Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartD
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 13D, Issue 7 - Dec 2006
Volume 13D, Issue 6 - Oct 2006
Volume 13D, Issue 5 - Oct 2006
Volume 13D, Issue 4 - Aug 2006
Volume 13D, Issue 3 - Jun 2006
Volume 13D, Issue 2 - Apr 2006
Volume 13D, Issue 1 - Feb 2006
Selecting the target year
Load Shedding via Predicting the Frequency of Tuple for Efficient Analsis over Data Streams
Chang, Joong-Hyuk ;
The KIPS Transactions:PartD, volume 13D, issue 6, 2006, Pages 755~764
DOI : 10.3745/KIPSTD.2006.13D.6.755
In recent, data streams are generated in various application fields such as a ubiquitous computing and a sensor network, and various algorithms are actively proposed for processing data streams efficiently. They mainly focus on the restriction of their memory usage and minimization of their processing time per data element. However, in the algorithms, if data elements of a data stream are generated in a rapid rate for a time unit, some of the data elements cannot be processed in real time. Therefore, an efficient load shedding technique is required to process data streams effcientlv. For this purpose, a load shedding technique over a data stream is proposed in this paper, which is based on the predicting technique of the frequency of data element considering its current frequency. In the proposed technique, considering the change of the data stream, its threshold for tuple alive is controlled adaptively. It can help to prevent unnecessary load shedding.
Mining Association Rules in Multidimensional Stream Data
Kim, Dae-In ; Park, Joon ; Kim, Hong-Ki ; Hwang, Bu-Hyun ;
The KIPS Transactions:PartD, volume 13D, issue 6, 2006, Pages 765~774
DOI : 10.3745/KIPSTD.2006.13D.6.765
An association rule discovery, a technique to analyze the stored data in databases to discover potential information, has been a popular topic in stream data system. Most of the previous researches are concerned to single stream data. However, this approach may ignore in mining to multidimensional stream data. In this paper, we study the techniques discovering the association rules to multidimensional stream data. And we propose a AR-MS method reflecting the characteristics of stream data since make the summarization information by one data scan and discovering the association rules for significant rare data that appear infrequently in the database but are highly associated with specific event. Also, AR-MS method can discover the maximal frequent item of multidimensional stream data by using the summarization information. Through analysis and experiments, we show that AR-MS method is superior to other previous methods.
Dangerous Area Prediction Technique for Preventing Disaster based on Outside Sensor Network
Jung, Young-Jin ; Kim, Hak-Cheol ; Ryu, Keun-Ho ;
The KIPS Transactions:PartD, volume 13D, issue 6, 2006, Pages 775~788
DOI : 10.3745/KIPSTD.2006.13D.6.775
Many disaster monitoring systems are constantly studied to prevent disasters such as environmental pollution, the breaking of a tunnel and a building, flooding, storm earthquake according to the progress of wireless telecommunication, the miniaturization of terminal devices, and the spread of sensor network. A disaster monitoring system can extract information of a remote place, process sensor data with rules to recognize disaster situation, and provide work for preventing disaster. However existing monitoring systems are not enough to predict and prevent disaster, because they can only process current sensor data through utilizing simple aggregation function and operators. In this paper, we design and implement a disaster prevention system to predict near future dangerous area through using outside sensor network and spatial Information. The provided prediction technique considers the change of spatial information over time with current sensor data, and indicates the place that could be dangerous in near future. The system can recognize which place would be dangerous and prepare the disaster prevention. Therefore, damage of disaster and cost of recovery would be reduced. The provided disaster prevention system and prediction technique could be applied to various disaster prevention systems and be utilized for preventing disaster and reducing damages.
