Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Computer and Information
Journal Basic Information
Journal DOI :
Korean Society of Computer Information
Editor in Chief :
Volume & Issues
Volume 19, Issue 12 - Dec 2014
Volume 19, Issue 11 - Nov 2014
Volume 19, Issue 10 - Oct 2014
Volume 19, Issue 9 - Sep 2014
Volume 19, Issue 8 - Aug 2014
Volume 19, Issue 7 - Jul 2014
Volume 19, Issue 6 - Jun 2014
Volume 19, Issue 5 - May 2014
Volume 19, Issue 4 - Apr 2014
Volume 19, Issue 3 - Mar 2014
Volume 19, Issue 2 - Feb 2014
Volume 19, Issue 1 - Jan 2014
Selecting the target year
Design and Implementation of Location Information System and User Mapping System using DSDV Routing Algorithm in Ad-hoc Network Environment
Kwak, Jong Wook ;
Journal of the Korea Society of Computer and Information, volume 19, issue 3, 2014, Pages 1~9
DOI : 10.9708/jksci.2014.19.3.001
In this paper, we design and implement location information system and user mapping system using DSDV(Destination Sequenced Distance Vector) routing algorithm in ad-hoc network environment to efficient manage a number of mobile devices. The software part in proposed system construct ad-hoc network using DSDV routing algorithm and it activate alarm system, such as vibration, when one of devices disappears in the network. The hardware system, called u_LIN (User Location Information Node) construct ad-hoc network and it helps to find a disappeared device by using warning system. When we evaluate the performance of our prototype system, we have checked a correct operation, within the range of 250m in case of 1:1 communication and within the range of 100m in case of 1:N communication. The implemented system in this paper is highly expected to flexibly use in juvenile protection system, stray-child protection system, tourist guide system and so on.
Real Time Balancing Control of 2 Wheel Robot Using a Predictive Controller
Kang, Jin-Gu ;
Journal of the Korea Society of Computer and Information, volume 19, issue 3, 2014, Pages 11~16
DOI : 10.9708/jksci.2014.19.3.011
In this paper, the two-wheels robot using a predictive controller to maintain the balance of the posture control in real time have been examined. A reaction wheel pendulum control method is adopted to maintain the balance while the bicycle robot is driving. The objective of this research was to design and implement a self-balancing algorithm using the dsPIC30F4013 embedded processor. To calculate the attitude in ARS using 2 axis gyro(roll, pitch) and 3 axis accelerometers (x, y, z). In this study, the disturbance of the posture for the asymmetrical propose to overcome the predictive controller which was a problem in the control of a remote system by introducing the two wheels of the robot controller and the linear prediction of the system controller combines the simulation was performed. Also, the robust characteristic for realizing the goal of designing a loop filter too robust controller is designed so that satisfactory stability of the control system to improve stability of the system to minimize degradation of performance was confirmed.
Word Cluster-based Mobile Application Categorization
Heo, Jeongman ; Park, So-Young ;
Journal of the Korea Society of Computer and Information, volume 19, issue 3, 2014, Pages 17~24
DOI : 10.9708/jksci.2014.19.3.017
In this paper, we propose a mobile application categorization method using word cluster information. Because the mobile application description can be shortly written, the proposed method utilizes the word cluster seeds as well as the words in the mobile application description, as categorization features. For the fragmented categories of the mobile applications, the proposed method generates the word clusters by applying the frequency of word occurrence per category to K-means clustering algorithm. Since the mobile application description can include some paragraphs unrelated to the categorization, such as installation specifications, the proposed method uses some word clusters useful for the categorization. Experiments show that the proposed method improves the recall (5.65%) by using the word cluster information.
The I-MCTBoost Classifier for Real-time Face Detection in Depth Image
Joo, Sung-Il ; Weon, Sun-Hee ; Choi, Hyung-Il ;
Journal of the Korea Society of Computer and Information, volume 19, issue 3, 2014, Pages 25~35
DOI : 10.9708/jksci.2014.19.3.025
This paper proposes a method of boosting-based classification for the purpose of real-time face detection. The proposed method uses depth images to ensure strong performance of face detection in response to changes in lighting and face size, and uses the depth difference feature to conduct learning and recognition through the I-MCTBoost classifier. I-MCTBoost performs recognition by connecting the strong classifiers that are constituted from weak classifiers. The learning process for the weak classifiers is as follows: first, depth difference features are generated, and eight of these features are combined to form the weak classifier, and each feature is expressed as a binary bit. Strong classifiers undergo learning through the process of repeatedly selecting a specified number of weak classifiers, and become capable of strong classification through a learning process in which the weight of the learning samples are renewed and learning data is added. This paper explains depth difference features and proposes a learning method for the weak classifiers and strong classifiers of I-MCTBoost. Lastly, the paper presents comparisons of the proposed classifiers and the classifiers using conventional MCT through qualitative and quantitative analyses to establish the feasibility and efficiency of the proposed classifiers.
