Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Computer and Information
Journal Basic Information
Journal DOI :
Korean Society of Computer Information
Editor in Chief :
Volume & Issues
Volume 14, Issue 12 - Dec 2009
Volume 14, Issue 11 - Nov 2009
Volume 14, Issue 10 - Oct 2009
Volume 14, Issue 9 - Sep 2009
Volume 14, Issue 8 - Aug 2009
Volume 14, Issue 7 - Jul 2009
Volume 14, Issue 6 - Jun 2009
Volume 14, Issue 5 - May 2009
Volume 14, Issue 4 - Apr 2009
Volume 14, Issue 3 - Mar 2009
Volume 14, Issue 2 - Feb 2009
Volume 14, Issue 1 - Jan 2009
Selecting the target year
An Implementation of Cutting-Ironbar Manufacturing Software using Dynamic Programming
Kim, Seong-Hoon ;
Journal of the Korea Society of Computer and Information, volume 14, issue 4, 2009, Pages 1~8
In this paper, we deal an implementation of the software that produces sub-optimal solution of cutting-ironbar planning problem using dynamic programming. Generally, it is required to design an optimization algorithm to accept the practical requirements of cutting ironbar manufacturing. But, this problem is a multiple-sized 1-dimensional cutting stock problem and Linear Programming approaches to get the optimal solution is difficult to be applied due to the problem of explosive computation and memory limitation. In order to overcome this problem, we reform the problem for applying Dynamic Programming and propose a cutting-ironbar planning algorithm searching the sub-optimal solution in the space of fixed amount of combinated columns by using heuristics. Then, we design a graphic user interfaces and screen displays to be operated conveniently in the industry workplace and implement the software using open-source GUI library toolkit, GTK+.
Energy and Performance-Efficient Dynamic Load Distribution for Mobile Heterogeneous Storage Devices
Kim, Young-Jin ; Kim, Ji-Hong ;
Journal of the Korea Society of Computer and Information, volume 14, issue 4, 2009, Pages 9~17
In this paper, we propose a dynamic load distribution technique at the operating system level in mobile storage systems with a heterogeneous storage pair of a small form-factor and disk and a flash memory, which aims at saving energy consumption as well as enhancing I/O performance. Our proposed technique takes a combinatory approach of file placement and buffer cache management techniques to find how the load can be distributed in an energy and performance-aware way for a heterogeneous mobile storage air of a hard disk and a flash memory. We demonstrate that the proposed technique provides better experimental results with heterogeneous mobile storage devices compared with the existing techniques through extensive simulations.
A Study on Extraction of Skin Region and Lip Using Skin Color of Eye Zone
Park, Young-Jae ; Jang, Seok-Woo ; Kim, Gye-Young ;
Journal of the Korea Society of Computer and Information, volume 14, issue 4, 2009, Pages 19~30
In this paper, We propose a method with which we can detect facial components and face in input image. We use eye map and mouth map to detect facial components using eyes and mouth. First, We find out eye zone, and second, We find out color value distribution of skin region using the color around the eye zone. Skin region have characteristic distribution in YCbCr color space. By using it, we separate the skin region and background area. We find out the color value distribution of the extracted skin region and extract around the region. Then, detect mouth using mouthmap from extracted skin region. Proposed method is better than traditional method the reason for it comes good result with accurate mouth region.
The correction of Lens distortion based on Image division using Artificial Neural Network
Shin, Ki-Young ; Bae, Jang-Han ; Mun, Joung-H. ;
Journal of the Korea Society of Computer and Information, volume 14, issue 4, 2009, Pages 31~38
Lens distortion is inevitable phenomenon in machine vision system. More and more distortion phenomenon is occurring in order to choice of lens for minimizing cost and system size. As shown above, correction of lens distortion is critical issue. However previous lens correction methods using camera model have problem such as nonlinear property and complicated operation. And recent lens correction methods using neural network also have accuracy and efficiency problem. In this study, I propose new algorithms for correction of lens distortion. Distorted image is divided based on the distortion quantity using k-means. And each divided image region is corrected by using neural network. As a result, the proposed algorithms have better accuracy than previous methods without image division.
