Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Computer and Information
Journal Basic Information
Journal DOI :
Korean Society of Computer Information
Editor in Chief :
Volume & Issues
Volume 17, Issue 12 - Dec 2012
Volume 17, Issue 11 - Nov 2012
Volume 17, Issue 10 - Oct 2012
Volume 17, Issue 9 - Sep 2012
Volume 17, Issue 8 - Aug 2012
Volume 17, Issue 7 - Jul 2012
Volume 17, Issue 6 - Jun 2012
Volume 17, Issue 5 - May 2012
Volume 17, Issue 4 - Apr 2012
Volume 17, Issue 3 - Mar 2012
Volume 17, Issue 2 - Feb 2012
Volume 17, Issue 1 - Jan 2012
Selecting the target year
A Study on the Estimation of Energy Expenditure and falls measurement system for the elderly
Lim, Chae-Young ; Jeon, Ki-Man ; Ko, Kwang-Cheol ; Koh, Kwang-Nak ; Kim, Kyung-Ho ;
Journal of the Korea Society of Computer and Information, volume 17, issue 4, 2012, Pages 1~9
DOI : 10.9708/jksci.2012.17.4.001
As we are turnning into the aged society, accidents by falling down are increasing in the aged people`s group. In this paper, we design the system with the 3-Axis acceleration sensor which is composed by a single chip. The body activity signal is measured with the signal detector and RF communicator in this proposed system and the and falling by the entering signal pattern analysis with 3-Axis acceleration sensor. For the RF communication, we are using nRF24L01p and 8bits ATmega uC for the processor. The error of energy expenditure estimation between motor driven treadmill and proposed a body activity module was 7.8% respectively. Human activities and falling is monitored according to analyze and judge the critical value of the Signal Vector. as falled down if they don`t turn off the alarm after specific period and the aged person`s after falling down activities are their position and more.
The Design and Implementation of Network Intrusion Detection System Hardware on FPGA
Kim, Taek-Hun ; Yun, Sang-Kyun ;
Journal of the Korea Society of Computer and Information, volume 17, issue 4, 2012, Pages 11~18
DOI : 10.9708/jksci.2012.17.4.011
Deep packet inspection which perform pattern matching to search for malicious patterns in the packet is most computationally intensive task. Hardware-based pattern matching is required for real-time packet inspection in high-speed network. In this paper, we have designed and implemented network intrusion detection hardware as a Microblaze-based SoC using Virtex-6 FPGA, which capture the network input packet, perform hardware-based pattern matching for patterns in the Snort rule, and provide the matching result to the software. We verify the operation of the implemented system using traffic generator and real network traffic. The implemented hardware can be used in network intrusion detection system operated in wire-speed.
A Study on Application of STEAM education with Robot in Elementary School
Park, Jung-Ho ;
Journal of the Korea Society of Computer and Information, volume 17, issue 4, 2012, Pages 19~29
DOI : 10.9708/jksci.2012.17.4.019
According to the result of PISA and TIMSS, it was reported that interest for Math and Science was far lower compared to high achievement of Them. The purpose of this study is to investigate effects of robot based STEAM education on elementary school students` Math learning behavior and Science motivation. Robot based STEAM education integrated science, mathematics and art with a theme of `Energy` was practiced for test group and For control group, those three subjects were taught separately in order to achieve this purpose. Curriculum of fourth grade second semester`s science, mathematics and art was analysed to teach a robot based STEAM class and STEAM class Model with the theme `Energy was designed and applied to elementary students. In science class, heat transfer experiment was conducted with robots and the result was related to drawing polygonal lines in mathematics. In art class, robot components were used to describe the heat energy in shapes and colors. The research shows that students` Math learning behavior and Science motivation were improved more with robot based STEAM education than with traditional lessons(p<.05). It proves that robot based STEAM class can be effective for improving interest in elementary Math and Science.
