Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Computer and Information
Journal Basic Information
Journal DOI :
Korean Society of Computer Information
Editor in Chief :
Volume & Issues
Volume 17, Issue 12 - Dec 2012
Volume 17, Issue 11 - Nov 2012
Volume 17, Issue 10 - Oct 2012
Volume 17, Issue 9 - Sep 2012
Volume 17, Issue 8 - Aug 2012
Volume 17, Issue 7 - Jul 2012
Volume 17, Issue 6 - Jun 2012
Volume 17, Issue 5 - May 2012
Volume 17, Issue 4 - Apr 2012
Volume 17, Issue 3 - Mar 2012
Volume 17, Issue 2 - Feb 2012
Volume 17, Issue 1 - Jan 2012
Selecting the target year
AMEX: Extending Addressing Mode of 16-bit Thumb Instruction Set Architecture
Kim, Dae-Hwan ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 1~10
DOI : 10.9708/jksci/2012.17.11.001
In this paper, the extension of the addressing mode in the 16-bit Thumb instruction set architecture is proposed to improve the performance of 16-bit Thumb code. The key idea of the proposed approach is the introduction of new addressing modes for more frequent instructions by using the saved bits from the reduction of the register fields in less frequently used instructions. The proposed approach adopts efficient addressing modes from the 32-bit ARM architecture, which is the superset of the 16-bit Thumb architecture. To speed up access to a data list, scaled register offset addressing mode and post-indexed addressing mode are introduced for load and store instructions. Experiments show that the proposed approach improves performance by an average of 8.5% when compared to the conventional approach.
Parameter Estimation in Debris Flow Deposition Model Using Pseudo Sample Neural Network
Heo, Gyeongyong ; Lee, Chang-Woo ; Park, Choong-Shik ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 11~18
DOI : 10.9708/jksci/2012.17.11.011
Debris flow deposition model is a model to predict affected areas by debris flow and random walk model (RWM) was used to build the model. Although the model was proved to be effective in the prediction of affected areas, the model has several free parameters decided experimentally. There are several well-known methods to estimate parameters, however, they cannot be applied directly to the debris flow problem due to the small size of training data. In this paper, a modified neural network, called pseudo sample neural network (PSNN), was proposed to overcome the sample size problem. In the training phase, PSNN uses pseudo samples, which are generated using the existing samples. The pseudo samples smooth the solution space and reduce the probability of falling into a local optimum. As a result, PSNN can estimate parameter more robustly than traditional neural networks do. All of these can be proved through the experiments using artificial and real data sets.
A Hybrid Inference System for Efficiently Controlling Reversible Lane
Kwon, Hee-Chul ; Yoo, Jung-Sang ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 19~26
DOI : 10.9708/jksci/2012.17.11.019
Reversible lanes in urban intersections is used to efficiently control vehicles, reduce traffic congestion and increase the capacity of a roadway. But by far traffic control systems in urban intersections are simple and manually operated by police officers. In this study, we present a hybrid algorithm that intelligently resolve the moving direction of reversible lanes to efficiently manage the flow of traffic at intersection. The proposed algorithm consists of three stages:(i) fuzzy inference method to get the efficiency of moving direction, (ii) a provisional decision whether to change the reversible lane to different direction, (iii) a final evaluation criterion for changing the directions of the reversible lanes. The fuzzy inference results of efficiency are shown by using matlab application.
Color Image Filter using an Enhanced Fuzzy Method
Kim, Kwang Baek ; Lee, Byung Kwan ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 27~32
DOI : 10.9708/jksci/2012.17.11.027
In this paper, we propose a fuzzy method that improves the existing problem of the fuzzy filtering algorithm. The proposed fuzzy filtering algorithm separates R, G, and B channels from the color image. Mask information was extracted from separated channels and the brightness of the mean value and median value for channels was applied in the function of the proposed fuzzy method to calculate the membership and achieve application in the inference rule. Also, the membership degrees of R, G, and B were used to distinguish the possibility of noise. The proposed fuzzy method selected three membership functions. If noise is distinguished, the noise is eliminated by selecting the median value or mean value as the relevant pixel value according to the degree of noise. By applying the proposed method in color images, it was verified that the proposed method is more effective in eliminating noise when compared with the conventional fuzzy filtering method.
