Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Computer and Information
Journal Basic Information
Journal DOI :
Korean Society of Computer Information
Editor in Chief :
Volume & Issues
Volume 15, Issue 12 - Dec 2010
Volume 15, Issue 11 - Nov 2010
Volume 15, Issue 10 - Oct 2010
Volume 15, Issue 9 - Sep 2010
Volume 15, Issue 8 - Aug 2010
Volume 15, Issue 7 - Jul 2010
Volume 15, Issue 6 - Jun 2010
Volume 15, Issue 5 - May 2010
Volume 15, Issue 4 - Apr 2010
Volume 15, Issue 3 - Mar 2010
Volume 15, Issue 2 - Feb 2010
Volume 15, Issue 1 - Jan 2010
Selecting the target year
Development of the Performance Benchmark Tool for Data Stream Management Systems Combined with DBMS
Kim, Gyoung-Bae ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 1~11
DOI : 10.9708/jksci.2010.15.8.001
Many applications of DSMS(Data Stream Management System) require not only to process real-time stream data efficiently but also to provide high quality services such as data mining and data warehouse combining with DBMS(Database Management System) to users. In this paper we execute the performance benchmark of the combined system of DSMS and DBMS that is developed for high quality services. We use the stream data of network monitoring application system and combine the traditional representative DSMSs and DBMSs in a single system for the performance testing. We develop the total performance benchmark tool implementing JAVA language for the our testing. For our performance testing, we combine DSMS such as STREAM and Coral8 and DBMS such MySQL and Oracle10g respectively.
An Optimization of Hashing Mechanism for the DHP Association Rules Mining Algorithm
Lee, Hyung-Bong ; Kwon, Ki-Hyeon ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 13~21
DOI : 10.9708/jksci.2010.15.8.013
One of the most distinguished features of the DHP association rules mining algorithm is that it counts the support of hash key combinations composed of k items at phase k-1, and uses the counted support for pruning candidate large itemsets to improve performance. At this time, it is desirable for each hash key combination to have a separate count variable, where it is impossible to allocate the variables owing to memory shortage. So, the algorithm uses a direct hashing mechanism in which several hash key combinations conflict and are counted in a same hash bucket. But the direct hashing mechanism is not efficient because the distribution of hash key combinations is unvalanced by the characteristics sourced from the mining process. This paper proposes a mapped perfect hashing function which maps the region of hash key combinations into a continuous integer space for phase 3 and maximizes the efficiency of direct hashing mechanism. The results of a performance test experimented on 42 test data sets shows that the average performance improvement of the proposed hashing mechanism is 7.3% compared to the existing method, and the highest performance improvement is 16.9%. Also, it shows that the proposed method is more efficient in case the length of transactions or large itemsets are long or the number of total items is large.
Index block mapping for flash memory system
Lee, Jung-Hoon ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 23~30
DOI : 10.9708/jksci.2010.15.8.023
Flash memory is non-volatile and can retain data even after system is powered off. Besides, it has many other features such as fast access speed, low power consumption, attractive shock resistance, small size, and light-weight. As its price decreases and capacity increases, the flash memory is expected to be widely used in consumer electronics, embedded systems, and mobile devices. Flash storage systems generally adopt a software layer, called FTL. In this research, we proposed a new FTL mechanism for overcoming the major drawback of conventional block mapping algorithm. In addition to the block mapping table, a index block mapping table with a small size is used to indicate sector location. The proposed indexed block mapping algorithm by adding a small size. By the simulation result, the proposed FTL provides an enhanced speed than a conventional hybrid mapping algorithm by around 45% in average, and the requirement of mapping memory is also reduced by around 12%.
