Skip to main content

2012 | Buch

Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity

International Conferences, ASEA and DRBC 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings

herausgegeben von: Tai-hoon Kim, Carlos Ramos, Haeng-kon Kim, Akingbehin Kiumi, Sabah Mohammed, Dominik Ślęzak

Verlag: Springer Berlin Heidelberg

Buchreihe : Communications in Computer and Information Science

insite
SUCHEN

Über dieses Buch

This book comprises the refereed proceedings of the International Conferences, ASEA and DRBC 2012, held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of advanced software engineering and its applications, and disaster recovery and business continuity.

Inhaltsverzeichnis

Frontmatter
Central Technology Forecasting Using Social Network Analysis

In this paper, a central technology is defined as a key technology that is connected to most other technologies and that significantly affects them. Accordingly, we can build an R&D policy effectively if we can forecast central technologies. We propose a central technology forecasting model that uses social network analysis (SNA). A social network is a social structure of diverse items as well as of human beings. In this study, we set each technology as a node in an SNA graph and analyze the linkages between them. Thus, we forecast central technologies from SNA results. To verify the performance of our model, we conducted a case study using patent data related to nanotechnology.

Sunghae Jun
Design of Movement Scenarios for Aircraft Ad Hoc Networks

Since current popular simulators do not provide the simulation environments for aircraft ad hoc networks, it is strongly required to extend the current simulators by adding several elements such as mobility model, type of node and so on to conduct research in the area. In this paper, we propose how to design the realistic mobility scenarios for aircraft ad hoc network. Unlike previous approach based on mathematical equation, it relies on the flight simulator which is used to train pilot. By using of flight simulator, it can generate more realistic mobility model because it can describe accurate dynamics of aircraft. Moreover, user interface of the proposed software is also presented.

Ki-Il Kim, Kyoung Choon Park
STVsm: Similar Structural Code Detection Based on AST and VSM

The potential software defects are most derived from the frequent changes during the development life cycle. It is very helpful to inform developers of the related codes which are affected by the change they are currently performing. In this paper, we propose a new approach STVsm to detect the similar structural code which related to some software changes. The method of STVsm is based on abstract syntax tree and vector space model. Experimental results show that our STVsm method achieves a significant accurate to detect the similar structural codes in C programming language, including exact clones, change code format, renamed codes, reordered codes and add redundancy codes.

Ning Li, Mingda Shen, Sinan Li, Lijun Zhang, Zhanhuai Li
Impact on Realistic Mobility Model for Aircraft Ad Hoc Networks

In this paper, we address the impact on realistic mobility model for routing protocol of aircraft ad hoc networks. Since current simulation results are not based on realistic model, impact of mobility model for aircraft ad hoc networks has not been explored very well yet. Thus, this study will provide good simulation results for researcher who is going to develop routing protocol for aircraft ad hoc networks. Moreover, analysis of results shows what is the important factor in design of routing protocol. For the simulation, we introudce three main protocols, AODV, DSDV, and GPRS according to general classification, reactive/proactive as well as geographical protocol.

Ki-Il Kim, Kyoung Choon Park
Technology Network Model Using Bipartite Social Network Analysis

Social network analysis (SNA) is an analysis method with network analytic functionality in the social science domain. SNA is used to analyze nodes and linkages between nodes in social structures. In general, a node represents a person and a linkage is the line that connects that person to others. We can determine the associated structure of a social domain from SNA results. Using an SNA approach, we propose a technology network model for forecasting trends in a target technology. In addition, we construct a bipartite network SNA graph that is composed of technologies and technological clusters. To verify the efficacy of our technique, we carry out a case study using patent data.

Sunghae Jun
Museum Guide, a Mobile App

As science and technology are advancing, computers become so small and powerful that they are now embedded into mobile telephones. Not only a computer but also so many sensors are installed in a smartphone. Making use of those devices, they have developed so many apps running on smartphones. Museum guide we are introducing in this paper is one of those apps. To the best of our knowledge, Museum Guide is the first indoor-location-based, context-aware, and video-on-demand app.

Jaegeol Yim, Thanh C. Le
Hybrid Mobile Testing Model

In order to obtain higher quality mobile applications, greater attention should be devoted to the testing activity throughout the development process and effective models, methods, techniques and tools for testing should be available for testers. In particular, cost-effective, rapid, and automated testing processes should be executed when possible, in order to cope with the fundamental necessity of the rapid delivery of these applications. In this paper focuses on the problem of automatic testing of mobile applications developed for the Hybrid platform. We also describe the services as a test idea generator for software testers new to testing mobile applications, and to broaden the risk analysis that guides the testing of this new breed of application. A risk-based software tester can choose the categories of interest from this structured risk profile, explore the mobile application under test, and create more powerful tests designed to detect potential failures.

