Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Computer and Information
Journal Basic Information
Journal DOI :
Korean Society of Computer Information
Editor in Chief :
Volume & Issues
Volume 18, Issue 12 - Dec 2013
Volume 18, Issue 11 - Nov 2013
Volume 18, Issue 10 - Oct 2013
Volume 18, Issue 9 - Sep 2013
Volume 18, Issue 8 - Aug 2013
Volume 18, Issue 7 - Jul 2013
Volume 18, Issue 6 - Jun 2013
Volume 18, Issue 5 - May 2013
Volume 18, Issue 4 - Apr 2013
Volume 18, Issue 3 - Mar 2013
Volume 18, Issue 2 - Feb 2013
Volume 18, Issue 1 - Jan 2013
Selecting the target year
A Method of Embedded Linux Light-Weight for Efficient Application Execution
Lee, Tae-Woo ; Cho, Ji-Yong ; Cho, Yong-Hwan ;
Journal of the Korea Society of Computer and Information, volume 18, issue 3, 2013, Pages 1~10
DOI : 10.9708/jksci.2013.18.3.001
In this paper, we propose a method of embedded linux light-weight to improve efficiency of application running on embedded systems. Three methods including fast booting scheme applying the Hibernation technique, JFFS2 file system optimization applying the Symbolic Link and virtual address mapping, kernel light-weight that guarantees the general purpose was applied. Since then check the system dependency and generate kernel image according to the target embedded kit. And embedded system performance of existing linux and linux which the method proposed in this paper was compared. In experimental result, the kernel size was 9.6% improved and the system booting time was 18% improved. And application processing speed on target embedded kit was improved 11% in the best case, 66% in the worst case. This result show that the light-weight method proposed in this paper is guarantee fast booting time and securing resources and it is good for the application processing speed improvement.
A Design and Implementation of N-Screen Emulator Based on Cloud
Lee, Won Joo ; Lee, Jung-Pyo ; Yoon, Yong Ik ;
Journal of the Korea Society of Computer and Information, volume 18, issue 3, 2013, Pages 11~18
DOI : 10.9708/jksci.2013.18.3.011
In this paper, we propose a new design scheme of N-Screen emulator based on Cloud and then implement the emulator, in order to solve the critical point of N-Screen emulator based on Cloud. This method, without the emulator in the server, will be able to confirm the features of the emulator with a browser using Web Service. This means that the identical service is possible without regard to personal computer or mobile environment. Also, in order to emulating each different web browser engine of the various devices separately, we revise and manage the WebKit engine to be suitable to the characteristics of each device. In the previous design method, the number of emulators which can be shown in a monitor is restricted to 2 or 3. However, we show that the proposed design method can improve the performance of server to the extent that this method could operate more than 100 emulators per each server.
The Extraction of Quality Evaluation Elements for Medical Serious Game
Yoon, Seon-Jeong ; Ryu, Mi-Young ;
Journal of the Korea Society of Computer and Information, volume 18, issue 3, 2013, Pages 19~26
DOI : 10.9708/jksci.2013.18.3.019
As the Medical Serious Games are recently proven effective, the quality evaluation of the game has become an important issue. In quality evaluation, objective criteria and evaluation elements are important. Quality evaluation of the serious game is divided into two areas : the technical (from the point of view of Program) and the non-technical (from the point of view of Content). In this study, we developed the quality evaluation element of the non-technical area to the psychotherapy and the health & rehab game according to developing process of quality evaluation model. We extracted five evaluation elements from the two kinds of medical games, and interviewed with medical experts in order to ensure the validity of them. The goodness of fit tests for the elements mentioned above were verified by conducting. Chi-square test results for the two groups did not differ significantly. In conclusion, we expect to take advantage of the results of this study to design and develop serious games for medical treatment.
Design of Wide Band Antennas for Mobile Communications
Kim, Jang-Wook ;
Journal of the Korea Society of Computer and Information, volume 18, issue 3, 2013, Pages 27~34
DOI : 10.9708/jksci.2013.18.3.027
A wideband patch antenna fed by an L-strip feeder is studied. The objective of this paper is to design small wideband antenna for 3G and 4G wireless mobile communication service. The enhanced features were confirmed and proved by comparing the proposed antenna with the antennae that have been reported in the relevant literatures. Measurement results confirm that an impedance bandwidth(
) of 636MHz(32.5%, fo=1,960MHz) is achieved at 3G and 4G frequency band for L-strip-fed triangular patch antenna. In general, probe feed has only the parasitic reactance caused by the probe, which reduces the bandwidth performance of the antenna. The experimental results proved that the effects of improvement could be achieved because the proposed antenna is capable of compensating the parasitic reactance from the feeding mechanism. The studied antenna can be designed easily for extension of array because it has simple structure.