Lane detection method using Median Filter based Retinex Algorithm in Foggy Image
Kim, Young-Tak ; Hahn, Hern-Soo ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 31~39
DOI : 10.9708/jksci.2010.15.8.031
The paper proposes the median filter based Retinex algorithm to detect the lanes in a foggy image. Whether an input image is foggy or not is determined by analyzing the histogram in the pre-defined ROI(Region of Interest). If the image is determined as a foggy one, then it is improved by the median filter based Retinex algorithm. By replacing the Gaussian filter by the median filter in the Retinex algorithm, the processing time can be reduced and the lane features can be detected more robustly. Once the enhanced image is acquired, the binarization based on multi-threshold and the labeling operations are applied. Finally, it detects the lane information using the size and direction parameters of the detected lane features. The proposed algorithm has been evaluated by using various foggy images collected on different road conditions to prove that it detects lanes more robustly in most cases than the conventional methods.
Design and Implementation of Monitoring System for Stable ATSC Mobile DTV
Yu, Saet-Byeol ; Cho, Min-Ju ; Sohn, Ye-Jin ; Chon, Sung-Hee ; Lee, Jae-Ho ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 41~49
DOI : 10.9708/jksci.2010.15.8.041
Digital broadcasting system has various affecting factors unlike analog broadcasting system, and has possibility of no signal reception in case of errors due to characteristics of digital system. And, digital broadcasting system has monitoring system for error occurrences handling various factors. ATSC mobile DTV system uses legacy frequency and provides mobile broadcasting services, and also requires monitoring systems for monitoring online broadcasting services and reporting to administrator about interference or influence with legacy systems, and error situations. In this paper, we propose efficient monitoring system which monitors online broadcasting status of ATSC mobile DTV, reports on poor signal reception, video streaming failures to administrator, and maintains reliable digital broad ca sting system.
The Recommendation System based on Staged Clustering for Leveled Programming Education
Kim, Kyung-Ah ; Moon, Nam-Mee ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 51~58
DOI : 10.9708/jksci.2010.15.8.051
Programming education needs learning which is adjusted individual learners` level of their learning abilities. Recommendation system is one way of implementing personalized service. In this research, we propose recommendation method which learning items are recommended for individual learners` learning in web-based programming education environment by. Our proposed system for leveled programming education provides appropriate programming problems for a certain learner in his learning level and learning scope employing collaborative filtering method using learners` profile of their level and correlation profile between learning topics. As a result, it resolves a problem that providing appropriate programming problems in learner`s level, and we get a result that improving leaner`s programming ability. Furthermore, when we compared our proposed method and original collaborative filtering method, our proposed method provides the ways to solve the scalability which is one of the limitations in recommendation systems by improving recommendation performance and reducing analysis time.
A Study on Coupling Coefficient and Resonant Frquency tunable Multi-band Internal Antenna
Lee, Moon-Woo ; Lee, Sang-Hyun ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 59~66
DOI : 10.9708/jksci.2010.15.8.059
In this paper, the internal antenna for mobile communication handset which is able to control both coupling coefficient and resonant frequency without any major modification of radiator and ground plane of antenna. Novel internal antenna with its controllable resonant frequency is presented for triple-band or over mobile handsets. The operating range can include GSM(880~960 MHz), GPS(
), DCS(1,710~1,880MHz), US-PCS(1,850~1,990 MHz), and W-CDMA(1,920~2,170 MHz). The proposed antenna is realized by combination of a half wavelength loaded line antenna and PIFA(Planner Inverted F Antenna). A single shorting and feeding points are used and they are common to both antenna structures. One of two inductors which is placed at each shorting post, one inductor is for adjusts amount of coupling, and the other controlling the resonant frequency in DCS/US-PCS/WCDMA bands. The inductance range for control of input impedance is between 0nH and 6.8nH, and each of gain variation in GSM, GPS and DCS/US-PCS/WCDMA band is under 0.15dBi, 0.73dBi and 0.29dBi. The inductance range for control of the resonant frequency is between 1640MHz and 2500MHz, and each of gain variation in GSM, GPS and DCS/US-PCS/WCDMA band is under 0.46dBi, 0.53dBi and 0.8dBi.