Haeng-Kon Kim
Mobile Application Development Using Component Features and Inheritance

With the ever increasing of personal mobile services in a mobile service group, in which mobile services offer the same functionality with different parameters, Mobile service selection in a Mobile service group is an ongoing research topic. Recognizing and achieving software reuse for mobile applications are fundamental problems in software engineering. The current approaches for component reuse concentrates primarily on the consumer perspective for it. To keep balance between the component producers, the component consumers and end-user perspective for the mobile applications, this paper proposes two orthogonal approaches to reusing existing components: component inheritance and feature composition. Component inheritance provides an effective mechanism for service component refactoring. To meet variability requirements, a new service component object can be derived from an old component object. The base component class defines interface and event message flow, and implements code framework and partial functions. The derived component class for the mobile applications reuses legacy asserts and implements virtual interface method. The event message flow produced by base component object can be intercepted by derived component. we also presents a sound approach to derive a software reuse architecture model from the requirements goal model in systematic way for ubiquitous mobile applications using CBD and UML. To narrow the gap between the user and the developer perspectives, the system’s features are decomposed into a set of independent feature component. When a feature component is reused, the consumer only needs to plug it into the prime component to be used by component clients. Mobile telephone projects experiments show that the two approaches contribute to reuse and ease of change.

Haeng-Kon Kim
View, Level and Fragment: Commonalities in “Architecture 101” and Software Modelling

In software modelling, it is difficult to properly arrange the modelling of system structure and behaviour as the traversal between software models usually lacks a clear progression path. Taking an inter-disciplinary approach, this paper tackles the problem by borrowing ideas from a successful movie “Architecture 101”. The commonalities between the movie and modelling are studied. The result is a proposal for multi-modelling. The benefits include more explicit guidance in software development. And the progression from model to code is made more productive.

K. O. Chow
Highly Analysable, Reusable, and Realisable Architectural Designs with XCD

Connector-Centric Design (

XcD

) is a new approach to specifying software architectures.

XcD

views complex connectors as highly significant in architectural designs, as it is the complex connectors that non-functional quality properties in systems can emanate from. So,

XcD

promotes in designs a clean separation of connectors (interaction behaviours) from components (functional behaviours). Designers can then specify connectors in detail explicitly thus easing the analysis of system designs for quality properties. Furthermore,

XcD

separates control behaviour from connectors as control strategies. Architectural designs in

XcD

thus become highly modular with re-usable components, connectors, and control strategies (representing design solutions for quality properties). The end result is the eased architectural experimentation with different design solutions by re-using components/connectors and formal analysis of these solutions to find out the optimal ones.

Mert Ozkaya, Christos Kloukinas
ARSL: A Domain Specific Language for Aircraft Separation Minima Determination

This paper proposes Aeronautical Rules Script Language (ARSL), which is particularly designed for the collaborative determination of a required separation between aircrafts before the tactical phase. ARSL is a domain specific language (DSL) that can be used as a formal language for information sharing and airspace configuration. The advantages of ARSL are that it allows domain specialists to understand, easy to write, reuse, and maintain the program efficiently. In this research, ARSL is implemented and integrated into the col-laborative decision making (CDM) project of Aeronautical Radio of Thailand as a case study.

Sakon Sinlapalun, Yachai Limpiyakorn
Automated Testing Featuring Prototype Generation from Harvested Requirements Specification

Prototyping is a common technique suggested for requirements validation during the early phase of software project. However, prototype construction is resource consuming. Moreover, the evolving prototype due to requirements change may cause inconsistency among associated artifacts. This paper thus presents an approach to automating the construction of prototypes from harvested requirements specification. The implemented component is part of Requirements Harvester— RH, which is the system to facilitate integrating quality control activities with requirements management ability provided by a traceability matrix. The generated prototype is self-test and capable of maintaining the consistency of related work products. The presented automation approach promotes the working smarter environments that could improve process capability and performance. The findings from the comparisons of the manual and the proposed methods reported the outperformance of the latter.

Nawin Phuangphoo, Yachai Limpiyakorn
Regression Testing of Object-Oriented Software: A Technique Based on Use Cases and Associated Tool

This paper presents a regression testing technique (and associated tool) for object-oriented software based on use cases. The basic models we use to describe use cases are UML statechart and collaboration diagrams. The technique combines, in fact, the analysis of these models to a simple static analysis of the code. The goal is to identify changes that may not be visible in design models (change in a method’s body). The developed tool identifies modified (impacted by modifications) use cases and selects the appropriate test cases from an existing test suite. New test cases are generated when necessary. The selected test cases (including the new ones) are automatically executed. A case study is reported to provide evidence of the feasibility of the approach and its benefits (reduction of regression testing effort).

Pierre-Luc Vincent, Linda Badri, Mourad Badri
Development of an Instant Meeting Android Application Using Wi-Fi Direct APIs

In most cases, Web conferencing requires a meeting place equipped with presentation facilities such as beam projectors, computers, video presentation aids, and Internet connection. Such a Web conferencing may be well suited for formal meetings or presentations rather than small-scale group meetings. In small-scale group meetings, presenters may want to start meetings quickly anywhere at any time even though there is no Internet connection. In this paper, we present the design and implementation of an instant meeting Android application based on Wi-Fi Direct, thus not using 3G, 4G, or Wi-Fi Internet access. The initial version of the proposed application indicates that the Wi-Fi Direct APIs of the Android platform can be effectively applied for file sharing and event exchange.

