Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartD
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 16D, Issue 6 - Dec 2009
Volume 16D, Issue 5 - Oct 2009
Volume 16D, Issue 4 - Aug 2009
Volume 16D, Issue 3 - Jun 2009
Volume 16D, Issue 2 - Apr 2009
Volume 16D, Issue 1 - Feb 2009
Selecting the target year
An Efficient Buffer Replacement Policy based on CLOCK Algorithm for NAND Flash Memory
Kim, Jong-Sun ; Son, Jin-Hyun ; Lee, Dong-Ho ;
The KIPS Transactions:PartD, volume 16D, issue 6, 2009, Pages 825~834
DOI : 10.3745/KIPSTD.2009.16D.6.825
Block-wise Skipping for Embedded Database System
Chong, Jae-Hyok ; Park, Hyoung-Min ; Hong, Seok-Jin ; Shim, Kyu-Seok ;
The KIPS Transactions:PartD, volume 16D, issue 6, 2009, Pages 835~844
DOI : 10.3745/KIPSTD.2009.16D.6.835
Today, most of all the query processors in the world generally use the `Pipelining` method to acquire fast response time (first record latency) and less memory usage. Each of the operator nodes in the Query Execution Plan (QEP) provides Open(), Next(), and Close() functions for their interface to facilitate the iterator mechanism. However, the embedded database systems for the mobile devices, based on the FLASH memory, usually require a function like Previous(), which returns the previous records from current position. It is because that, in the embedded environment, the mobile devices cannot fully provide it main memory to store all the query results. So, whenever needed the previously read records the user (program) should re-fetch the previous records using the Previous() function: the BACKWARD data fetch. In this paper, I introduce the `Direction Switching Problem` caused by the Previous() function and suggest `Block-wise Skipping` method to fully utilize the benefits of the block-based data transfer mechanism, which is widely accepted by most of the today`s relational database management systems.
k-Bitmap Clustering Method for XML Data based on Relational DBMS
Lee, Bum-Suk ; Hwang, Byung-Yeon ;
The KIPS Transactions:PartD, volume 16D, issue 6, 2009, Pages 845~850
DOI : 10.3745/KIPSTD.2009.16D.6.845
Use of XML data has been increased with growth of Web 2.0 environment. XML is recognized its advantages by using based technology of RSS or ATOM for transferring information from blogs and news feed. Bitmap clustering is a method to keep index in main memory based on Relational DBMS, and which performed better than the other XML indexing methods during the evaluation. Existing method generates too many clusters, and it causes deterioration of result of searching quality. This paper proposes k-Bitmap clustering method that can generate user defined k clusters to solve above-mentioned problem. The proposed method also keeps additional inverted index for searching excluded terms from representative bits of k-Bitmap. We performed evaluation and the result shows that the users can control the number of clusters. Also our method has high recall value in single term search, and it guarantees the searching result includes all related documents for its query with keeping two indices.
Mobbing-Value Algorithm based on User Profile in Online Social Network
Kim, Guk-Jin ; Park, Gun-Woo ; Lee, Sang-Hoon ;
The KIPS Transactions:PartD, volume 16D, issue 6, 2009, Pages 851~858
DOI : 10.3745/KIPSTD.2009.16D.6.851
Mobbing is not restricted to problem of young people but the bigger recent problem occurs in workspaces. According to reports of ILO and domestic case mobbing in the workplace is increasing more and more numerically from 9.1%(`03) to 30.7%(`08). These mobbing brings personal and social losses. The proposed algorithm makes it possible to grasp not only current mobbing victims but also potential mobbing victims through user profile and contribute to efficient personnel management. This paper extracts user profile related to mobbing, in a way of selecting seven factors and fifty attributes that are related to this matter. Next, expressing extracting factors as `1` if they are related me or not `0`. And apply similarity function to attributes summation included in factors to calculate similarity between the users. Third, calculate optimizing weight choosing factors included attributes by applying neural network algorithm of SPSS Clementine and through this summation Mobbing-Value(MV) can be calculated . Finally by mapping MV of online social network users to G2 mobbing propensity classification model(4 Groups; Ideal Group of the online social network, Bullies, Aggressive victims, Victims) which is designed in this paper, can grasp mobbing propensity of users, which will contribute to efficient personnel management.