Real-time Lip Region Detection for Lipreadingin Mobile Device
Kim, Young-Un ; Kang, Sun-Kyung ; Jung, Sung-Tae ;
Journal of the Korea Society of Computer and Information, volume 14, issue 4, 2009, Pages 39~46
Many lip region detection methods have been developed in PC environment. But the existing methods are difficult to run on real-time in resource limited mobile devices. To solve the problem, this paper proposes a real-time lip region detection method for lipreading in Mobile device. It detects face region by using adaptive face color information. After that, it detects lip region by using geometrical relation between eyes and lips. The proposed method is implemented in a smart phone with Intel PXA 270 embedded processor and 386MB memory. Experimental results show that the proposed method runs at the speed 9.5 frame/see and the correct detection rate was 98.8% for 574 images.
Recognition of Events by Human Motion for Context-aware Computing
Cui, Yao-Huan ; Shin, Seong-Yoon ; Lee, Chang-Woo ;
Journal of the Korea Society of Computer and Information, volume 14, issue 4, 2009, Pages 47~57
Event detection and recognition is an active and challenging topic recent in Computer Vision. This paper describes a new method for recognizing events caused by human motion from video sequences in an office environment. The proposed approach analyzes human motions using Motion History Image (MHI) sequences, and is invariant to body shapes. types or colors of clothes and positions of target objects. The proposed method has two advantages; one is thant the proposed method is less sensitive to illumination changes comparing with the method using color information of objects of interest, and the other is scale invariance comparing with the method using a prior knowledge like appearances or shapes of objects of interest. Combined with edge detection, geometrical characteristics of the human shape in the MHI sequences are considered as the features. An advantage of the proposed method is that the event detection framework is easy to extend by inserting the descriptions of events. In addition, the proposed method is the core technology for event detection systems based on context-aware computing as well as surveillance systems based on computer vision techniques.
A Geographic Routing based Data Delivery Scheme for Void Problem Handling in Wireless Sensor Networks
Kim, Seog-Gyu ;
Journal of the Korea Society of Computer and Information, volume 14, issue 4, 2009, Pages 59~67
In wireless sensor networks (WSNs), geographic greedy forwarding fails to move a packet further towards its destination if the sender does not have any closer node to the destination in its one hop transmission region. In this paper, we propose a enhanced geographic routing, called CGR(Cost based Geographic Routing) for efficient data delivery against void problem environment. CGR first establishes Shadow Bound Region and then accomplishes Renewing Cost Function Algorithm for effective greedy forwarding data delivery. Our simulation results show significant improvements compared with existing schemes in terms of routing path length, success delivery ratio and energy efficiency.
Harmful Traffic Control Using Sink Hole Routing
Chang, Moon-Soo ; Lee, Jeong-Il ; Oh, Chang-Suk ;
Journal of the Korea Society of Computer and Information, volume 14, issue 4, 2009, Pages 69~76
The construction of Internet IP-based Network is composed of router and switch models in a variety of companies. The construction by various models causes the complexity of the management and control as different types of CLI is used by different company to filter out abnormal traffics like worm, virus, and DDoS. To improve this situation, IETF is working on enacting XML based configuration standards from NETCONF working group, but currently few commands processing at the level of operation layer on NETCONF are only standardized and it's hard for unified control operation process between different make of system as different company has different XML command to filter out abnormal traffics. This thesis proposes ways to prevent abnormal attacks and increase efficiency of network by re-routing the abnormal traffics coming thru unified control for different make of systems into Sinkhole router and designing a control system to efficiently prevent various attacks after checking the possibility of including abnormal traffics from unified control operation.
A Framework to Support Reconfiguration of Single Web Service Based on Dynamic QoS Properties
Jin, Sang-Chan ; Lee, Eun-Joo ;
Journal of the Korea Society of Computer and Information, volume 14, issue 4, 2009, Pages 77~86
At present, Web services become main means to construct web applications. As the number of web services grows and various kind of web services have been produced, QoS properties of web services are one of important criteria to select more appropriate web services. However, the selected web services may become inappropriate for the Requester's requirements, because QoS is kind of dynamic properties. this paper proposes a framework that proposed that finds an appropriate web service for Requester's QoS requirements, and dynamically replaces an inappropriate web service with right one. The problems which happen in substitution step are also identified and the solutions are described with an illustrative example.
