Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Computer and Information
Journal Basic Information
Journal DOI :
Korean Society of Computer Information
Editor in Chief :
Volume & Issues
Volume 17, Issue 12 - Dec 2012
Volume 17, Issue 11 - Nov 2012
Volume 17, Issue 10 - Oct 2012
Volume 17, Issue 9 - Sep 2012
Volume 17, Issue 8 - Aug 2012
Volume 17, Issue 7 - Jul 2012
Volume 17, Issue 6 - Jun 2012
Volume 17, Issue 5 - May 2012
Volume 17, Issue 4 - Apr 2012
Volume 17, Issue 3 - Mar 2012
Volume 17, Issue 2 - Feb 2012
Volume 17, Issue 1 - Jan 2012
Selecting the target year
Performance Evaluation of WAN Storage Migration Scheme for Cloud Computing Environment
Chang, Jun-Hyub ; Lee, Won-Joo ; Jeon, Chang-Ho ;
Journal of the Korea Society of Computer and Information, volume 17, issue 5, 2012, Pages 1~7
DOI : 10.9708/jksci.2012.17.5.001
In this paper, we design and implement the simulator for WAN storage replication model performance evaluation in cloud computing environment. Each cloud of simulator is composed of virtual machine emulator and storage emulator. The virtual machine emulator is composed of read/write ratio module, the read/write sequence combination module, and the read/write request module. The storage emulator is composed of storage management module, data transfer module, read/write operations module, and overhead processing module. Using the simulator, we evaluate performance of migration scheme, pre-copy and the post-copy, considering about read/write ratio, network delay, and network bandwidth. Through simulation, we have confirmed that the average migration time of pre-copy was decreased proportional to the read operation. However, average migration time of post-copy was on the increase. Also, the average migration time of post-copy was increased proportional to the network delay. However, average migration time of pre-copy was shown uniformly. Therefore, we show that pre-copy model more effective to reduce the average migration time than the post-copy model. The average migration time of pre-copy and post-copy were not affected by the change of network bandwidth. Therefore, these results show that selects the storage replication model to be, the network bandwidth know not being the important element.
Analysis of the CPU/GPU Temperature and Energy Efficiency depending on Executed Applications
Choi, Hong-Jun ; Kang, Seung-Gu ; Kim, Jong-Myon ; Kim, Cheol-Hong ;
Journal of the Korea Society of Computer and Information, volume 17, issue 5, 2012, Pages 9~19
DOI : 10.9708/jksci.2012.17.5.009
As the clock frequency increases, CPU performance improves continuously. However, power and thermal problems in the CPU become more serious as the clock frequency increases. For this reason, utilizing the GPU to reduce the workload of the CPU becomes one of the most popular methods in recent high-performance computer systems. The GPU is a specialized processor originally designed for graphics processing. Recently, the technologies such as CUDA which utilize the GPU resources more easily become popular, leading to the improved performance of the computer system by utilizing the CPU and GPU simultaneously in executing various kinds of applications. In this work, we analyze the temperature and the energy efficiency of the computer system where the CPU and the GPU are utilized simultaneously, to figure out the possible problems in upcoming high-performance computer systems. According to our experimentation results, the temperature of both CPU and GPU increase when the application is executed on the GPU. When the application is executed on the CPU, CPU temperature increases whereas GPU temperature remains unchanged. The computer system shows better energy efficiency by utilizing the GPU compared to the CPU, because the throughput of the GPU is much higher than that of the CPU. However, the temperature of the system tends to be increased more easily when the application is executed on the GPU, because the GPU consumes more power than the CPU.
