Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Computer and Information
Journal Basic Information
Journal DOI :
Korean Society of Computer Information
Editor in Chief :
Volume & Issues
Volume 19, Issue 12 - Dec 2014
Volume 19, Issue 11 - Nov 2014
Volume 19, Issue 10 - Oct 2014
Volume 19, Issue 9 - Sep 2014
Volume 19, Issue 8 - Aug 2014
Volume 19, Issue 7 - Jul 2014
Volume 19, Issue 6 - Jun 2014
Volume 19, Issue 5 - May 2014
Volume 19, Issue 4 - Apr 2014
Volume 19, Issue 3 - Mar 2014
Volume 19, Issue 2 - Feb 2014
Volume 19, Issue 1 - Jan 2014
Selecting the target year
Cyclic Executive for Autonomous Driving with Real-Time Smart Cruise Control
Lee, Jaemyoun ; Kang, Kyungtae ; Noh, Dong Kun ;
Journal of the Korea Society of Computer and Information, volume 19, issue 1, 2014, Pages 1~8
DOI : 10.9708/jksci.2014.19.1.001
In recent years, much attention has been paid to the development of intelligent vehicles that integrate automotive technology into the information technology, with the aim of improving user friendliness and stability. The representative function is a autonomous driving and a cruise control. In designing such vehicles, it is critical to address the real-time issues (i.e., real-time vehicle control and timely response). However, previous research excluded the real-time scheduling. We develop a model car with unmanned cruise control, design the real-time scheduler using cyclic executive to easily adapt the model car, and provide some insight into potential solutions based on various experiments.
A Method of Auto Photography Composition Suggestion
Choi, Yong-Sub ; Park, Dae-Hyun ; Kim, Yoon ;
Journal of the Korea Society of Computer and Information, volume 19, issue 1, 2014, Pages 9~21
DOI : 10.9708/jksci.2014.19.1.009
In this paper, we propose the auto correction technique of photography composition by which the eye line is concentrated and the stable image of the structure can be obtained in case the general user takes a picture. Because the general user photographs in most case without background knowledge about the composition of the photo, the subject location is not appropriate and the unstable composition is contrasted with the stable composition of pictures which the experts take. Therefore, we provide not the method processing the image after photographing, but he method presenting automatically the stable composition when the general users take a photograph. The proposed method analyze the subject through Saliency Map, Image Segmentation, Edge Detection, etc. and outputs the subject at the location where the stable composition can be comprised along with the guideline of the Rule of Thirds. The experimental result shows that the good composition was presented to the user automatically.
Filtering Feature Mismatches using Multiple Descriptors
Kim, Jae-Young ; Jun, Heesung ;
Journal of the Korea Society of Computer and Information, volume 19, issue 1, 2014, Pages 23~30
DOI : 10.9708/jksci.2014.19.1.023
Feature matching using image descriptors is robust method used recently. However, mismatches occur in 3D transformed images, illumination-changed images and repetitive-pattern images. In this paper, we observe that there are a lot of mismatches in the images which have repetitive patterns. We analyze it and propose a method to eliminate these mismatches. MDMF(Multiple Descriptors-based Mismatch Filtering) eliminates mismatches by using descriptors of nearest several features of one specific feature point. In experiments, for geometrical transformation like scale, rotation, affine, we compare the match ratio among SIFT, ASIFT and MDMF, and we show that MDMF can eliminate mismatches successfully.
A Virtual Mobile Ad-Hoc Network Model to Improve Internet Connectivity among Heterogeneous Mobile Devices
Uddin, Jia ; Kim, Jong-Myon ;
Journal of the Korea Society of Computer and Information, volume 19, issue 1, 2014, Pages 31~41
DOI : 10.9708/jksci.2014.19.1.031
This paper proposes a virtual mobile ad-hoc network (VMANET) model that automatically divides heterogeneous mobile devices of a MANET into a number of network groups depending on the communication capacity(data rate) of different network operational models such as IEEE 802.11g, IEEE 802.11b, and Frequency Hopping. In addition, it supports a distinct routing protocol for each network group of VMANETs, resulting in running multiple routing protocols concurrently on different groups of VMANETs. To reduce the network congestion and improve the network load balance, a default MANET gateway is configured in each VMANET and these gateways are responsible for integrating the MANET and IP networks. Experiment results show that the proposed model outperforms the conventional IMANET by significantly increasing throughput and reducing network congestion and network delay.