Adapted Sequential Pattern Mining Algorithms for Business Service Identification
Lee, Jung-Won ;
Journal of the Korea Society of Computer and Information, volume 14, issue 4, 2009, Pages 87~99
The top-down method for SOA delivery is recommended as a best way to take advantage of SOA. The core step of SOA delivery is the step of service modeling including service analysis and design based on ontology. Most enterprises know that the top-down approach is the best but they are hesitant to employ it because it requires them to invest a great deal of time and money without it showing any immediate results, particularly because they use well-defined component based systems. In this paper, we propose a service identification method to use a well-defined components maximally as a bottom-up approach. We assume that user's inputs generates events on a GUI and the approximate business process can be obtained from concatenating the event paths. We first find the core GUIs which have many outgoing event calls and form event paths by concatenating the event calls between the GUIs. Next, we adapt sequential pattern mining algorithms to find the maximal frequent event paths. As an experiment, we obtained business services with various granularity by applying a cohesion metric to extracted frequent event paths.
A Study on DB Security Problem Improvement of DB Masking by Security Grade
Baek, Jong-Il ; Park, Dea-Woo ;
Journal of the Korea Society of Computer and Information, volume 14, issue 4, 2009, Pages 101~109
An encryption module is equipped basically at 8i version ideal of Oracle DBMS, encryption module, but a performance decrease is caused, and users are restrictive. We analyze problem of DB security by technology by circles at this paper whether or not there is an index search, object management disorder, a serious DB performance decrease by encryption, real-time data encryption beauty whether or not there is data approach control beauty circular-based IP. And presentation does the comprehensive security Frame Work which utilized the DB Masking technique that is an alternative means technical encryption in order to improve availability of DB security. We use a virtual account, and set up a DB Masking basis by security grades as alternatives, we check advance user authentication and SQL inquiry approvals and integrity after the fact through virtual accounts, utilize to method as collect by an auditing log that an officer was able to do safely DB.
Real-time wireless Audio/video Transmission Technique for Handheld Devices
Yoon, Kyung-Seob ;
Journal of the Korea Society of Computer and Information, volume 14, issue 4, 2009, Pages 111~117
Improvement of Wireless internet and handheld devices makes it possible that users can use various multimedia services. But, access point devices are needed while using handheld devices, and those devices use virtual network address for networking. For that reason, end-users hardly use the 1:1 voice or video chat, and messenger service that require direct communications between devices. Also, service providers need central server for relaying packets from terminals to others, the traffic and costs of relaying go high, so real-time massive data transmission services are restrictively provided. In this study, we apply TCP/UDP hole punching technique to those applications. And we implement service that supports real-time multimedia direct transmission between equipments that use virtual network addresses.
Attendance Appraisal for Learner Participation Degree Based Virtual Lecture
Kim, Hyun-Ju ;
Journal of the Korea Society of Computer and Information, volume 14, issue 4, 2009, Pages 119~129
In The increasing use of computers and high-speed Internet network has greatly influenced education, causing a veering away from the typical and traditional way of delivering instruction. Specifically, the various kinds of Web-based multimedia technology, the interactive activities on the Internet, and satellite broadcasting technology are accelerating the emergence of a virtual-lectures-based educational model, which transcends time and space. Such virtual lectures make it possible for the entire teaching-learning process to be done in a virtual learning environment, thus giving rise to problem regarding learning guidance, feedback, and appraisal. In this paper, we propose a system for attendance appraisal for learner participation degree based virtual lecture, an appraisal element in virtual learning environments. This appraisal model can set the elements of virtual learning environments in such a way as to reflect in the attendance appraisal of the opened virtual learning environment information regarding the learner's participation in class. In addition, this model motivates the learners to actively participate in the virtual learning environment and to support instructors by accomplishing the activities that are needed for attendance appraisal.
Development Method's Impact on Function Points in IT Projects - Focused on New Development and Enhancement -
Lee, Won-Ho ;
Journal of the Korea Society of Computer and Information, volume 14, issue 4, 2009, Pages 131~139
The decision makers of IT projects are faced to situations to choose a best development method between inhouse development and solution purchase when companies must develop a new system or enhance the existed system. For those decision makers related to the IT projects, this study provides them with meaningful results through the ISBSG project repositary, how each development method, such as a development inhouse, a solution purchased, a combined method, impact the function point, which is a critical factor to measure the required time, efforts, cost of IT project development.
