Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartD
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 15D, Issue 6 - Dec 2008
Volume 15D, Issue 5 - Oct 2008
Volume 15D, Issue 4 - Aug 2008
Volume 15D, Issue 3 - Jun 2008
Volume 15D, Issue 2 - Apr 2008
Volume 15D, Issue 1 - Feb 2008
Selecting the target year
Functional Improvement of the Compressed Data Management System for Mobile DBMS
Hwang, Jin-Ho ; Lee, Jeong-Wha ; Kim, Gun-Woo ; Shin, Young-Jae ; Son, Jin-Hyun ;
The KIPS Transactions:PartD, volume 15D, issue 6, 2008, Pages 733~740
DOI : 10.3745/KIPSTD.2008.15-D.6.733
Recently, mobile computing devices are used popularly. And quantity of information on mobile computing devices is being increased due to digitalization of information. So it needs an embedded DBMS for effective information management. Furthermore, since flash memory having a restriction on the number of partial write cycles is rapidly deployed on mobile computing devices as data storage and is more expensive than the conventional magnetic hard disk, the compressed data management system(CDMS) has been considered as an effective storage management technique for mobile computing devices in previous research. However, the research of CDMS is at the initial stage and has several problems. Hence, in this paper, we present additional storage management methods to solve the problems and improve the effectiveness of the CDMS for embedded DBMS.
Finding Frequent Itemsets Over Data Streams in Confined Memory Space
Kim, Min-Jung ; Shin, Se-Jung ; Lee, Won-Suk ;
The KIPS Transactions:PartD, volume 15D, issue 6, 2008, Pages 741~754
DOI : 10.3745/KIPSTD.2008.15-D.6.741
Due to the characteristics of a data stream, it is very important to confine the memory usage of a data mining process regardless of the amount of information generated in the data stream. For this purpose, this paper proposes the Prime pattern tree(PPT) for finding frequent itemsets over data streams with using the confined memory space. Unlike a prefix tree, a node of a PPT can maintain the information necessary to estimate the current supports of several itemsets together. The length of items in a prime pattern can be reduced the total number of nodes and controlled by split_delta
. The size and the accuracy of the PPT is determined by
. The accuracy is better as the value of
is smaller since the value of
is large, many itemsets are estimated their frequencies. So it is important to consider trade-off between the size of a PPT and the accuracy of the mining result. Based on this characteristic, the size and the accuracy of the PPT can be flexibly controlled by merging or splitting nodes in a mining process. For finding all frequent itemsets over the data stream, this paper proposes a PPT to replace the role of a prefix tree in the estDec method which was proposed as a previous work. It is efficient to optimize the memory usage for finding frequent itemsets over a data stream in confined memory space. Finally, the performance of the proposed method is analyzed by a series of experiments to identify its various characteristics.
Log-Structured B-Tree for NAND Flash Memory
Kim, Bo-Kyeong ; Joo, Young-Do ; Lee, Dong-Ho ;
The KIPS Transactions:PartD, volume 15D, issue 6, 2008, Pages 755~766
DOI : 10.3745/KIPSTD.2008.15-D.6.755
Recently, NAND flash memory is becoming into the spotlight as a next-generation storage device because of its small size, fast speed, low power consumption, and etc. compared to the hard disk. However, due to the distinct characteristics such as erase-before-write architecture, asymmetric operation speed and unit, disk-based systems and applications may result in severe performance degradation when directly implementing them on NAND flash memory. Especially when a B-tree is implemented on NAND flash memory, intensive overwrite operations may be caused by record inserting, deleting, and reorganizing. These may result in severe performance degradation. Although
-tree has been proposed in order to overcome this problem, it suffers from frequent node split and rapid increment of its height. In this paper, we propose Log-Structured B-Tree(LSB-Tree) where the corresponding log node to a leaf node is allocated for update operation and then the modified data in the log node is stored at only one write operation. LSB-tree reduces additional write operations by deferring the change of parent nodes. Also, it reduces the write operation by switching a log node to a new leaf node when inserting the data sequentially by the key order. Finally, we show that LSB-tree yields a better performance on NAND flash memory by comparing it to
-tree through various experiments.