Jae Yoon Jung, Dong Kwan Kim
V&V to Use Agile Approach in ES Development: Why RDR Works for Expert System Developments!

In artificial intelligence, many researchers have proposed several expert system development approaches but most of them failed to deal with two issues, maintenance and analysis. It is better to find an alternative solution from other areas, rather than to waste time waiting any longer. We found that researchers in computer software development also have been suffering from the difficulty of maintenance and analysis, just as in the expert system development area. To solve this problem, agile software development is used to overcome the difficulty of analysis, and business rules approach is utilised for removing maintenance issues. We believe that the two approaches are the ideal solutions that are able to formalize the expert system development process. In this paper, we outline this novel approach, Multiple Classification Ripple Down Rule, which is based on agile software development and business rules approach.

HeeGuen Yoon, Soyeon Caren Han, Byeong Ho Kang, Seong-Bae Park
Developer Support for Understanding Preprocessor Macro Expansions

In the age of advanced integrated development environments there is a lack of support for understanding preprocessor macros. The preprocessor has proven to be a powerful tool for decades, but the developer is still guided poorly when the debugger stops at a source code line containing macros. The main problem is that the developer sees the original code, while the compiler uses the preprocessed code in the background. Investigating the usually nested macro calls can be a labor intensive tasks, which increases the overall effort spent on development and maintenance. There are several possibilities to help the developer in similar situations, but these are rarely employed since the preprocessor has its own, separate language to be analyzed. We implemented a Visual Studio plug-in (AddIn) that provides hand-on information on macros to increase the productivity of developers during debugging or program comprehension tasks. We enhanced the idea of macro folding, a technique to show/hide macro names and values within the source code editor; and defined a graphical view for macro expansions. In the background precise dynamic analysis of directives takes place, so the hint given for the developers considers all kind of preprocessor constructs like macros in conditionals and concatenating operators in the replacement text.

László Vidács, Richárd Dévai, Rudolf Ferenc, Tibor Gyimóthy
Enhancing Smartphone Malware Detection Performance by Applying Machine Learning Hybrid Classifiers

Significant increase and serious thread of Smartphone malwares has imposed adopting accurate malware detection solutions. In this paper, we investigate the performance of machine learning individual classifiers and the possibility of enhancing this performance by introducing hybrid classifiers using stacking method. For the purpose of malware detection on Smartphone, the classifiers are evaluated and tested on 100 most download normal free applications and 90 available malicious applications traces. Those applications have been installed and executed on a HTC Dream phone. The metrics used to measure the classifiers performance are classifier accuracy and false positive rate.

Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert, Martin Hamiche
Myth or Reality? Analyzing the Effect of Design Patterns on Software Maintainability

Although the belief of utilizing design patterns to create better quality software is fairly widespread, there is relatively little research objectively indicating that their usage is indeed beneficial.

In this paper we try to reveal the connection between design patterns and software maintainability. We analyzed more than 300 revisions of JHotDraw, a Java GUI framework whose design relies heavily on some well-known design patterns. We used our probabilistic quality model for estimating the maintainability and we parsed the javadoc annotations of the source code for gathering the pattern instances.

We found that every introduced pattern instance caused an improvement in the different quality attributes. Moreover, the average design pattern line density showed a very high, 0.89 Pearson correlation with the estimated maintainability values. Although the amount of available empirical data is still very small, these first results suggest that the usage of design patterns do improve code maintainability.

Péter Hegedűs, Dénes Bán, Rudolf Ferenc, Tibor Gyimóthy
Towards Building Method Level Maintainability Models Based on Expert Evaluations

The maintainability of software systems is getting more and more attention both from researchers and industrial experts. This is due to its direct impact on development costs and reliability of the software.

Many models exist for estimating maintainability by aggregating low level source code metrics. However, very few of them are able to predict the maintainability on method level; even fewer take subjective human opinions into consideration. In this paper we present a new approach to create method level maintainability prediction models based on human surveys using regression techniques.

We performed three different surveys and compared the derived prediction models. Our regression models were built based on approximately 150000 answers of 268 persons. These models were able to estimate the maintainability of methods with a 0.72 correlation and a 0.83 mean absolute error on a continuous [0,10].

Péter Hegedűs, Gergely Ladányi, István Siket, Rudolf Ferenc
A Study on the Improved Stability of Inverter through History Management of Semiconductor Elements for Power Supply

This study suggested the methods to check a proper replacement time, etc. by managing operation data of IGBT used as switching element of inverter for improving the stability of inverter, which was checked through practical experiment. This study accumulated and recorded data such as operation time of IGBT and temperature of radiator for the use in setting, etc. of proper replacement time by checking the data through an indicator. Methods and systems suggested in this study will be also easily used in various sectors using other electric system and semiconductor switching elements for power.

