Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Computer and Information
Journal Basic Information
Journal DOI :
Korean Society of Computer Information
Editor in Chief :
Volume & Issues
Volume 19, Issue 12 - Dec 2014
Volume 19, Issue 11 - Nov 2014
Volume 19, Issue 10 - Oct 2014
Volume 19, Issue 9 - Sep 2014
Volume 19, Issue 8 - Aug 2014
Volume 19, Issue 7 - Jul 2014
Volume 19, Issue 6 - Jun 2014
Volume 19, Issue 5 - May 2014
Volume 19, Issue 4 - Apr 2014
Volume 19, Issue 3 - Mar 2014
Volume 19, Issue 2 - Feb 2014
Volume 19, Issue 1 - Jan 2014
Selecting the target year
Design Space Exploration of Many-Core Processor for High-Speed Cluster Estimation
Seo, Jun-Sang ; Kim, Cheol-Hong ; Kim, Jong-Myon ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 1~12
DOI : 10.9708/jksci.2014.19.10.001
This paper implements and improves the performance of high computational subtractive clustering algorithm using a single instruction, multiple data (SIMD) based many-core processor. In addition, this paper implements five different processing element (PE) architectures (PEs
An Integer Programming-based Local Search for the Set Covering Problem
Hwang, Jun-Ha ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 13~21
DOI : 10.9708/jksci.2014.19.10.013
The set covering problem (SCP) is one of representative combinatorial optimization problems, which is defined as the problem of covering the m-rows by a subset of the n-columns at minimal cost. This paper proposes a method utilizing Integer Programming-based Local Search (IPbLS) to solve the set covering problem. IPbLS is a kind of local search technique in which the current solution is improved by searching neighborhood solutions. Integer programming is used to generate neighborhood solution in IPbLS. The effectiveness of the proposed algorithm has been tested on OR-Library test instances. The experimental results showed that IPbLS could search for the best known solutions in all the test instances. Especially, I confirmed that IPbLS could search for better solutions than the best known solutions in four test instances.
The Design and Implementation of OWL Ontology Construction System through Information Extraction of Unstructured Documents
Jo, Dae Woong ; Choi, Ji Woong ; Kim, Myung Ho ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 23~33
DOI : 10.9708/jksci.2014.19.10.023
The development of the information retrieval field is evolving to the research field searching accurately for the information from thing finding rapidly a large amount of information. Personalization and the semantic web technology is a key technology. The automatic indexing technology about the web document and throughput go beyond the research stage and show up as the practical service. However, there is a lack of research on the document information retrieval field about the attached document type of except the web document. In this paper, we illustrate about the method in which it analyzed the text content of the unstructured documents prepared in the text, word, hwp form and it how to construction OWL ontology. To build TBox of the document ontology and the resources which can be obtained from the document is selected, and we implement with the system in order to utilize as the instant of the constructed document ontology. It is effectually usable in the information retrieval and document management system using the semantic technology of the correspondence document as the ontology automatic construction of this kind of the unstructured documents.
Obstacle Avoidance of Indoor Mobile Robot using RGB-D Image Intensity
Kwon, Ki-Hyeon ; Lee, Hyung-Bong ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 35~42
DOI : 10.9708/jksci.2014.19.10.035
It is possible to improve the obstacle avoidance capability by training and recognizing the obstacles which is in certain indoor environment. We propose the technique that use underlying intensity value along with intensity map from RGB-D image which is derived from stereo vision Kinect sensor and recognize an obstacle within constant distance. We test and experiment the accuracy and execution time of the pattern recognition algorithms like PCA, ICA, LDA, SVM to show the recognition possibility of it. From the comparison experiment between RGB-D data and intensity data, RGB-D data got 4.2% better accuracy rate than intensity data but intensity data got 29% and 31% faster than RGB-D in terms of training time and intensity data got 70% and 33% faster than RGB-D in terms of testing time for LDA and SVM, respectively. So, LDA, SVM have good accuracy and better training/testing time to use for obstacle avoidance based on intensity dataset of mobile robot.