A Study on the Factors for Adopting Financial Information System and the Companies' Business Performance
Hwang, In-Tae ; Yi, Seon-Gyu ;
Journal of the Korea Society of Computer and Information, volume 14, issue 4, 2009, Pages 141~152
This research conducted research on the provision of the strategic information for the companies' financial and accounting parts among the functions that are provided by the ERP, elements related to the adoption of financial information system that influence and that supports decision-making and management performance. The results of this research are as follows. First, organization's degree of decentralization among the organization structure's characteristics and the element of information technology infrastructure among the information technology characteristics does not affect financial or non-financial performance. Second, financial information characteristics do not affect financial performance partially, Third, organization's size does not play the role of adjuster when it comes to the financial performance. Fourth, some research variables used on this research were not analyzed as important elements that influence financial performance, but the analysis showed that they mostly influence non-financial performance, which means that these are what could be considered strategically when adopting financial information system in the future.
The Effects on Knowledge Contribution in Online Communities
Shin, Ho-Kyoung ; Lee, Ki-Won ; Kim, Kyeong-Jun ;
Journal of the Korea Society of Computer and Information, volume 14, issue 4, 2009, Pages 153~160
This study investigated what factors influence the knowledge contribution in online communities. Based on the theoretical framework like self-presentation theory and organizational citizenship behavior theory, we developed the research model and proposed four hypotheses. In order to test our hypotheses with an empirical study, we have conducted a survey which resulted in 192 valid responses in the final sample. The PLS analysis results indicate that knowledge contribution is influenced by self-presentation, innovation, organizational citizenship behavior, and affection similarity of online community users. Practical implications of these findings and future research implications are also discussed.
A Study on Impediments and Suggestion in Developing DHRMIS
Rho, Seung-Dam ; Yang, Hae-Sool ;
Journal of the Korea Society of Computer and Information, volume 14, issue 4, 2009, Pages 161~169
Republic of Korea is actively adopting IT fusion technologies to achieve the goal of 'Advanced National Defense'. This study is aiming to directly contribute to the ongoing DHRMIS project by analyzing its any discovered and substantial problems as well as suggesting improvements. Current difficulties include the efficient estimation on project cost, the lack of statistics for cross-referencing, the inefficient development methodology, compliance with global quality control standard, and the separated command centers. This study suggests the budget appraisal process prior to the actual execution, the introduce of regulatory business registration system, applying an efficient development methodologies as well as ISO9126 standard for quality control, and a centralized command department. We expect this study would contribute to following researches in advancing our national defense.
Business Processes Automation and Analysis Techniques by Using BPM and SOA
Lee, Chung-Hun ; Lee, Jong-Hak ; Seo, Jeong-Man ; Cho, Wan-Sup ;
Journal of the Korea Society of Computer and Information, volume 14, issue 4, 2009, Pages 171~178
Recently, a combination of Business Process Management (BPM) and Service Oriented Architecture (SOA) is being recommended as the best approach for automating large business systems. And the need to create meaningful information from daily operational data is increased today. In this paper, we propose a methodology for automating business processes based on the BPM-SOA convergence trend and verify the methodology by implementing the project management business process. BPM-SOA convergence provides higher extensibility and productivity due to the loosely coupled system construction and maintenance. The system has good properties for frequent process changes and reuse of duplicate processes. We then analyze extensibility of the system as new business processes are added to the existing system. We finally analyze the data generated by BPM by using SAP business intelligence to support management's decision making and strategy. Business intelligence provides not only useful data for business decisions but also chance to optimize the business processes.
A Modeling Methodology for Analysis of Dynamic Systems Using Heuristic Search and Design of Interface for CRM
Jeon, Jin-Ho ; Lee, Gye-Sung ;
Journal of the Korea Society of Computer and Information, volume 14, issue 4, 2009, Pages 179~187
Most real world systems contain a series of dynamic and complex phenomena. One of common methods to understand these systems is to build a model and analyze the behavior of them. A two-step methodology comprised of clustering and then model creation is proposed for the analysis on time series data. An interface is designed for CRM(Customer Relationship Management) that provides user with 1:1 customized information using system modeling. It was confirmed from experiments that better clustering would be derived from model based approach than similarity based one. Clustering is followed by model creation over the clustered groups, by which future direction of time series data movement could be predicted. The effectiveness of the method was validated by checking how similarly predicted values from the models move together with real data such as stock prices.