A Study on Problem Identification and Diagnosis from Virtual Network
Kim, Jeong-Su ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 67~78
DOI : 10.9708/jksci.2010.15.8.067
Various services such as IPTV, VoIP, multimedia over IP, on-line payment, on-line game, etc. were made possible due to the rapid advance of the network. In order to provide secure and seamless services over the network, the Internet service providers are performing continuous network monitoring using NMS. The main function of NMS is to perform a diagnosis to identify the potential causes of failure from event messages. In this paper, a simulation tool, named as NetDoctor, is presented which is capable of identifying and diagnosing the potential problems in the virtual network, before the network model is constructed. In NetDoctor, a series of various and artificial failure is imposed on the virtual network, and it was analyzed if NetDoctor could identify the problems. The experimental results on virtual network show that the developed tool is very effective in identifying and diagnosing the problems. The presented simulation tool can be used in the design of robust network.
Interrelation Based Resource Allocation Scheme for Mobile Multimedia Networks
Lee, Jong-Chan ; Lee, Moon-Ho ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 79~87
DOI : 10.9708/jksci.2010.15.8.079
It is widely accepted that the coverage with high user densities in mobile multimedia environments can only be achieved with small cell such as micro- and pico-cell. If handover events occur during the transmission of multimedia, the efficient resource reservation and handover methods are necessary in order to maintain the same QoS of transmitted multimedia traffic because the QoS may be defected by some delay and information loss. In this paper, we propose a resource allocation method in the next generation mobile communication systems, in which the resource allocation process has a tight relation with call admission, call load, and packet scheduling. The simulation results show that our proposed method provides a excellent performance.
Implementation of HL7 Interface Engine for Medical Information Exchange
Hwang, Deuk-Young ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 89~98
DOI : 10.9708/jksci.2010.15.8.089
Recently supply of Internet is bringing a important change in medical environments. The hospitals which had a different system is required the system that can efficiently share and exchange medical information. In order to transmission medical information between systems, the Health Level Seven(HL7) interface engine development that can convert medical data to HL7 messages is necessary. The HL7 is a standard protocol for data exchange in healthcare environments. In this paper, I implemented HL7 interface engine for Alzheimer`s disease in elderly care facility. The interface engine is composed of the client system and the server system. The client system inputs user`s medical care data for the aged, and builds them into HL7 message stream. HL7 messages in the client system transmitted over TCP/IP protocol to the server system. The server system parses and validates this messages stream to the segments and fields and then transmits acknowledgement to the client system. I implemented it using the Java and JavaCC. The study of interface engine implementation can be used meaningfully in electronic health record, telemedicine system, and medical information sharing among various healthcare institutions.
A Customized Mobile Tour Guide System for Amusement Park based on GPS
Yu, Seok-Jong ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 99~105
DOI : 10.9708/jksci.2010.15.8.099
Because in the amusement park, a number of people use various vehicles facilities complicated arraigned, it needs an effective way to search optimal path to reduce errors in touring a park. Particularly, when choosing a facility, searching a waiting time-based path as well as shortest path is important. This paper presents a path recommendation system which minimizes total park tour time based on tour distance and waiting time through GPS and wireless internet. This system can also recommend customized tour path based on the characteristics of user members as well as a simple shortest path.
A Secure Technique Design for Privacy Protection in RFID System
Oh, Gi-Oug ; Park, Mi-Og ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 107~115
DOI : 10.9708/jksci.2010.15.8.107
RFID (Radio Frequency IDentification) technology, automatic identification and data capture technologies in ubiquitous computing is an essential skill. Low-cost Radio Frequency Identification tags using memory and no physical contact due to the ease of use and maintenance of excellence are going to use expanded. However, it is possible to the illegal acquisition of the information between RFID tags and readers because RFID uses the RF signal, and the obtained information can be used for the purpose of location tracking and invasion of privacy. In this paper, we proposed the security scheme to protect against the illegal user location tracking and invasion of privacy. The security scheme proposed in this paper, using Gray Code and reduced the capacity of the calculation of the actual tags, However, it is impossible for the malicious attacker to track information because tag information transmitted from the reader is not fixed. Therefore, even if the tags information is obtained by a malicious way, our scheme provides more simple and safe user privacy than any other protection methods to protect user privacy, because not actual information but encrypted information is becoming exposed.
