Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Computer and Information
Journal Basic Information
Journal DOI :
Korean Society of Computer Information
Editor in Chief :
Volume & Issues
Volume 14, Issue 12 - Dec 2009
Volume 14, Issue 11 - Nov 2009
Volume 14, Issue 10 - Oct 2009
Volume 14, Issue 9 - Sep 2009
Volume 14, Issue 8 - Aug 2009
Volume 14, Issue 7 - Jul 2009
Volume 14, Issue 6 - Jun 2009
Volume 14, Issue 5 - May 2009
Volume 14, Issue 4 - Apr 2009
Volume 14, Issue 3 - Mar 2009
Volume 14, Issue 2 - Feb 2009
Volume 14, Issue 1 - Jan 2009
Selecting the target year
The Bayesian Approach of Software Optimal Release Time Based on Log Poisson Execution Time Model
Kim, Hee-Cheul ; Shin, Hyun-Cheul ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 1~8
In this paper, make a study decision problem called an optimal release policies after testing a software system in development phase and transfer it to the user. The optimal software release policies which minimize a total average software cost of development and maintenance under the constraint of satisfying a software reliability requirement is generally accepted. The Bayesian parametric inference of model using log Poisson execution time employ tool of Markov chain(Gibbs sampling and Metropolis algorithm). In a numerical example by T1 data was illustrated. make out estimating software optimal release time from the maximum likelihood estimation and Bayesian parametric estimation.
Proposal of Weight Adjustment Methods Using Statistical Information in Fuzzy Weighted Mean Classifiers
Woo, Young-Woon ; Heo, Gyeong-Yong ; Kim, Kwang-Baek ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 9~15
The fuzzy weighted mean classifier is one of the most common classification models and could achieve high performance by adjusting the weights. However, the weights were generally decided based on the experience of experts, which made the resulting classifiers to suffer the lack of consistency and objectivity. To resolve this problem, in this paper, a weight deciding method based on the statistics of the data is introduced, which ensures the learned classifiers to be consistent and objective. To investigate the effectiveness of the proposed methods, Iris data set available from UCI machine learning repository is used and promising results are obtained.
Support Vector Regression based on Immune Algorithm for Software Cost Estimation
Kwon, Ki-Tae ; Lee, Joon-Gil ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 17~24
Increasing use of information system has led to larger amount of developing expenses and demands on software. Until recent days, the model using regression analysis based on statistical algorithm has been used. However, Machine learning is more investigated now. This paper estimates the software cost using SVR(Support Vector Regression). a sort of machine learning technique. Also, it finds the best set of parameters applying immune algorithm. In this paper, software cost estimation is performed by SVR based on immune algorithm while changing populations, memory cells, and number of allele. Finally, this paper analyzes and compares the result with existing other machine learning methods.
Effective Handwriting Verification through DTW and PCA
Jang, Seok-Woo ; Huh, Moon-Haeng ; Kim, Gye-Young ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 25~32
In this paper, we propose a new handwriting verification method using pattern analysis in off-line environments. The proposed method first segments character regions in a document and extracts effective features from the segmented regions. It then estimates the similarity between the extracted non-linear features and reference ones by using dynamic time warping and principal component analysis. Our handwriting verification method extracts handwriting features effectively and enables the verification of handwriting with various lengths of features as well as ones of short patterns. The experimental results show that our method outperforms others in terms as accuracy. We expect that the proposed method will automate the manual handwriting verification tasks and provide much objectivity on handwriting identification.
Using Mean Shift Algorithm and Self-adaptive Canny Algorithm for I mprovement of Edge Detection
Shin, Seong-Yoon ; Pyo, Seong-Bae ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 33~40
Edge detection is very significant in low level image processing. However, majority edge detection methods are not only effective enough cause of the noise points' influence, even not flexible enough to different input images. In order to sort these problems, in this paper an algorithm is presented that has an extra noise reduction stage at first, and then automatically selects the both thresholds depending on gradient amplitude histogram and intra class minimum variance. Using this algorithm, can fade out almost all of the sensitive noise points, and calculate the propose thresholds for different images without setting up the practical parameters artificially, and then choose edge pixels by fuzzy algorithm. In finally, get the better result than the former Canny algorithm.