Generating Rank-Comparison Decision Rules with Variable Number of Genes for Cancer Classification
Yoon, Young-Mi ; Bien, Sang-Jay ; Park, Sang-Hyun ;
The KIPS Transactions:PartD, volume 15D, issue 6, 2008, Pages 767~776
DOI : 10.3745/KIPSTD.2008.15-D.6.767
Microarray technology is extensively being used in experimental molecular biology field. Microarray experiments generate quantitative expression measurements for thousands of genes simultaneously, which is useful for the phenotype classification of many diseases. One of the two major problems in microarray data classification is that the number of genes exceeds the number of tissue samples. The other problem is that current methods generate classifiers that are accurate but difficult to interpret. Our paper addresses these two problems. We performed a direct integration of individual microarrays with same biological objectives by transforming an expression value into a rank value within a sample and generated rank-comparison decision rules with variable number of genes for cancer classification. Our classifier is an ensemble method which has k top scoring decision rules. Each rule contains a number of genes, a relationship among involved genes, and a class label. Current classifiers which are also ensemble methods consist of k top scoring decision rules. However these classifiers fix the number of genes in each rule as a pair or a triple. In this paper we generalized the number of genes involved in each rule. The number of genes in each rule is in the range of 2 to N respectively. Generalizing the number of genes increases the robustness and the reliability of the classifier for the class prediction of an independent sample. Also our classifier is readily interpretable, accurate with small number of genes, and shed a possibility of the use in a clinical setting.
Extracting Subsequence of Boolean Variables using SAT-solver
Park, Sa-Choun ; Kwon, Gi-Hwon ;
The KIPS Transactions:PartD, volume 15D, issue 6, 2008, Pages 777~784
DOI : 10.3745/KIPSTD.2008.15-D.6.777
Recently in the field of model checking, to overcome the state explosion problem, the method of using a SAT-solver is mainly researched. To use a SAT-solver, the system to be verified is translated into CNF and the Boolean cardinality constraint is widely used in translating the system into CNF. In BCC it is dealt with set of boolean variables, but there is no translating method of the sequence among Boolean variables. In this paper, we propose methods for translating the problem, which is extracting a subsequence with length k from a sequence of Boolean variables, into CNF formulas. Through experimental results, we show that our method is more efficient than using only BCC.
An On-The-Fly Testing Technique of Embedded Software using Aspect Components
Kim, Jong-Phil ; Hong, Jang-Eui ;
The KIPS Transactions:PartD, volume 15D, issue 6, 2008, Pages 785~792
DOI : 10.3745/KIPSTD.2008.15-D.6.785
In spite of the various techniques on the testing of embedded software, operation failures of embedded systems such as robot or satellite applications, are occurred frequently. The critical reason of these failures is due to the fact that software is embedded into a target system with inherent faults. Therefore, in order to prevent the failure owing to such faults, it needs a technique to test the embedded software which operates in real environment. In this paper, we propose a testing technique, aspect-based On-the-Fly testing that is to test the functionality and performance at real operation time. Our proposed technique gives some benefits of real test of unexpected input conditions, prevention of software malfunction, and reusability of aspect components for the testing.
A Study on Selection Process of Open Source Software
Lee, Young-Min ; Rhew, Sung-Yul ; Kim, Jong-Bae ;
The KIPS Transactions:PartD, volume 15D, issue 6, 2008, Pages 793~802
DOI : 10.3745/KIPSTD.2008.15-D.6.793
The development methods which utilize OSSs have been tried as new alternative to solve limits of the previous software developments such as the quality of software, and time and cost of developments. Especially, small and medium companies are suffering from difficulty in applying large-scale development methodology whenever they develop softwares. Therefore, in the current situation that demand for small-scale development methodology is increasing, the methods of utilizing OSSs can become an efficient way to save costs and reduce a development period. Accordingly, analysis of open-source is no fixed procedure or method to utilize open-source for software developments in the field. In this thesis, to solve such problems, we propose the procedures and methods for identifying and selecting suitable open-source, and effective methods for improvement and integration through least modification on the basis of synthesis of existing researches and experiences in development projects. For selection of OSSs, we did identify correct requirements for the software to be developed, investigate the open-source just matching with such requirements, draw a candidate index, establish assessment criteria, and the consequently present a method to select OSSs. And, we deduced the validity and improvement of each detailed activity from practical application to an actual project and assessment.