Collaboration Model Design to Improve Malicious Node Detection Rate in MANET
Shin, Eon-Seok ; Jeon, Seo-In ; Park, Gun-Woo ; Ryu, Keun-Ho ;
Journal of the Korea Society of Computer and Information, volume 18, issue 3, 2013, Pages 35~45
DOI : 10.9708/jksci.2013.18.3.035
MANET has a weak point because it allows access from not only legal nodes but also illegal nodes. Most of the MANET researches had been focused on attack on routing path or packet forwarding. Nevertheless, there are insuffcient studies on a comprehensive approach to detect various attacks on malicious nodes at packet forwarding processes. In this paper, we propose a technique, named DTecBC (detection technique of malicious node behaviors based on collaboration), which can handle more effciently various types of malicious node attacks on MANET environment. The DTecBC is designed to detect malicious nodes by communication between neighboring nodes, and manage malicious nodes using a maintain table. OPNET tool was used to compare with Watchdog, CONFIDANT, SRRPPnT for verifying effectiveness of our approach. As a result, DTecBC detects various behaviors of malicious nodes more effectively than other techniques.
Grid-based Semantic Cloaking Method for Continuous Moving Object Anonymization
Zhang, Xu ; Shin, Soong-Sun ; Kim, Gyoung-Bae ; Bae, Hae-Young ;
Journal of the Korea Society of Computer and Information, volume 18, issue 3, 2013, Pages 47~57
DOI : 10.9708/jksci.2013.18.3.047
Location privacy has been a serious concern for mobile users who use location-based services to acquire geographical location continuously. Spatial cloaking technique is a well-known privacy preserving method, which blurs an exact user location into a cloaked area to meet privacy requirements. However, cloaking for continuous moving object suffers from cloaked area size problem as it is unlikely for all objects travel in the same direction. In this paper, we propose a grid-based privacy preservation method with an improved Earth Mover's Distance(EMD) metric weight update scheme for semantic cloaking. We also define a representative cloaking area which protects continuous location privacy for moving users. Experimental implementation and evaluation exhibit that our proposed method renders good efficiency and scalability in cloaking processing time and area size control. We also show that our proposed method outperforms the existing method by successfully protects location privacy of continuous moving objects against various adversaries.
A study for improving passenger service level at the airport security checks by using simulation
Choi, Sanggyun ; Lee, Chulung ;
Journal of the Korea Society of Computer and Information, volume 18, issue 3, 2013, Pages 59~68
DOI : 10.9708/jksci.2013.18.3.059
In this study, airport security check process is analyzed to modeling a simulation. Simulation is compared with real security system to verify. Utilizing verified simulation, spends time in the current security check is calculated and suggests alternatives. Considering the movement of passengers and security check system of all four cases the results yielded by the experiment. The results show that security check time decreased significantly to 20.8%. The simulation was developed in this study; including the introduction of a new security system at security check can be used as a decision support tool is expected.
A comparative study on the usability evaluation of museum smart phone applications in pre-visit setting
Rhee, Boa ;
Journal of the Korea Society of Computer and Information, volume 18, issue 3, 2013, Pages 69~77
DOI : 10.9708/jksci.2013.18.3.069
This research validates the correlation between usability and functional attributes whilst comparing the degree of satisfaction of information framework used in museum mobile apps via usability evaluation in pre-visit setting. In cases of Bilbao Guggenheim and American Natural History Museum apps, the degree of satisfaction measured for information service, functional attributes, motivation for actual museum visit and during-visit usability of the apps were all highly evaluated. Such evaluation data indicates the increased usability of apps when mobile applications take user-friendly design that intuitively reflect users' interests and needs. After thorough analysis of correlation between usability and fictional attributes, data pointed to more meaning relationships existed in non-intrusiveness and personalization than other functional attributes. In conclusion, we were able to acknowledge the usability of museum mobile apps depends upon the interaction between content and functional attributes rather than entertainment factor and technology.
Intelligent Army Tactical Command Information System based on National Defense Ontology
Yoo, Donghee ; Ra, Minyoung ; Han, Changhee ; Shin, Jinhee ; No, Sungchun ;
Journal of the Korea Society of Computer and Information, volume 18, issue 3, 2013, Pages 79~89
DOI : 10.9708/jksci.2013.18.3.079
ATCIS (Army Tactical Command Information System) provides commanders and staff officers the battlefield information that is reported by tactical echelons under an army corps and the commanders make decisions based on the information by using their experience and specialty in military domain. If ATICS can automatically understand the reported information from rapidly changing battlefield and provide new knowledge that can support decision making, the commanders would be able to make faster and more accurate decision. In this paper, therefore, we propose an intelligent ATCIS using a national defense ontology. To this end, we built the national defense ontology by analyzing the electronic field manuals and ATCIS database, and then we defined military knowledge for decision making as a form of rule by interviewing several staff officers from different fields. In order to show how to apply the ontology and rules to decision making support for the commanders, we implemented a decision support service to estimate the possibility of enemy's provocation by using semantic web technologies.
A study on the properties of the finite-dimensional approximation of an r-fold Wiener Process
Choi, Sung-Hee ; Hwang, Suk-Hyung ;
Journal of the Korea Society of Computer and Information, volume 18, issue 3, 2013, Pages 91~96
DOI : 10.9708/jksci.2013.18.3.091
Because the r-fold Wiener process is truly infinitely dimensional and a computer can only handle finitely dimensional subspaces, we study in this paper the basic properties of the m-dimensional approximation function of the r-fold Wiener process.