A Structural Complexity Metric for Web Application based on Similarity
Jung, Woo-Sung ; Lee, Eun-Joo ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 117~126
DOI : 10.9708/jksci.2010.15.8.117
Software complexity is used to evaluate a target system`s maintainability. The existing complexity metrics on web applications are count-based, so it is hard to incorporate the understandability of developers or maintainers. To make up for this shortcomings, entropy-theory can be applied to define complexity, however, it is assumed that information quantity of each paper is identical. In this paper, structural complexity of a web application is defined based on information theory and similarity. In detail, the proposed complexity is defined using entropy as the previous approach, but the information quantity of individual pages is defined using similarity. That is, a page which are similar with many pages has smaller information quantity than a page which are dissimilar to others. Furthermore, various similarity measures can be used for various views, which results in many-sided complexity measures. Finally, several complexity properties are applied to verify the proposed metric and case studies shows the applicability of the metric.
CoRapport: Proactive Display Application Supporting Presentation of Various Social Web Contents in Physical Spaces
Lee, Tae-Ho ; Lee, Myung-Joon ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 127~139
DOI : 10.9708/jksci.2010.15.8.127
The concept of Web 2.0, which means that internet users are producers and also consumers is evolved according to the development of web service technology. In the Web 2.0 space, the enormous amount of web contents are produced using many social web services. Proactive display system supports various types of users`s web contents. Unfortunately, private web contents sharing facility is imperfect to date. In this paper, we develop a proactive display application which identifies people, displaying their social contents such as blogs and open cafes through wide display devices or multi-media players in physical spaces. For this, we develop a social contents presentation server where users can register their profiles and information on the social contents to be shared through the developed application. Also, we develop a social contents presentation client that proactively identifies the user in close proximity and displays the user`s social contents through an intuitive user interface in physical spaces. In addition, we develop an on-the-spot feedback service which supports posting various types of replies and an on-the-spot scrap service which specifies direct sharing of the contents through the intuitive user interface.
User`s Individuality Preference Recommendation System using Improved k-means Algorithm
Ahn, Chan-Shik ; Oh, Sang-Yeob ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 141~148
DOI : 10.9708/jksci.2010.15.8.141
In mobile terminal recommend service system has general information restrictive recommend that individuality considering to user`s information find and recommend. Also it has difficult of accurate information recommend bad points user`s not offer individuality information preference recommend service. Therefore this paper is propose user`s information individuality preference considering by user`s individuality preference recommendation system using improved k-means algorithm. Propose method is correlation coefficients using user`s information individuality preference when user`s individuality preference recommendation using improved k-means algorithm. Restrictive information recommend to fix a problem, information of restrictive general recommend that user`s information individuality preference offer to accurate information recommend. Performance experiment is existing service system as compared to evaluating the effectiveness of precision and recall, performance experiment result is appear to precision 85%, recall 68%.
An Energy Efficient Query Processing Mechanism using Cache Filtering in Cluster-based Wireless Sensor Networks
Lee, Kwang-Won ; Hwang, Yoon-Cheol ; Oh, Ryum-Duck ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 149~156
DOI : 10.9708/jksci.2010.15.8.149
As following the development of the USN technology, sensor node used in sensor network has capability of quick data process and storage to support efficient network configuration is enabled. In addition, tree-based structure was transformed to cluster in the construction of sensor network. However, query processing based on existing tree structure could be inefficient under the cluster-based network. In this paper, we suggest energy efficient query processing mechanism using filtering through data attribute classification in cluster-based sensor network. The suggestion mechanism use advantage of cluster-based network so reduce energy of query processing and designed more intelligent query dissemination. And, we prove excellence of energy efficient side with MATLab.