A Complex Region Analysis Algorithm of Two Dimensional Electrophoresis Images Using Accumulated Gradients
Kim, Mi-Ae ; Yoon, Young-Woo ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 41~47
A solution to the problems of recognizing as one spot or detection failures for complex regions, in which many spots representing proteins are overlapped and saturated, is suggested. The accumulated gradients of each point in complex regions are calculated, and the resulting accumulated gradient image segmented using watershed technique. The suggested solution show better and efficient result than existing method for spot separation, detects more protein spots hidden in the image of 2-dimensional electrophoresis, and expands the scope of prediction.
Development of Daily Life Monitori ng System using RFID
Jung, Kyung-Kwon ; Park, Hyun-Sik ; Choi, Woo-Seung ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 49~56
In this paper, we present a daily activity monitoring system by using a wireless sensor network. The proposed system is installed in glove for activity monitoring. The RFID reader, to send data by using sensor network platform and RFID tag are small size, the shape of quadrangle, and operate in the frequency of 13.56 MHz. The sensor node can read RFID tags on the various objects used in daily living such as furniture, medicines, and kitchenwares. The sensor node reads the data of RFID tags, it transmits wireless packets to the sink node. The sink node sends the received packet immediately to a server system. The data from each RFID system is collected into a database, and then the data are processed to visualize the measurement of daily living activities of users. We provide a web-based monitoring system, and can see the number of RFID tag readings per day as bar charts. The result of experiments demonstrates that the way we propose can help to check the situation of life for people who live alone.
Performance Analysis of OFDM with I mproved Dual Adaptive Equalizer in microwave band Tow-path Channel Environments
Kim, Jang-Sook ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 57~64
Based on this article, I have analyzed the OFDM system which applies three types of equalizer forms in the two-path channel of the microwave baseband. The Two-path channel of microwave baseband had been simulated through the Rummler channel. In the Two-path channel, the OFDM system which has three forms of equalizer has been analyzed and the result is, equalizer 1-tab has great improvement in efficiency compared with Pre-FFT 11-tab which has noise power ratio less than 18dB. On the contrary, if the symbol energy to the noise ratio is more than 18dB, the equalizer which applies Pre-FFT 11-tab has greater efficiency compared to the equalizer which applies 1-tab frequency. Last but not least, the OFDM system which applies Dual equalizer has better efficiency compared to the system which has 1-tab frequency and equalizer which applies Pre-FFT 11-tab.
A Study on the VCR Cryptographic System Design Adapted in Wire/Wireless Network Environments
Lee, Seon-Keun ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 65~72
This paper proposed VCR cryptographic algorithm that adapted in TCP/IP protocol architecture and wire/wireless communication network environments. we implemented by hardware chip level because proposed VCR cryptographic algorithm perform scalable & reconfigurable operations into the security system. Proposed VCR cryptographic algorithm strengthens security vulnerability of TCP/IP protocol and is very profitable real-time processing and encipherment of high-capacity data and multi-user communication because there is important purpose to keep security about many user as that have variable round numbers function in network environments.
A Study of Authentication of Using Multi-factor
Choi, Byeong-Hun ; Kim, Sang-Geun ; Bae, Je-Min ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 73~80
Internet accidents have skyrocketed every year. It always has been threatened by the methods such as hacking and Spyware. The majority of security accident is formed of the loss of authentication information, and the internal user who is not authorized. The importance of security is also emphasized when someone tries to do something accessing to the main information system. Accordingly, Biometrics has been used in many ways. OTP, however, must have a few devices accessing to several systems, and Biometrics involve some risk of mis-recognition rate and mis-denial rate. It also has the risk possible to access to the main information system when losing OTP. This research reduced risks about the loss as separating RFID leader for mobile, Tag and the accessor's cellular phone, and is about pseudo random validation key generated from the administration system through contact with RFID leader for mobile and Tag. As sending the key to user's cell phone which is already registered, security is strengthened more than existing connection methods through the ID and password. RFID for mobile not generalized to the present has been studied as a tool accessing to the main information system.
