Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
KIISE Transactions on Computing Practices
Journal Basic Information
Journal DOI :
Korean Institute of Information Scientists and Engineers
Editor in Chief :
Volume & Issues
Volume 21, Issue 12 - Dec 2015
Volume 21, Issue 11 - Nov 2015
Volume 21, Issue 10 - Oct 2015
Volume 21, Issue 9 - Sep 2015
Volume 21, Issue 8 - Aug 2015
Volume 21, Issue 7 - Jul 2015
Volume 21, Issue 6 - Jun 2015
Volume 21, Issue 5 - May 2015
Volume 21, Issue 4 - Apr 2015
Volume 21, Issue 3 - Mar 2015
Volume 21, Issue 2 - Feb 2015
Volume 21, Issue 1 - Jan 2015
Selecting the target year
A Query Preprocessing Tool for Performance Improvement in Complex Event Stream Query Processing
Choi, Joong-Hyun ; Cho, Eun-Sun ; Lee, Kang-Woo ;
KIISE Transactions on Computing Practices, volume 21, issue 8, 2015, Pages 513~523
DOI : 10.5626/KTCP.2015.21.8.513
A complex event processing system, becoming useful in real life domains, efficiently processes stream of continuous events like sensor data from IoT systems. However, those systems do not work well on some types of queries yet, so that programmers should be careful about that. For instance, they do not sufficiently provide detailed guide to choose efficient queries among the almost same meaning queries. In this paper, we propose an query preprocessing tool for event stream processing systems, which helps programmers by giving them the hints to improve performance whenever their queries fall in any possible bad formats in the performance sense. We expect that our proposed module would be a big help to increases productivity of writing programs where debugging, testing, and performance tuning are not straightforward.
Building a Log Framework for Personalization Based on a Java Open Source
Sin, Choongsub ; Park, Seog ;
KIISE Transactions on Computing Practices, volume 21, issue 8, 2015, Pages 524~530
DOI : 10.5626/KTCP.2015.21.8.524
A log is for text monitoring and perceiving the issues of a system during the development and operation of a program. Based on the log, system developers and operators can trace the cause of an issue. In the development phase, it is relatively simple for a log to be traced while there are only a small number of personnel uses of a system such as developers and testers. However, it is the difficult to trace a log when many people can use the system in the operation phase. In major cases, because a log cannot be tracked, even tracing is dropped. This study proposed a simplified tracing of a log during the system operation. Thus, the purpose is to create a log on the run time based on an ID/IP, using features provided by the Logback. It saves an ID/IP of the tracking user on a DB, and loads the user's ID/IP onto the memory to trace once WAS starts running. Before the online service operates, an Interceptor is executed to decide whether to load a log file, and then it generates the service requested by a certain user in a separate log file. The load is insignificant since the arithmetic operation occurs in a JVM, although every service must pass through the Interceptor to be executed.
Implementation of Real-time Vowel Recognition Mouse based on Smartphone
Jang, Taeung ; Kim, Hyeonyong ; Kim, Byeongman ; Chung, Hae ;
KIISE Transactions on Computing Practices, volume 21, issue 8, 2015, Pages 531~536
DOI : 10.5626/KTCP.2015.21.8.531
The speech recognition is an active research area in the human computer interface (HCI). The objective of this study is to control digital devices with voices. In addition, the mouse is used as a computer peripheral tool which is widely used and provided in graphical user interface (GUI) computing environments. In this paper, we propose a method of controlling the mouse with the real-time speech recognition function of a smartphone. The processing steps include extracting the core voice signal after receiving a proper length voice input with real time, to perform the quantization by using the learned code book after feature extracting with mel frequency cepstral coefficient (MFCC), and to finally recognize the corresponding vowel using hidden markov model (HMM). In addition a virtual mouse is operated by mapping each vowel to the mouse command. Finally, we show the various mouse operations on the desktop PC display with the implemented smartphone application.
Distributed Processing System for Aggregate/Analytical Functions on CUBRID Shard Distributed Databases
Won, Jiseop ; Kang, Suk ; Jo, Sunhwa ; Kim, Jinho ;
KIISE Transactions on Computing Practices, volume 21, issue 8, 2015, Pages 537~542
DOI : 10.5626/KTCP.2015.21.8.537
Database Shard is a technique that can be queried and stored by dividing one logical table into multiple databases horizontally. In order to analyze the shard data with aggregate or analysis functions, a process is required that integrates partial results on each shard database. In this paper, we introduce the design and implementation of a distributed processing system for aggregation and analysis on the CUBRID Shard distributed database, which is an open source database management system. The implemented system can accelerate the analysis onto multiple shards of partitioned tables; it shows efficient aggregation on shard distributed databases compared to stand-alone databases.
