Korean | English

pISSN : 1975-7700 / eISSN : 2734-0570

2020 KCI Impact Factor : 0.42
Home > Explore Content > All Issues > Article List

2017, Vol.12, No.5

  • 1.

    A Filtering Scheme to Improve the Performance of Last Level Cache

    Youngil Cho | 2017, 12(5) | pp.599~607 | number of Cited : 0
    Abstract PDF
    The last level cache(LLC) is commonly managed using LRU policy. However, LRU has a high overhead cost of moving cache lines into the most recently used position whenever a cache line is accessed. Also, LRU is prone to cache pollution when a sequence of single-use memory accesses that are larger than the cache size is fetched from memory. Cache performance and efficiency can be improved if some subset of these reuse lines can reside in the cache longer. Previous schemes approach this by bypassing never reused lines(0-reused lines). But, sometimes they deliver no benefit due to the lack of never reused lines. This paper proposes a new mechanism that filters out not only 0-reused lines but also 1-reused lines and accurately predicts 0/1-reused lines from incoming lines. Filtering of 0/1-reused lines provides more opportunities to fit the working set into cache size. Our proposed scheme is evaluated using a simulation environment where its effectiveness and performance-improvement capabilities are demonstrated. We present experimental results showing miss rate and IPC(Instruction Per Cycle) comparison of the proposed scheme and OBM(Optimal Bypass Monitor) against LRU for SPEC CPU2006 benchmarks. The result shows that the proposed scheme and OBM can improve IPC by an average of 20.1% and 14.4%, respectively. And the proposed scheme reduces the miss rate by 20.6% compared to LRU.
  • 2.

    Robust Motion UX based Direction Education System for Developmental Disorder Children

    Im, Tami | 윤인호 | Sang-Youn Kim | 2017, 12(5) | pp.609~617 | number of Cited : 0
    Abstract PDF
    Developmental disorder children commonly have difficulties in sustaining attention, understanding abstract concepts, and transferring of learning. Repeated training, simulation based learning, and experiential learning using five senses have been suggested as effective learning methods for enhancing skill acquisition and behavioral changes for developmental disorder children due to their cognitive and behavioral delay. The most important factor in educational systems for developmental disorder children is to develop educational tool which enhance their perceptual functioning through bodily sensations and motor skills. In this paper, we introduce an enhanced tangible UX-based educational system consists of a motion creating device and a motion input device and found that it is well operated by a user through experiments. A suspension module is fabricated by a 3D printer and is applied to the motion creating device to equally provide the weight to its four wheels. To investigate the trajectory of the developed motion creating device and its velocity, we construct an experimental environment. The experiment results clearly show that the developed tangible UX-based educational system creates motion along 8 directions and controls its velocity. It is suggested that the UX-based educational system is feasible for the educational systems for developmental disorder children. Follow-up studies with special education institutes will be conducted to examine educational effectiveness of suggested system for developmental disorder children.
  • 3.

    Development of Potentiostat for Human-Body Mounted Prtable Diagnostic Devices

    JIHWAN LEE | 2017, 12(5) | pp.619~627 | number of Cited : 0
    Abstract PDF
    The interesting thing is increasing about personal healthcare and an aging society. As a result, The POCT(Point-Of-Care Testing) market is growing rapidly. There are a variety of POCT devices, of which potentiostat is often used to measure precise components. Numerous potentiostats can be easily accessible. However, a portable potentiostat with the highly accurate sensor is not easily accessible. However, Potentiostat, which can be attached to a human body, has a limited range of measurement range. The high-sensitivity potentiostat developed in this study enables the measurement of multiple markers in the one chamber and the analysis data can be checked in real time. Also, It can be communication with a computer or smartphone by internal USB, Bluetooth or Serial port. and then The potentiostat developed the compact size (23㎜ x 40㎜) by minimizing the number of components through FPGA development. and then We checked the high reliability(correlation coefficient: 0.94) and row detection limited(20nA). We make the sensor by using FR-4 material and then We found the stable pattern in the variable sensor pattern. It can be useful change the pattern and connect to the line. Also, It doesn’t break from high elasticity. Our device will have a positive influence on POCT and potentiostat market.
  • 4.