A Research on the Performance Analysis of SPDY Protocol in Mobile Networks
Kim, Hee-Jung ; Yi, Gyu-Sun ; Lee, Sung-Won ;
Journal of the Korea Society of Computer and Information, volume 19, issue 1, 2014, Pages 43~55
DOI : 10.9708/jksci.2014.19.1.043
SPDY is the new protocol proposed by Google to complement problems of HTTP(Hypertext Transfer Protocol)/1.1 and to improve web speed. In this paper, we evaluated the performance of SPDY protocol in a variety environment. By this evaluation, we examined the characteristics of the SPDY protocol and compared the differences between the existing protocol and SPDY protocol. And we took a closer look at the Flow Control of SPDY. Through this, we analyzed the problem of SPDY. It improved performance at 3G network environment, but failed to improve performance at high speed WLAN and mobility environments. We also verified that Flow Control does not work well. And finally we proposed directions for improvement of this protocol.
Efficient Construction of Euclidean Steiner Minimum Tree Using Combination of Delaunay Triangulation and Minimum Spanning Tree
Kim, Inbum ;
Journal of the Korea Society of Computer and Information, volume 19, issue 1, 2014, Pages 57~64
DOI : 10.9708/jksci.2014.19.1.057
As Steiner minimum tree building belongs to NP-Complete problem domain, heuristics for the problem ask for immense amount execution time and computations in numerous inputs. In this paper, we propose an efficient mechanism of euclidean Steiner minimum tree construction for numerous inputs using combination of Delaunay triangulation and Prim's minimum spanning tree algorithm. Trees built by proposed mechanism are compared respectively with the Prim's minimum spanning tree and minimums spanning tree based Steiner minimum tree. For 30,000 input nodes, Steiner minimum tree by proposed mechanism shows about 2.1% tree length less and 138.2% execution time more than minimum spanning tree, and does about 0.013% tree length less and 18.9% execution time less than minimum spanning tree based Steiner minimum tree in experimental results. Therefore the proposed mechanism can work moderately well to many useful applications where execution time is not critical but reduction of tree length is a key factor.
eFlowC: A Packet Processing Language for Network Management
Ko, Bang-Won ; Yoo, Jae-Woo ;
Journal of the Korea Society of Computer and Information, volume 19, issue 1, 2014, Pages 65~76
DOI : 10.9708/jksci.2014.19.1.065
In this paper, we propose a high-level programming language for packet processing called eFlowC and it supporting programming development environment. Based on the C language which is already familiar and easy to use to program developers, eFlowC maintains the similar syntax and semantics of C. Some features that are unnecessary for the packet processing has been removed from C, eFlowC is highly focused on performing packet data, database, string byte information checking and event processing. Design high-level programming languages and apply an existing language or compiler technology, language function and compilation process that is required for packet processing will be described. In order to use the DPIC device such as X11, we designed a virtual machine eFVM that takes into account the scalability and portability. We have evaluated the utility of the proposed language by experimenting a variety of real application programs with our programming environment such as compiler, simulator and debugger for eFVM. As there is little research that devoted to define the formats, meanings and functions of the packet processing language, this research is significant and expected to be a basis for the packet processing language.
Hierarchical Network Synchronization of STAR Network based on TDMA
Yoon, Juhyun ;
Journal of the Korea Society of Computer and Information, volume 19, issue 1, 2014, Pages 77~84
DOI : 10.9708/jksci.2014.19.1.077
In this paper, we propose the hierarchical network synchronization scheme that is backward compatible for the existing commercial system, efficient for total system performance, and whose hardware modification is minimized. This system performance is, the relationship among bandwidth efficiency, complexity and MODEM performance, and superiority of network system applicability. The proposed structure can remedy the high hardware complexity and the lower accuracy of network sychronization that the existing satellite communication terminal system in the star network based on TDM/MF-TDMA of DVB-S2/RCS standards has. Besides, It has high efficiency in view of cost and system performance if the system designed for satellite broadcast requires system upgrade. In the body section, its hardware complexity and system performance of the proposed algorithm is analysed theoretically and treated with the related parameters(symbol rate, spreading factor, etc.) and the BER performance of control channel through the computer simulation for its verification that it can be applied for communications system.