Design of Charge and Discharge Monitoring System for Secondary Batteries of Hybrid Electric Vehicle
Lee, Jun-Ha ; Lee, Kang-Ho ; Choi, Jong-Ho ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 157~161
DOI : 10.9708/jksci.2010.15.8.157
Most of air pollution in a metropolis is the result of exhaust gas emissions from automotive vehicles, and the world-wide regulation against environmental pollution is becoming more strict. Moreover the demand on development and supply of an environment-friendly automobile is increasing and the market share about that is expected to grow rapidly in this time of high oil price. The secondary batteries the most important component to store the electrical energy in hybrid electric vehicle. It needs to the higher power characteristics to emit the energy instantaneous. In this paper, we proposed the system to monitor reliably the charge and discharge states of the secondary batteries for hybrid electric vehicle. The material is about SW and HW module the software and hardware module mounted on the charge and discharge system and the monitoring system to control the charge and discharge performance effectively.
A Study on Personas Models for Car Navigation Developing
Oh, See-Hyung ; Kim, Jung-Hee ; Choi, Hak-Hyun ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 163~171
DOI : 10.9708/jksci.2010.15.8.163
This research has studied developing the persona model based on alan cooper`s user oriented design which is newly in the limelight in the field of product design process. As developing the persona model, In-depth interview and FGI(focus group interview) has been conducted for extracting car navigation user group`s motivation and using attribute. Based on research, three different car navigation user group were divided-low using & understanding the function group, medium using & well understanding the function group, heavy using & well understanding the function group. This research yielded the foundation for setting the persona model and this persona gives the key factor for producing the user oriented user Interface design after all.
A Study on the Improvement Alternatives using USN Technology on Bicycle and Infrastructures
Chung, Sung-Hak ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 173~180
DOI : 10.9708/jksci.2010.15.8.173
This research aims to enhance the security and safety of bicycle facilities by utilizing convergence technology of ubiquitous sensor network in the transportation system. To achieve the aim, U-bike system has developed by utilizing sensor network technology, and the serviceability and safety function of public facilities in the system have enhanced. This research also presents a plan for the construction of U-bike using ubiquitous sensor network and safety infrastructure of facilities by analyzing bicycle traffic reports and characteristics of service through studying the literature on the security of bicycles and the safety of facilities on bicycle lanes. The result of this research will contribute to the enhancement of safety function of bicycle lanes and facilities around National 4 major rivers bicycle lanes in the future.
A dispatching policy for stochastic scheduling simulation considering machine breakdowns
Ko, Dong-Jin ; Lee, Chul-Ung ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 181~192
DOI : 10.9708/jksci.2010.15.8.181
We develop a dispatching policy for stochastic scheduling simulation especially for a continuous manufacturing system with machine breakdowns. The proposed dispatching policy computes an urgency index with the consideration of re-heating, setup cost and remaining due date. Prioritized by the index, we execute swapping or reassigning material sequences so as to minimize the total penalty cost. To evaluate the performance of the proposed policy, a discrete event simulation is developed. With 200 data sets and 20 iterations, we compare the performance of the urgency policy with those of SPT (Shortest Processing Time) and FCFS (First Come First Serve) which are the most common policies. The result shows that the proposed policy consistently gives the lowest total costs by reducing the penalty costs for lateness.
The Factors affecting on Internet Addition in Adolescence and how to deal with it - Focusing on Ecosystem Theory -
Park, Hwie-Seo ;
Journal of the Korea Society of Computer and Information, volume 15, issue 8, 2010, Pages 193~200
DOI : 10.9708/jksci.2010.15.8.193
This study is to identify the factors affecting on adolescent internet addition and suggest how to deal with it. This study is based on the ecosystem theory for human development. The factors affecting on adolescent internet addition are the followings: First, self-efficacy, self-esteem and self-control affect on internet addiction in individual system. Second, the affecting factors concerned with home environmental system are the communication level between parents and adolescent, parents` attitude for bringing up, parents` control level for adolescent, parents support etc. Third, the affecting factors concerned with school environmental system academic score, friends` support, teacher`s support, adolescent adaptation in school life etc. This study suggest how to deal with internet addiction based on these findings.