Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
KIPS Transactions on Computer and Communication Systems
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 1, Issue 3 - Dec 2012
Volume 1, Issue 2 - Nov 2012
Volume 1, Issue 1 - Oct 2012
Selecting the target year
Energy-efficient Set-associative Cache Using Bi-mode Way-selector
Lee, Sungjae ; Kang, Jinku ; Lee, Juho ; Youn, Jiyong ; Lee, Inhwan ;
KIPS Transactions on Computer and Communication Systems, volume 1, issue 1, 2012, Pages 1~10
DOI : 10.3745/KTCCS.2012.1.1.001
The way-lookup cache and the way-tracking cache are considered to be the most energy-efficient when used for level 1 and level 2 caches, respectively. This paper proposes an energy-efficient set-associative cache using the bi-mode way-selector that combines the way selecting techniques of the way-tracking cache and the way-lookup cache. The simulation results using an Alpha 21264-based system show that the bi-mode way-selecting L1 instruction cache consumes 27.57% of the energy consumed by the conventional set-associative cache and that it is as energy-efficient as the way-lookup cache when used for L1 instruction cache. The bi-mode way-selecting L1 data cache consumes 28.42% of the energy consumed by the conventional set-associative cache, which means that it is more energy-efficient than the way-lookup cache by 15.54% when used for L1 data cache. The bi-mode way-selecting L2 cache consumes 15.41% of the energy consumed by the conventional set-associative cache, which means that it is more energy-efficient than the way-tracking cache by 16.16% when used for unified L2 cache. These results show that the proposed cache can provide the best level of energy-efficiency regardless of the cache level.
Continuous Multiple Prediction of Stream Data Based on Hierarchical Temporal Memory Network
Han, Chang-Yeong ; Kim, Sung-Jin ; Kang, Hyun-Syug ;
KIPS Transactions on Computer and Communication Systems, volume 1, issue 1, 2012, Pages 11~20
DOI : 10.3745/KTCCS.2012.1.1.011
Stream data shows a sequence of values changing continuously over time. Due to the nature of stream data, its trend is continuously changing according to various time intervals. Therefore the prediction of stream data must be carried out simultaneously with respect to multiple intervals, i.e. Continuous Multiple Prediction(CMP). In this paper, we propose a Continuous Integrated Hierarchical Temporal Memory (CIHTM) network for CMP based on the Hierarchical Temporal Memory (HTM) model which is a neocortex leraning algorithm. To develop the CIHTM network, we created three kinds of new modules: Shift Vector Senor, Spatio-Temporal Classifier and Multiple Integrator. And also we developed learning and inferencing algorithm of CIHTM network.
The Analysis of 'General Computer' Textbooks in Commerce·Information High Schools
Kang, Oh-Han ;
KIPS Transactions on Computer and Communication Systems, volume 1, issue 1, 2012, Pages 21~28
DOI : 10.3745/KTCCS.2012.1.1.021
In this paper, both content analysis and Romey analysis were employed to analyze three 'General Computer' textbooks used in commerce and information high schools. The content analysis was employed to study the organization and contents of the textbooks, whereas the Romey analysis to determine the inquisitive tendency of four sections - Text, Data, Activity and Evaluation. The results from the content analysis showed that textbooks differed in the number of subsections, the number of pages in each section, and the number of concepts introduced in each section. Also, results from the Romey analysis demonstrated that the section Text in all the textbooks was written with a low level of inquisitive tendency, but also that they differed in that two other sections Data and Activity in one textbook exhibited a high level of inquisitive tendency while the other section Evaluation in two textbooks did. Using the aforementioned results, we proposed ways to improve the readability of 'General Computer' textbooks.