Detection of Aesthetic Measure from Stabilized Image and Video
Rhee, Yang-Won ; Choi, Byeong-Seok ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 33~38
DOI : 10.9708/jksci/2012.17.11.033
An free-fall object is received only force of gravity. Movement that only accept gravity is free-fall movement, and a free-falling object is free falling body. In other words, free falling body is only freely falling objects under the influence of gravity, regardless of the initial state of objects movement. In this paper, we assume, ignoring the resistance of the air, and the free-fall acceleration by the height does not change within the range of the short distance in the vertical direction. Under these assumptions, we can know about time and maximum height to reach the peak point from jumping vertically upward direction, time and speed of the car return to the starting position, and time and speed when the car fall to the ground. It can be measured by jumping degree and risk of accident from car or motorcycle in telematics.
A Study on Correcting Virtual Camera Tracking Data for Digital Compositing
Lee, Junsang ; Lee, Imgeun ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 39~46
DOI : 10.9708/jksci/2012.17.11.039
The development of the computer widens the expressive ways for the nature objects and the scenes. The cutting edge computer graphics technologies effectively create any images we can imagine. Although the computer graphics plays an important role in filming and video production, the status of the domestic contents production industry is not favorable for producing and research all at the same time. In digital composition, the match moving stage, which composites the captured real sequence with computer graphics image, goes through many complicating processes. The camera tracking process is the most important issue in this stage. This comprises the estimation of the 3D trajectory and the optical parameter of the real camera. Because the estimating process is based only on the captured sequence, there are many errors which make the process more difficult. In this paper we propose the method for correcting the tracking data. The proposed method can alleviate the unwanted camera shaking and object bouncing effect in the composited scene.
Study on Establishment of Internet ethics expressed through Language convert in computer games
Park, Koo Rack ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 47~52
DOI : 10.9708/jksci/2012.17.11.047
Today the Internet is being used in all areas. However, part of everyday life, the lack of ethics on the Internet, the Internet lies in state. Especially the youth, should exploit the anonymity. As a result, has caused many problems. Fps online game from young people enjoy the use of profanity and slang, and increasing the damage of cyber violence has also increased. The damage type of cyber violence, abusive and slang, and the age, the lower the investigation was to increase the damage. Lot of publicity and public service advertising is in progress in order to prevent problems, but its expected effects is lacking. In addition, using abusive and slang words, This is a fundamental and provide a service to handle deleted or blinds, but if you can not see the solution. In this paper suggests the language convert that can be applied to Fps online games. Language the conversion process, if applicable to the game, the abusive and slang language, helps to purify. Proposed language the conversion process is expected to reduce cyber violence used abusive and slang.
Creative 3D game programming learning using Kodu visual programming language for elementary school students
Rim, Hwa-Kyung ; Cho, Yong-Nam ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 53~61
DOI : 10.9708/jksci/2012.17.11.053
Kodu made by MS is a new 3D visual programming language made specifically for creating games. This language is based on creativity, problem-solving methods, and storytelling. So, it is very suitable for game programming education for kids. In this paper, we designed learning method to develop games based on elementary school students' creative thinking. The instruction was given to 27 6-grade elementary school students in 30 hours. And we applied the learning method in class. Also, we analyzed the changes in the learners' creative thinking and the learning effects of game programming.
A Study on M2M Identifier for M2M Service in Mobile Communication Networks
Hong, Yong-Geun ; Youn, JooSang ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 63~71
DOI : 10.9708/jksci/2012.17.11.063
Recently, due to the development of the mobile communication system and communication technology, a communication paradigm changes from human-to-human(H2H) communication to machine-to-human(M2H) and machine-to-machine(M2M) communication. The machine means a device with networking capabilities Also, if M2M services will be activated, we can expect that many M2M devices connect to mobile communication networks, which leads to the lack of M2M identifier to identify a M2M device in mobile communication system. Therefore, this paper proposes the group identifier based M2M identification scheme to identify many M2M devices in mobile communication based M2M service network. In the future, the proposed M2M identification scheme can be utilized as a way to solve the shortage problem of M2M identifier.