    A Study on the Continuous Use Intention of the Social Platform

    조래을 | 2017, 12(5) | pp.629~638 | number of Cited : 1
    Abstract PDF
    The rapid development of information and communication technology has brought about a great change in the global industry. The birth of smartphones has become a new communication platform for social network services and a virtuous cycle structure in which various businesses are created by the rapid growth of SNS such as Facebook, Instagram, and kakao. In this study, we investigate what factors affect users in using social platform, which is a modern business model. The empirical study applying the extended technology acceptance model that extended the fun variables to the technology acceptance model centered on the perceived ease of use and perceived usefulness will be of practical help to the platform builder. The results of this study suggest that perceived ease of use and fun factors affect the intention of continuous use. On the other hand, perceived usefulness was excluded from the influence factors. This suggests that the social platform is limited to the direct business of social network services and that it is not yet a useful step to expand various businesses as a platform. The perceived ease of use and fun factor were both significant for perceived usefulness and persistent intention to use. Especially, fun factor has high path coefficient and p value.
  • 5.

    Logical Subnet Configuration Scheme Using Cryptography in Tactical Data Link Environment

    Seungbae Jee | 진철 | 박경미 and 4other persons | 2017, 12(5) | pp.639~650 | number of Cited : 2
    Abstract PDF
    TDL provides common situation awareness and simultaneous decision making power through real-time and near real-time information sharing to all warfighters. Accordingly, The ROK forces, which have to carry out various operational missions, make various efforts to acquire TDL for joint and combined operations in various weapons systems such as command post, ship, airplane, tanks, and etc. However, it takes a lot of money to acquire such ability. Accordingly, there is a need for an alternative for minimizing the cost increase and improving the TDL operation capability in the existing operation. In this paper, we propose an alternative method to expand the TDL through logical subnet configuration using ARIA encryption technology instead of adding individual network through the acquisition of new equipment. The proposed logical subnet configuration method shows that various logical subnets can be configured for each group on the TDL sharing information in the existing broadcast network. Through the system implementation, we confirmed the validity and feasibility of the technique. In the future, based on this paper, it is expected that further study on the ROK TDL subnet operation method and the performance improvement of each weapon system platform. Through these studies, we hope to contribute to the improvement of ROK military mission performance and economic military operation.
  • 6.

    An Energy-Efficient Cross-layer Wakeup Scheduling Scheme by using Multipath in Wireless Sensor Networks

    Yonghyeog Kang | 김문정 | Moon-Seog Han | 2017, 12(5) | pp.651~659 | number of Cited : 0
    Abstract PDF
    Wireless sensor networks are composed of many wireless sensor nodes and have many application ranges. The sensor nodes are resource constrained in memory space, CPU computation, and energy capacity. These constrains are restricted to extend the sensor networks to the more applications. In these networks, many energy efficient mechanisms are proposed with wakeup scheduling schemes that wake up the sleeping sensor nodes to be active states of the sensor nodes synchronously or asynchronously. This paper proposes the scheme of energy efficient and load balancing wakeup scheduling of sensor nodes by using cross layer approach with not disjointed multipath. Our proposed scheme constructs the graph of not disjointed multi-paths from source nodes to the sink node. This graph is maintained by each sensor nodes and is used in the wakeup scheduling of the sensor nodes synchronously. Our proposed scheme wakes up the sensor nodes along the not disjointed multipath from the sensor nodes in range of interests to the sink node synchronously. Our proposed scheme is analyzed to have many merits that are the low and expected packet latency, the energy efficiency, and the energy balancing of wireless sensor networks through the combined transfer of packets and the combined processing of packets.
  • 7.