Query Optimization for an Advanced Keyword Search on Relational Data Stream
Joo, Jin-Ung ; Kim, Hak-Soo ; Hwang, Jin-Ho ; Son, Jin-Hyun ;
The KIPS Transactions:PartD, volume 16D, issue 6, 2009, Pages 859~870
DOI : 10.3745/KIPSTD.2009.16D.6.859
Despite the surge in the research for keyword search method over relational database, only little attention has been devoted to studying on relational data stream.The research for keyword search over relational data stream is intense interest because streaming data is recently a major research topic of growing interest in the data management. In this regard we first analyze the researches related to keyword search methodover relational data stream, and then this paper focuses on the method of minimizing the join cost occurred while processing keyword search queries. As a result, we propose an advanced keyword search method that can yield more meaningful results for users on relational data streams. We also propose a query optimization method using layered-clustering for efficient query processing.
Energy Component Library for Power Consumption Analysis of Embedded Software
Hong, Jang-Eui ; Kim, Doo-Hwan ;
The KIPS Transactions:PartD, volume 16D, issue 6, 2009, Pages 871~880
DOI : 10.3745/KIPSTD.2009.16D.6.871
Along with the complexity and size growth of embedded software, it is critical to meet the nonfunctional requirements such as power consumption as well as functional requirements such as correctness. This paper, apart from the existing studies of source code-based power analysis, proposes an approach of model-based power analysis using UML 2.0. Specially, we focus on the development of energy library to analyze the power consumption of embedded software. Our energy library supports model-based power analysis, and also supports the easy adaption for the change of embedded application.
The VMDC(View, Model, Dispatcher, Controller) Architecture for Products Management
Kim, Da-Jeong ; Lee, Eun-Ser ;
The KIPS Transactions:PartD, volume 16D, issue 6, 2009, Pages 881~888
DOI : 10.3745/KIPSTD.2009.16D.6.881
This research introduces the architecture of managing products based software. There are many of the architectures for managing products using software instead of manpower. In case of MVC and existing architectures, The architectures transfer redundant data so the architectures cause a problem that unnecessary data moved. This research presents VMDC(View, Model, Dispatcher, Controller) architecture to solve the problem. Dispatcher of VMDC grasps necessary data and reconstructs objects to efficient transferring data. This research shows usecase that designed VMDC(View, Model, Dispatcher, Controller) and demonstrate efficiency of VMDC(View, Model, Dispatcher, Controller) together. after demonstration this research present with next research.
Situation Modeling and Situation Awareness Middleware Development with Sensor Data for the Safety Transportation of Containers
Nam, Tae-Woo ; Yeom, Keun-Hyuk ;
The KIPS Transactions:PartD, volume 16D, issue 6, 2009, Pages 889~898
DOI : 10.3745/KIPSTD.2009.16D.6.889
Currently, the amount of containers is growing up continuously. However, they still depend on humans checking or validating. In this situation, humans must participate in the systems. Situation-awareness technologies allow human participation to be minimized. The situation-awareness technologies provide data or service appropriate to the object`s current state, and the state is recognized automatically by the system. They can automatically execute working processes without human intervention. We suggest a middleware system based on situation-awareness technologies using an ontology for the safety transportation of containers. The middleware is aware of the current state and sends the data required by an application. It can help build new applications by enhancing agility, and it can also support automated service processing by invoking the service required like fire-fighting, fixing container, and so on. Improving transportation of containers process automation with situation-awareness technologies reduces manpower requirements for checking and validating containers, and so saves logistics costs of container transportation.
Traceability Enhancement Technique Through the Integration of Software Configuration Management and Personal Working Space
Kim, Dae-Yeob ; Youn, Cheong ;
The KIPS Transactions:PartD, volume 16D, issue 6, 2009, Pages 899~910
DOI : 10.3745/KIPSTD.2009.16D.6.899
Software productivity and quality improvement through software configuration management is based on organized and consistent change management. In change management, artifact identified as configuration item should be able to provide its changed history to the members in group and the members should be able to track down the changes made for the corresponding artifact. General software configuration management systems provide tracking information for artifacts only within the configuration management system, and it does not go further to changes that occur within personal working space. This paper provides a solution that helps tracking down changes that occur not only in configuration management, but also personal artifact`s changes through the integration of configuration management system and personal working space. A revised version in configuration management system is connected to the artifact version of the working space by the tagging technique, and traceability can be managed more effectively by sharing the tracking information.