Detecting Abnormal Patterns of Network Traffic by Analyzing Linear Patterns and Intensity Features
Jang, Seok-Woo ; Kim, Gye-Young ; Na, Hyeon-Suk ;
Journal of the Korea Society of Computer and Information, volume 17, issue 5, 2012, Pages 21~28
DOI : 10.9708/jksci.2012.17.5.021
Recently, the necessity for good techniques of detecting network traffic attack has increased. In this paper, we suggest a new method of detecting abnormal patterns of network traffic data by visualizing their IP and port information into two dimensional images. The proposed approach first generates four 2D images from IP data of transmitters and receivers, and makes one 2D image from port data. Analyzing those images, it then extracts their major features such as linear patterns or high intensity values, and determines if traffic data contain DDoS or DoS Attacks. To comparatively evaluate the performance of the proposed algorithm, we show that our abnormal pattern detection method outperforms the existing algorithm in terms of accuracy and speed.
Extraction of Muscle Areas form Ultrasonographic Images using Subcutaneous Fat Areas and Thoracic Vertebra
Kim, Kwang-Baek ;
Journal of the Korea Society of Computer and Information, volume 17, issue 5, 2012, Pages 29~32
DOI : 10.9708/jksci.2012.17.5.029
In this paper, we propose a novel method to extract muscle area from lumbar ultrasonographic image. The muscle area resided in lumbar area can be defined as the area between thoracic vertebra and subcutaneous fat area. A modified 4-directional contour tracing algorithm is designed to detect the boundaries and candidate areas are extracted and verified by the morphological characteristics of lumbar area. The experiment using 392 lumbar images verifies that the proposed method is sufficiently effective by showing over 94% accuracy in extraction.
Anomaly Detection Scheme of Web-based attacks by applying HMM to HTTP Outbound Traffic
Choi, Byung-Ha ; Choi, Sung-Kyo ; Cho, Kyung-San ;
Journal of the Korea Society of Computer and Information, volume 17, issue 5, 2012, Pages 33~40
DOI : 10.9708/jksci.2012.17.5.033
Efficient Cache Management Scheme with Maintaining Strong Data Consistency in a VANET
Moon, Sung-Hoon ; Park, Kwang-Jin ;
Journal of the Korea Society of Computer and Information, volume 17, issue 5, 2012, Pages 41~48
DOI : 10.9708/jksci.2012.17.5.041
A Vehicular Ad-hoc Network (VANET) is a vehicular specific type of a mobile ad-hoc network, to provide temporary communications among nearby vehicles. Mobile node of VANET consumes energy and resource with participating in the member of network. In a VANET, data replication and cooperative caching have been used as promising solutions to improve system performance. Existing cooperative caching scheme in a VANET mostly focuses on weak consistency is not always satisfactory. In this paper, we propose an efficient cache management scheme to maintain strong data consistency in a VANET. We make an adaptive scheduling scheme to broadcast Invalidation Report (IR) in order to reduce query delay and communication overhead to maintain strong data consistency. The simulation result shows that our proposed method has a strength in terms of query delay and communication overhead.
An Improvement of the P2P Streaming Network Topology Algorithm Using Link Information
Lee, Sang-Hoon ; Han, Chi-Geun ;
Journal of the Korea Society of Computer and Information, volume 17, issue 5, 2012, Pages 49~57
DOI : 10.9708/jksci.2012.17.5.049
In P2P streaming management, peer's churning and finding efficient topology architecture optimization algorithm that reduces streaming delay is important. This paper studies a topology optimization algorithm based on the P2P streaming using peer's link information. The proposed algorithm is based on the estimation of peer's upload bandwidth using peer's link information on mesh-network. The existing algorithm that uses the information of connected links is efficient to reduce message overload in the point of resource management. But it has a risk of making unreliable topology not considering upload bandwidth. And when some network error occurs in a server-closer-peer, it may make the topology worse. In this paper we propose an algorithm that makes up for the weak point of the existing algorithm. We compare the existing algorithm with the proposed algorithm using test data and analyze each simulation result.