Young-Choon Kim, Ho-Bin Song, Moon-Taek Cho, Chung-Sik Lee, Ok-Hwan Kim, Sung-Young Park
CSP Based Relation Structure for Social Network Service

Social networking sites (SNS) have infiltrated people’s daily life with amazing rapidity to become an important social platform for computer-mediated communication. SNS provides a method of communicating, employing computers as a collaborate process to accelerate group formation and increase group scope and influence. Therefore it is important to identify and design their relation in SNS. In this paper, we make a human relation model for SNS considering each factor’s correlation in social environment. The factors were Person, Interesting and Society. We also consider their behavior and interaction that person does to keep their relationship with their interesting and society. For this process, we use CSP that is well known in formal method to process analysis. And finally, we define person’s relation and interaction in SNS using CSP.

HwaYoung Jeong, BongHwa Hong
Service Based Software Fault-Tolerance for Manufacturing System

Manufacturing system consists of many components such as robots, motors, cylinders and sensors. It also operates in poor environment in the factory. Worst thing is, it is difficult to control, manage and repair the system for system engineer when the manufacturing system has jam or error. Because the system engineer stay hard always beside the manufacturing system. Therefore automatic recover system is necessary. In this paper, we propose web based software fault-tolerance for manufacturing system. Due to use the web service, the system use UDDI server. The Manufacturing service system that is to provide system software consists of 4 programs; Operating program, Control program, Management program and Fault-Tolerance program. Especially Fault-Tolerance program provide the system recovery process as a service to the manufacturing system at the distance location. It performs the automatic recover process when the manufacturing system has the jam or error.

HwaYoung Jeong, BongHwa Hong
A Study on Industry-University Collaboration Schemes for the Improvement of Urban Convergence Contents Industry

The cultural contents industry is related to the consumers’ sensibilities. At the turn of the 21

st

century, its importance to all industries gradually increased, and each country separated it as cultural technologies and fostered it intensively. The cultural contents industry creates added value in itself, but it can also create value as a new urban industry through convergence and integration in mutual association and exchanges. Thus, the growth potential of the cultural contents industry can be said to be very high.

This research was conducted to examine the current conditions of the cultural contents industry in the Seoul metropolitan area, and to conduct a survey among the related enterprises on the industry-university collaboration program, particularly with regard to their participation in the program, the degree of their satisfaction with it, the demand for it in the industry, and the difficulties they have encountered while participating in the program, and to establish and recommend the effective project performance and direction for the development of the urban convergence contents industry.

Hae-Jong Joo, Euy-Soo Lee
Information Security System Using Image Puzzle Type Keycode

As the modern society is developing into a multimedia information society, it has become easy to collect, search, process, transmit, and store information. However, damages from illegal system intrusion, personal information leaks, data duplication and forgery are also increasing everyday. Thus, information protection technologies are required to guarantee the confidentiality, integrity, and availability of information by responding to the threats and adverse effects that hinder the information communication environment. This paper proposes an information security system using image puzzle type key-code which divides original images consisting of pictures, figures, texts, numbers, fingerprints, and/or iris into certain sizes and the divided image pieces are arranged in accordance with preset patterns to create an image puzzle type key-code, and the original image is restored to a key-code image by substituting a puzzle type key-code value, thus preventing the leakage of original images.

Seongsoo Cho, Changhoon Choi, Sukjoo Hong, Youngchoon Kim
Schedulability Analysis Approach for UML-Based Real-Time Models

Real-time systems cover a large variety of general-purpose and safety critical applications. In addition to their timing constraints, their complexity is continuously increasing. They have in fact evolved to become distributed taking advantages of the ubiquitous real-time networking facilities such as CAN bus, FDDI, TTEhternet, etc. The object-oriented paradigm is well adapted to deal with such complexity. In particular, UML through its proling mechanism can support applying predictive quantitative analysis such as schedulability and performance analysis. In this paper, we present an approach targeting the integration of the design modeling and schedulability analysis for distributed object-oriented real-time systems. In particular, we put the focus on a schedulability analysis technique of a multi-threaded task model derived from an UML model.

Abdelouahed Gherbi
Correlated Weibull Clutter Generation Procedure for UWB SRR System in Automobile Application

In this paper, we propose a model that generates discrete time coherent correlated weibull sequences for Ultra Wide Band Short Range Radar in Automotive applications. First, we generate a coherent correlated Gaussian sequence from coherent white Gaussian noise. Secondly, coherent correlated weibull sequence is obtained from the generated coherent correlated Gaussian sequence by using Zero-memory nonlinear transformation. Finally, the detection performance of UWB SRR detector is analyzed in weibull clutter environment and simulation has been done in order to verify it.

