Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Computer and Information
Journal Basic Information
Journal DOI :
Korean Society of Computer Information
Editor in Chief :
Volume & Issues
Volume 15, Issue 12 - Dec 2010
Volume 15, Issue 11 - Nov 2010
Volume 15, Issue 10 - Oct 2010
Volume 15, Issue 9 - Sep 2010
Volume 15, Issue 8 - Aug 2010
Volume 15, Issue 7 - Jul 2010
Volume 15, Issue 6 - Jun 2010
Volume 15, Issue 5 - May 2010
Volume 15, Issue 4 - Apr 2010
Volume 15, Issue 3 - Mar 2010
Volume 15, Issue 2 - Feb 2010
Volume 15, Issue 1 - Jan 2010
Selecting the target year
A Study on Ontology Instance Generation Using Keywords
Han, Kwang-Rok ; Kang, Hyun-Min ; Sohn, Surg-Won ;
Journal of the Korea Society of Computer and Information, volume 15, issue 5, 2010, Pages 1~11
DOI : 10.9708/jksci.2010.15.5.001
The success of semantic web depends largely on the semantic annotation which systematizes knowledge for the construction and production of ontology. Therefore, the efficiency of semantic annotation is very important in order to change many knowledge expressions and generate into ontology instances. In this paper, we presents a generation system of rule-based ontology instances which are produced accurately and efficiently via semantic annotation in conventional web sites. In conventional studies, the manual process is necessary for finding relevant information, comparing it with ontology, and entering information. We propose a new method that manages keyword data regarding extracted information and rule information separately. Thus, it is quite practical to extract information efficiently from various web documents by adding a small number of keywords and rules. The proposed method shows the possibility of ontology instance generation which reuses the rules and keywords from the various websites.
The Analysis of The Kalman Filter Noise Factor on The Inverted Pendulum
Kim, Hoon-Hak ;
Journal of the Korea Society of Computer and Information, volume 15, issue 5, 2010, Pages 13~21
DOI : 10.9708/jksci.2010.15.5.013
The Optimal results of Kalman Filtering on the Inverted Pendulum System requires an effective factor such as the noise covariance matrix Q, the measurement noise covariance matrix R and the initial error covariance matrix
. We present a special case where the optimality of the filter is not destroyed and not sensitive to scaling of these covariance matrix because these factors are unknown or are known only approximately in the practical situation. Moreover, the error covariance matrices issued by this method predict errors in the state estimate consistent with the scaled covariance matrices and not the issued state estimates. Various results using the scalar gain
are derived to described the relations among the three covariance matrices, Kalman Gain and the error covariance matrices. This paper is described as follows: Section III a brief overview of the Inverted Pendulum system. Section IV deals with the mathematical dynamic model of the system used for the computer simulation. Section V presents a various simulation results using the scalar gain.
An Indexing Scheme for Predicting Future-time Positions of Moving Objects with Frequently Varying Velocities
Lim, Sung-Chae ;
Journal of the Korea Society of Computer and Information, volume 15, issue 5, 2010, Pages 23~31
DOI : 10.9708/jksci.2010.15.5.023
With the advances in the information technology and mobile communications, we now face increasing demands for various services based on both of position tracking of moving objects and their efficient index scheme. Accordingly, the
-tree, which were proposed for efficiently tracking moving objects and predicting their positions in the future time, has drawn much intention. As the
-tree came from the R-tree that is suitable for indexing static objects, it does not support cheap update costs. Therefore, it seems to be very costly to index moving objects if there are frequent occurrences of node updates caused by continuously changing velocities and positions. If some moving objects with high velocities have node updates, in particular, then the
-tree may suffer from many unnecessary updates in the wide range of tree regions. To avoid such a problem, we propose a method that can keep fast-moving objects in the child nodes of the root node, thereby saving node update costs in the
-tree. To show our performance advantages and retaining
-tree features, we performed some performance experiments using a simulation technique.