A Design of ETWAD(Encapsulation and Tunneling Wormhole Attack Detection) based on Positional Information and Hop Counts on Ad-Hoc
Lee, Byung-Kwan ; Jeong, Eun-Hee ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 73~81
DOI : 10.9708/jksci/2012.17.11.073
This paper proposes an ETWAD(Encapsulation and Tunneling Wormhole Attack Detection) design based on positional information and hop count on Ad-Hoc Network. The ETWAD technique is designed for generating GAK(Group Authentication Key) to ascertain the node ID and group key within Ad-hoc Network and authenticating a member of Ad-hoc Network by appending it to RREQ and RREP. In addition, A GeoWAD algorithm detecting Encapsulation and Tunneling Wormhole Attack by using a hop count about the number of Hops within RREP message and a critical value about the distance between a source node S and a destination node D is also presented in ETWAD technique. Therefore, as this paper is estimated as the average probability of Wormhole Attack detection 91%and average FPR 4.4%, it improves the reliability and probability of Wormhole Attack Detection.
Improved User Anonymity Authentication Scheme using Smart Card for Traceability
Park, Mi-Og ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 83~91
DOI : 10.9708/jksci/2012.17.11.083
Authentication schemes preserving user anonymity have first been proposed by Das et al, and most of user anonymity schemes provide user anonymity against outside attacks in the communication channel. In this paper, according to the increasing of personal information exposure incidents by server attack, we propose a new authentication scheme that provides user anonymity against server as well as one against outside attacks in the communication channel. Furthermore, the proposed authentication scheme provides traceability that remote server should be able to trace the malicious user and it also solves the problem of increasing computational load of remote server by solving weakness of wrong password input by mistake.
A Scheme of Access Network Management in Convergence Networks
Park, Sang-Joon ; Lee, Jong-Chan ; Shin, Sung-Yun ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 93~99
DOI : 10.9708/jksci/2012.17.11.093
The B3G networks that provide the internetworking techniques of heterogeneous network systems and services are constructed to support various service requirements of mobile users. In this paper, we represent the internetworking scheme of heterogeneous networks systems such like UMTS and WLAN which can be used as access networks, and illustrate the service providing of each network system and the internetworking service based on heterogeneous access networks. UMTS and WLAN can provide each proper service to mobile users, and is included to B3G networks to increase the service usage effectiveness by using complementary service for mobile users.
Android Log Cat Systems Research for Privacy
Jang, Hae-Sook ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 101~105
DOI : 10.9708/jksci/2012.17.11.101
Various social problems through violating personal information and privacy are growing with the rapid spread of smartphones. For this reason, variety of researches and technology developments to protect personal information being made. The smartphone, contains almost all of the personal information, can cause data spill at any time. Collecting or analyzing evidence is not an easy job with forensic analyzing tool. Android forensics research has been focused on techniques to collect and analyze data from non-volatile memory but research for volatile data is very slight. Android log is the non-volatile data that can be collected by volatile storage. It is enough to use as a material to track the usage of the Android phone because all of the recent driven records from system to application are stored. In this paper, we propose a method to respond to determining the existence of personal information leakage by filtering logs without forensic analysis tools.
A Study on Generation Methodology of Crime Prediction Probability Map by using the Markov Chains and Object Interpretation Keys
Noe, Chan-Sook ; Kim, Dong-Hyun ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 107~116
DOI : 10.9708/jksci/2012.17.11.107
In this paper we propose a method that can generate the risk probability map in the form of raster shape by using Markov Chain methodology applied to the object interpretation keys and quantified risk indexes. These object interpretation keys, which are primarily characteristics that can be identified by the naked eye, are set based on the objects that comprise the spatial information of a certain urban area. Each key is divided into a cell, and then is weighted by its own risk index. These keys in turn are used to generate the unified risk probability map using various levels of crime prediction probability maps. The risk probability map may vary over time and means of applying different sets of object interpretation keys. Therefore, this method can be used to prevent crimes by providing the ways of setting up the best possible police patrol beat as well as the optimal arrangement of surveillance equipments.
Intelligent Contents Curation(ICCuration) model for Smart Device based on Scenario
Song, Sumi ; Yoon, Yong-Ik ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 117~123
DOI : 10.9708/jksci/2012.17.11.117
Smart devices are great tool to get a lot of information of user by variety sensors, application, web. The information is good clue to seize pattern of user. So, we can expect that customized content-service will be possible based on utilizing information of user. This expectation alters the type of content-service from just providing lots of contents to smart devices to recommendation contents which wanted, needed, favorite looking by user. For this customized content-service, a system model like a curator in galleries or museums is required. So, in this paper, we suggest Intelligent Contents Curation(ICCuration) model which has 3 sub modules with sensing, analysis and filtering information of user. The collected information of user are processed up to scenarios and the scenario is a clue for selecting contents which will be recommended to users. In the scenario has user's preferences and behaviors as well as devices informations as elements. So, contents can be optimized not only domain category but type of media for devices.