A Study on Comparison of Road Surface Images to Provide Information on Specific Road Conditions
Jang, Eun-Gyeom ;
Journal of the Korea Society of Computer and Information, volume 17, issue 4, 2012, Pages 31~39
DOI : 10.9708/jksci.2012.17.4.031
On rainy days, water films form on wet road surfaces and reduce the braking force of vehicles, which often ends up in accidents. For safe driving, the road information signage provides information on road and weather conditions warning drivers of wet road conditions. Still, current information on road conditions is neither localized nor detailed but universal. The present study used the images on CCTVs installed on roads to compare the images of road surfaces in an attempt to suggest a mechanism determining factors that hamper safe driving based on the images. In the image comparison, a normal road image taken on a sunny day is used as an original image, against which road conditions occurring on rainy days are categorized and determined on a case-by-case basis to provide drivers with early warning for the sake of safe driving.
Detection of Gradual Scene Boundaries with Linear and Circular Moving Borders
Jang, Seok-Woo ; Cho, Sung-Youn ;
Journal of the Korea Society of Computer and Information, volume 17, issue 4, 2012, Pages 41~49
DOI : 10.9708/jksci.2012.17.4.041
This paper proposes a detection method of wipes including horizontal wipes with linear moving borders, such as horizontal or vertical wipes, Barn Doors, and Iris Rounds with circular moving borders. The suggested method first obtains a difference image between two adjacent frames, and extracts lines and circles by applying Hough transformation to the extracted difference image. Then, we detect wipe transitions by employing an evaluation function that analyzes the number of moving trajectories of lines or circles, their moving direction and magnitude. To evaluate the performance of the suggested algorithm, experimental results show that the proposed method can effectively detect wipe transitions with linear and circular moving borders rather than some existing methods.
The Enhancement of the Boundary-Based Depth Image
Ahn, Yang-Keun ; Hong, Ji-Man ;
Journal of the Korea Society of Computer and Information, volume 17, issue 4, 2012, Pages 51~58
DOI : 10.9708/jksci.2012.17.4.051
Recently, 3D technology based on depth image is widely used in various fields including 3D space recognition, image acquisition, interaction, and games. Depth camera is used in order to produce depth image, various types of effort are made to improve quality of the depth image. In this paper, we suggests using area-based Canny edge detector to improve depth image in applying 3D technology based on depth camera. The suggested method provides improved depth image with pre-processing and post-processing by fixing image quality deterioration, which may take place in acquiring depth image in a limited environment. For objective image quality evaluation, we have confirmed that the image is improved by 0.42dB at maximum, by applying and comparing improved depth image to virtual view reference software. In addition, with DSCQS(Double Stimulus Continuous Quality Scale) evaluation method, we are reassured of the effectiveness of improved depth image through objective evaluation of subjective quality.
Dried pepper sorting using independent component analysis on RGB images
Kwon, Ki-Hyeon ; Lim, Jung-Dae ;
Journal of the Korea Society of Computer and Information, volume 17, issue 4, 2012, Pages 59~65
DOI : 10.9708/jksci.2012.17.4.059
Hot pepper can be easily faded or discolored in drying process, so we need to use the sorting technique to improve the quality for dried hot pepper. Independent Component Analysis (ICA) is one of the most widely used methods for blind source separation. In this paper we use this technique to get a concentration image of the most important component which plays a role in the dried pepper. This concentration image is different from the binary image and it reflects the characteristics of major components, so that we know the distribution and quality of the component and how to sort the dried pepper. Also, the size of the concentration image can tell the relation with capsaicinoids which make hot taste. We propose a sorting method of the dried hot pepper that is faded or discolored and lacked a major component likes capsaicin in drying process using ICA concentration image.