A Study on Similarity Comparison for File DNA-Based Metamorphic Malware Detection
Jang, Eun-Gyeom ; Lee, Sang Jun ; Lee, Joong In ;
Journal of the Korea Society of Computer and Information, volume 19, issue 1, 2014, Pages 85~94
DOI : 10.9708/jksci.2014.19.1.085
This paper studied the detection technique using file DNA-based behavior pattern analysis in order to minimize damage to user system by malicious programs before signature or security patch is released. The file DNA-based detection technique was applied to defend against zero day attack and to minimize false detection, by remedying weaknesses of the conventional network-based packet detection technique and process-based detection technique. For the file DNA-based detection technique, abnormal behaviors of malware were splitted into network-related behaviors and process-related behaviors. This technique was employed to check and block crucial behaviors of process and network behaviors operating in user system, according to the fixed conditions, to analyze the similarity of behavior patterns of malware, based on the file DNA which process behaviors and network behaviors are mixed, and to deal with it rapidly through hazard warning and cut-off.
The effects of the Partnership in Supply Chain Management with Appling Social Business on the outcome of the SCM
Kim, So-Chun ; Lim, Wang-Kyu ;
Journal of the Korea Society of Computer and Information, volume 19, issue 1, 2014, Pages 95~110
DOI : 10.9708/jksci.2014.19.1.095
The purpose of this research is to further investigate the influence of partnership between with the mediator effect of the social business on the outcome of SCM. IT technology fusion electronic tags, mobile phone, such as cloud computing is also activated in supply chain management of recently, business is faster, if social business is applied here that are smarter, customers or suppliers, there may be communication directly and to further improve the relationship partnership. 150 questionnaires were sent to companies that have introduced SCM to their systems and are operating it. Among 150 questionnaires, 127 collected data were analyzed excluding incomplete 23 data. Statistical methods used in this study were frequency analysis, factor analysis, reliability analysis, t-test, ANOVA, path analysis, Scheffe test and Sobel test with Amos 18.0. and SPSS 21.0. The analytical results are as follows. First, the more the reliability, information share, continuous transaction, effects on the social business are getting higher, the interdependence has little impact on it. Second, the impact on the outcome of SCM, partnerships between companies, showed a significant influence the reliability, the share of information, the continuous transaction, but the interdependence was analysed as an uninfluential factor. Third, the social business is analyses to have a mediator effect in relationship between the partnership and the outcome of SCM.
Follower classification system based on the similarity of Twitter node information
Kye, Yong-Sun ; Yoon, Youngmi ;
Journal of the Korea Society of Computer and Information, volume 19, issue 1, 2014, Pages 111~118
DOI : 10.9708/jksci.2014.19.1.111
Current friend recommendation system on Twitter primarily recommends the most influential twitter. However, this way of recommendation has drawbacks where it does not recommend the users of which attributes of interests are similar to theirs. Since users want other users of which attributes are similar, this study implements follower recommendation system based on the similarity of twitter node informations. The data in this study is from SNAP(Stanford Network Analysis Platform), and it consists of twitter node information of which number of followers is over 10,000 and twitter link information. We used the SNAP data as a training data, and generated a classifier which recommends and predicts the relation between followers. We evaluated the classifier by 10-Fold Cross validation. Once two twitter node informations are given, our model can recommend the relationship of the two twitters as one of following such as: FoFo(Follower Follower), FoFr(Follower Friend), NC(Not Connected).
Genetic Algorithm based Pathfinding System for Analyzing Networks
Kim, Jun-Woo ;
Journal of the Korea Society of Computer and Information, volume 19, issue 1, 2014, Pages 119~130
DOI : 10.9708/jksci.2014.19.1.119
This paper proposes GAPS, a practical genetic algorithm based pathfinding system for conveniently analyzing various networks. To this end, the GAPS is developed through integration of the intuitive graphic user interface for network modeling, the database management system for managing the data generated in modeling and exploring procedures, and a simple genetic algorithm for analyzing a wide range of networks. Especially, previous genetic algorithms are not appropriate for analyzing the networks with many dead-ends where there are few feasible paths between the given two nodes, however, GAPS is based on the genetic algorithm with the fitness function appropriate for evaluating both feasible and infeasible paths, which enables GAPS to analyze a wide range of networks while maintaining the diversity of the population. The experiment results reveal that GAPS can be used to analyze both networks with many dead-ends and networks with few dead-ends conveniently, and GAPS has several advantages over the previous genetic algorithms for pathfinding problems.