Hardware Fault Attack Resistant RSA-CRT with Parallel Support
Eun, Ha-Soo ; Oh, Hee-Kuck ; Kim, Sang-Jin ;
Journal of the Korea Society of Computer and Information, volume 17, issue 5, 2012, Pages 59~70
DOI : 10.9708/jksci.2012.17.5.059
RSA-CRT is one of the commonly used techniques to speedup RSA operation. Since RSA-CRT performs its operations based on the modulus of two private primes, it is about four times faster than RSA. In RSA, the two primes are normally thrown away after generating the public key pair. However, in RSA-CRT, the two primes are directly used in RSA operations. This led to hardware fault attacks which can be used to factor the public modulus. The most common way to counter these attacks is based on error propagation. In these schemes, all the outputs of RSA are affected by the infected error which makes it difficult for an adversary to use the output to factor the public modulus. However, the error propagation has sequentialized the RSA operation. Moreover, these schemes have been found to be still vulnerable to hardware fault attacks. In this paper, we propose two new RSA-CRT schemes which are both resistant to hardware fault attack and support parallel execution: one uses common modulus and the other one perform operations in each prime modulus. Both proposed schemes takes about a time equal to two exponentiations to complete the RSA operation if parallel execution is fully used and can protect the two private primes from hardware fault attacks.
A Study on Land Warrior System Design Based on IEEE 802.15.4
Heo, Jun ; Lee, Sang-Jin ; Choi, Yong-Hoon ; Choi, Hyo-Hyun ;
Journal of the Korea Society of Computer and Information, volume 17, issue 5, 2012, Pages 71~80
DOI : 10.9708/jksci.2012.17.5.071
In this paper, applications that require low-speed data rate on personal area network to operate the Land Warrior system is proposed. These applications can refer to WSN(wireless sensor network) technology. However, this technology is not suitable to support various data transmission rate. A suitable CSMA/CA algorithm for Land Warrior System in order to solve these existing system problems is proposed. The proposed algorithm is designed to be variable CSMA/CA algorithm parameter, depending on data rate. For the evaluation of Land Warrior system model and CSMA/CA algorithm, we used Castalia. As a result of the simulation, it is found that the proposed system model can not only relieve loads of data processing, but also probability of collision was decreased.
The Development of Users' Interesting Points Analyses Method and POI Recommendation System for Indoor Location Based Services
Kim, Beoum-Su ; Lee, Yeon ; Kim, Gyeong-Bae ; Bae, Hae-Young ;
Journal of the Korea Society of Computer and Information, volume 17, issue 5, 2012, Pages 81~91
DOI : 10.9708/jksci.2012.17.5.081
Recently, as location-determination of indoor users is available with the development of variety of localization techniques for indoor location-based service, diverse indoor location based services are proposed. Accordingly, it is necessary to develop individualized POI recommendation service for recommending most interested points of large-scale commercial spaces such as shopping malls and departments. For POI recommendation, it is necessary to study the method for exploring location which users are interested in location with considering user's mobility in large-scale commercial spaces. In this paper, we proposed POI recommendation system with the definition of users' as 'Stay point' in order to consider users' various interest locations. By using the proposed algorithm, we analysis users' Stay points, then mining the users' visiting pattern to finished the proposed. POI Recommendation System. The proposed system decreased data more dramatically than that of using user's entire mobility data and usage of memory.
Citizen Participation-Based Smart Phone Application's Potential Development throughout Open API Mashup
Ki, Jung-Hoon ;
Journal of the Korea Society of Computer and Information, volume 17, issue 5, 2012, Pages 93~101
DOI : 10.9708/jksci.2012.17.5.093
In the field of urban planning and disaster prevention, various geographical information systems (GIS) and design softwares have been in use. Recently urban planners and disaster managing officials face new challenges, as three dimensional GIS, web environment, and smart phone app are rapidly developed. Technical progress in open API and mashup opens a possibility of making the citizen participation-based smart phone applications in the field of urban planning and disaster prevention. Our suggested smart phone applications will have technical, economic, and administrative impacts on the society in general; and play an effective role in developing U-City, U-health, and disaster prevention.