Seok-Jun Ko, Purushothaman Surendran, Chul-Ung Kang
RBAC-Based UAV Control System for Multiple Operator Environments

Nowadays, there are many researches on UAV (Unmanned Aerial Vehicle) control systems for disaster monitoring, national defense and surveillance applications, which mainly focus on flight performance of UAV or multiple UAV control by single operator. This paper presents design and implementation of an effective system for multiple operators to control UAVs based on RBAC (Role Based Access Control). In the proposed system, a UAV is connected to the UAV control server, and operators remotely access to the UAV by connecting to the server using various devices such as smart phones, desktops, and laptops at the same time. Each operator can control the UAV based on RBAC, in other words, operators are granted with permissions which are corresponding to the given roles. For example, the administrator may have all the permissions defined in the system and a pilot has a role where the flight control and flight status permissions are granted. In addition, operators may have a role with the camera tilt control and video access permissions. The major advantage of RBAC-based approach is to prevent unnecessary operational confusion, conflict and mistake under multi-operator UAV environments. Another advantage is to increase efficiency and accuracy of UAV mission control by allowing a mission to be decomposed into specific roles.

Hyeok-June Jeong, Young-Guk Ha
A Study on the Extraction of Damage Locations Using Twitter Messages

In the past, people had to rely on broadcasts and public agencies to receive disaster information when the disaster occurred. More recently, disaster information is shared by means of photos or messages shared by citizens using social network services (SNS). However, SNS is neither reliable nor efficient method of sharing information, due to the fact that SNS messages are not necessarily grammatically correct and the information may not be accurate. In this paper, we suggest the method of extracting information regarding affected locations by means of message analysis, and extracting GPS information from uploaded photographs.

Younghak Chun, Hyun Suk Hwang, Chang Soo Kim
Experiments on the Sensor Space Based Location Estimation System under KS Specified Illumination Intensity Environment

A sensor space which is realized in this study was designed as a matrix structure comprised of CDS sensors made to recognize the coordinate of a specific location by sensing light when a robot is positioned on the CDS sensor. However, since CDS sensor is light-specific which sensitively responds according to the amount of light, it is important to understand the characteristic behavior of CDS sensor according to environment changes. Therefore, in this study, by setting various environments in the sensor space, the characteristics of CDS sensor data under different environments were analyzed.

Seok-Jun Ko, Sang-Seop Lim, Chul-Ung Kang
A Study on Damage Spatial Data Generation to Construct Disaster History Information

When disasters occur, data for damage is been collected through media such as the internet, smart-phones, telephones of government-related organizations and some civilians. However, an integrated system to accumulate and to manage the damage data is not completely constructed, and current disaster management systems have disadvantage sin regards to accuracy and cost in constructing spatial databases because of batch input processing with related documentations. We integrate dispersed data into our designed spatial database, such as photos transferred from smart-phones by civilians and other related information. We have developed an integrated damage spatial data management system to generate polygon type of damage areas based on the existing disaster history management system. In this system, managers can conveniently indicate damage areas with three different forms based on maps. General users and managers can provide the collected damage information and can search disaster history information.

Hyun Suk Hwang, Chang Soo Kim
Analysis of Gaussian Pulse’s Bandwidth for Automotive UWB Short Range Radar

In this paper, we present the mathematical analysis of the bandwidth and the pulse-width of Gaussian pulse for 24GHz automotive UWB SRR system. Finally, we propose an appropriate value of the time normalization factor in making the Gaussian pulse, which is related with bandwidth satisfying the standards.

Seok Jun Ko, Chul-Ung Kang
Software Test Capability Improvement Method

An Integrated Medical Information System (IMIS) requires continuous customization to cope with periodic government notifications, changes in customer needs, and changing customer preferences. These systems are also modified as part of internationalization efforts. An IMIS should adhere to these situations while retaining its ability to charge medical expenses to patients and to the National Health Insurance Corporation. It should also deal with medical information such as prescriptions, medical images or videos in a manner that avoids minor defects which can lead to legal battles. Thorough testing is therefore very important. However, it is not easy to standardize medical processes, and much tailoring of IMISs has been done as a result. Moreover, new notifications should be reflected in customized IMISs operating in the hospitals within one week. It is known that sufficient testing of these systems has not been carried out. Therefore, this paper describes observations and an examination of the improvements of the test capability of such a system at a SME-level company. The assessments use a lightweight test process based on the test capability level of the company.

Jihyun Lee, Sunmyung Hwang
Implementation of Improved DES Algorithm in Securing Smart Card Data

Although smart cards have already provided secure portable storage device, security is still a major concern to electronic data systems. There is a need to improve data security against accidental or unlawful destruction or alteration during transmission or while in storage. The Odd-Even substitution proved to have provided additional confusion technique to DES and was essential in providing adequate security. The limitation of DES to encrypt large data has also been addressed by this research without intensive processing. Unlike the 3DES or AES, the improved DES has lesser computational load.

