Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
KIPS Transactions on Computer and Communication Systems
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 2, Issue 12 - Dec 2013
Volume 2, Issue 11 - Nov 2013
Volume 2, Issue 10 - Oct 2013
Volume 2, Issue 9 - Sep 2013
Volume 2, Issue 8 - Aug 2013
Volume 2, Issue 7 - Jul 2013
Volume 2, Issue 6 - Jun 2013
Volume 2, Issue 5 - May 2013
Volume 2, Issue 4 - Apr 2013
Volume 2, Issue 3 - Mar 2013
Volume 2, Issue 2 - Feb 2013
Volume 2, Issue 1 - Jan 2013
Selecting the target year
A Fast Parity Resynchronization Scheme for Small and Mid-sized RAIDs
Baek, Sung Hoon ; Park, Ki-Wong ;
KIPS Transactions on Computer and Communication Systems, volume 2, issue 10, 2013, Pages 413~420
DOI : 10.3745/KTCCS.2013.2.10.413
Redundant arrays of independent disks (RAID) without a power-fail-safe component in small and mid-sized business suffers from intolerably long resynchronization time after a unclean power-failure. Data blocks and a parity block in a stripe must be updated in a consistent manner, however a data block may be updated but the corresponding parity block may not be updated when a power goes off. Such a partially modified stripe must be updated with a correct parity block. However, it is difficult to find which stripe is partially updated (inconsistent). The widely-used traditional parity resynchronization manner is a intolerably long process that scans the entire volume to find and fix inconsistent stripes. This paper presents a fast resynchronization scheme with a negligible overhead for small and mid-sized RAIDs. The proposed scheme is integrated into a software RAID driver in a Linux system. According to the performance evaluation, the proposed scheme shortens the resynchronization process from 200 minutes to 5 seconds with 2% overhead for normal I/Os.
Flow Labeling Method for Realtime Detection of Heavy Traffic Sources
Lee, KyungHee ; Nyang, DaeHun ;
KIPS Transactions on Computer and Communication Systems, volume 2, issue 10, 2013, Pages 421~426
DOI : 10.3745/KTCCS.2013.2.10.421
As a greater amount of traffic have been generated on the Internet, it becomes more important to know the size of each flow. Many research studies have been conducted on the traffic measurement, and mostly they have focused on how to increase the measurement accuracy with a limited amount of memory. In this paper, we propose an explicit flow labeling technique that can be used to find out the names of the top flows and to increase the counting upper bound of the existing scheme. The labeling technique is applied to CSM (Counter Sharing Method), the most recent traffic measurement algorithm, and the performance is evaluated using the CAIDA dataset.
A Moving Path Control of an Automatic Guided Vehicle Using Relative Distance Fingerprinting
Hong, Youn Sik ; Kim, Da Jung ; Hong, Sang Hyun ;
KIPS Transactions on Computer and Communication Systems, volume 2, issue 10, 2013, Pages 427~436
DOI : 10.3745/KTCCS.2013.2.10.427
In this paper, a method of moving path control of an automatic guided vehicle in an indoor environment through recognition of marker images using vision sensors is presented. The existing AGV moving control system using infrared-ray sensors and landmarks have faced at two critical problems. Since there are many windows in a crematorium, they are going to let in too much sunlight in the main hall which is the moving area of AGVs. Sunlight affects the correct recognition of landmarks due to refraction and/or reflection of sunlight. The second one is that a crematorium has a narrow indoor environment compared to typical industrial fields. Particularly when an AVG changes its direction to enter the designated furnace the information provided by guided sensors cannot be utilized to estimate its location because the rotating space is too narrow to get them. To resolve the occurrences of such circumstances that cannot access sensing data in a WSN environment, a relative distance from marker to an AGV will be used as fingerprinting used for location estimation. Compared to the existing fingerprinting method which uses RSS, our proposed method may result in a higher reliable estimation of location. Our experimental results show that the proposed method proves the correctness and applicability. In addition, our proposed approach will be applied to the AGV system in the crematorium so that it can transport a dead body safely from the loading place to its rightful destination.
Design and Implementation of Mobile Teleconference System Based on Hybrid Web
Kim, Yun Kyoung ; Choi, Ji Hyun ;
KIPS Transactions on Computer and Communication Systems, volume 2, issue 10, 2013, Pages 437~444
DOI : 10.3745/KTCCS.2013.2.10.437
Recently, there are several attempts to save temporal, spatial and paper resources through mobile teleconference. However, present application-based mobile solutions have limited access, and are occasionally not working because of its operating system dependency. In recent times, several researchers attempt to develop mobile teleconference systems that can operate in all operating systems. It is still required to install proprietary applications to sync screens in user device. In this paper, we propose a full duplex and real-time data mirroring technology based on hybrid web that allows syncing screens without application installation, and operates in all mobile devices.
A Proposal for "Security Verification Method for Implementation of Secure Android Mobile Application"
Hur, Hwan Seok ; Kang, Sung Hoon ; Kim, Seung Joo ;
KIPS Transactions on Computer and Communication Systems, volume 2, issue 10, 2013, Pages 445~460
DOI : 10.3745/KTCCS.2013.2.10.445
Mobile applications today are being offered as various services depending on the mobile device and mobile environment of users. This increase in mobile applications has shifted the spotlight to their vulnerability. As an effective method of security verification, this paper proposes "phase-wise security verification for the implementation of mobile applications". This method allows additional security verification by covering specific items across a wider range compared to existing methods. Based on the identified weaknesses, it detects the cause of vulnerability and monitors the related settings.