An Efficient Cache Management Scheme for Load Balancing in Distributed Environments with Different Memory Sizes
Choi, Kitae ; Yoon, Sangwon ; Park, Jaeyeol ; Lim, Jongtae ; Lee, Seokhee ; Bok, Kyoungsoo ; Yoo, Jaesoo ;
KIISE Transactions on Computing Practices, volume 21, issue 8, 2015, Pages 543~548
DOI : 10.5626/KTCP.2015.21.8.543
Recently, volume of data has been growing dramatically along with the growth of social media and digital devices. However, the existing disk-based distributed file systems have limits to their performance of data processing or data access, due to I/O processing costs and bottlenecks. To solve this problem, the caching technique is being used to manage data in the memory. In this paper, we propose a cache management scheme to handle load balancing in a distributed memory environment. The proposed scheme distributes the data according to the memory size, n distributed environments with different memory sizes. If overloaded nodes occur, it redistributes the the access time of the caching data. In order to show the superiority of the proposed scheme, we compare it with an existing distributed cache management scheme through performance evaluation.
Posture Recognition for a Bi-directional Participatory TV Program based on Face Color Region and Motion Map
Hwang, Sunhee ; Lim, Kwangyong ; Lee, Suwoong ; Yoo, Hoyoung ; Byun, Hyeran ;
KIISE Transactions on Computing Practices, volume 21, issue 8, 2015, Pages 549~554
DOI : 10.5626/KTCP.2015.21.8.549
As intuitive hardware interfaces continue to be developed, it has become more important to recognize the posture of the user. An efficient alternative to adding expensive sensors is to implement computer vision systems. This paper proposes a method to recognize a user's postured in a live broadcast bi-directional participatory TV program. The proposed method first estimates the position of the user's hands by generation a facial color map for the user and a motion map. The posture is then recognized by computing the relative position of the face and the hands. This method exhibited 90% accuracy in an experiment to recognize three defined postures during the live broadcast bi-directional participatory TV program, even when the input images contained a complex background.
Design and Prototyping of Legacy Home Appliance Controlling System Using Wearable Devices
Koo, Bonhyun ; Choi, Lynn ;
KIISE Transactions on Computing Practices, volume 21, issue 8, 2015, Pages 555~560
DOI : 10.5626/KTCP.2015.21.8.555
In this paper, we analyzed the existing control methods of the legacy wearable-based CE devices and identified the requirements for improvements. In the conventional system, users waste their time configuring the initial network and registering their devices with the management server. To overcome these hurdles, we implemented the Easy-Setup framework for smart phones to personalized cloud devices.
Implementation and Performance Analysis of Hadoop MapReduce over Lustre Filesystem
Kwak, Jae-Hyuck ; Kim, Sangwan ; Huh, Taesang ; Hwang, Soonwook ;
KIISE Transactions on Computing Practices, volume 21, issue 8, 2015, Pages 561~566
DOI : 10.5626/KTCP.2015.21.8.561
Hadoop is becoming widely adopted in scientific and commercial areas as an open-source distributed data processing framework. Recently, for real-time processing and analysis of data, an attempt to apply high-performance computing technologies to Hadoop is being made. In this paper, we have expanded the Hadoop Filesystem library to support Lustre, which is a popular high-performance parallel distributed filesystem, and implemented the Hadoop MapReduce execution environment over the Lustre filesystem. We analysed Hadoop MapReduce over Lustre by using Hadoop standard benchmark tools. We found that Hadoop MapReduce over Lustre execution has a performance 2-13 times better than a typical Hadoop MapReduce execution.
Korean Transition-based Dependency Parsing with Recurrent Neural Network
Li, Jianri ; Lee, Jong-Hyeok ;
KIISE Transactions on Computing Practices, volume 21, issue 8, 2015, Pages 567~571
DOI : 10.5626/KTCP.2015.21.8.567
Transition-based dependency parsing requires much time and efforts to design and select features from a very large number of possible combinations. Recent studies have successfully applied Multi-Layer Perceptrons (MLP) to find solutions to this problem and to reduce the data sparseness. However, most of these methods have adopted greedy search and can only consider a limited amount of information from the context window. In this study, we use a Recurrent Neural Network to handle long dependencies between sub dependency trees of current state and current transition action. The results indicate that our method provided a higher accuracy (UAS) than an MLP based model.
GreedyUCB1 based Monte-Carlo Tree Search for General Video Game Playing Artificial Intelligence
Park, Hyunsoo ; Kim, HyunTae ; Kim, KyungJoong ;
KIISE Transactions on Computing Practices, volume 21, issue 8, 2015, Pages 572~577
DOI : 10.5626/KTCP.2015.21.8.572
Generally, the existing Artificial Intelligence (AI) systems were designed for specific purposes and their capabilities handle only specific problems. Alternatively, Artificial General Intelligence can solve new problems as well as those that are already known. Recently, General Video Game Playing the game AI version of General Artificial Intelligence, has garnered a large amount of interest among Game Artificial Intelligence communities. Although video games are the sole concern, the design of a single AI that is capable of playing various video games is not an easy process. In this paper, we propose a GreedyUCB1 algorithm and rollout method that were formulated using the knowledge from a game analysis for the Monte-Carlo Tree Search game AI. An AI that used our method was ranked fourth at the GVG-AI (General Video Game-Artificial Intelligence) competition of the IEEE international conference of CIG (Computational Intelligence in Games) 2014.