    A Study of GPU Based Computing Methods on Military Defense Systems

    Jung-Woong | Ye-Eun Hong | Won-Jae Jang and 4other persons | 2017, 12(5) | pp.661~675 | number of Cited : 0
    Abstract PDF
    By the mid of 2020, Korean military forces have planned to built the network centric warfare(NCW) environment by integrating advanced US/NATO standardized tactical data links and Korean unique data links. In this NCW environment, sensors, reconnaissance and weapon systems will be integrated with command and control systems utilizing tactical data links These inter-systems integrations bring out the dramatic growth of exchanging data and computing resources for real time processing. However, these issues could not be easily resolved with current CPU based computing architectures. Because, CPU is not dedicated parallel processing device, it is usually very expensive and multi-thread programming using CPU is very difficult even for expert programmers. By the way, the high-speed arithmetic dedicated GPUs(Graphic Processing Unit) with hundreds or thousands cores are being developed rapidly and applied commercially in the area of genetic analysis, hydrodynamics and cryptography in these days. It also provides grid-block-thread architectures for parallel data processing and software development kits(SDK) for developers to exchange data and functions between hosts systems and GPUs at ease. In a huge military system, there are lots of high computing power required areas such as receiving and transmitting tactical messages with specific rules, data fusions and management, threat evaluation, weapon assignment and drawing situational display. This study will identify those areas in detail and suggest GPU based parallel processing ideas which can be adaptable with several examples and experiments.
  • 8.

    Survivability Analysis of Virtual Network According to Physical Structure

    송명규 | 2017, 12(5) | pp.677~682 | number of Cited : 0
    Abstract PDF
    In recent years, there is a growing interest in using SDN, which uses virtual networks, rather than developing physical technologies of networks. In other words, the virtual network utilizes existing physical resources to construct a software network. In this case, the minimum physical network resources must be supported in order to be used for the purpose. When using the resources provided by the PIP, if there is no physical connection or if the capacity is insufficient, it may not provide the desired performance. In this paper, we assume that survivability of a virtual network are implemented using only existing PIPs and that additional resources utilization of physical connection (link addition) is utilized The efficiency of each of them was compared and analyzed. The efficiency here is about the coverage and cost of survivability. That is, it analyzes the survivability of the virtual network according to the physical structure of the network. When the number of virtual networks is small, survivability is greatly influenced by the physical network structure. However, as the number of virtual networks increases, it is confirmed that survivability is not significantly influenced by the physical network structure.
  • 9.

    The Design of Embedded System for Locating Damage Point of Smart Sheet

    Min Gi Nam | Hong,In-Sik | 2017, 12(5) | pp.683~691 | number of Cited : 2
    Abstract PDF
    As the Internet of things has evolved recently, construction of smart city infrastructures is also actively proceeding. Smart City is a form in which telecommunication infrastructure facilities are connected to all places in a city like a human neural network to attract new investment and job creation and also to provide high- In a society where people and goods are always connected, and the solution to increase the economic power of the city, the movement of introduction in the whole world including Korea is increasing rapidly. As a result, interest in system, which is efficient for infrastructure management and advantageous for maintenance/repair, will increase. SmartSheet is widely used to protect and monitor underground facilities when building Smart City. The SmartSheet is manufactured in the form of a combination of a communication line and a detection tape used to detect various breakage (damage during construction, breakage due to aging, ground subsidence, sink hole, etc.). This makes it possible to judge whether there is an abnormality through the communication between smart sheets. It is hard to find out exactly where it is when it is damaged underground. Although the damage location can be measured by using the existing TDR, there is a blind spot which can not be measured in the vicinity, and it is also very expensive. In this paper, we design a hardware and dedicated detection program that finds faulty locations within tens of meters to 1km using a low cost embedded board. Circuits and software were constructed by analyzing the relationship between time constant - voltage and impedance. The input values measured by the 10-bit ADC are converted to the correct measurement distance on the table-driven correction algorithm. The proposed system can be applied to location detection such as underground facilities such as piping, road - bridge breakage, plant breakage, and pipeline damage in a building.
  • 10.