Extract and Analysis System for CT/MRI Images
Kwak, Ho-Young ; Huh, Jisoon ;
Journal of the Korea Society of Computer and Information, volume 19, issue 1, 2014, Pages 131~140
DOI : 10.9708/jksci.2014.19.1.131
TMost of the medical images that are being used today are to confirm the existence of lesions. These kind of medical images can not only be used to confirm lesions but if we could use it for academic studies or for analysis and reference materials for surgical operations, it could offer great help in medical studies. Furthermore, we could reduce the number of errors in treatment through simulations in the surgical operations and treatments. In this paper, the necessary parts regarding the medical image visuals were extracted through the point cloud and by using the information obtained through it, it manufactures the necessary information for academic studies, diagnoses or operations. By designing and realizing the system which makes simulation possible with the manufactured information, the paper attempts to provide a more effective way to approach academic studies or giving appropriate diagnoses in the treatment of patients.
A Context-Aware Treatment Guidance System
Jung, Hwa Young ; Park, Jae Wook ; Lee, Yong Kyu ;
Journal of the Korea Society of Computer and Information, volume 19, issue 1, 2014, Pages 141~148
DOI : 10.9708/jksci.2014.19.1.141
As the quality of the medical treatment service provided by large hospitals grow, the number of patients utilizing the facilities is increasing dramatically. Various studies such as order communication system and treatment guidance system are under their process in order to shorten the waiting time for patients. However, the existing methods assign the treatments in successive order without recognizing the situation of each treatment, therefore increasing a patient's standby time at a hospital. This paper proposes a context-aware treatment guidance system, which recognizes the previously undermined estimated waiting time of each treatment for a patient and recommends a treatment with shorter estimated sojourn time first. This context-aware treatment guidance system provides detailed information of treatment services based on the recommended order of treatments to a patient's smartphone. By utilizing the context-aware treatment guidance system introduced in this paper, patients can reduce their standby time at hospitals to the minimum while hospitals can efficiently service more patients at the same amount of time. The proposed context-aware treatment guidance system proves to be outstanding in treatment order recommendation through comparisons to previously used methods.
A dominant hyperrectangle generation technique of classification using IG partitioning
Lee, Hyeong-Il ;
Journal of the Korea Society of Computer and Information, volume 19, issue 1, 2014, Pages 149~156
DOI : 10.9708/jksci.2014.19.1.149
NGE(Nested Generalized Exemplar Method) can increase the performance of the noisy data at the same time, can reduce the size of the model. It is the optimal distance-based classification method using a matching rule. NGE cross or overlap hyperrectangles generated in the learning has been noted to inhibit the factors. In this paper, We propose the DHGen(Dominant Hyperrectangle Generation) algorithm which avoids the overlapping and the crossing between hyperrectangles, uses interval weights for mixed hyperrectangles to be splited based on the mutual information. The DHGen improves the classification performance and reduces the number of hyperrectangles by processing the training set in an incremental manner. The proposed DHGen has been successfully shown to exhibit comparable classification performance to k-NN and better result than EACH system which implements the NGE theory using benchmark data sets from UCI Machine Learning Repository.
A Study on the Influence of Perceived Organizational Support on Organization Commitment
Lee, HongKi ; Jang, Myung Bok ;
Journal of the Korea Society of Computer and Information, volume 19, issue 1, 2014, Pages 157~168
DOI : 10.9708/jksci.2014.19.1.157
In general, there are three factors which compel employees to leave their position at a company: duties in organization, perception related to organization, and attitude built through the previous factors. The purpose of this study is to investigate the influence of the factors on the turnover intention and the decreasing achievement affected by the turnover. For this study, the perceived organizational support and organization commitment were chosen as worker's attitude variables which affects turnover intention. The results through the actual analysis are as follows: 1. Worker's emotional commitment is on the increase when the organization values their increased efforts as precious and makes efforts to improve welfare system. 2. Worker's turnover intention decreases as the stronger emotional commitment enables them to gain more consciousness to stay longer at the company. 3. The worker who possesses stronger lasting commitment tends to have some inclination to leave his current position if other organization offers compensation enough to make up for the current investment. 4. Worker's turnover intention decreases when they perceive that the organization acknowledges employees' value and supports them. 5. Worker's turnover intention at the small-middle sized companies is higher than at major companies. In this study, four out of five hypotheses, which are based on theoretical examinations and backgrounds, gain verified results. In the end, it is showed that the perceived organization support can increase the emotional commitment which makes it possible to decrease turnover intention. Consequently, it can be said that the appropriate human resources management is to explore the ways to decrease worker's turnover intention by improving labor environment and searching for the way to promote worker's commitment to their organization through the perceived organization supports.