A Lip Detection Algorithm Using Color Clustering
Jeong, Jongmyeon ;
Journal of the Korea Society of Computer and Information, volume 19, issue 3, 2014, Pages 37~43
DOI : 10.9708/jksci.2014.19.3.037
In this paper, we propose a robust lip detection algorithm using color clustering. At first, we adopt AdaBoost algorithm to extract facial region and convert facial region into Lab color space. Because a and b components in Lab color space are known as that they could well express lip color and its complementary color, we use a and b component as the features for color clustering. The nearest neighbour clustering algorithm is applied to separate the skin region from the facial region and K-Means color clustering is applied to extract lip-candidate region. Then geometric characteristics are used to extract final lip region. The proposed algorithm can detect lip region robustly which has been shown by experimental results.
P2P Traffic Classification using Advanced Heuristic Rules and Analysis of Decision Tree Algorithms
Ye, Wujian ; Cho, Kyungsan ;
Journal of the Korea Society of Computer and Information, volume 19, issue 3, 2014, Pages 45~54
DOI : 10.9708/jksci.2014.19.3.045
In this paper, an improved two-step P2P traffic classification scheme is proposed to overcome the limitations of the existing methods. The first step is a signature-based classifier at the packet-level. The second step consists of pattern heuristic rules and a statistics-based classifier at the flow-level. With pattern heuristic rules, the accuracy can be improved and the amount of traffic to be classified by statistics-based classifier can be reduced. Based on the analysis of different decision tree algorithms, the statistics-based classifier is implemented with REPTree. In addition, the ensemble algorithm is used to improve the performance of statistics-based classifier Through the verification with the real datasets, it is shown that our hybrid scheme provides higher accuracy and lower overhead compared to other existing schemes.
Hybrid Link State Update Algorithm in QoS Routing
Cho, Kang Hong ;
Journal of the Korea Society of Computer and Information, volume 19, issue 3, 2014, Pages 55~62
DOI : 10.9708/jksci.2014.19.3.055
This paper has proposed Hybrid QoS Routing Link State Update(LSU) Algorithm that has had a both advantage of LSU message control in periodic QoS routing LSU algorithm and QoS routing performance in adaptive LSU algorithm. Hybrid LSU algorithm can adapt the threshold based network traffic information and has the mechanism that calculate LSU message transmission priority using the flow of statistical request bandwidth and available bandwidth and determine the transmission of the message according to update rate per a unit of time. We have evaluated the performance of the proposed algorithm and the existing algorithms on MCI simulation network using the performance metric as the QoS routing blocking rate and the mean update rate per link, it thus appears that we have verified the performance of this algorithm that it can diminish to 10% of the LSU message count.
MAC-Layer Error Control for Real-Time Broadcasting of MPEG-4 Scalable Video over 3G Networks
Kang, Kyungtae ; Noh, Dong Kun ;
Journal of the Korea Society of Computer and Information, volume 19, issue 3, 2014, Pages 63~71
DOI : 10.9708/jksci.2014.19.3.063
We analyze the execution time of Reed-Solomon coding, which is the MAC-layer forward error correction scheme used in CDMA2000 1xEV-DO broadcast services, under different air channel conditions. The results show that the time constraints of MPEG-4 cannot be guaranteed by Reed-Solomon decoding when the packet loss rate (PLR) is high, due to its long computation time on current hardware. To alleviate this problem, we propose three error control schemes. Our static scheme bypasses Reed-Solomon decoding at the mobile node to satisfy the MPEG-4 time constraint when the PLR exceeds a given boundary. Second, dynamic scheme corrects errors in a best-effort manner within the time constraint, instead of giving up altogether when the PLR is high; this achieves a further quality improvement. The third, video-aware dynamic scheme fixes errors in a similar way to the dynamic scheme, but in a priority-driven manner which makes the video appear smoother. Extensive simulation results show the effectiveness of our schemes compared to the original FEC scheme.