Gunnery Classification Method Using Profile Feature Extraction in Infrared Images
Kim, Jae-Hyup ; Cho, Tae-Wook ; Chun, Seung-Woo ; Lee, Jong-Min ; Moon, Young-Shik ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 43~53
DOI : 10.9708/jksci.2014.19.10.043
Gunnery has been used to detect and classify artilleries. In this paper, we used electro-optical data to get the information of muzzle flash from the artilleries. Feature based approach was applied; we first defined features and sub-features. The number of sub-features was 38~40 generic sub-features, and 2 model-based sub-features. To classify multiclass data, we introduced tree structure with clustering the classes according to the similarity of them. SVM was used for each non-leaf nodes in the tree, as a sub-classifier. From the data, we extracted features and sub-features and classified them by the tree structure SVM classifier. The results showed that the performance of our classifier was good for our muzzle flash classification problem.
An Adaptive Background Formation Algorithm Considering Stationary Object
Jeong, Jongmyeon ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 55~62
DOI : 10.9708/jksci.2014.19.10.055
In the intelligent video surveillance system, moving objects generally are detected by calculating difference between background and input image. However formation of reliable background is known to be still challenging task because it is hard to cope with the complicated background. In this paper we propose an adaptive background formation algorithm considering stationary object. At first, the initial background is formed by averaging the initial N frames. Object detection is performed by comparing the current input image and background. If the object is at a stop for a long time, we consider the object as stationary object and background is replaced with the stationary object. On the other hand, if the object is a moving object, the pixels in the object are not reflected for background modification. Because the proposed algorithm considers gradual illuminance change, slow moving object and stationary object, we can form background adaptively and robustly which has been shown by experimental results.
Recognition of Partially Occluded Binary Objects using Elastic Deformation Energy Measure
Moon, Young-In ; Koo, Ja-Young ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 63~70
DOI : 10.9708/jksci.2014.19.10.063
Process of recognizing objects in binary images consists of image segmentation and pattern matching. If binary objects in the image are assumed to be separated, global features such as area, length of perimeter, or the ratio of the two can be used to recognize the objects in the image. However, if such an assumption is not valid, the global features can not be used but local features such as points or line segments should be used to recognize the objects. In this paper points with large curvature along the perimeter are chosen to be the feature points, and pairs of points selected from them are used as local features. Similarity of two local features are defined using elastic deformation energy for making the lengths and angles between gradient vectors at the end points same. Neighbour support value is defined and used for robust recognition of partially occluded binary objects. An experiment on Kimia-25 data showed that the proposed algorithm runs 4.5 times faster than the maximum clique algorithm with same recognition rate.
Design of Microstrip Array Antenna for Satellite Reception
Kim, Jang-Wook ; Jeon, Joo-Seong ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 71~79
DOI : 10.9708/jksci.2014.19.10.071
In this paper, the microstrip array antenna is studied to replace the parabolic antenna in the direct satellite reception. A microstrip array antenna has been used in extremely limited area, but if it is applied to practical life like a direct satellite reception antenna, we expect that it will be used in various way. First of all, if we use a microstrip array antenna for a direct satellite reception antenna, it should be guaranteed characteristics of broadband frequency. Therefore, the goal of this paper is designing technique an antenna which guarantees broadband frequency band for a direct satellite reception. In this paper, the proposed microstrip antenna is fed by orthogonal two feed lines to a rectangular patch and a sequentially rotated feeding technique is designed proposed for a good axial ratio in broadband frequency band. The rectangular patch is designed to satellite reception band, and the width and length are W
Design of System for Avoiding upload of Identical-file using SA Hash Algorithm
Hwang, Sung-Min ; Kim, Seog-Gyu ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 81~89
DOI : 10.9708/jksci.2014.19.10.081
In this paper, we propose SA hash algorithm to avoid upload identical files and design server system using proposed SA hash algorithm. Client to want to upload file examines the value of SA hash and if the same file is found in server system client use the existing file without upload. SA hash algorithm which is able to examine the identical-file divides original file into blocks of n bits. Original file`s mod i bit and output hash value`s i bit is calculated with XOR operation. It is SA hash algorithm`s main routine to repeat the calculation with XOR until the end of original file. Using SA hash algorithm which is more efficient than MD5, SHA-1 and SHA-2, we can design server system to avoid uploading identical file and save storage capacity and upload-time of server system.