QARA: Quality-Aware Rate Adaptation for Scalable Video Multicast in Multi-Rate Wireless LANs
Park, Gwangwoo ; Jang, Insun ; Pack, Sangheon ;
KIPS Transactions on Computer and Communication Systems, volume 1, issue 1, 2012, Pages 29~34
DOI : 10.3745/KTCCS.2012.1.1.029
Wireless multicast service can be used for video streaming service to save the network resources by sending the same popular multimedia contents to a group of users at once. For better multimedia streaming multicast service, we propose a quality-aware rate adaptation (QARA) scheme for scalable video multicast in rate adaptive wireless networks. In QARA, transmission rate is determined depending on the content's type and users' channel conditions. First, the base layer is transmitted by a low rate for high reliability. That means we provide basic service quality to all users. On the contrary, the transmission rate for enhancement layer is adapted by using channel condition feedback from a randomly selected node. So, the enhancement layer frames in a multimedia content is sent with various transmission rates. Therefore, each node can be provided with differentiated quality services. Consequently, QARA is capable of serving heterogeneous population of mobile nodes. Moreover, it can utilize network resources more efficiently. Our simulation results show that QARA outperforms utilization of the available transmission rate and reduces the data transmission time.
Optimized Handoff Scheme with Fuzzy logic in Heterogeneous Vehicular Mobile Networks
Roh, Youngsam ; Jeong, Jongpil ;
KIPS Transactions on Computer and Communication Systems, volume 1, issue 1, 2012, Pages 35~46
DOI : 10.3745/KTCCS.2012.1.1.035
The development of wireless communication systems has resulted in the availability of several access technologies at any geographic area, such as 3G networks, wireless local area networks (WLANs) and wireless broadband networks. The development of these technologies is provided for users who have experienced mobile network environments which are slow or fast-movement environment and change distance between the AP(Access Point). This paper describes network performance issues in various environmental changes. Also, Fuzzy logic is applied to evaluate the performance in vehicle networks around users' environmental factors to focusing on the minimizing of transfer time and costs. First, WLAN and 3G networks fixed distance between AP, Second, WLAN and 3G networks random distance between APs, finally above two environmental with vehicle Ad hoc networks is analyzed. These V2I and V2V environmental condition are assumed. Results which based on Fuzzy logic suggest an optimal performance in vehicle network environments according to vehicle speed and distance between APs. Proposed algorithm shows 21% and 13% improvement of networks performance in V2I and V2V environment.
Digital Watermarking for Robustness of Low Bit Rate Video Contents on the Mobile
Seo, Jung-Hee ; Park, Hung-Bog ;
KIPS Transactions on Computer and Communication Systems, volume 1, issue 1, 2012, Pages 47~54
DOI : 10.3745/KTCCS.2012.1.1.047
Video contents in the mobile environment are processed with the low bit-rate relative to normal video contents due to the consideration of network traffic; hence, it is necessary to protect the copyright of the low bit-rate video contents. The algorithm for watermarking appropriate for the mobile environment should be developed because the performance of the mobile devices is much lower than that of personal computers. This paper suggested the invisible spread spectrum watermarking method to the low bit-rate video contents, considering the low performance of the mobile device in the M-Commerce environment; it also enables to track down illegal users of the video contents to protect the copyright. The robustness of the contents with watermark is expressed with the correlation of extraction algorithm from watermark removed or distorted contents. The results of our experiment showed that we could extract the innate frequencies of M-Sequence when we extracted M-Sequence after compressing the contents with watermark easily. Therefore, illegal users of the contents can be tracked down because watermark can be extracted from the low bit-rate video contents.
Feature Selection with PCA based on DNS Query for Malicious Domain Classification
Lim, Sun-Hee ; Cho, Jaeik ; Kim, Jong-Hyun ; Lee, Byung Gil ;
KIPS Transactions on Computer and Communication Systems, volume 1, issue 1, 2012, Pages 55~60
DOI : 10.3745/KTCCS.2012.1.1.055
Recent botnets are widely using the DNS services at the connection of C&C server in order to evade botnet's detection. It is necessary to study on DNS analysis in order to counteract anomaly-based technique using the DNS. This paper studies collection of DNS traffic for experimental data and supervised learning for DNS traffic-based malicious domain classification such as query of domain name corresponding to C&C server from zombies. Especially, this paper would aim to determine significant features of DNS-based classification system for malicious domain extraction by the Principal Component Analysis(PCA).