Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartD
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 17D, Issue 6 - Dec 2010
Volume 17D, Issue 5 - Oct 2010
Volume 17D, Issue 4 - Aug 2010
Volume 17D, Issue 3 - Jun 2010
Volume 17D, Issue 2 - Apr 2010
Volume 17D, Issue 1 - Feb 2010
Selecting the target year
Implementation of a Data Processing Method to Enhance the Quality and Support the What-If Analysis for Traffic History Data
Lee, Min-Soo ; Cheong, Su-Jeong ; Choi, Ok-Ju ; Meang, Bo-Yeon ;
The KIPS Transactions:PartD, volume 17D, issue 2, 2010, Pages 87~102
DOI : 10.3745/KIPSTD.2010.17D.2.087
A vast amount of traffic data is produced every day from detection devices but this data includes a considerable amount of errors and missing values. Moreover, this information is periodically deleted before it could be used as important analysis information. Therefore, this paper discusses the implementation of an integrated traffic history database system that continuously stores the traffic data as a multidimensional model and increases the validity and completeness of the data via a flow of processing steps, and provides a what-if analysis function. The implemented system provides various techniques to correct errors and missing data patterns, and a what-if analysis function that enables the analysis of results under various conditions by allowing the flexible definition of various process related environment variables and combinations of the processing flows. Such what-if analysis functions dramatically increase the usability of traffic data but are not provided by other traffic data systems. Experimantal results for cleaning the traffic history data showed that it provides superior performance in terms of validity and completeness.
The Path Inverted Index Technique for XML Document Retrieval
Moon, Kyung-Won ; Hwang, Byung-Yeon ;
The KIPS Transactions:PartD, volume 17D, issue 2, 2010, Pages 103~110
DOI : 10.3745/KIPSTD.2010.17D.2.103
Recently, many XML document management systems using the advantage of RDBMS have been actively developed for the storage, processing and retrieval of XML documents. However, fractional pattern-matching query such as the LIKE operations cannot take the advantage of the index of RDBMS because these operations have deteriorated retrieval performance through its inefficient comparison processing. The hierarchical XML storage technique which stores XML documents in RDBMS efficiently, and the path inverted index technique are proposed in this paper. It regards the element of an XML document as a keyword, and focuses on organizing a posting file with path identifiers and sequences to reduce the retrieval time of path based query. Through simulations, our methods have shown about 60% better performance than the conventional method using RDBMS in searching.
Improvement of a Simulink Debugger Capacity for Model Verification
Kim, Seong-Jo ; Lee, Hong-Seok ; Choi, Kyung-Hee ; Chung, Ki-Hyun ;
The KIPS Transactions:PartD, volume 17D, issue 2, 2010, Pages 111~118
DOI : 10.3745/KIPSTD.2010.17D.2.111
In this paper, we describe the implementation of debugger that has advanced features for verifying Simulink model. The debugger provided in Simulink has some boring and repetitive work when verifying complicated Simulink models or complicated scenarios. In order to resolve the problems, this paper addresses the issues on the implementation of debugger that provides features such as a convenient feature to compare the simulation output to the expected output for specific input, to monitor system`s behavior at specific time, and coverage report function in some or all input scenarios. The proposed debugger is applied to the vending machine model provided by Matlab, demonstrating its feasibility.
A Method of Selecting Open Source Software by IFCS
Jeon, Hye-Young ; Jin, Jing-Shu ; Rhew, Sung-Yul ;
The KIPS Transactions:PartD, volume 17D, issue 2, 2010, Pages 119~128
DOI : 10.3745/KIPSTD.2010.17D.2.119
The application field of OSS is being expanded farther and the existing studies are well established theoretically but not actually widely used. Because so many criteria and complexity of selection methods result in low efficiency and not proper for use. In this master`s thesis, to solve these problems I propose a selecting technique for OSS with less criteria, which is more effective and easy to use than before. Based on the existing studies, we identify assessment criteria which common used and redefine 14 evaluation attributes as well as 31 assessment criteria through elimination and grouping. And evaluate the criteria in four steps such as Initial assessment, Functional assessment, Characteristical assessment and Supplemental assessment. To evaluate the adequacy of suggested technique, 29 database management tools for MySQL are selected as candidates, and applied to the technique I proposed. As the result, time and effort for evaluation is reduced sharply and we can use this technique more easily.