A Design and Implementation of Mobile Game Based on Windows Phone Platform
Park, Jin-Yang ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 91~97
DOI : 10.9708/jksci.2014.19.10.091
In this paper, we design and implement a mobile game based on windows phone platform. Visual Studio and the Windows Mobile software development kit(SDK) and developer tool kits (DTK) make it possible to create software for the Windows Mobile platform in Visual C#. Also The XNA Framework is the set of .NET libraries that developers will code against to build games. XNA Framework support PC and XBOX and a ZUNE HD multiplex platform environment and 2D and 3D games provides the necessary functions to a development. XNA Framework is to make it easier to develop games because the codes which are succeeded creates with automatic, implements a game development relation resource and the game logic. The key idea of our game is that we use shooting and ranking system to raise fun.
Contents Error and Security Analysis of `Security Analysis and Improvements of a Biometrics-based User Authentication Scheme Using Smart Cards`
Park, Mi-Og ; Oh, Gi-Oug ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 99~106
DOI : 10.9708/jksci.2014.19.10.099
In this paper, we analyze weaknesses of the biometrics-based user authentication scheme proposed by An. The result of analysis An`s authentication scheme by the login success scenario proposed in this paper, if the attacker successes to get user`s random number, he/she can pass user authentication phase of the legal server. Also the biometrics guessing scenario proposed in this paper shows the legal user`s the biometric information is revealed in lost smart card. Since An`s authentication scheme submit user ID and biometrics in plain text to the server, it is very vulnerable to inner attack and it is not provide the user anonymity to the server as well as the one to the third by user ID in plain text. Besides An`s authentication scheme is contextual error too, due to this, it has weakness and so on that it did not check the validity of the smart card holder.
The design of the expanded BYOD solutions for business mobile users
Park, Jae-Kyung ; Kim, Sung-Jin ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 107~115
DOI : 10.9708/jksci.2014.19.10.107
In recent years, large companies and public institutions in the Smartphone business purposes has been used a lot. Personal Smartphone are worried about security of personal information only. But if you are a corporate or business purposes requires a more cautious approach. It can destroy an organization`s network to hack Smartphones have very serious damage. For this purpose, the existing solution, and try to solve security issues with MDM or MAM. However, Smartphone users discomfort and there is a limit of organizational control. In this paper, we can propose with these issues more broadly would like to suggest. Secure mobile traffic management system enables companies or agencies the ease for users to use a Smartphone. And, for organizations that provide smart phones are more powerful and can provide a means of control. In addition, wired/wireless integration and security measures that can provide new services to offer.
Case Analysis of Legal System and Regulations according to the Needs of S/W Development Security
Shin, Seong-Yoon ; Jeong, Kil-Hyun ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 117~124
DOI : 10.9708/jksci.2014.19.10.117
Software Development Security is defined as a sequential procedure such as deleting potential security vulnerability for secure software development, designing or implementing various functions with considering security, and so on. In this paper, we research on domestic or international hacking cases that could damage us mentally or financially. Seventy five percent of Web-site attacks abuses weak points of application programs, or software. We also research on major issues related to software development security with these demerits. And then, we propose public and private laws, regulations, or systems and give some examples with detailed descriptions.
A Development of Hotel Bankruptcy Prediction Model on Artificial Neural Network
Choi, Sung-Ju ; Lee, Sang-Won ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 125~133
DOI : 10.9708/jksci.2014.19.10.125
This paper develops a bankruptcy prediction model on an Artificial Neural Network for hotel management. A bankruptcy prediction model has a specific feature to predict a bankruptcy of the whole hotel business after evaluate bankruptcy possibility on the basis of business performance data of each branch. here are many traditional statistical models for bankruptcy prediction such as Multivariate Discriminant Analysis or Logit Analysis. However, we chose Artificial Neural Network because the method has accuracy rates of prediction better than those of other methods. We first selected 100 good enterprises and 100 bankrupt enterprises as experimental data and set up a bankruptcy prediction model by use of a tool for Artificial Neural Network, NeuroShell. The model and its experiments, which demonstrated high efficiency, can certainly provide great help in decision making in the field of hotel management and in deciding on the bankruptcy or financial solidity of each branch of serviced residence hotel.