Construction on e-learning Platform of Smart Phone Environment
Pyo, Sung-Bae ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 125~132
DOI : 10.9708/jksci/2012.17.11.125
In recent years, a variety of learning content construction utilizing the smart phone is coming. In this paper, we investigate on overall trends and movements in e-learning performance at University. And system developed a e-learning platform consisting of smart phone portal, learning management system(LMS), and learning content management system(LCMS). Throughout the experiment, each of the components of the e-learning were implemented. LMS was implemented more efficiently using a user profile evaluation system for qualification.
A Tag-based Music Recommendation Using UniTag Ontology
Kim, Hyon Hee ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 133~140
DOI : 10.9708/jksci/2012.17.11.133
In this paper, we propose a music recommendation method considering users' tags by collaborative tagging in a social music site. Since collaborative tagging allows a user to add keywords chosen by himself to web resources, it provides users' preference about the web resources concretely. In particular, emotional tags which represent human's emotion contain users' musical preference more directly than factual tags which represent facts such as musical genre and artists. Therefore, to classify the tags into the emotional tags and the factual tags and to assign weighted values to the emotional tags, a tag ontology called UniTag is developed. After preprocessing the tags, the weighted tags are used to create user profiles, and the music recommendation algorithm is executed based on the profiles. To evaluate the proposed method, a conventional playcount-based recommendation, an unweighted tag-based recommendation, and an weighted tag-based recommendation are executed. Our experimental results show that the weighted tag-based recommendation outperforms other two approaches in terms of precision.
A Classifier for the association study between SNPs and quantitative traits
Uhmn, Saangyong ; Lee, Kwang Mo ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 141~148
DOI : 10.9708/jksci/2012.17.11.141
The advance of technologies for human genome makes it possible that the analysis of association between genetic variants and diseases and the application of the results to predict risk or susceptibility to them. Many of those studies carried out in case-control study. For quantitative traits, statistical analysis methods are applied to find single nucleotide polymorphisms (SNP) relevant to the diseases and consider them one by one. In this study, we presented methods to select informative single nucleotide polymorphisms and predict risk for quantitative traits and compared their performance. We adopted two SNP selection methods: one considering single SNP only and the other of all possible pairs of SNPs.
A Technique for Requirements Normalization and Selection based on Practical Approach
Byun, Jung-Won ; Rhew, Sung-Yul ; Kim, Jin-Su ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 149~161
DOI : 10.9708/jksci/2012.17.11.149
In the customer-centered world, which is used internet and social network services actively, it is important that their needs should be embraced into systems. Our study proposes a technique to normalize and select 1,800 customer's needs at C company. In order to normalize the requirements, we have specified requirements by considering a standard for requirements specification, have identified a set of keywords of requirements and have constructed a relation-graph of requirements. The graph presents objectives to design and build a system, and shows a degree of relative importance for each requirement. And then, we propose a techniques for requirements selection according to their contribution points, which are calculated using relative degree. We demonstrates our techniques by a case study of C company.
A Study on the Effect of Critical Factors on Consumer Satisfaction of Online Game Users
Kim, Jeong Yeol ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 163~171
DOI : 10.9708/jksci/2012.17.11.163
Many previous researches in the area of online games have been carried out about internet addiction by psychologist and about the development of related technologies by scientists. There are a few studies about the consumer satisfaction from the online business model. The purpose of this study is to examine the causal relationship between critical factors and consumer satisfaction of online game users. This study model used five themes(interactivity, enjoyment, challenge, feedback, design) in order to identify the effect of critical factors on consumer satisfaction. The result of this study identified that interactivity, enjoyment, challenge have a significant effect on consumer satisfaction of online game users. Future areas for studying on the Effect of Critical Factors on Consumer Satisfaction of Online Game Users are continuously discussed.