Implementation of Mouse Function Using Web Camera and Hand
Kim, Seong-Hoon ; Woo, Young-Woon ; Lee, Kwang-Eui ;
Journal of the Korea Society of Computer and Information, volume 15, issue 5, 2010, Pages 33~38
DOI : 10.9708/jksci.2010.15.5.033
In this paper, we proposed an algorithm implementing mouse functions using hand motion and number of fingers which are extracted from an image sequence. The sequence is acquired through a web camera and processed with image processing algorithms. The sequence is first converted from RGB model to YCbCr model to efficiently extract skin area and the extracted area is further processed using labeling, opening, and closing operations to decide the center of a hand. Based on the center position, the number of fingers is decided, which serves as the information to decide and perform a mouse function. Experimental results show that 94.0% of pointer moves and 96.0% of finger extractions are successful, which opens the possibility of further development for a commercial product.
An Integration of Local Search and Constraint Programming for Solving Constraint Satisfaction Optimization Problems
Hwang, Jun-Ha ;
Journal of the Korea Society of Computer and Information, volume 15, issue 5, 2010, Pages 39~47
DOI : 10.9708/jksci.2010.15.5.039
Constraint satisfaction optimization problem is a kind of optimization problem involving cost minimization as well as complex constraints. Local search and constraint programming respectively have been used for solving such problems. In this paper, I propose a method to integrate local search and constraint programming to improve search performance. Basically, local search is used to solve the given problem. However, it is very difficult to find a feasible neighbor satisfying all the constraints when we use only local search. Therefore, I introduced constraint programming as a tool for neighbor generation. Through the experimental results using weighted N-Queens problems, I confirmed that the proposed method can significantly improve search performance.
A Performance Analysis Based on Hadoop Application's Characteristics in Cloud Computing
Keum, Tae-Hoon ; Lee, Won-Joo ; Jeon, Chang-Ho ;
Journal of the Korea Society of Computer and Information, volume 15, issue 5, 2010, Pages 49~56
DOI : 10.9708/jksci.2010.15.5.049
In this paper, we implement a Hadoop based cluster for cloud computing and evaluate the performance of this cluster based on application characteristics by executing RandomTextWriter, WordCount, and PI applications. A RandomTextWriter creates given amount of random words and stores them in the HDFS(Hadoop Distributed File System). A WordCount reads an input file and determines the frequency of a given word per block unit. PI application induces PI value using the Monte Carlo law. During simulation, we investigate the effect of data block size and the number of replications on the execution time of applications. Through simulation, we have confirmed that the execution time of RandomTextWriter was proportional to the number of replications. However, the execution time of WordCount and PI were not affected by the number of replications. Moreover, the execution time of WordCount was optimum when the block size was 64~256MB. Therefore, these results show that the performance of cloud computing system can be enhanced by using a scheduling scheme that considers application's characteristics.
A Real Time Flame and Smoke Detection Algorithm Based on Conditional Test in YCbCr Color Model and Adaptive Differential Image
Lee, Doo-Hee ; Yoo, Jae-Wook ; Lee, Kang-Hee ; Kim, Yoon ;
Journal of the Korea Society of Computer and Information, volume 15, issue 5, 2010, Pages 57~65
DOI : 10.9708/jksci.2010.15.5.057
In this paper, we propose a new real-time algorithm detecting the flame and smoke in digital CCTV images. Because the forest fire causes the enormous human life and damage of property, the early management according to the early sensing is very important. The proposed algorithm for monitoring forest fire is classified into the flame sensing and detection of smoke. The flame sensing algorithm detects a flame through the conditional test at YCbCr color model from the single frame. For the detection of smoke, firstly the background range is set by using differences between current picture and the average picture among the adjacent frames in the weighted value, and the pixels which get out of this range and have a gray-scale are detected in the smoke area. Because the proposed flame sensing algorithm is stronger than the existing algorithms in the change of the illuminance according to the quantity of sunshine, and the smoke detection algorithm senses the pixel of a gray-scale with the smoke considering the amount of change for unit time, the effective early forest fire detection is possible. The experimental results indicate that the proposed algorithm provides better performance than existing algorithms.