An Empirical Study on EA Governance and EA Competency of Public Agencies
Kim, Gi-Baek ; Lee, Cheol-Gyu ; Yoo, Wang-Jin ; Moon, Jong-Beom ;
Journal of the Korea Society of Computer and Information, volume 17, issue 5, 2012, Pages 103~114
DOI : 10.9708/jksci.2012.17.5.103
EA, efficient and hierarchical Information Resource Management(IRM) tool of Korean public agencie is one of the core of carrying forward the e-Government initiative. The objective of the paper is to study empirically whether using EA Governance for Controlling EA is related with their EA competency or not. the 190 person in charge of Information System service division are included for analysis. The various hypotheses established are validated by structural equation in SPSS and AMOS 18.0. The results shows that EA management and EA utilization of EA competency level was affected by EA Function, EA Organization and EA Human Resource of exogenous variable EA Governance but EA implementation level was not affected by EA Organization and EA Human Resource. also we investigated that the EA management level of endogenous variable EA competency was affected positively by EA implementation level and the EA utilization level of was affected positively by EA management level by stages.
A Study on Effective Requirement Traceability Management Method in Implementation Project of Information System
Jeong, Cheon-Su ; Kim, Seung-Ryeol ;
Journal of the Korea Society of Computer and Information, volume 17, issue 5, 2012, Pages 115~126
DOI : 10.9708/jksci.2012.17.5.115
It is very important to trace whether all the requirements has been reflected in the developed system. However, most existing researches apply Requirement Traceability Matrix(RTM) to the whole SDLC according to the development methodology. RTM has no practical value because it has not only too many pursuit items but also its tracking method is very complicated and the practical management in developing the information system is not accomplished nearly. Therefore, in this study, we proposed an enhanced RTM which was composed of only necessary items and allow us to manage the applied area effectively from Request for Proposal(RFP) or the proposal stage to SDLC stage then confirmed the effect through six actual applicable cases of information system development project of "K" company.
The Influence of Parenting Attitudes on Adolescents' School Adjustment -Focused on the Deduction of the Political Implication-
Ki, Sung-Jin ;
Journal of the Korea Society of Computer and Information, volume 17, issue 5, 2012, Pages 127~136
DOI : 10.9708/jksci.2012.17.5.127
This study empirically analyzed which influence the moderating effect of individual characteristics has on adolescents' perceived parenting attitude and school life adjustment. The results showed that parenting attitude positively affected social adjustment; particularly, affection and acceptance had significant effects on academic and social adjustment. As for influence of parenting attitude upon school life adjustment, women showed more significant result than men in schoolwork adjustment, social adjustment, and environmental/general adjustment when attachment factor is high. Also, it could be known that the birth placing moderates the influence upon social adjustment by democratic autonomous parenting attitude and attachment acceptance-based parenting attitude in the parenting attitude.
The Development of RFID Utility Statistical Analysis Tool (RUSAT) in Comparison to Barcode for Logistics Activities
Ha, Heon-Cheol ; Park, Heung-Sun ; Kim, Hyun-Soo ; Choi, Yong-Jung ;
Journal of the Korea Society of Computer and Information, volume 17, issue 5, 2012, Pages 137~146
DOI : 10.9708/jksci.2012.17.5.137
In SCM(Supply Chain Management), a management paradigm where the customer satisfaction is to be achieved by minimizing the cost, reducing the uncertainty, and obtaining the overall optimization. As it performs the integrated operation of the paths of information, assets, and knowledge from the raw material providers to the retailers, the adoption of RFID(Radio Frequency Identification) in SCM could be expected to magnify the effectiveness of the system. However, there is a huge risk by deciding whether or not RFID system is adopted without the objective analysis under the uncertain circumstances. This research paper presents the statistical analysis methodologies for the comparison of RFID with Barcode on the aspect of utility and the statistical analysis tool, RUSAT, which was programmed for nonstatisticians' convenience. Assuming a pharmaceutical industry, this paper illustrates how the data were entered and analyzed in RUSAT. The results of this research are expected to be used not only for the pharmaceutical related company but also for the manufacturer, the whole-saler, and the retailer in the other logistic industries.