Bigdata Analysis Project Development Methodology
Kim, Hyoungrae ; Jeon, Do-hong ; Jee, Sunghyun ;
Journal of the Korea Society of Computer and Information, volume 19, issue 3, 2014, Pages 73~85
DOI : 10.9708/jksci.2014.19.3.073
As the importance of big data analysis increases to improve the competitiveness of a corporate, a unified big data project development methodology is required in order to study the problem of a corporate in a systematic way and evaluate the problem w.r.t. a business value after solving the problem. This paper propose Scientific Data Anslysis and Development methodology(SDAD) which are integrated methodology of software development and project management for easier application into a field project. SDAD consisits of 6 stages(problem definition stage, data preparation stage, model design stage, model development stage, result extraction stage, service development state), each stages has detailed processes(47) and productions(93). SDAD, furthermore, unified previous ISP, DW, SW development methodologies in terms of the data analysis and can easily interchange the productions with them. This paper, lastly, introduces a way to assign responsible persons for each process and provide communication procedures in RACI chart to improves the efficiency of the interaction among professionals from different subjects. SDAD is applied to a Bigdata project in Korea Employment Information Services institution and the result turned out to be acceptable when evaluated by the supervision.
Effect of Information Technology Resources and Quality of Information in Logistics Information System upon Business Logistics Performance
Kim, Hak-Seung ; Lim, Wang Kyu ;
Journal of the Korea Society of Computer and Information, volume 19, issue 3, 2014, Pages 87~100
DOI : 10.9708/jksci.2014.19.3.087
This study was conducted to investigate the impact of information technology resources and quality of information in logistics information system on logistics performance of logistics companies. The questionnaire targets IT manager of logistics companies. In the questionnaire survey for empirical analysis, we conducted a survey and used 125 responses for statistical analysis to validate hypotheses. The results from the empirical model suggest that quality of information in logistics information system tend to be influence by IT resource. And firm's logistics performance is effected by the usefulness of quality of information in logistics information system.
Design and Implementation of a common API for building a system of mobile Web Services
Kwon, Doowy ; Park, Suhyun ;
Journal of the Korea Society of Computer and Information, volume 19, issue 3, 2014, Pages 101~108
DOI : 10.9708/jksci.2014.19.3.101
Many businesses, government offices, educational institutions, according to the characteristics of each business and information system is used. However, prevalence of smart phones and a wide range of mobile devices with services, which requires users with mobility, according to the latest mobile services and in many places, and is under development. Interworking between existing systems and mobile systems to be set aside for the development cost and time, a waste of human resources is getting worse. Also, in many places to provide mobile services to existing systems need to fix the problem is coming. In this paper, to solve the problem of interworking between existing systems and mobile systems for the data transfer and processing of existing server, web services server, and mobile systems has been developed between the library.
An Improved Quine-McCluskey Algorithm for Circuit Minimization
Lee, Sang-Un ;
Journal of the Korea Society of Computer and Information, volume 19, issue 3, 2014, Pages 109~117
DOI : 10.9708/jksci.2014.19.3.109
This paper revises the Quine-McCluskey Algorithm to circuit minimization problems. Quine-McCluskey method repeatedly finds the prime implicant and employs additional procedures such as trial-and-error, branch-and-bound, and Petrick's method as a means of circuit minimization. The proposed algorithm, on the contrary, produces an implicant chart beforehand to simplify the search for the prime implicant. In addition, it determines a set cover to streamline the search for
essential prime implicants. When applied to 3-variable and 4-variable experimental data, the proposed algorithm has indeed proved to obtain the optimal solutions much more simply and accurately than the Quine-McCluskey method.
The Effects of the Elder Abuse experience on mental health - Focusing on Moderating Effects of Social support -
Sim, Mi-Young ; Park, Hwie-Seo ;
Journal of the Korea Society of Computer and Information, volume 19, issue 3, 2014, Pages 119~126
DOI : 10.9708/jksci.2014.19.3.119
This study is to suggest the theoretical and practical implications by analysing the moderating effects of social supports in the relationships between the elder abuse experience and mental health. For this study, we sampled 270 of the elder abuse experience who has received council services for the aged. The results of this study showed that the elder abuse experience affect the mental health significantly and social support moderates the relationship between the elder abuse experience and the mental health. This study suggested some theoretical and practical implications on the base of the results.