Design and Implementation of Android-based Open U-Learning System for Improve Learning Effect : Focusing on 2009 revised science education courses
Kim, Youn-Soo ; Lee, Ju-Hong ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 135~149
DOI : 10.9708/jksci.2014.19.10.135
This study proposed the ubiquitous learning system by finding the difficulties which students have in learning the course of science and analyzing the current learning applications that are used commercially. Through case studies, we found 4 problems. First, the request of long learning time by most of the existing video-based learning applications. Second, it is impossible to know their level of learning due to the lack of open learning contents. Third, it is difficult for learners to participate in interactive learning. Fourth, there are educational contents without considerations on the level of learners. To refine the difficulties due to these problems, we designed and implemented a new ubiquitous learning system which applies the small learning contents for short-term learning, open learning system and enhanced hierarchical learning contents. The system was implemented based on Android. It provides learners with useful science education. We conducted a questionnaire for third grade middle school students in order to show that the proposed system has a good educational effects. The questionnaire asks for the differences between the proposed ubiquitous learning system and the existing learning application. We concluded that the proposed system is better than the existing application by using t-test for improvement of learning effects using feedback with which students participate in interactive learning but not in unidirectional learning, and share the learning result.
Implementation of N-screen based solar power monitoring system
Lee, Kyong-Ho ; Park, Hee-Wan ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 151~158
DOI : 10.9708/jksci.2014.19.10.151
In this paper, we have designed and implemented the `N-screen based solar power monitoring system` using N-screen technology by improving the existing monitoring system that can only be accessed or controlled by PC. The HW of the system is consists of solar power modules, inverter, and relay server. And SW is implemented in consideration of the following three points. First, we applied the N-screen technology in order to support various devices. Second, we applied 1:N communication technology that multiple devices can be connected simultaneously to the relay server. Third, we also considered the security problems between server and devices. The final system has been evaluated through the operational test and received good reviews from the technical and economic point. In the future, we are expecting that this technology will replace the existing monitoring systems in various fields, like smart home, smart building, smart city, smart industry, and smart agriculture, etc.
Design and Implementation of Real-time Audio and Video System Using Red5 and Node.js
Kim, Hyeock-Jin ; Kwark, Woo-Young ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 159~168
DOI : 10.9708/jksci.2014.19.10.159
The Web is a way to share documents and communicate. However, voice and video data can be transmission in real time and currently being developed by the objects and the objects that interact to further develop the Internet. Existing video and audio programs to transmission data to the interface of different types of systems a lot of constraint condition on the cost of the interface, extensibility. In this paper, voice and audio transmission system a different operating system, improve the constraints of the ERP system compatibility and extensibility is a open source based system developed by the research. The program is different types of systems and interface, extensibility with program design and development methodologies, and open source-based system composed This system is good for cost saving and extensibility. Therefore, systems research and development, Extensibility and excellent on the interface, system design and development methodologies, such as real-time video conferencing, HMI, and take advantage of your video available from SNS.
Maximum Profit Priority Goods First Loading Algorithm for Barge Loading Problem
Lee, Sang-Un ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 169~173
DOI : 10.9708/jksci.2014.19.10.169
Nobody has yet been able to determine the optimal solution conclusively whether NP-complete problems are in fact solvable in polynomial time. Gu
ret et al. tries to obtain the optimal solution using linear programming with
time complexity for barge loading problem a kind of bin packing problem that is classified as nondeterministic polynomial time (NP)-complete problem. On the other hand, this paper suggests the loading rule of profit priority rank algorithm with O(m log m) time complexity. This paper decides the profit priority rank firstly. Then, we obtain the initial loading result using the rule of loading the good has profit priority order. Finally, we balance the loading and capability of barge swap the goods of unloading in previously loading in case of under loading. As a result of experiments, this algorithm reduces the
of linear programming to O(m log m) time complexity for NP-complete barge loading problem.