The Face Authentication Mechanism of Learner for the Efficient E-Learning
Jang, Eun-Gyeom ; Kim, Gyoung-Bae ;
Journal of the Korea Society of Computer and Information, volume 15, issue 5, 2010, Pages 67~74
DOI : 10.9708/jksci.2010.15.5.067
E-learning technology which effectively supports the learning methodologies between students and professors and which provides location and time benefits to students is being researched now a days. However, E-learning classes produce bad effects comparing with offline classes in learning procedures including scholastic achievements. Bad effects of E-learning system could be proxy attendance, lack of concentration, and bad attitude of students. These environmental problems must be solved first to achieve the advantages of E-learning technology. To get rid of these problems, in this paper, we proposed a mechanism which provides effective learning progress by using face authentication method. This mechanism supervise the student by using real time face recognition which prevents proxy attendance, illegal activities, and student's absences.
A Study on the Incident Angle Estimation Method of Target at Coherent Interference
Shin, Ho-Sub ;
Journal of the Korea Society of Computer and Information, volume 15, issue 5, 2010, Pages 75~81
DOI : 10.9708/jksci.2010.15.5.075
Adaptive array antenna system estimates target signal, as making a null pattern toward the interference signal. However, receiving a coherent interference signal at adaptive array antenna system, as target signal is regarded as interference signal, the performance of system rapidly decreases. The main beam does not direct an incidence direction of target signal due to sensitivity in directivity error. This paper proposes beamforming algorithm which combines high order limit condition and directivity error modify method. And it minimizes degree of freedom and decreases interference signal and directivity error using proposed algorithm. This paper compares and analyzes the performance of proposed algorithm and general algorithm using simulation. In this paper, the proposed algorithm correctly estimates an incident angle, but general algorithm occurs an error of about
A Discriminant Analysis on the User Classification of Mobile Telecommunications Service and HSDPA Service Strategy
Lee, Jun-Yub ;
Journal of the Korea Society of Computer and Information, volume 15, issue 5, 2010, Pages 83~92
DOI : 10.9708/jksci.2010.15.5.083
Along with the advance of industrial technology in mobile telecommunications and diversity in customer needs, today's Korean mobile telecommunication market has rapidly expanded due to stronger competition among businesses as well as increasing the number of subscribers. 3G roll-outs of mobile telecommunications service, so called "HSDPA" has seriously promoted marketing strategies among mobile telecommunication companies which led to move to the next generation customers. Understanding the competitive situation, mobile telecommunications companies are currently focusing on increasing sales per subscriber as well as increasing the number of subscribers as a solution to occupy the leading position in the mobile telecommunications industry in the future. The purpose of this study was to classify the customers in mobile telecommunications service with or without higher tendency of intention to subscribe and use the service using discriminant analysis. Through the discriminant analysis, discriminant function which classifying the critical user has been identified. The result of this study will give useful marketing strategies in competitive HSDPA mobile telecommunications market.
Hierarchical network management based on MA+SNMP
Na, Ho-Jin ; Cho, Kyung-San ;
Journal of the Korea Society of Computer and Information, volume 15, issue 5, 2010, Pages 93~101
DOI : 10.9708/jksci.2010.15.5.093
Although various network management architectures such as centralized, distributed, and hybrid have been presented, any one is not always efficient in all the environment. In this paper, we propose a hierarchical and split network management architecture based on MA+SNMP in order to manage a network of many small NEs distributed over the wide area. Our hierarchical architecture has MA-based proxy management nodes for the flexibility and overhead reduction in NMS as well as SNMP-based NEs considering NE's capacity. Through the analysis with real experiments, we show that our proposal improves some drawbacks and the processing delay of the existing architectures in the given environment.
An Efficient Data Transmission Strategy using Adaptive-Tier Low Transmission Power Schedule in a Steady-state of BMA
Kim, Sang-Chul ;
Journal of the Korea Society of Computer and Information, volume 15, issue 5, 2010, Pages 103~111
DOI : 10.9708/jksci.2010.15.5.103
This paper proposes an efficient data transmission strategy using adaptive-tier low transmission power schedule in a TDMA-based ad hoc MAC protocol. Since the network resource of ad hoc networks has the characteristic of reassignment due to the multiple interferences and the contention-based limited wireless channel, the efficient time slot assignment and low power transmission scheme are the main research topics in developing ad hoc algorithms. Based on the proposed scheme of interference avoidance when neighbor clusters transmit packets, this paper can minimize the total energy dissipation and maximize the utilization of time slot in each ad hoc node. Simulation demonstrates that the proposed algorithm yields 15.8 % lower energy dissipation and 4.66% higher time slot utilization compared to the ones of two-tier conventional energy dissipation model.