The Effects of Adolescents' Self-control and Internet Expectation on Internet Addiction - Focus on Moderating Effect of Parents' Raising Attitude -
Jeong, Byeong-Il ; Park, Hwie-Seo ;
Journal of the Korea Society of Computer and Information, volume 19, issue 3, 2014, Pages 127~134
DOI : 10.9708/jksci.2014.19.3.127
This study is to suggest ideas for policies and theories by analysing the control effectiveness of parents' raising attitude on the influence of adolescents' self-control and Internet Expectation. For this, the questionnaire surveys composed of measures on adolescents' self-control, Internet Expectation, and parents' raising attitude, were carried out to 312 high school students in G metropolitan city, and the relation of the variables were studied. As a result of research, it was found out adolescents' self-control and Internet Expectation influenced the internet addiction. Expecially, the influence of adolescents' self-control and Internet Expectation of internet addiction was differed by the parent's raising attitude. In this research, the ideas of policies were suggested based on the analysis of the results.
An Analysis of Middle School Students' Resilience on Their School Adjustment
Lee, Shinsook ; Kim, Yongseob ;
Journal of the Korea Society of Computer and Information, volume 19, issue 3, 2014, Pages 135~145
DOI : 10.9708/jksci.2014.19.3.135
This study aims to draw the implication in improving middle school students' school adjustment and suggest policy methods for their school adjustment depending on the degree of social support. As a result of the research, it was found that middle school students' resilience factors such as self-control ability and interpersonal relationship ability had the influence on their impulse control, self-esteem, communication and self-expansion ability on their social competence. Emotional regulation, impulse control, self-esteem, communication and self-expansion ability had the influence on school adjustment. It was also known that middle school students' social competence had high influence on their school adjustment and their self-expansion ability had the highest influence on social competence. Middle school students' resilience factors such as emotional regulation, empathy and self-expansion ability may be different in their influence on social competence. Impulse control may be different depending on their school adjustment and a degree of social support, and social competence may be different depending on their school adjustment and a degree of social support.
Qualitative Study on the Lifelong Education Institute in Korea
Shin, Shin Myung ;
Journal of the Korea Society of Computer and Information, volume 19, issue 3, 2014, Pages 147~153
DOI : 10.9708/jksci.2014.19.3.147
The lifelong education institute in Korea has given the stable groundwork of lifelong education, according to the enforcement of the lifelong education policy for the embodiment of the lifelong education society by Lifelong Education Act newly revised and promulgated in 2007. After that, the lifelong education in Korea has developed, getting the system. Therefore, in this point, this study theoretically provided the history of the lifelong education institute, the content of Lifelong Education Act, and the current lifelong education institute. Above all, this study has significance that it discussed the lifelong education institute in Korea in the comprehensive level.
A study of the Infantry Backpack System for Portability and Mobility Performance
Chung, SungHak ;
Journal of the Korea Society of Computer and Information, volume 19, issue 3, 2014, Pages 155~161
DOI : 10.9708/jksci.2014.19.3.155
The objective of this study is to weight analysis portable backpack system of infantry weapon systems for ergonomic design in manual materials handling tasks. For the product design, we analyzed the ergonomic guidelines and status of similar weapon systems by comparing the efficient operation performance provide for the basic data. Result of this study, the relationship between portability and mobility presented for schematic. In the short distance of the short biomechanical criterion, 1-2 hours in the middle of moving psychophysical criterion, 4 hour or more long-distance criterion applied for the physiological criterion for easy of trade-offs that need to be considered. This study suggests for 4 research items for infantry backpack system in manual materials handling tasks. Throughout the result of anthropometric populations, the 5%tile body weight for -0.91kg but 95%tile in 34.17kg considered to be margin for free, easy and efficient operation for the weight margin between portability and mobility in manual materials handling tasks.
Consideration on the Revision Direction of National Cyber Security Management Legislation
Oh, Tae-Kon ; Seoung, Gwan-Sil ;
Journal of the Korea Society of Computer and Information, volume 19, issue 3, 2014, Pages 163~170
DOI : 10.9708/jksci.2014.19.3.163
Cyberspace is closely related with one another, transcending the spacetime throughout the world, and is already located in the most important area of our lives. However, if the organizational cyber terror happens like the national paralysis crisis of major information network such as the previous 1.25 the Internet crisis, the possibility of cyber crisis highly damaging our whole society such as the leakage of the national secrecy and advanced technology is increasing. But we haven't set up the institutional procedure systematically performing the national cyber security management affairs yet. So, in case of cyber crisis, this is highly likely to damage the aspects of national and personal level. On this point, this study looks into the examples of legislation related to our cyber security, and suggests the implication on the revision direction of national cyber security management regulations through relative examination about the examples of legislation in major countries.