    Determinants of SNS Users' Overdependence from the Theory of Struggle for Recognition Perspective

    Sung Yul Ryoo | Sangcheol Park | 2017, 12(5) | pp.693~703 | number of Cited : 1
    Abstract PDF
    As the usage of SNS has considered as a normal modern behavior, there are downfalls alike behavioral addictions which related to excessive and compulsive behavior in SNS usage. In line with this situation, this study tends to examine the relationships among propensity for conspicuous consumption on SNS, conspicuous consumption on SNS and SNS overdependence. In this study, we attempted to undermine the determinants of users' overdependence toward SNS from the nature of human, we have also considered both propensity for conspicuous consumption on SNS and conspicuous consumption on SNS as major determinants. We developed the model with three research hypotheses and test it by using partial least squares approach after collecting 430 data from SNS users. According to our results, this study found that the propensity for conspicuous consumption on SNS affected both conspicuous consumption on SNS and SNS overdependence. We also found that the relationship between conspicuous consumption on SNS and SNS overdependence was positively significant. Based upon the empirical findings, this study has theoretical implications on explaining overdependence to SNS from the human nature. We also have practical implications for preparing some precaution policies to decrease overdependence on SNS.
  • 11.

    Reliability Analysis of Systems Using Level (λ, ρ) Intuitioninstic Fuzzy Sets

    Cho, Sang Yeop | 2017, 12(5) | pp.705~711 | number of Cited : 0
    Abstract PDF
    In this paper we propose a method to evaluate the reliability of systems using the level intuitionistic fuzzy sets. There are various studies using fuzzy sets, interval-valued fuzzy sets, L-R fuzzy numbers, level λ triangular fuzzy sets, level interval-valued fuzzy numbers, and intuitionistic fuzzy sets as methods to provide the theoretical basis of the analysis method for system reliability. The fuzzy sets represnt the degree of membership as a real number between zero and one. In the interval-valued fuzzy sets, the degree of membership represent the interval. Therefore, it is possible to solve the problem that the degree of membership for the fuzzy sets is uncertain. The L-R fuzzy numbers can be adjusted differently to the left-right slope of the membership functions. Therefore, we can represent more various fuzzy numbers. Level λ triangular fuzzy sets can adjust the magnitude of the degree of membership using λ. If λ = 1, it becomes level λ fuzzy numbers. In the level interval-valued fuzzy numbers it is possible to adjust the magnitude of the minimum degree of membership by using λ. The intuitionistic fuzzy sets can represent beliefs using a truth-membership function supporting evidence and a falsity-membership function contrary to evidence. In the level intuitionistic fuzzy sets used in this paper, it is possible to adjust the minimum degree of membership value of the falsity-membership function and the maximum degree of the truth-membership function by using λ and ρ, respectively. Therefore, it becomes possible to express various intuitive fuzzy sets.
  • 12.

    Assembly Simulation Service for 3D Printing

    Iksu Kim | Choi, Jong Myung | 2017, 12(5) | pp.713~721 | number of Cited : 0
    Abstract PDF
    Recently, 3D printing application technology has been actively studied in medical, education and manufacturing industries. 3D printing technology can reduce the cost of raw materials compared to conventional manufacturing methods, and can produce products with complex structures. However, in order to produce a product using a 3D printer, 3D modeling technology is required for the product. Most consumers who want to produce unique products are unable to produce their own products using 3D printers because they have no knowledge of 3D modeling. In this paper, we propose a 3D printing assembly simulation service that can meet various needs of consumers who do not have knowledge about 3D modeling. In the proposed service, the server provides drawings of the various parts required for assembly of the finished product. After executing the simulator program on the terminal such as PC, smartphone, and tablet, the consumer can assemble various types of products using the parts drawings provided by the server. The finished product drawings are output to the actual parts using a 3D printer and the consumer can complete the finished product using the output parts.
  • 13.