Context Information Model using Ontologies and Rules Based on Spatial Object
Park, Mi ; Ryu, Keun-Ho ;
The KIPS Transactions:PartD, volume 13D, issue 6, 2006, Pages 789~796
DOI : 10.3745/KIPSTD.2006.13D.6.789
Context-aware is the core in ubiquitous environment of sensor network to support intelligent and contextual adaptation service. The new context information model is demanded to support context-aware applications. The model should not depend on a specified application and be shareable between applications in the same environment. Also, it should support various context representation and complex context-aware. In this paper, we define the context information according to context-aware process. Also we design the knowledge of domain as well as applications using ontologies and rules. The domain spatial ontology and application knowledge are represented using the spatial object model and the rules of expanded ontologies, respectively. The expression of abundant spatial ontology represents the context information about distance between objects and adjacent object as well as the location of the object. The proposed context information model which is able to exhibit various spatial context and recognizes complex spatial context through the existing GIS. This model shows that it can adapt to a large scale outdoor context-aware applications such as air pollution and prevention of disasters as well as various context-aware applications.
An Efficient Incremental Maintenance of SPJ Materialized Views
Lee, Ki-Yong ; Son, Jin-Hyun ; Kim, Myoung-Ho ;
The KIPS Transactions:PartD, volume 13D, issue 6, 2006, Pages 797~806
DOI : 10.3745/KIPSTD.2006.13D.6.797
In the data warehouse environment, materialized views are typically used to support efficient query processing. Materialized views need to be updated when source data change. Since the update of the views need impose a significant overhead, it is essential to update the views efficiently. Though various view maintenance strategies have been discussed in the past, the efficient maintenance of SPJ materialized views has not been sufficiently investigated. In this paper, we propose an efficient incremental view maintenance method for SPJ materialized views that minimizes the total accesses to data sources. The proposed method finds an optimal view maintenance strategy using a dynamic programming algorithm. We also present various experimental results that shows the efficiency of our proposed method.
TToSA: An Architecture Model Translator toward Embedded Software Product Line Engineering
Hong, Jang-Eui ; Oh, Gi-Young ; Kim, Jong-Phil ;
The KIPS Transactions:PartD, volume 13D, issue 6, 2006, Pages 807~814
DOI : 10.3745/KIPSTD.2006.13D.6.807
Along with the enlargement of application scope, the growth of requirements complexity, and the fast development of product for embedded system, lots of industries developing embedded software try to evolve their traditional development environment into the new paradigm such as product line engineering approach. In order to sufficiently support the evolution, software architecture is essentially required to develop the embedded software. In this paper, we propose a tool, named TToSA which translates the conventional software models to software architecture models. Our TToSA is developed with the critical implication about that an industry can approach toward the new development paradigm without the big change of the existing software development method.
A Study for Enhancing the Criterion of the Software Cost Estimation
Kwon, Ki-Tae ; Byun, Boon-Hee ;
The KIPS Transactions:PartD, volume 13D, issue 6, 2006, Pages 815~822
DOI : 10.3745/KIPSTD.2006.13D.6.815
It is very important that they accurately predict the software development cost in the early stage of a software development. Because cost estimations are required when bidding for a contract or determining whether a project is feasible in terms of a cost-benefit analysis. The criterions of the software cost estimation was set up to calculate software development cost more exactly, which is applied to made up a budget of the software business or to calculate a suitable cost to start the business in our country. However, as the software technology and environment are changing very rapidly, it need to enhance the criterion of the cost estimation continuously. Therefore, we tried to apply technology of software and a variety of factors of environment changes in present. Most of all, we proposed an introduction and readjustment of the adjustment factor applying 14 general system characteristics to improve the accuracy of the cost estimation and the schedule adjustment factor that is required by practicians. For evaluating the accuracy in terms of the real data, we have used MMRE & PRED. In result, we proved that the accuracy was clearly improved by applying the scale factor and readjusted VAF with 14 general system characteristics. Moreover, we evaluated the accuracy of the schedule adjustment factor.