A Study on the Correctional Policy through Comparison of Juvenile Delinquents and Normal Adolescents: Focusing on Self-esteem and Sociality
Lee, Duk-Nam ;
Journal of the Korea Society of Computer and Information, volume 19, issue 1, 2014, Pages 169~179
DOI : 10.9708/jksci.2014.19.1.169
This study conducted a comparison analysis of the differences by scope between juvenile delinquents, under sentence of juvenile protective disposition, and normal middle high school boys' self-esteem and sociality; it aims to search for the correctional policy to prevent juvenile delinquency. I conducted a survey, as a sampling target, of students (84) at Daedeok Juvenile Reformatory, located in Daejeon-si, Korea, and the normal middle high school boys (230). The results of analysis showed that in the analysis of self-esteem difference, juvenile delinquents were found high in the global self-esteem and school-academic self-esteem, but the normal adolescents were found high only in the scope of family-parents self-esteem. In leadership, a subordinate scope of sociality, juvenile delinquents showed the high result, and in independence and cooperativity, normal adolescents were found high. In conclusion, as the distinction between self-esteem and sociality is different by scope, depending on the individual's characteristic and environment, it suggests that the correctional policy through the customized plan is effective at preventing delinquency.
The Effects of Teenagers' Brand Perceptions on their Sociability -Focusing on Policy Implications-
Kim, Kyung-Sook ; Park, Hwie-Seo ;
Journal of the Korea Society of Computer and Information, volume 19, issue 1, 2014, Pages 181~189
DOI : 10.9708/jksci.2014.19.1.181
The purpose of this study is to suggest some policy implications for the youth through empirical study about the effects of middle school students' brand perception on their sociability. For the purpose of this study, this study established a causal model about the relationships between brand perception and sociability through review of previous studies and surveyed for empirical research. The results of this study are presented as follows: Preference, imitation, and relevance as brand purchase elements of teenagers affected their self-esteem and empathy for others significantly. Self-esteem that is meditating variable in this study did not have a significant effect on sociability, while empathy for others had a great effect on it. This study suggested policy implications for teenagers to have good standards and a sense of value in a brand purchase.
The Analysis of Informatics Gifted Elementary Students' Computational Problem Solving Approaches in Puzzle-Based Learning
Lee, Eunkyoung ; Choi, JeongWon ; Lee, Youngjun ;
Journal of the Korea Society of Computer and Information, volume 19, issue 1, 2014, Pages 191~201
DOI : 10.9708/jksci.2014.19.1.191
The purpose of this study is to propose strategies of puzzle-based learning for Informatics gifted education through analyzing Informatics gifted elementary students' computational problem solving approaches in puzzle-based learning contexts. Six types of educational puzzles, which are constraints, optimization, probability, statistically speaking, pattern recognition, and strategy, were used in teaching 14 Informatics gifted students for 8 sessions. The results of pre and post test and each students' answers were analyzed to identify why students were not able to solve the puzzles. We also analysed what essential computational strategies are needed to solve each type of puzzles, and what students did not know in solving puzzle problems. We identified some problems caused by puzzle representation methods, and various students' intuitions that disturb puzzle solving. Also, we identified essential computational strategies to solve puzzles: backtracking, dynamic programming, abstraction, modeling, and reduction of big problem. However, students had difficulties in applying these strategies to solve their puzzle problems. We proposed the revised puzzle-based learning strategies, which is based on the improved problem representation, just-in-time cognitive feedbacks, and web-based learning system.
User Satisfaction Analysis on Similarity-based Inference Insect Search Method in u-Learning Insect Observation using Smart Phone
Jun, Eung Sup ;
Journal of the Korea Society of Computer and Information, volume 19, issue 1, 2014, Pages 203~213
DOI : 10.9708/jksci.2014.19.1.203
In this study, we proposed a new model with ISOIA (Insect Search by Observation based on Insect Appearance) method based on observation by insect appearance to improve user satisfaction, and compared it with the ISBC and ISOBC methods. In order to test these three insect search systems with AHP method, we derived three evaluation criteria for user satisfaction and three sub-evaluation criteria by evaluation criterion. In the ecological environment, non-experts need insect search systems to identify insect species and to get u-Learning contents related to the insects. To assist the public the non-experts, ISBC (Insect Search by Biological Classification) method based on biological classification to search insects and ISOBC (Insect Search by Observation based on Biological Classification) method based on the inference that identifies the observed insect through observation according to biological classification have been provided. In the test results, we found the order of priorities was ISOIA, ISOBC, and ISBC. It shows that the ISOIA system proposed in this study is superior in usage and quality compared with the previous insect search systems.