Dynamic Modeling of Eigenbackground for Object Tracking
Kim, Sung-Young ;
Journal of the Korea Society of Computer and Information, volume 17, issue 4, 2012, Pages 67~74
DOI : 10.9708/jksci.2012.17.4.067
In this paper, we propose an efficient dynamic background modelling method by using eigenbackground to extract moving objects from video stream. Even if a background model has been created, the model has to be updated to adapt to change due to several reasons such as weather or lighting. In this paper, we update a background model based on R-SVD method. At this time we define a change ratio of images and update the model dynamically according this value. Also eigenbackground need to be modelled by using sufficient training images for accurate models but we reorganize input images to reduce the number of images for training models. Through simulation, we show that the proposed method improves the performance against traditional eigenbackground method without background updating and a previous method.
The Motion Artifact Reduction using Periodic Moving Average Filter
Lee, Jun-Yeon ;
Journal of the Korea Society of Computer and Information, volume 17, issue 4, 2012, Pages 75~82
DOI : 10.9708/jksci.2012.17.4.075
The Photoplethysmogram is a similar periodic signal that synchronized to a heartbeat. In this paper, we propose a periodic moving average filter that use similarity of Photoplethysmogram. This filtering method has the average value of each samples through separating the cycle of PPG signal. If there are some motion artifacts in continuous PPG signal, disjoin the signal based on cycle. And then, we made these signals to have same cycle by coordinating the number of sample. After arrange these cycles in 2 dimension, we put the average value of each samples from starting till now. So, we can eliminate the motion artifacts without damaged PPG signal.
A Comprehensive Performance Evaluation in Collaborative Filtering
Yu, Seok-Jong ;
Journal of the Korea Society of Computer and Information, volume 17, issue 4, 2012, Pages 83~90
DOI : 10.9708/jksci.2012.17.4.083
In e-commerce systems that deal with a large number of items, the function of personalized recommendation is essential. Collaborative filtering that is a successful recommendation algorithm, suffers from the sparsity, cold-start, and scalability restrictions. Additionally, this work raises a new flaw of the algorithm, inconsistent performance of recommendation. This is also not measurable by the current MAE-based evaluation that does not consider the deviation of prediction error, and furthermore is performed independently of precision and recall measurement. To evaluate the collaborative filtering comprehensively, this work proposes an extended evaluation model that includes the current criteria such as MAE, Precision, Recall, deviation, and applies it to cluster-based combined collaborative filtering.
Yi et al.`s Group Key Exchange Protocol : A Security Vulnerability and its Remediation
Lee, Young-Sook ; Kim, Jee-Yeon ; Won, Dong-Ho ;
Journal of the Korea Society of Computer and Information, volume 17, issue 4, 2012, Pages 91~98
DOI : 10.9708/jksci.2012.17.4.091
A group key exchange (GKE) protocol is designed to allow a group of parties communicating over a public network to establish a common secret key. As group-oriented applications gain popularity over the Internet, a number of GKE protocols have been suggested to provide those applications with a secure multicast channel. Among the many protocols is Yi et al.`s password-based GKE protocol in which each participant is assumed to hold their individual password registered with a trusted server. A fundamental requirement for password-based key exchange is security against off-line dictionary attacks. However, Yi et al.`s protocol fails to meet the requirement. In this paper, we report this security problem with Yi et al.`s protocol and show how to solve it.
Group Mobility Control Mechanism for Micro Unmanned Aerial Vehicle
Nam, Su-Hyun ; Choi, Myung-Whan ; Choi, Hyo-Hyun ;
Journal of the Korea Society of Computer and Information, volume 17, issue 4, 2012, Pages 99~107
DOI : 10.9708/jksci.2012.17.4.099
We propose control mechanism of UAV(Unmanned Aerial Vehicle) group for making the communication network to the base station after the target is found. We assume UAVs can communicate to each other by wireless LAN without existing communication infrastructure. UAVs started to fly in linear formation, after finding target, UAVs move to the base station to send the information about the target. At least one UAV stays the position that the target is found. This paper explains the mechanism supporting reliable connectivity during UAV group`s flying. We verify the proposed scheme and evaluate the performance through NS-2 simulation. The proposed scheme can be applied to the disaster area and war zone, which the existing communication infrastructure cannot be worked.