A Feature-Oriented Approach to Variability Management and Consistency Analysis of Multi-Viewpoint Product Line Architectures
Lee, Kwan-Woo ;
The KIPS Transactions:PartD, volume 15D, issue 6, 2008, Pages 803~814
DOI : 10.3745/KIPSTD.2008.15-D.6.803
Product line architectures include variable parts to be selected according to product specific requirements. In order to derive architectures that are valid for a particular product from product line architectures, variabilities of product line architectures must be systematically managed. In this paper, we adopt an approach to variability management of product line architectures through an explicit mapping between a feature model and product line architecture models. If this mapping is incorrect or there exists inconsistency among product line architectural elements, variabilities of product line architectures cannot be managed correctly. Therefore, this paper formally defines product line architectural models in terms of conceptual, process, deployment, and module views, and mapping relationships between the feature model and the architectural models. Consistency rules for correct variability management of product line architectures are defined in terms of consistency in each of product line architecture model, consistency between different architectural view models, and consistency between a feature model and product line architectural models. These consistency rules provide a theoretical foundation for deriving valid product architecture from product line architectures.
A Design of Dynamic Meta-model for Reusable Framework of Embedded System
Kim, Chul-Jin ; Cho, Eun-Sook ;
The KIPS Transactions:PartD, volume 15D, issue 6, 2008, Pages 815~824
DOI : 10.3745/KIPSTD.2008.15-D.6.815
Embedded system is applied in various fields and must equip system to respond market`s requirement which is changing fast. Products that do not equip such fast construction system will have become sterilization. Construction system for Time-To-Market is reusability system or framework that have reused existent product and produce new product. Because embedded system is being based on hardware, amendment is not available easily, but can change system softly using segment of software. Therefore, in this paper, suggest meta-model of reusability framework that can change embedded software. Meta model of this paper suggests dynamic meta-model to design functional flow of reusability framework.
Automated Code Smell Detection and Refactoring using OCL
Kim, Tae-Woong ; Kim, Tae-Gong ;
The KIPS Transactions:PartD, volume 15D, issue 6, 2008, Pages 825~840
DOI : 10.3745/KIPSTD.2008.15-D.6.825
Refactoring is a kind of software modification process that improves system qualities internally but maintains system functions externally. What should be improved on the existing source codes should take precedence over the others in such a modification process using this refactoring. Martin Fowler and Kent Beck proposed a method that identifies code smells for this purpose. Also, some studies on determining what refactoring will be applied to which targets through detecting code smells in codes were presented. However, these studies have a lot of disadvantages that show a lack of precise description for such code smells and detect limited code smells only. In addition, these studies showed other disadvantages that generate ambiguity in behavior preservation due to the fact that a description method of pre-conditions for the behavior preservation is included in a refactoring process or unformalized. Thus, our study represents a precise specification of code smells using OCL and proposes a framework that performs a refactoring process through the automatic detection of code smells using an OCL interpreter. Furthermore, we perform the automatic detection in which the code smells are be specified by using OCL to the java program and verify its applicability and effectivity through applying a refactoring process.
An Adjustable Process of Requirements Prioritizing for Release Plan
Seong, Jae-Seok ; Kang, Dong-Su ; Song, Chee-Yang ; Baik, Doo-Kwon ;
The KIPS Transactions:PartD, volume 15D, issue 6, 2008, Pages 841~856
DOI : 10.3745/KIPSTD.2008.15-D.6.841
The priority of requirement is important because the priority is a critical activity of release plan especially in software development which has an open market customer. Also, it is important for stakeholders to select a method and aspects to prioritize requirements. The selection is based on the organizational experience of a priority process, the process model of the product, goals and a type of products, and dependencies between requirements. But, the current researches considered only static dependency between requirements and did not suggest a systematic priority process. In addition, the current researches only suggest limited aspects to prioritize requirements, such as cost and value. Therefore, this paper proposes an adjustable priority process based on a priority model to select a method and aspects for the suitable priority for product and organization. Especially, this paper enhances the completeness of a release plan by a definition of static and dynamic dependency types between requirements. This paper suggests a priority model, which considers the dependencies between requirement and various viewpoint of software development. Based on the priority model, the paper suggests a systematic priority process to promote reasonable decisions to the priority and release plan of requirement.