A Study on the Research Model for the Standardization of Software-Similarity-Appraisal Techniques
Bahng, Hyo-Keun ; Cha, Tae-Own ; Chung, Tai-Myoung ;
The KIPS Transactions:PartD, volume 13D, issue 6, 2006, Pages 823~832
DOI : 10.3745/KIPSTD.2006.13D.6.823
The Purpose of Similarity(Reproduction) Degree Appraisal is to determine the equality or similarity between two programs and it is a system that presents the technical grounds of judgment which is necessary to support the resolution of software intellectual property rights through expert eyes. The most important things in proceeding software appraisal are not to make too much of expert`s own subjective judgment and to acquire the accurate-appraisal results. However, up to now standard research and development for its systematic techniques are not properly made out and as different expert as each one could approach in a thousand different ways, even the techniques for software appraisal types have not exactly been presented yet. Moreover, in the analyzing results of all the appraisal cases finished before, through a practical way, we blow that there are some damages on objectivity and accuracy in some parts of the appraisal results owing to the problems of existing appraisal procedures and techniques or lack of expert`s professional knowledge. In this paper we present the model for the standardization of software-similarity-appraisal techniques and objective-evaluation methods for decreasing a tolerance that could make different results according to each expert in the same-evaluation points. Especially, it analyzes and evaluates the techniques from various points of view concerning the standard appraisal process, setting a range of appraisal, setting appraisal domains and items in detail, based on unit processes, setting the weight of each object to be appraised, and the degree of logical and physical similarity, based on effective solutions to practical problems of existing appraisal techniques and their objective and quantitative standardization. Consequently, we believe that the model for the standardization of software-similarity-appraisal techniques will minimizes the possibility of mistakes due to an expert`s subjective judgment as well as it will offer a tool for improving objectivity and reliability of the appraisal results.
Program Plagiarism Detection through Memory Access Log Analysis
Park, Sung-Yun ; Han, Sang-Yong ;
The KIPS Transactions:PartD, volume 13D, issue 6, 2006, Pages 833~838
DOI : 10.3745/KIPSTD.2006.13D.6.833
Program Plagiarism is an infringement of software copyright. In detecting program plagiarism, many different source program comparison methods has been studied. But, it is not easy to detect plagiarized program that made a few cosmetic changes in program structures and variable names In this paper, we propose a new ground-breaking technique in detecting plagiarism by Memory Access Log Analysis.
Dynamic Distributed Adaptation Framework for Quality Assurance of Web Service in Mobile Environment
Lee, Seung-Hwa ; Cho, Jae-Woo ; Lee, Eun-Seok ;
The KIPS Transactions:PartD, volume 13D, issue 6, 2006, Pages 839~846
DOI : 10.3745/KIPSTD.2006.13D.6.839
Context-aware adaptive service for overcoming the limitations of wireless devices and maintaining adequate service levels in changing environments is becoming an important issue. However, most existing studies concentrate on an adaptation module on the client, proxy, or server. These existing studies thus suffer from the problem of having the workload concentrated on a single system when the number of users increases md, and as a result, increases the response time to a user`s request. Therefore, in this paper the adaptation module is dispersed and arranged over the client, proxy, and server. The module monitors the contort of the system and creates a proposition as to the dispersed adaptation system in which the most adequate system for conducting operations. Through this method faster adaptation work will be made possible even when the numbers of users increase, and more stable system operation is made possible as the workload is divided. In order to evaluate the proposed system, a prototype is constructed and dispersed operations are tested using multimedia based learning content, simulating server overload and compared the response times and system stability with the existing server based adaptation method. The effectiveness of the system is confirmed through this results.
A Study of Mobile Collaboration Environment based on Distributed Object Group Framework and Its application
Kim, Dong-Seok ; Jeong, Chang-Won ; Joo, Su-Chong ;
The KIPS Transactions:PartD, volume 13D, issue 6, 2006, Pages 847~856
DOI : 10.3745/KIPSTD.2006.13D.6.847
In this paper, we suggested a mobile collaboration framework for supporting mobile services among mobile devices, and designed and implemented on this environment. The suggested framework has three elements; groups of sensors and mobile devices(Fixed and Moving-typed PDAs) and a home server. We designed interfaces for interactions with each other in collaboration environment with three elements described above. The information collected by sensors can be share and exchanged by mobile devices or a home server in accordance with Push and Pull methods. This framework is based on the distributed object group framework(DOGF) we implemented before. Therefore the DOGF provides functions of object group management, storing information and security services to our mobile collaboration framework via application interfaces defined. The information collected by sensors is arranged according to user`s security `demands. And user profile information is used for checking authority of each service object. Each component for executing functions of mobile devices and a home server is implemented by TMO scheme. And we used the TMOSM for interactions between distributed components. Finally, we showed via GUI the executablity of a given healthcare application scenario on our mobile collaboration framework.