A Study on the User Context Awareness based on the Smart Phone
Kim, Kee-Baek ; Jang, Won-Seok ; Choi, Jae-Wan ; Lim, Chul-Su ; Choi, Jong-Ho ;
Journal of the Korea Society of Computer and Information, volume 17, issue 4, 2012, Pages 109~119
DOI : 10.9708/jksci.2012.17.4.109
As it is developing and growing up the mobile telecommunication, commercial mobile, and the application on it, the smart phone is attracting public attention techniques, hereafter. In this paper, we can make the context-awareness platform to supply users with the interface for their appropriate contexts using the smart phone. Therefore, we use the sensors in the smart phone, and the values from them are analyzed. As a result, we can estimate the user`s contexts, such as the sitting and standing, movement, the lights, positions, locations, etc. In addition, we happen the suitable events from them for users. Therefore, we can provide the perspective interfaces for them. In addition, to prove the more efficiency of the proposed platform, we implemented the shooting game, and could know that the performance is the more advanced than the others. The proposed algorithm can be used for the mobile environments, which high efficiency is required such as the game, or the implementation of mobile applications which are more efficient to the user interfaces, etc.
A Framework for Biometric Security based on OTP in Mobile Devices
Han, Seung-Jin ;
Journal of the Korea Society of Computer and Information, volume 17, issue 4, 2012, Pages 121~127
DOI : 10.9708/jksci.2012.17.4.121
Biometric technology has been proposed as a new means to replace conventional PIN or password because it is hard to be lost and has the low possibility of illegal use. However, unlike a PIN or password, there is no way to modify the exposure if it is exposed and used illegally. To solve the problems, we propose to apply OTP using biometric information to mobile devices for more secure and adaptable authentication. In this paper, we propose a secure framework for delivering biometric information as mobile OTP to the server (TTP) and compared this paper with existed methods about security and performance.
Performance Improvement of Queen-bee Genetic Algorithms through Multiple Queen-bee Evolution
Jung, Sung-Hoon ;
Journal of the Korea Society of Computer and Information, volume 17, issue 4, 2012, Pages 129~137
DOI : 10.9708/jksci.2012.17.4.129
The queen-bee genetic algorithm that we made by mimicking of the reproduction of queen-bee has considerably improved the performances of genetic algorithm. However, since we used only one queen-bee in the queen-bee genetic algorithm, a problem that individuals of genetic algorithm were driven to one place where the queen-bee existed occurred. This made the performances of the queen-bee genetic algorithm degrade. In order to solve this problem, we introduce a multiple queen-bee evolution method by employing another queen-bee whose fitness is the most significantly increased than its parents as well as the original queen-bee that is the best individual in a generation. This multiple queen-bee evolution makes the probability of falling into local optimum areas decrease and allows the individuals to easily get out of the local optimum areas even if the individuals fall into a local optimum area. This results in increasing the performances of the genetic algorithm. Experimental results with four function optimization problems showed that the performances of the proposed method were better than those of the existing method in the most cases.