Removable Logo Watermarking Technique
Cho, Dong-Joon ; Choi, Hyuk ;
The KIPS Transactions:PartD, volume 15D, issue 6, 2008, Pages 857~860
DOI : 10.3745/KIPSTD.2008.15-D.6.857
In this paper, we propose a removable logo watermarking technique for copyright protection of digital image. Then, visible logo is inserted into digital image to protect copyright, and the information removed by the logo is embedded by a new quantization watermarking. In a legal usage, the image can be reconstructed without logo after watermarking detection process. Experiment results show that the proposed method maintains high image quality in both watermarked images and reconstructed images, and is practical and effective in protection of image copyright.
An Automatic Identification System of Biological Resources based on 2D Barcode and UCC/EAN-128
Chu, Min-Seok ; Ryu, Keun-Ho ; Kim, Jun-Woo ; Kim, Hung-Tae ; Han, Bok-Ghee ;
The KIPS Transactions:PartD, volume 15D, issue 6, 2008, Pages 861~872
DOI : 10.3745/KIPSTD.2008.15-D.6.861
As rapid development of computing environment, field of automatic identification research which interoperates with various physical objects and digital information is making active progress. Although the automatic identification system is widely used in various industries, application of automatic identification system in the field of medical health doesn`t reach other industry. Therefore research in medical health supplies such as medical equipment, blood, human tissues and etc is on progress. This paper suggests the application of automatic identification technology for biological resources which is core research material in human genome research. First of all, user environment requirements for the introduction of automatic identification technology are defined and through the experiments and research, barcode is selected as a suitable tag interface. Data Matrix which is 2D barcode symbology is chosen and data schema is designed based on UCC/EAN-128 for international defecto standard. To showapplicability of proposed method when applied to actual environment, we developed, tested and evaluated application as following methods. Experiments of barcode read time at 196 and 75 below zero which is actual temperature where biological resources are preserved resulted read speed of average of 1.6 second and the data schema satisfies requirements for the biological resources application. Therefore suggested method can provide data reliability as well as rapid input of data in biological resources information processing.
A Study on the Roadkill Prevention System Based on the Web Services
Noh, Yong-Deok ; Jeong, Eun-Sung ; Lee, Jeong-Sik ; Kim, Kyoung-Hee ;
The KIPS Transactions:PartD, volume 15D, issue 6, 2008, Pages 873~878
DOI : 10.3745/KIPSTD.2008.15-D.6.873
The wild animal warning post and the echo-bridge on the road are widely used as a popular roadkill prevention system. The warning post shows a one way warning message to drivers and is not effective to prevent animals from being killed. In the case of echo-bridge, the construction cost is very high such that we could not build sufficient number of the echo bridges on the road. Therefore, we have proposed a new roadkill prevention system which is designed and implemented to warn both of drivers and animals. This system is composed with sensor, speaker, web server, and navigation system and the software is designed to use web services on the web under the. Net environment.
Developing XForms Based Mobile User Interface for Web Service Composition
Lee, Eun-Jung ;
The KIPS Transactions:PartD, volume 15D, issue 6, 2008, Pages 879~888
DOI : 10.3745/KIPSTD.2008.15-D.6.879
As web services have become an important architecture solution, web service composition applications are developed actively. A mobile application supporting multiple services requires a complex user interface so that the interface needs to consist of more than one view and to provide a way to navigate between views. In this paper, we presented a formal way to analyze a set of views for a given service specification, and a relation model between views and methods. We then provided an algorithm to generate codes for service method calls and navigation between views. Therefore, with an optional user configuration input, we could automatically generated XForms codes from the web service specifications. Finally, we developed a proof of concept implementation of XForms browser to show that the generated codes works well as an interface for web service compositions.