Object Modeling for Mapping from XML Document and Query to UML Class Diagram based on XML-GDM
Park, Dae-Hyun ; Kim, Yong-Sung ;
The KIPS Transactions:PartD, volume 17D, issue 2, 2010, Pages 129~146
DOI : 10.3745/KIPSTD.2010.17D.2.129
Nowadays, XML has been favored by many companies internally and externally as a means of sharing and distributing data. there are many researches and systems for modeling and storing XML documents by an object-oriented method as for the method of saving and managing web-based multimedia document more easily. The representative tool for the object-oriented modeling of XML documents is UML (Unified Modeling Language). UML at the beginning was used as the integrated methodology for software development, but now it is used more frequently as the modeling language of various objects. Currently, UML supports various diagrams for object-oriented analysis and design like class diagram and is widely used as a tool of creating various database schema and object-oriented codes from them. This paper proposes an Efficinet Query Modelling of XML-GL using the UML class diagram and OCL for searching XML document which its application scope is widely extended due to the increased use of WWW and its flexible and open nature. In order to accomplish this, we propose the modeling rules and algorithm that map XML-GL. which has the modeling function for XML document and DTD and the graphical query function about that. In order to describe precisely about the constraint of model component, it is defined by OCL (Object Constraint Language). By using proposed technique creates a query for the XML document of holding various properties of object-oriented model by modeling the XML-GL query from XML document, XML DTD, and XML query while using the class diagram of UML. By converting, saving and managing XML document visually into the object-oriented graphic data model, user can prepare the base that can express the search and query on XML document intuitively and visually. As compared to existing XML-based query languages, it has various object-oriented characteristics and uses the UML notation that is widely used as object modeling tool. Hence, user can construct graphical and intuitive queries on XML-based web document without learning a new query language. By using the same modeling tool, UML class diagram on XML document content, query syntax and semantics, it allows consistently performing all the processes such as searching and saving XML document from/to object-oriented database.
Conformance Test Scenario Extraction Techniques for Embedded Software using Test Execution Time
Park, In-Su ; Shin, Young-Sul ; Ahn, Sung-Ho ; Kim, Jin-Sam ; Kim, Jae-Young ; Lee, Woo-Jin ;
The KIPS Transactions:PartD, volume 17D, issue 2, 2010, Pages 147~156
DOI : 10.3745/KIPSTD.2010.17D.2.147
Conformance testing for embedded software is to check whether software was correctly implemented according to software specification or not. In conformance testing, test scenarios must be extracted to cover every test cases of software. In a general way, test scenarios simply focus on testing all functions at least one time. But, test scenarios are necessary to consider efficiency of test execution. In this paper, we propose a test scenario extraction method by considering function`s execution time and waiting time for user interaction. A test model is a graph model which is generated from state machine diagram and test cases in software specification. The test model is augmented by describing test execution time and user interaction information. Based on the test model, test scenarios are extracted by a modified Dijkstra`s algorithm. Our test scenario approach can reduce testing time and improve test automation.
A Tag Flow-Driven Deployment Simulator for Developing RFID Applications
Moon, Mi-Kyeong ;
The KIPS Transactions:PartD, volume 17D, issue 2, 2010, Pages 157~166
DOI : 10.3745/KIPSTD.2010.17D.2.157
More recently, RFID (Radio Frequency Identification) systems have begun to find greater use in various industrial fields. The use of RFID system in these application domains has been promoted by efforts to develop the RFID tags which are low in cost, small in size, and high in performance. The RFID applications enable the real-time capture and update of RFID tag information, while simultaneously allowing business process change through real-time alerting and alarms. These be developed to monitor person or objects with RFID tags in a place and to provide visibility and traceability of the seamless flows of RFID tags. In this time, the RFID readers should be placed in diverse locations, the RFID flows between these readers can be tested based on various scenarios. However, due to the high cost of RFID readers, it may be difficult to prepare the similar environment equipped with RFID read/write devices. In this paper, we propose a simulator to allow RFID application testing without installing physical devices. It can model the RFID deployment environment, place various RFID readers and sensors on this model, and move the RFID tags through the business processes. This simulator can improve the software development productivity by accurately testing RFID middleware and applications. In addition, when data security cannot be ensured by any fault, it can decide where the problem is occurred between RFID hardware and middleware.
Design and Implementation of Pinpad using Secure Technology from Shoulder Surfing Attack
Kang, Moon-Seol ; Kim, Young-Il ;
The KIPS Transactions:PartD, volume 17D, issue 2, 2010, Pages 167~174
DOI : 10.3745/KIPSTD.2010.17D.2.167
When entering the PIN(personal identification number), the greatest security threat is shoulder surfing attack. Shoulder surfing attack is watching the PIN being entered from over the shoulder to obtain the number, and it is the most common and at the same time the most powerful security threat of stealing the PIN. In this paper, a psychology based PINpad technology referred to as DAS(Dynamic Authentication System) that safeguards from shoulder surfing attack was proposed. Also, safety of the proposed DAS from shoulder surfing attack was tested and verified through intuitive viewpoint, shoulder surfing test, and theoretical analysis. Then, a PINpad with an internal DAS that was certified for its safety from shoulder surfing attack was designed and produced. Because the designed PINpad significantly decreases the chances for shoulder surfing attackers being able to steal the PIN when compared to the ordinary PINpad, it was determined to be suitable for use at ATM(automated teller machine)s operated by banks and therefore has been introduced and is being used by many financial institutions.