Quicksort Using Range Pivot
Lee, Sang-Un ;
Journal of the Korea Society of Computer and Information, volume 17, issue 4, 2012, Pages 139~145
DOI : 10.9708/jksci.2012.17.4.139
Generally, Quicksort selects the pivot from leftmost, rightmost, middle, or random location in the array. This paper suggests Quicksort using middle range pivot
and continually divides into 2. This method searches the minimum value
and maximum value
in the length n of list
. Then compute the initial pivot key $P_0
The Impact of Cumulative Effcet of Cash Donation on Business Performance
Kim, Hyoung-Gu ;
Journal of the Korea Society of Computer and Information, volume 17, issue 4, 2012, Pages 147~153
DOI : 10.9708/jksci.2012.17.4.147
This paper has investigated the impact of corporate donation expenditure which has recently drawn great attention in Korean society on businessl performance and conducted an empirical analysis on the causal relations. In addition, concurrent effect has been analyzed using cross-sectional data between two variables (corporate donation expenditure and business performance) while sequential effect has been examined using panel data. The result of this study can be summarized as follows: First, corporate donation expenditure had a positive impact on ROA and ROS. However, PER and ROE had no impact on corporate donation expenditure Second, cumulative effcet of corporate cash donation would have a bigger impact on short-term business performance than long-term performance. In the future, The results of this study is expect through cash donations in the social contribution to be more aggressive in carrying out social responsibilities.
A Study on the Effect of Core Competencies and Value Innovation Strategies on Business Performance in the Manufacturing Industries
Rho, Hyung-Jin ;
Journal of the Korea Society of Computer and Information, volume 17, issue 4, 2012, Pages 155~161
DOI : 10.9708/jksci.2012.17.4.155
The purpose of this paper is to analyze the structural relationship of the impact on the business performance when it pursues resource based production strategies, nurtures core competency, develops core product lines and innovate its business models as part of a strategy of value innovation and to validate how the nurturing core competency can have an impact on the execution of the value innovation strategies. This paper confirms that there is a structural relationship, which is logically and conceptually valid, among the core competence, value innovation strategies and business performance of manufacturing companies. In order to maximize the business performance which is the eventual objective of a company, it must strategically nurture its core competence, which will be a main driver of the future competitiveness and diversify its management based on the value innovation strategies.
A study of improved ways of the predicted probability to criminal types
Chung, Young-Suk ; Kim, Jin-Mook ; Park, Koo-Rack ;
Journal of the Korea Society of Computer and Information, volume 17, issue 4, 2012, Pages 163~172
DOI : 10.9708/jksci.2012.17.4.163
Modern society, various great strength crimes are producing. After all crimes happen, it is most important that prevent crime beforehand than that cope. So, many research studied to prevent various crime. However, existing method of studies are to analyze and prevent by society and psychological factors. Therefore we wishes to achieve research to forecast crime by time using Markov chain method. We embody modelling for crime occurrence estimate by crime type time using crime occurrence number of item data that is collected about 5 great strength offender strength, murder, rape, moderation, violence. And examined propriety of crime occurrence estimate modelling by time that propose in treatise that compare crime occurrence type crime occurrence estimate price and actuality occurrence value. Our proposed crime occurrence estimate techniques studied to apply maximum value by critcal value about great strength crime such as strength, murder, rape etc. actually, and heighten crime occurrence estimate probability by using way to apply mean value about remainder crime in this paper. So, we wish to more study about wide crime case and as the crime occurrence estimate rate and actuality value by time are different in crime type hereafter applied examples investigating.
A Quantitative Method for Quality Improvement of Information System Audit Evaluation
Lee, Ki-Young ; Kim, Young-Ho ; Han, Ki-Joon ;
Journal of the Korea Society of Computer and Information, volume 17, issue 4, 2012, Pages 173~184
DOI : 10.9708/jksci.2012.17.4.173
As a result of the compulsory of information system audit and a rise in audit demand, the quality improvement of information system audit is being emphasized. However, since the current information system audit heavily depends on the auditor`s experience, skill, and subjective judgments, it incurs distrust in the objectivity and reliability of audit results from audit interest person. Furthermore, so far research activities aimed at securing the objectivity and reliability of audits have not been adequately carried out. Therefore, this paper presents a quantitative method for information system audit evaluation in order to contribute to the quality improvement of overall information system audit through securing compliance, objectivity, and reliability of information system audit. The quantitative method is largely composed of two sectors, such as evaluation areas and items, scores calculation for evaluation items, and can generally apply the information system audit standard to information system audit evaluation.