Design and Implementation of Shopping Mall System based on Image
Ha, Yan ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 173~177
DOI : 10.9708/jksci/2012.17.11.173
This paper proposes a service which searches goods by images and finds a shopping mall site that offers referral services. In the service, images are obtained in various types. For example, paint function, images search based on pattern and shape. For this shopping mall system, it will be modeled using UML use case and class diagram. Also it will be implemented in JSP. It supports functions that searched various types of images by pattern and shape. In addition to features which were mentioned above, we aim to implement a shopping mall system to search and buy goods by improved information searching techniques, ultimately providing a space that realizes user's painting.
Research on Impacts of Depression Among the Aged in the Long-Term Care
Kim, Kyung-Woo ; Choi, Kun-Sik ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 179~188
DOI : 10.9708/jksci/2012.17.11.179
This research study was to examine the relationships of social supports and depression among long-term care center residents. Depression of long-term care center residents is the most common mental health problem confronting older adults. It is estimated that 13 percent of people aged 65 years and over have a major depressive disorder in Korean Society of Welfare for the Aged. Social support is a key ingredient in dealing with emotional distress and a critical in helping people to cope with all kinds of extreme circumstance. As the result of this research, Perceived social support was found to be related to depression. However, network size was not a predictor of depression, and high health status is accounted for a lower portion of the variance in depression., the poor health status was one of the most powerful predictors of depression, From results of this research study, for social workers who are employed institutional-based agencies.
A Swap Optimization for Dynamic Economic Dispatch Problem with Non-smooth Function
Lee, Sang-Un ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 189~196
DOI : 10.9708/jksci/2012.17.11.189
This paper proposes Swap algorithm for solving Dynamic Economic Dispatch (DED) problem. The proposed algorithm initially balances total load demand
with total generation
by deactivating a generator with the highest unit generation cost
. It then swaps generation level
=1.0, 0.1, 0.01, 0.001) for
. This new algorithm is applied and tested to the experimental data of Dynamic Economic Dispatch problem, demonstrating a considerable reduction in the prevalent heuristic algorithm's optimal generation cost and in the maximization of economic profit.
A Study of Multidisciplinary Customized Curriculum Model for 21
Century Learning Ability Extension
Jeong, Jae-Hoon ; Kim, Sun-Hoi ; Nam, Dong-Soo ; Lee, Tae-Wuk ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 197~206
DOI : 10.9708/jksci/2012.17.11.197
The objectives of this study are to investigate core learning ability necessary for the 21st century and to develop core human resources required for social and national development in the future. The '21st Century Learning Ability Project' is to approach the existing knowledge and learning multidisciplinary and interactively based on the learning ability of each learner and individually and socially valuable themes. Even in Korea, a variety of intersubject integrative educational curriculum was attempted to cultivate learning ability. However, there are not enough teachers who can teach the differences between the content and characteristics for each subject by fully understanding them. Thus, it is difficult to apply them easily to the field of education. Thus, this study develops the multidisciplinary customized educational curriculum in order to develop the learning ability necessary for the 21st century, analyzes the reality of the educational curriculum integrating the academic knowledge in order to support this effectively. As a result, this study offers the interdisciplinary customized integrated model applicable to elementary and middle schools.
An Instruction-learning Model through the Cyber Home Learning System 2.0 for Elementary Social Studies Underachievers
Lee, MyungGeun ; Choi, Yong-Hun ; Lee, Jung Min ;
Journal of the Korea Society of Computer and Information, volume 17, issue 11, 2012, Pages 207~214
DOI : 10.9708/jksci/2012.17.11.207
This study tried to propose an optimal instruction-learning model for the cyber home learning system2.0 through grounded theory. In-depth interviews were conducted to investigate causes of underachievement and the causes were categorized according to common concepts. A total of 25 causes of underachievement could be grouped into four categories and eight sub-categories, as a result. Underachievers, then, participated in the lessons utilizing the cyber home learning system2.0 and their cognitive change process about learning was analyzed from reflectional journals and in-depth interviews with a teacher. It was found that underachievers were participated in learning by passing through 5 processes; adaptation to the cyber home learning system2.0, basic knowledge learning, task implementing, rounds of group discussions, feedbacks and evaluation. Based on analysis of these five processes, this study proposed a conditional matrix for the cyber home learning system 2.0 as the most personalized model for underachieving students.