Effect of Purchase Intention of Location-Based Services: Focused on Privacy-Trust-Behavioral Intention Model
Jang, Sung-Hee ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 175~184
DOI : 10.9708/jksci.2014.19.10.175
The purpose of this study is to examine the factors influencing purchase intention of Location-Based Services (LBS) using privacy-trust-behavioral intention model. This model tests various theoretical research hypotheses relating to LBS, privacy-trust-behavioral intention model, and Concern for Information Privacy(CFIP). The target population of this study was LBS users. Data for this study were collected from January 21 to March 20, 2014. The data were gathered from 231 questionnaire respondents with experience using LBS. Among these reponses, 21 were excluded because of missing or inappropriate data. After removing the unsuitable questionnaires, a total of 210 surveys were considered for analysis. The results of hypothesis testing are as follows. First, location awareness positively influence privacy concerns. Second, privacy concerns negatively influence trust. Finally, trust positively influence purchase intention. The results of this study will provide various implication to improve purchase intention of LBS.
A Design Of Role-based Emergency Medical Information Security System REMISS
Kim, Hyung-Hoon ; Cho, Jeong-Ran ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 185~195
DOI : 10.9708/jksci.2014.19.10.185
In this paper, we designed a role-based emergency medical information security system REMISS added the security concept to the existing emergency medical information system. Also we suggested a REMISS protocol based on HL7 for using the emergency medical information and the security information. The procedure of security consists of user authentication phase and role/permission assign phase in the REMISS. The REMISS can supply proper security service since the REMISS assign proper permissions to each users of emergency medical information system and allow the user to access the permitted emergency medical information by using security information of the REMISS. There are some advantages that REMISS can adapt to the changing of the role of each user by dynamic exchanging the security information and assigning permissions to each user.
A Study on the Efficiency of Logistics Systems through the Operation of a Freight Car Sharing Information System among Companies
Kim, Byeong-Chan ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 197~205
DOI : 10.9708/jksci.2014.19.10.197
This study set out to develop a logistics rationalization model to reduce logistics costs including return route costs by using open information systems that overcame the limitations of the old closed logistics systems by the corporations and applying the principle of freight car sharing among them. In recent years, information infrastructure that can be easily shared by many such as information networks, however, One of the causes of rising logistics costs is high empty transfer rates on return routes after goods are transported from the distribution center of each company to consumption sites, It is propose to promote logistic efficiency and innovation. The study especially identified a logistics rationalization plan by examining and analyzing the stages of transportation on the circulation route of a distribution system from the distribution center of a corporation to consumption sites and the empty transfer rates and their current state.
Effect of social media use motive and credibility on social capital
Park, Jin-Woo ; Kim, Deok-Jung ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 207~219
DOI : 10.9708/jksci.2014.19.10.207
The purpose of this study was to investigate the effect of social media use motive and credibility on social capital. In particular, it explored the motivations for the use of most influential SNS in Korea, Facebook. The result of analysis showed that the use motive, information exchange and making relationship, influenced significantly on social capital. Second, the credibility of social media influenced significantly on social capital(bonding social capital and bridging capital).
Development of Multi-Disciplinary Learning Program for 21
Century Learning Skills
Song, Jeong-Beom ; Lee, Tae-Wuk ;
Journal of the Korea Society of Computer and Information, volume 19, issue 10, 2014, Pages 221~230
DOI : 10.9708/jksci.2014.19.10.221
In this study, we propose a learning method that can be extended to take advantage of the knowledge of the various disciplines in the project related to the subject to perform the process of restoring stork. The development program is grade 3.4 Group 4 class hours, grade 5.6 Group 4 class hours, total 8 class hours, and in each class hour, it was designed to be extended such creativity, problem solving skills, communication skills and ability to learn, based on knowledge and concepts of the elementary curriculum related to storks. Content validity was verified using a method consisting of 12 experts to verify the validity of the program. Feasibility evaluation of Lawshe (1975) content validity ratio for the analysis: we used (Content Validity Ratio CVR) calculation formula. As a result of a feasibility study in total 8 class hours, It was analyzed that match with the development effect except for program of grade 3.4 group 4 class hours. grade 3.4 group 4 class hours program was raised this issue for the academic linkage region, was fixed. Later, It is necessary to measure the degree of learning skills improves effectiveness by applying it to the elementary school students in the proposed research program.