Automated Black-Box Test Case Generation for MC/DC with SAT
Chung, In-Sang ;
The KIPS Transactions:PartD, volume 16D, issue 6, 2009, Pages 911~920
DOI : 10.3745/KIPSTD.2009.16D.6.911
Airbone software must comply the DO-178B standard in order to be certified by the FAA. The standard requires the unit testing of safety-critical software to meet the coverage criterion called MC/DC(Modified Condition/Decision Coverage). Although MC/DC is known to be effective in finding errors related to safety, it is also true that generating test cases which satisfy the MC/DC criterion is not easy. This paper presents a tool named MD-SAT which generates MC/DC test cases with SAT(SATisfiability) technology. It can be employed for generating diverse test cases in tools implementing various testing techniques including decision table based test, cause-effect graphing, and state-based test.
An Efficient Searching of Vulnerabilities Based on a DNS System Model using Ptolemy
Shin, Seung-Hun ; Park, Seung-Kyu ; Jung, Ki-Hyun ;
The KIPS Transactions:PartD, volume 16D, issue 6, 2009, Pages 921~926
DOI : 10.3745/KIPSTD.2009.16D.6.921
Vulnerabilities in software can result in many social and economic problems once it has already been deployed and put to use. Thus, the vulnerabilities should be seriously taken into consideration from the beginning step of software development. A modeling and simulation method for software can be adopted as a testing tool for establishing vulnerability inspection strategies. For verification of usability of this strategy, in this paper, we modeled the behavior of a DNS system using Ptolemy and the simulation was performed. The result shows that a well-known vulnerability of DNS server could be effectively found, which confirms that the modeling and simulation can be used for vulnerability testing.
Commonality and Variability Analysis Method for UML CASE Tool Frameworks
Choi, Hwan-Bok ; Lee, Eun-Ser ; Kim, Yun-Ho ;
The KIPS Transactions:PartD, volume 16D, issue 6, 2009, Pages 927~934
DOI : 10.3745/KIPSTD.2009.16D.6.927
This paper presents a commonality and variability analysis method for UML CASE tool frameworks. Commonality and Variability analysis increase extension and reusability by separating common area and variable area. We suggest class category based on property and the notation to represent commonality and variability. It is also implements frameworks based on analysis method and verify method using defect removal efficiency.
JARSIO:Java Remote Service Invocation for OSGI Frameworkto Enhance Inter-Operations of Services on OSGi
Choi, Jae-Hyun ; Park, Jae-Won ; Lee, Nam-Yong ;
The KIPS Transactions:PartD, volume 16D, issue 6, 2009, Pages 935~944
DOI : 10.3745/KIPSTD.2009.16D.6.935
Recently, many researches focus on Ubiquitous Network which comprised various networks for effective service provision. In particular, OSGi proposed by OSGi Alliance is preferred for core infrastructure to establish Ubiquitous Network as it supports integration and inter-operation among various service environments, and dynamic configuration of services. However, OSGi is limited to be used only within local service framework, since OSGi specification does not have any considerations for inter-operations between internal and external services. Thus, in this paper we propose JARSIO(JAva Remote Service Invocation for OSGi) framework which enables the inter-operations of dynamic internal OSGi services and other external services. The proposed framework is based on the TCP/IP protocol, and provides effective mechanisms for the inter-operations of the services.
Analysis of Determinants and Moderator Effects of User Age and Experience for VoIP Acceptance
Kim, Ki-Youn ; Lee, Duk-Sun ; Seol, Jeong-Seon ; Lee, Bong-Gyou ;
The KIPS Transactions:PartD, volume 16D, issue 6, 2009, Pages 945~960
DOI : 10.3745/KIPSTD.2009.16D.6.945
The purpose of this study is to define determinants of VoIP user acceptance and to verify significant causality among latent variables - performance expectancy, effort expectancy, cost expectancy, social influence, facilitating conditions, behavioral intend, use behavior - based on UTAUT model. We presented the expanded hypotheses including the new factor, cost expectancy and analyzed the moderating effect of user age, gender and usage experience variables. For a accuracy of predicted results, we focused on survey analysis with 641 real user samples. Compared to previous studies, it is meaningful that this research verified the conceptual difference between behavioral intention and usage behavior. As a result, all proposed hypotheses accepted and moderating effects are supported significantly in age and use experience moderating variables.