Ariel M. Sison, Bartolome T. Tanguilig III, Bobby D. Gerardo, Yung-Cheol Byun
Uniform Random Number Generator Using Leap-Ahead LFSR Architecture

The conventional Leap-Ahead LFSR URNG (uniform random number generator) is useful to generate multiple random numbers since it only consumes 10% slices of the multi-LFSR architecture. However, it has significant drawback. The maximum period of the random number generated is dramatically diminished depending on the relationship between the number of the stages in LFSR and the number of the output bits in URNG. This paper presents the new architecture for Leap-Ahead LFSR URNG employing segmentation technique to increase the maximum period of the random numbers. The simulation results show that the proposed architecture can increase the maximum period is increased 2.5 times at the worst cases without significant area overhead.

Je-Hoon Lee, Min-Jeong Jeon, Sang Choon Kim
The Effect of Fairy Tale Activities with Multimedia on Preschool Children’s Prosocial Behavior

The purpose of this study was to find a teaching-learning method to improve preschool children’s prosocial behavior, comparing educational effectiveness of fairy tale activity with picture book and with multimedia, which contained the context of helping and sharing. The results of this study were as follows: First, fairy tale activity with multimedia turned out to have a statistically significant difference in improving preschool children’s prosocial behavior. That is, it had a positive effect on preschool children’s helping and sharing behavior. Second, activity with multimedia showed a significant interaction effect of age and gender only by age. As a result, it suggested that fairy tale activity with multimedia was an educationally effective activity in improving preschool children’s prosocial behavior.

Yongsuk Kim, Youngsik Kang, Seongchul Yun
Strategies for the Improvement of Historic Sites Bike Tour Using Structural Equation Modeling

Structural equation modeling was used to evaluate components within safety, amenity, information, convenience and amusement among 198 participants who joined to Gyeongju historic sites tour by bike. As results of a SEM, the component of amusement primarily affects the degree of satisfaction (DS) (0.61). Second significant component influencing the DS is the convenience (0.22) followed by safety (0.16) and information (0.07). Four variables denoting the amusement component are as follows: “Playing in rest time (e.g., game)” (0.82), “How about course? Not detour?” (0.81), “Human relationship among team members” (0.76). This means that participants consider amusement as the most important factor. Second important component is the convenience. It consists of such variables as “Fee - expensive or cheap” (0.88), “Easy to resister for participant” (0.75) and “Quality of rental bike” (0.47). For the component of safety, participants of Gyeongju Bike Tour Program (GBTP) put little importance since they recognized the program itself to be safely run. In this paper, we suggest that the local government needs to play a core role in improving the bike infrastructure such “Safety of shared bike road” and “Obstructions on bike road”, although an amusement is the most important component for improving the program running.

Jangwon Jin, Jeongill Kim
A Case Study on the Effect of Land-Use Characteristics on Damages Caused by Natural Hazards in South Korea

This paper examines the effect of land-use characteristics on the total sum of damages caused by natural hazards in South Korea. The results show that the size of urbanized area, population density, industrial district area, bare land area and so on are positively related to damages, and that the area of levee has a strongly negative influence on them. Lastly, this paper proposes some measures for natural hazard mitigation, based on our empirical findings.

Jae Heon Shim, Kwang-Woo Nam, Sung-Ho Lee
An Analysis of the Relationship between the Flow Experience and the Lesson Persistence Intention of Robot Programming Lesson Participants

The purpose of this study was to objectively analyze the active and persistent lesson participation attitude and the lesson flow phenomenon of students that are participating in robot programming lesson. The analysis information was used to identify the factors that could affect the lesson participation & flow of learners in order to identify the areas of improvement in programming lesson that is regarded as difficult by students in general. Accordingly, Technology Acceptance Model (TAM) and the Theory of Flow were examined based on which structural equation model was established and analyzed. Consequently, it was found that Perceived Ease of Use and Perceived Usefulness were factors that could affect the lesson persistence intention of learner, among which the Perceived Ease of Use factor affected the flow of learner. Meanwhile, it was also found that the factor of Balance between Challenges and Skills affected the Concentration on the task at Hand factor as well as the Perceived Usefulness factor in the flow of learner. In addition, this study also dealt with information on the relation between TAM and flow.

Seung Young Shin, Mi Ryang Kim
Guitar Application Programming for Smartphone

Groundbreaking ideas or developing products can innovatively change our lifestyles. The ideas and products can be combined together and rapidly evolve by themselves. The smart phone that was developed just a few years ago has capabilities that are too many to list. It is not only a phone, but also has computer functions, such as games, music, and the Internet that are a must for modern people. The guitar application named, ’The First Guitar’ which we developed, improves performance and has a realistic touch compared to other musical applications that have been released. This study is about serious consideration of musical applications for smart phones such as sound, design, a variety of functions, and User-Oriented interface in the process. This paper has two different subjects; one is how to produce the best guitar sound source and the other is how to provide an easy and convenient application for users using a previously recorded guitar sound source.

