standard normal distribution and skewed distribution to compare difference of reading time. The experiment showed that converted bitmap and network transmission are 2.5 and 8 times faster for each.
  • 18.

    Review of Prohibition of Discrimination due to Homosexuality in the information society

    park , Sang-Ouk Noe | 2019, 24(8) | pp.143~150 | number of Cited : 0
    Abstract PDF
    LGBT movements have been actively taking place since the late 20th century, 24 countries around the world have fully embraced same-sex marriage as a form of marriage, and implemented it into law. Therefore in this paper, arguments and discussion on prohibition of discrimination due to homosexuality are examined and reviewed under the Constitution of Korea, by looking at the discussion on homosexuality (sexual orientation), which is currently in progress in Korea. However, First, national consensus is deemed absolutely necessary to add a new prohibition ground. Second, specifying the grounds for prohibiting discrimination should take into account historical background and demands of the “oughtness.” Third, it should be noted that the grounds for prohibiting discrimination specified in the Constitution are not subject to moral judgment. Fourth, in the case where homosexuality and/ or sexual orientation are specified as grounds for prohibiting discrimination, the problems that may occur must be considered. the 「National Human Rights Commission Act of Korea」 Article 2, Subparagraph 1 defines the concept of “human right(s),” and also in Subparagraph 3, “sexual orientation” is enumerated as an example of “discriminatory act.” Therefore,「National Human Rights Commission Act of Korea」 Article 2, Paragraph 3 must be deleted.
  • 19.

    Impacts of the Establishments’ Safety Behavior, Safety and Health Delivery and Communication on Occupational Safety and Health Policy Satisfaction

    Seo-Yeon Choi , HanSuk Jung , JooHyun Ham | 2019, 24(8) | pp.151~158 | number of Cited : 1
    Abstract PDF
    In this paper, we conducted a study to understand the impacts of safety behavior, safety and health delivery and communication, which should be managed for the establishments’ safety and health control on occupational safety and health policy satisfaction to utilize that as a material for preparing policy support and preventive measures. For this purpose, we conducted a statistic analysis with 2,970 establishments, utilizing the material, “2015 Occupational Safety and Health Company Survey”. As a result, in the manufacturing industry, it turned out in the establishments with more than 300 workers, safety behavior, safety and health delivery and communication of the cooperative firm of the prime contractor were high. In addition, it turned out that safety behaviors had the biggest impact on occupational safety and health policy satisfaction in the manufacturing industry and safety and health delivery and communication had the biggest impact on occupational safety and health policy satisfaction in the construction industry and other industries. As for the relationship between companies, it turned out that safety behaviors had the biggest impact on that between the parent company and a cooperative firm of a prime contractor while safety and health delivery and communication on that between the prime contractor and the subcontractor. Through the results of this study, it is necessary to build up safety and health behavior and safety and health delivery and communication systems for the characteristics of the company, and it is expected that the effect of the safety and health control will increase when policy support is made accordingly.
  • 20.

    Research on the Impact of the Network Marketing Strategy on Enterprise Performance of Artistic Products – Centered on Consumers' Impulsive and Repeated Purchasing Behaviors

    Mingzhe Du | 2019, 24(8) | pp.159~166 | number of Cited : 0
    Abstract PDF
    In this paper, we propose takes network marketing as a starting point for analysis, uses the theory of purchasing behavior and enterprise performance to analyze the network marketing strategy of artistic products, incorporates the practical problems encountered by some artistic products enterprises in Zhejiang Province in network marketing into theoretical research. The theoretical model of network marketing strategy acting on enterprise performance through the intermediary effect of purchasing behavior is constructed. This paper conducted an in-depth survey of three representative core domestic companies engaged in Internet marketing of artistic products, and analyzed the questionnaires of 357 respondents. The initial model was verified by statistical tools such as SPSS and AMOS, and three conclusions were drawn: Firstly, network marketing strategies of different dimensions have different effects on purchasing behavior: pricing strategy and product strategy have significant positive effects on impulse purchasing behavior, but channel strategy has no significant impact on impulse purchasing behavior; Channel strategy and product strategy have a significant positive impact on repeated purchasing behavior, but pricing strategy has no significant impact on repeated purchasing behavior. Second, user purchasing behavior has a significant positive impact on enterprise performance. Third, network marketing strategies of different dimensions have significant direct and positive impact on enterprise performance.
  • 21.

    An Analysis of Perceptions of Students toward Software Education according to School Level

    Seong-Won Kim , Lee Youngjun | 2019, 24(8) | pp.167~176 | number of Cited : 2
    Abstract PDF
    In this paper, we propose students' perception of software education according to the type of school. So, in this study, 47373 students were surveyed about the perception of SW education, and the results of the questionnaire were analyzed according to school type, gender, school level, experience of software education and event, and duration of software education experience. As a result, students attending software education lead schools showed the highest perception about software education, followed by software education research school and general school. In gender, males were more positive than females. The level of satisfaction and effectiveness of software education in school level was higher as the school level was lower, but the perception and career area of software education was higher as the school level was higher. In addition, software training and event experience have a positive effect on students' perception of software education, and the perception of software education changes positively as the duration of software education increases.