A Study on the Fingerprinting scheme without Trusted Third Party
Yong, Seung-Lim ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 81~88
Fingerprinting scheme is a technique which supports the copyright protection to track redistributors of digital content using cryptographic techniques. These schemes enable the original merchant to identify the original buyer of the digital data by embedding fingerprints into digital contents. Asymmetric property of fingerprinting schemes is important to keep the buyer's privacy. In this paper, we propose a symmetric encryption based fingerprinting protocol without trusted third party. Our scheme enables the reduction of computational costs for the encryption using symmetric key encryption scheme. Since a trusted third party doesn't take part in making the fingerprint of each buyer, the protocol doesn't need to control the trusted third party and it is more secure against collusion attack.
A RFID Tag Indexing Scheme Using Spatial Index
Joo, Heon-Sik ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 89~95
This paper proposes a tag indexing scheme for RFID tag using spatial index. The tag being used for the inventory management and the tag's location is determined by the position of readers. Therefore, the reader recognizes the tag, which is attached products and thereby their positions can be traced down. In this paper, we propose hTag-tree( Hybrid Tag index) which manages RFID tag attached products. hTag-tree is a new index, which is based on tag's attributes with fast searching, and this tag index manages RFID tags using reader's location. This tag index accesses rapidly to tags for insertion, deletion and updating in dynamic environment. This can minimize the number of node accesses in tag searching comparing to previous techniques. Also, by the extension of MER in present tag index, it is helpful to stop the lowering of capacity which can be caused by parent node approach. The proposed index experiment deals with the comparison of tag index. Fixed Interval R-tree, and present spatial index, R-tree comparison. As a result, the amount of searching time is significantly shortened through hTag-tree node access in data search. This shows that the use of proposed index improves the capacity of effective management of a large amount of RFID tag.
Improved MP-DD Routing Algorithm Considering Energy Efficiency in Wireless Sensor Networks
Jang, Yoon-Sik ; Park, Nam-Kyu ; Oh, Chung-Sik ; Choi, Seung-Kwon ; Lee, Chang-Jo ; Cho, Yong-Hwan ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 97~103
This paper proposes efficient routing scheme named MP-DD(MultiPath-Direct Diffusion) which is simple enough to be applicable to the wireless sensor networks. Conventional DD uses only one optimal path, therefore it consumes more energy of specific nodes. MP-DD uses multiple path and has a information of hop upstream node in the direction of the base-station is determined which are obtainable via the process of self-organization of the network. Simulation results show the feasibility of the simple routing schemes for the sensor networks.
A Safe Qperati ng Strategy for Information System of Small and Medium Enterprises
Yeo, Sang-Soo ; Hwang, Su-Chul ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 105~112
Small and medium enterprises have more dependency on their information technology than large enterprises have. but they can't pay much for information technology and information security due to financial restrictions, limited resources, and lack of know-how. So there are many vulnerabilities in small and medium enterprises and these would make many security incidents. Security managers of small and medium enterprises think that information security in their company is simply equivalent to updating the antivirus solutions. managing firewall, and patching systems regularly. However, security policies, prevention of information theft. business continuity, access controls, and many other information security issues should be considered for mitigating security incidents. In this context, we redefined security countermeasures and strategies which are only appropriate to large enterprises. for making them appropriate on a secure operating for information system of small and medium enterprises, and we investigate information security issues in the four views of information system and company, and finally we present information security strategies for each view, in this paper.
The method for protecting contents on a multimedia system
Kim, Seong-Ki ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 113~121
As a DRM is recently being removed from many sites, the content protection on a video server becomes important. However, many protection methods have their own limitations, or aren't used due to the deterioration of the streaming performance. This paper proposes a content protection method that uses both the eCryptFS and the SELinux at the same time, and measures the performance of the proposed method by using various benchmarks. Then, this paper verifies that the method doesn't significantly decrease the streaming performance although the proposed method decreases the other performances, so it can be used for the content protection in a multimedia system.
Mobile Proxy Architecture and Its Practice: Mobile Multimedia Collaboration System
Oh, Sang-Yoon ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 123~132
The perforrnance and portability of mobile applications can be greatly increased by adopting proxy modiles which exists between the conventional system and the device. When mobile devices collaborate with the conventional computers, there are problems to address: a battery life problem, limited input and output methods, and intermittent wireless connection. Those issues are magnified in the multimedia collaboration environment since it works in a real-time condition and the size of the message in the system is big in many cases. Additionally, because multimedia collaboration system softwares are too heavy and complex for mobile devices, it is veη hard to integrate them with conventional systems. In this paper, we describe our design and its implementation of a novel approach to map events (i.e. messages) using a proxy for mobile applications. We adopt a proxy to provide a content adaptation (i.e. transcoding) where the message contents are customized. Also, we design a mobile version publish/subscribe system to provide communication service for mobile device in loosely coupled and flexible manner. We present our empirical results which show that our design can be efficiently implemented and integrated with a conventional multimedia collaboration system.