Strategy for Introducing American Police Education through Information Analysis
Park, Jong-Ryeol ; Noe, Sang-Ouk ;
Journal of the Korea Society of Computer and Information, volume 17, issue 5, 2012, Pages 147~155
DOI : 10.9708/jksci.2012.17.5.147
Police education has shown a pronounced improvement during three eras in American police history. as the Reform Era arrived, the police academy was invented. With it, citizen expectations for the police expanded, and the level of competence exhibited by police grew. After the 1960s came the invention of the FTO and the creation of ongoing, in-service training requirements. in recent years, academics in many places-but by no means everywhere-are taking a more collegial approach to training, aimed especially at COP- style policing and the achievement of genuine professionalism. The Korean police training system is less efficient in education methodology, more inappropriate in the switch system of school education and practice, and poorer in educational environment, among others. Based on my findings, this paper recommends several improvement tips. First, legal stipulations on police training should be integrated and detailed. Second, active participation by preliminary police officers should be emphasized in the class of police training. Third, contents and hours for practice should be emphasized to maximize effects of the "switch system." Fourth, the educational environment of the Academy should be improved.
Development of an OLAP Database System for SME Growth Support -Centering around the Small Business Policy Funds Support Project-
Hwang, Man-Mo ; Choi, In-Soo ;
Journal of the Korea Society of Computer and Information, volume 17, issue 5, 2012, Pages 157~167
DOI : 10.9708/jksci.2012.17.5.157
The purpose of this paper is to develop an OLAP (online analytical processing) database system that supports the SMBA (Small and medium Business Administration) policy funding. A heterogeneous dimension schema will be central in staged support of policy funds. In this paper, therefore, we designed the FREQUENCY dimension table which has a heterogeneous dimension schema structure. In this paper, we made a model of measuring SME (small and medium-sized enterprise) size first. The model is composed of six determinants of firm growth such as sales, employment, own technology, the operating profit to sales ratio, the debt ratio, and the current ratio. We developed the OLAP database system by using three dimensions including the FREQUENCY dimension, and using the model of measuring SME size. Also we assessed past decisions on policy funding in the Small Business Policy Funds Support Project (2004-2007) by using the OLAP database system.
Research Issues on Online Content SCM: Focused on Portal SCM
Kim, Yoo-Jung ; Kim, Min-Sun ; Yoon, Jong-Soo ;
Journal of the Korea Society of Computer and Information, volume 17, issue 5, 2012, Pages 169~176
DOI : 10.9708/jksci.2012.17.5.169
The supply chain of online digital contents industry differs much from the supply chain of offline industry which produces and supplies physical products. Portal facilitates the creation, distribution, and usage of online digital contents by providing efficient and convenient content distribution platform to contents suppliers and users, resulting in enhancing competitiveness of portal supply chain. Each portal builds it's own supply chain and various participant firms like CPs(Content Providers) and SPs(Solution Providers) are collaborating together to survive from the fierce competition. However, there is few research work on portal SCM to explain how to design and implement a Portal SCM in a successful way. So, this paper investigates the structure of Portal SCM and the differences between traditional SCM and Portal SCM. Also, this paper proposes seven research issues need to be addressed to design and implement a portal in an efficient and effective way.
The Regulations by Criminal Law against any Libel in Cyberspace
Yoo, In-Chang ;
Journal of the Korea Society of Computer and Information, volume 17, issue 5, 2012, Pages 177~183
DOI : 10.9708/jksci.2012.17.5.177
There occur various crimes in cyber space hiding behind anonymity to avoid punishment by criminal law. One of the most serious crimes committed in cyber space is defamation against others under the cloak of freedom of expression. The infringements by defamations in cyber space are made all of a certain and widespread that the victims have no time to react, and for that reason, the shocks by the defamation are much serious and severe compared with that committed in off line. However, press and publication shouldn't infringe on other's honors, right, public order or social ethics in liberal democrat society which values much the human dignities and values as stipulated in Article 21 section 4 of the Constitution. Protection of personal honor is also the basic rights guaranteed by the Constitution as much as the freedom of expression, and by extension, such harmful behaviour shouldn't be included in the freedom of expression area. In this way, slander can be considered as the minimum limitation of the freedom of expression.