    Buyer's Information Visibility Advantage in Inter-Organizational Information Systems and Supply Chain IT Appropriability in Supply Chain

    KyungKyu Kim | Sung Yul Ryoo | 2017, 12(5) | pp.723~736 | number of Cited : 0
    Abstract PDF
    Inter-organizational information systems (IOS) in supply chain (SC) is a critical factor for SC performance. However, imbalance of power among SC participants causes asymmetric information visibility through an IOS among the participants. This study looks into the determinants of asymmetric information visibility in SC and its consequences. Drawing on the resource dependence theory, this study considers buyer's dependence advantage, supplier's dependence advantage, and joint dependence as major determinants of information visibility advantage in IOS. Furthermore, this study explores the relationship between information visibility advantage in IOS and SC IT appropriability. The study data were collected from 103 matched pairs of buyers and their suppliers. The results show that buyer's dependence advantage positively affects buyer's information visibility advantage in IOS, whereas both supplier's dependence advantage and joint dependence negatively influence buyer's information visibility advantage in IOS. Also, the relationship between buyer's information visibility advantage in IOS and SC IT appropriability turns out to be positively significant. According to these results, this study makes important contributions to understanding the asymmetric information visibility through an IOS.
  • 14.

    Model Design for Reduce OTP Reauthorization Based on Euclidean Distance

    Yang Liu | 백현철 | PARK JAE HEUNG and 1other persons | 2017, 12(5) | pp.737~745 | number of Cited : 2
    Abstract PDF
    Nowadays,intelligence communications technology is developing rapidly in a cloud computing environment with big data services. With the change of the network environment, the protection function for increasing information exchange process on the Internet and important intelligence materials needs to be further developed. Intelligence protection based on the internet has OTP authentication and encryption technology for network for the detection technology with non-normal general access. But the weaknesses of these technologies are being discovered in a variety of attack technologies. In particular, attackers with high-end illegal access technologies frequently try IP spoofing attacks. That is, it uses the cloud hosting intelligence that can build mutual trust to constantly try increase the trust relationship in the cloud service environment by illegal attacks. In order to improve the accessibility of information service in the cloud computing environment, this study analyzes the traceback information by using the Euclidean distance law in mathematics. In this study, the IP value of each hop is dually grouped, and the Euclidean distance is calculated by the two sets of coordinates. The chart changes composed of these datas are then calculated. Then the study will analyze and change the appropriate information for OTP authentication or encryption, and then obtain information to reduce the implementation process of OTP authentication.
  • 15.

    Improvement of Dynamic Web Vulnerability Inspection Method and Procedure by Website Structuring and Calculating Each Page's Action Size

    Jae-Ho Lee | Lee Sang Joon | 2017, 12(5) | pp.747~763 | number of Cited : 0
    Abstract PDF
    As the Web evolves, various web vulnerabilities are being discovered. Many companies and organizations are working to eliminate Web vulnerabilities, but they are not shrinking. Due to the nature of web vulnerability checks, dynamic checks are essential, and manual checks are preferred for accurate checking. In the case of a dynamic inspection performed manually, there are various problems such as false negative, missing inspection target and deflection due to inspectors. In this paper, we propose inspection methods and procedures to prevent a false negative, missing inspection target and deflection due to inspectors. In the proposed method, the web site is structured by Information Architecture(IA), and the detailed pages are classified into seven operation functions. The detailed pages are obtained by using the number of parameters, and the size of the entire website is calculated by adding the sizes of the detailed pages. Based on the number of Web vulnerability items to be used for the check, calculate the size of the page that can be checked in one day, and calculate the total inspection schedule. We verified the validity of the proposed method by comparing the number of vulnerabilities detected by the proposed method and the current method, and by analyzing the results of questionnaires for the related field workers. The proposed method can be applied not only to dynamic inspection but also to static inspection.
  • 16.