Yoemun Yun, Si-Ho Cha
A Study of Communication Design Strategies Based on Visual Elements in Yeosu Expo Newsletter

The newsletter in this study provides news and information of the company. And Consumers get necessary information from the newsletter and respond, so quick, precise, and effective information sending to customers is important. Information is delivered from Source to receiver through Channel. Source has to change its purpose into right sign for Channel to use it. The main contents 2012 Yeosu Expo newsletter try to deliver is about link to previous file, the Expo site, BIE site, ticket reservation site, participating nations status, Youtube video, Namdo shortcut, inform, and Naver blog event.In visual aspect of the newsletter, unity of link, prediction for path, and linguistic accessibility are analyzed in harmony of trend of image, arrangement of layout, illustration, photograph, and copy and informational aspect.

Jung-Ae Lee, Gwang-Yong Lee, Hee-Suk Shin
A Study on the Conceptual Design of High Efficiency Induction Motor and the Production of Prototype Motor for Sharing Core (Less than 37kw)

This paper is about the conceptual design and trial production of high efficiency induction motors with a sharing core capacity less than 37kw. For the preparation of a prototype induction motor set, motor design and analysis are required. The methods involved in the design and analysis for the high efficiency induction motor include basic design of motors, design of experiment, equivalent circuit method, and finite element method. Among these, design of experiment can be analyzed by dividing it into optimum design, key parameters, optimum areas, etc. Through the results and analysis of the design, motor characteristics are analyzed and their efficiencies are compared. Based on the analysis results, prototype high efficiency induction motors with a sharing core capacity less than 37kw (5.5kw, 7.5kw, 11kw, four 15kw poles, and six 11kw poles) are produced.

Kye-Kwang Choi, Sei-Hwan Kim, Sae-Jong Lim
Solving Mutual Exclusion Problem in Mobile Cellular Networks

The mutual exclusion (MX) paradigm can be used as a building block in many practical problems such as group communication, atomic commitment and replicated data management where the exclusive use of an object might be useful. The problem has been widely studied in the research community since one reason for this wide interest is that many distributed protocols need a mutual exclusion protocol. However, despite its usefulness, to our knowledge there is no work that has been devoted to this problem in a mobile computing environment. In this paper, we describe a solution to the mutual exclusion problem from mobile computing systems. This solution is based on the token-based mutual exclusion algorithm.

Sung-Hoon Park, Seon-Hyong Lee
A Resource Allocation Supporting QoS in Mobile Communication Systems

We propose channel management schemes applied to both macrocell and microcell, and we develop algorithms for a new call, handoff request and overflow call through a traffic model. For a new call, a new channel assignment scheme is achieved by modifying a DDCA scheme, using co-channel interference principle. For a handoff call, we suggest a novel channel reservation scheme to adjust the number of guard channels in macrocell, depending on the number of saturated microcells. The proposed schemes are able to accommodate much more mobile calls in the microcell and significantly reduce the blocking probability in the macrocell at the expense of the small increment of a forced termination in the microcell.

Gi-Sung Lee, Jong-Chan Lee, Sang-Joon Park
An Effect of Korean Wave on Domestic Cosmetics Industry of Korea Boryeong Mud

Korean wave is intangible cultural product for foreigners visiting Korea and continuous development of Korean wave products are required to foreign accepters who want new stimulation. This study started because of the intention to examine the process cosmetics industry accepted cultural phenomenon of Korean wave positively, reinterpreted it industrially and settled in overseas field successfully as well as diagnose the directivity. Through the effects Korean wave makes on cosmetics industry and actual examples of embodiment, we can realize that Korean wave model shows influences as one axis of brand expansion and cultivates brand property. Cosmetics industry shows that the process that industry is introduced without any effort in the place where culture was introduced successfully at the front.

Moon-Hee Choi, Hyun-Seob Cho, Jason Lee
A Study on the Introduction of Family Impact Assessment System

Even though our nation entered 20-50 club, the seriousness of low birth and aging become deepened than any other nations in the world, and the speed is fast, there is no research and future vision on the population such as population policy. Furthermore, keeping or fortifying policy which cannot diagnose diverse social ills occurring by the family breakup and even worsen them is considered to have the seriousness. Through the experience and know-how of advanced countries, systematical devices which can analyze the effect of population family policy and evaluate should be introduced urgently. Even though the Family Impact Assessment is composed narrowly in the traditional way on the scope and applications and limited, it also has advantage to find what to be learn from those who have suggested or practiced this on studying the characteristics of the Family Impact Assessment in spite of this.

Seung-Il Moon, Ki-Min Song, Sang-Hyeon Park, Ho-Young Choi
A Harmony between Point of Parity and Point of Difference for the Improvement of Positioning

There are many cases that branding or brand marketing is understood as the process to differentiate the brand from other brands. Two axes of positioning are point of parity and point of difference. Based on the point of parity, the point of difference should be inculcated to customers. Both of the point of parity and the point of difference are important and they should be properly harmonized.