Design and Implementation of a Mobile Application in Post-Disaster
Yoo, DaeHun ; Choi, WoongChul ;
Journal of the Korea Society of Computer and Information, volume 18, issue 3, 2013, Pages 97~105
DOI : 10.9708/jksci.2013.18.3.097
All means of communication using base stations are interrupted if the scorched earth environment happens because of a disaster. In order to use the systems of the public protection and disaster relief standards, users have to use the special equipments and need the expertise of the operation. Also, it needs the enormous investment for building an infrastructure. The systems is inadequate for the quick and efficient disaster communication, and the people can be in the chaos before the national resources are committed. For solving this problem, this paper presents the design of the mobile application that general people can use immediately, and implements the android phone's application for the proof of concept.
A Semiconductor Etching Process Monitoring System Development using OES Sensor
Kim, Sang-Chul ;
Journal of the Korea Society of Computer and Information, volume 18, issue 3, 2013, Pages 107~118
DOI : 10.9708/jksci.2013.18.3.107
In this paper, we developed the semiconductor monitoring system for the etching process. Around the world, expert companies are competing fiercely since the semiconductor industry is a leading value-added industry that produces the essential components of electronic products. As a result, many researches have been conducted in order to improve the quality, productivity, and characteristics of semiconductor products. Process monitoring techniques has an important role to give an equivalent quality and productivity to produce semiconductor. In fact, since the etching process to form a semiconductor circuit causes great damage to the semiconductors, it is very necessary to develop a system for monitoring the process. The proposed monitoring system is mainly focused on the dry etching process using plasma and it provides the detailed observation, analysis and feedback to managers. It has the functionality of setting scenarios to match the process control automatically. In addition, it maximizes the efficiency of process automation. The result can be immediately reflected to the system since it performs real-time monitoring. UI (User Interface) provides managers with diagnosis of the current state in the process. The monitoring system has diverse functionalities to control the process according to the scenario written in advance, to stop the process efficiently and finally to increase production efficiency.
A Study of Story Visualization Based on Variation of Characters Relationship by Time
Park, Seung-Bo ; Baek, Yeong Tae ;
Journal of the Korea Society of Computer and Information, volume 18, issue 3, 2013, Pages 119~126
DOI : 10.9708/jksci.2013.18.3.119
In this paper, we propose and describe the system to visualize the story of contents such as movies and novels. Character-net is applied as story model in order to visualize story. However, it is the form to be accumulated for total movie story, though it can depict the relationship between characters. We have developed the system that analyzes and shows the variation of Character-net and characters' tendency in order to represent story variation depending on movie progression. This system is composed by two windows that can play and analyze sequential Character-nets by time, and can analyze time variant graph of characters' degree centrality. First window has a function that supports to find important story points like the scenes that main characters appear or meet firstly. Second window supports a function that track each character's tendency or a variation of his tendency through analyzing in-degree graph and out-degree. This paper describes the proposed system and discusses additional requirements.
Effects of Information Quality on Customer Satisfaction and Continuous Intention to use in Social Commerce
Jun, Byoung-Ho ; Kang, Byung-Goo ;
Journal of the Korea Society of Computer and Information, volume 18, issue 3, 2013, Pages 127~139
DOI : 10.9708/jksci.2013.18.3.127
Social commerce has not been studied in depth as it is a more common recent phenomenon. Especially, social commerce has not been examined academically in terms of information quality despite its importance. The purpose of this paper is to investigate the effects of information quality on customer satisfaction and continuous intention to buy in social commerce market. This study addresses two research questions as following. First, this study aims to examine the effects of information quality on customer satisfaction and then investigate the relationship between customer satisfaction and continuous intention to use in social commerce market. According to the result of analysis, all aspects of information quality except price information quality were found to be significantly related to the customer satisfaction. Finally, customer satisfaction was shown to be significantly related to the continuous intention to use. This study has academic and practical significance in that it analyses the customer satisfaction in terns of information quality and then provides strategic guide for enhancing customer satisfaction in rapidly developing social commerce market.
The structural relationships of application richness, brand awareness, user habit, user loyalty, and continuance intention in mobile application market
Kim, Guan-Hyun ; Kim, Yoo-Jung ; Yoon, Jong-Soo ;
Journal of the Korea Society of Computer and Information, volume 18, issue 3, 2013, Pages 141~152
DOI : 10.9708/jksci.2013.18.3.141
This study investigates the determinants of users' continuance intention in mobile application market, and examines the structural relationships between predictors and users' continuance intention. Based on the intensive review of prior research related to Internet and mobile services, mobile application richness, brand awareness, user habit, user loyalty were selected as the predictors of users' continuance intention. Using 259 surveys, the research model was assessed and the research hypotheses were tested. The findings show that mobile application richness is positively related with brand awareness and user loyalty. Brand awareness is proven to be a key predictor of user habit and user loyalty. Futhermore, it is shown that user habit has a direct impact on user loyalty and users' continuance intention. Finally, it was proven that user loyalty is a pretty important determinant of users' continuance intention.