A Study on Design of Project Integrated Management Tool for Improving Communication Process
Moon, Sung-Gae ; Kim, Ji-Hyeok ; Rhew, Sung-Yul ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 133~141
To have successful execution of a development project on large scale, it is the most important to improve communication problems between project stakeholder. In this study, we design and implement project integrated management tools that improve the problems. In order to design and implement the tools, we gathered and arranged requirements based on the ISP data from S corporation and the problems of 23 projects which was executed in recent 2 years in a communication perspective, and then we conceptually design and propose the tools. We defined major parts of the functions and the architecture related to communication among the proposed architecture model, and we proposed process and detail functions to execute major functions. This study shows the possibility through a qualitative valuation to improve validation of the architecture model and a quantitative analysis in a communication perspective.
Design and implementation of a dynamic management method for heterogeneous RFID/USN devices
Kim, Hyu-Chan ; Soh, Seok-Yong ; Koh, Wan-Ki ; Yang, Moon-Seok ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 143~150
Recently "Green IT" technology has been attracting public attention that the Ministry of Environment has come up with new plans to make "low carbon and green growth" technology and to promote u-City industries. Making an offer, Uubiquitous Service needs RFID/USN Middleware to handle heterogeneous RFID/USN devices in order to gather existing informations. In this paper, we propose the design and implementation of a dynamic management method for heterogeneous RFID/USN devices. In compliance with the paper I will furnish Uubiquitous Service regarding existing circumstances by handling heterogeneous RFID/USN devices such as new RFID/Sensor devices addition and deletion and so on.
Development of Eco driving Simulator Module for Economical Driving
Chung, Sung-Hak ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 151~160
The aim of this study is to propose economical driving speed index which those are geometric road status; assess the levels of which those cost-benefit of driving energy consumption and emission; are search road safety design and operational technology for driving simulator. For the objective, we analyzed the current status of driving energy consumption and driving scenarios by the road alignments, and reviewed driving and technical specifications by the geometric types of road according to the implementation, and extended completion. Throughout the result of this study, diverse related driving information provision service, efficiently navigation driving module is expected to be implemented in the national highway design system.
Consolidated transportation model for recycling of end-of-life electronic household appliances in South Korea
Hur, Tae-Young ; Won, Joong-Yeon ; Kim, Hyun-Soo ; Han, Dae-Hee ; Han, Woo-Chul ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 161~168
In this paper, we studied about an consolidated transportation model to transport EOL (end-of-life) electronic household appliances for recycling in South Korea. The objective is to minimize the total traveling distance of the vehicles transporting EOL electronic household appliances collected by local authorities and major manufacturers' distribution centers to assigned R/C(recycling center) in South Korea. Current reverse logistics for recycling EOL electronic household appliances is operated by local authorities and major manufacturers individually, and it is inefficient for the following reasons: excessive traveling distance, transportation cost, low truck capacity utilization, and so on. The presented model is developed to solve this problem. We apply a integer programming to solve this problem and present computational results using actual field data.
The Korean FTA Drive Policy and Suggestion of Korea. China FTA
Lee, Keun-Young ;
Journal of the Korea Society of Computer and Information, volume 14, issue 7, 2009, Pages 169~175
In accordance with the promotional strategy of the 'simultaneously occurring and high-level comprehensive FTA that Korean government made clear in the FTA promotion roadmap in 2003, it has already entered into FTA with 22 countries such as Chile, Singapore, EU, MERCOSUR, ASEAN and the like but is progressing or promoting the negotiation about FTA. It is necessary to make efforts to lift all sorts of non-tariff barriers that put restrictions on the import of China with the promotion of the lowering of customs duties in the negotiation of FTA between Korea and China. It is anticipated that imports will be expanded in the manufacturing field as well as agricultural products with the efforts to improve the business management environment of Korean firms within China. Therefore, it is a very important task to make efforts to prevent the roundabout trade made via China by reinforcing the standard and criterion for the origin of country in the Korea China FTA.