    Recent Trend of Biomedical Image Classification Methods

    신승연 | Hyunjin Kim | SANGHYUN PARK | 2017, 12(5) | pp.765~776 | number of Cited : 1
    Abstract PDF
    As biomedical imaging equipment and machine learning algorithms are improved, biomedical image analysis became a popular topic for both biologists and machine learning researchers. Biomedical image analysis includes various topics such as classification, segmentation, and registration. All of them are being actively studied, and there are a lot of remarkable papers on these topics. In this paper, we focus on recent trend of biomedical image classification. Because researchers use microscopy images for biological image analysis and use radiological data such as CT, MRI for medical image analysis, we explain classification methods used in several researches for biological image and medical image separately, depending on the type of images to be analyzed. In addition to traditional methods based on feature descriptor, we also introduce methods that apply deep learning in biomedical image classification, since deep learning is recently used in many researches for image processing. We found that deep learning based models show great performance in biomedical domain, and state-of-the-art idea of image processing and computer vision has potential to be applied to biomedical problems. Finally we suggest future works for better biomedical image classifier, based on the idea that are recently studied in computer vision, but with few papers in biomedical domain.
  • 17.

    Design of (255, 239) Reed Solomon Encoder for CCSDS Satellite Communication Standards

    Cho Yong Suk | 2017, 12(5) | pp.777~783 | number of Cited : 0
    Abstract PDF
    Compared with other linear block codes Reed Solomon code has strong error correcting capability with the same coding efficiency’s code and can correct not only random errors but also burst errors. Hence it is widely used in deep-space communication systems, digital subscriber loops, wireless systems, data storage systems, digital television transmission systems as well as in memory. (255,239) Reed Solomon code has been selected by the Consultative Committee for Space Data Systems (CCSDS) as a correction coding tool for the forward and backward signals in the communication link of Advance Orbiting Systems (AOS). In this paper, an architecture of (255, 239) Reed Solomon encoder for CCSDS Satellite communication standard is presented. The conventional architecture of Reed Solomon encoder utilizes bit-parallel multiplication to realize Reed Solomon encoding, which needs a great quantity of logic resources. However, it is not well-suited to simplicity of hardware implementation. In order to simplify hardware implementation, a bit-serial multiplication algorithm for the encoding of Reed Solomon codes using polynomial basis over Galois field is presented in this paper. The proposed RS encoder operates in bit-serial form and in polynomial basis of GF(2m). The resultant bit-serial Reed Solomon encoder requires substantially less complexity in hardware than the conventional bit-parallel Reed Solomon encoder.
  • 18.

    Pedestrian-Vehicle Collision Detection System Using Acceleration and Gyroscope Sensors in Smart Phone

    이태호 | SAJOON PARK | 2017, 12(5) | pp.785~794 | number of Cited : 1
    Abstract PDF
    Smart phones help people by providing convenience and mobility, etc. Due to the smart phone’s diversified functions, the demand for smart phones is continuously increasing. In this paper, we propose a collision detection system to validate a car accident between a pedestrian and a car by using sensors embedded in a smart phone. The collision detection system consists of four modules: measuring module, accident decision module, accident class decision module, and message sending module. The measuring module conducts monitoring by using 3-axial acceleration and gyro sensors. The accident decision module executes the accident class decision module when the analyzed data satisfies the accidental condition. In order not to lose the precious time when the pedestrian meets the accident, the system is designed to decide the degree of the pedestrian’s injury by using a self-decision algorithm and send important information such as the pedestrian’s personal information, place, type and time of accident and other pertinent data to 119, 112 or to a predefined emergency contact address. We developed the optimal accident decision threshold values based on the graph of impact acceleration produced after collision between a vehicle and a pedestrian with simulation.