Hybrid PKI Public Certificate Security Method Based on Device ID
Son, Young-Hwan ; Choi, Woon-Soo ; Kim, Ki-Hyun ; Choi, Han-Na ; Lee, Dae-Yoon ; Oh, Chung-Shick ; Cho, Yong-Hwan ;
Journal of the Korea Society of Computer and Information, volume 15, issue 5, 2010, Pages 113~124
DOI : 10.9708/jksci.2010.15.5.113
In this study, the hybrid authorization quotation technique is based on the device ID for the integrity of the source region guarantee of user certificate, in order to improve the convenience and security for user in the hybrid PKI certificate Mechanism for authentication. The feature of the model in which it is presented from this paper is 5. First, because the user can select the policy himself in which it matches with each authentication situation and security level, the convenience can be improved. Second, the integrity of the source region of the user certificate can be guaranteed through the comparison of the DLDI Key, that is the hash-value of the device ID. Third, the security can be improved by continuously changing an encoding, and the value of the key in which it decodes through the EOTP Key. Fourth, the index value is added to a certificate, and the storage of a certificate is possible at the Multi-Device. Fifth, since the addi the inan aratus for the integrity of the source region guarantee of a certificate is not needed, the authentication process time can be reduced and the computational load of the certificate server can be reduced also.
The Comparative Study of Software Optimal Release Time Based on Gamma Exponential and Non-exponential Family Distribution Model
Kim, Hee-Cheul ; Shin, Hyun-Cheul ;
Journal of the Korea Society of Computer and Information, volume 15, issue 5, 2010, Pages 125~132
DOI : 10.9708/jksci.2010.15.5.125
Decision problem called an optimal release policies, after testing a software system in development phase and transfer it to the user, is studied. The applied model of release time exploited infinite non-homogeneous Poisson process. This infinite non-homogeneous Poisson process is a model which reflects the possibility of introducing new faults when correcting or modifying the software. The failure life-cycle distribution used exponential and non-exponential family which has various intensity. Thus, software release policies which minimize a total average software cost of development and maintenance under the constraint of satisfying a software reliability requirement becomes an optimal release policies. In a numerical example, after trend test applied and estimated the parameters using maximum likelihood estimation of inter-failure time data, estimated software optimal release time.
Contents Adaptation in Ubiquitous Environments
Shin, Young-Ok ;
Journal of the Korea Society of Computer and Information, volume 15, issue 5, 2010, Pages 133~141
DOI : 10.9708/jksci.2010.15.5.133
Contents adaptation is a technology which converts one content to another content used in various devices. Specially, synchronization of inter-media which are included in a document is needed. There are various proposals and solutions for synchronization of inter-media. In the paper, I present "TATS : Temporal Aggregate Tree Strategy" model, which is used for specifying the temporal relationship among media in series of time. In the TATS model, aggregate tree, a sort of a binary tree, is generated from the execution time of those media. Using this aggregate tree, I implemented the inter-media synchronizations.
A Factor Analysis on the Rational Application Model for Local Government Fund
Choi, Rack-In ;
Journal of the Korea Society of Computer and Information, volume 15, issue 5, 2010, Pages 143~151
DOI : 10.9708/jksci.2010.15.5.143
The purpose of this research paper is to provide to alternatives to improve the fiscal issue of current local government fund system of through empirical factor analysis. The method of this study is to survey residents and public officers. The meaning of local government fund system is to enhance the roll of local community effectually and to practice democratically and efficiently through continuing support to special project, But in general, Fund must be applied under certain restrictions in the field not to attain it's objects within budget accounting system, The reform of fund managemental application must to achieve before fixing an abuse out of fund system. According to this factor analysis, a strategic aspect to enhance the democracy and efficiency of fund system must be search actively.