Hyok-Gun Jo
The Economic Analysis of Feasibility Study on the Food Factories of Egypt

This paper is based on the feasibility study on the food factories of Egypt. In economical analysis of present project, IRR (Internal rate of Return), PBP (Payback Period) and NPV (Net Present Value) were introduced. Sensitivity analysis is performed by setting all variables at their nominal value and varying each at its upper and lower bound values such as total investment cost, sales price (steam & power) and fuel cost to investigate the impact on internal rate of return.

Doo Hee Han
Multicriterial Evaluation of Critical Infrastructure Element Protection in Czech Republic

The importance of Critical Infrastructure is seen through its potential to enable the functional continuity of vital societal functions from economic and social perspective. Present state of Critical Infrastructure Protection is related to creation of relevant security and protection management system, where the effectiveness of this system should be important also in relation to business continuity and disaster recovery. The article will discuss about potential approach to multicriterial evaluation of Critical Infrastructure and Its security and Protection management system in the context of security research project in the Czech Republic - ”VG20112014067 - Resilience evaluation system of Critical Infrastructure elements and networks in selected areas.“

Martin Hromada, Ludek Lukas
Integrated Alarm Systems

Alarm systems represent part of the technical resources to provide support for business continuity. Integration of the alarm systems is a modern way of using the current technological capability elements of intruder alarm system, CCTV, access control and hold-up alarm systems. These applications can be integrated with each other or to supplement the non-alarm systems and thereby provide simplify the automation processes in commercial and residential buildings. This article deals with problem of technical solutions of interconnection alarm and non - alarm systems. The key output of the article is classification of techniques of integration these systems.

Jan Valouch
Reservoir Risk Dispatching Combining Forecasting Error

Based on statistic forecasting error of different flood discharge magnitude, this paper considers the forecasting errors have relationship with flood discharge magnitude. Using interval estimation principle, a probable error magnitude bound on different risk level

α

is estimated. To consider safety preference, the upper limit of the probable error magnitude bound is called maximal probable error. On the same risk level, the correlativity function between different flood discharge magnitude and its maximal probable error is called forecasting error risk function. Then the text establishes reservoir forecasting error risk function which puts scientific basis for rational making use of forecasting production. According to reservoir scheduling discipline, probing into Feng Shuba reservoir risk forecasting dispatching combining forecasting error risk, it puts application for real time forecasting and dispatching.

Yu Song, Linlin Fan, Hongrui Wang
Investigation Technique of Slope Disaster Using Advanced Technology

Recently the frequency and impact of disasters due to the climate change have been increased and it is a usual trend in Korea. The steep slope failures, which are the representative natural disasters in Korea, generate 18 casualties every year. In order to response this disaster it is imperative to implement the scientific site investigation on potential slope areas and evaluate their vulnerability quantitatively. The efficient maintenance and management of steep slopes often require excessive professional resources and quantitative investigations. Therefore, it is important to develop a technology for the objective scientific site investigation and quantitative evaluation for steep slopes. In this study the ’Field Investigation System’ for steep slopes is proposed in order to improve the effectiveness of site investigation rather than conventional methods using the evaluation table. Verification for the applicability of the system is also performed by applying to the steep slope area which was affected by debris flows. It is, therefore, expected that the efficiency of maintaining steep slope is improved while time and resources are decreased by this Field Investigation System.

Young-Karb Song, Jeongrim Oh, Young-Jin Son, MinSu Jung
A Schematic Approach for GIS Application for Tsunami Disaster Management

Natural disasters like Tsunami are inevitable and it is almost impossible to fully recoup damages caused by the disasters. However, it is possible to minimize the potential risk by developing early warning strategies. GIS modeling with its geoprocessing and analysis capability can play a crucial role in efficient mitigation and management of disaster. This research aims at developing a spatial information system supporting tsunami evacuation action planning using geo-information technology. The main effort in minimizing casualties in tsunami disaster is to evacuate people from the hazard area before tsunami strikes by means of either horizontal or vertical evacuation.

Asha Nilani Liyanage, Heewon Lee
Application of Disaster Information System for Disaster Management

The policy for the recent maintenance of natural disaster is operating the disaster system from preliminary expectation, forecasting and respond, and for this it is necessary to raise the efficient work related to disaster through the scientific analysis and quick investigation of past disaster history. This research used spatial information of disaster attribute, digital image, digital topographic map, cadastral map and geological map for the efficient maintenance of disaster through scientific analysis and quick investigation to construct the disaster information system and evaluated the application of disaster management system. Disaster information system used the spatial information and disaster attribute information to make an efficient performance of functions necessary for disaster management such as disaster zone management, geological analysis and automatized calculation of damage area, and made the efficient disaster management through the extraction of cadastral information and damage area more than certain scale by damage area. In the future, this system can be used for the objective and quick recovery plan of disaster damage investigation and disaster related decision making.

Hee-Cheon Yun, Jong-Bai Kim, Kap-Yong Jung, Min-Gyu Kim
Analysis of Judicial Precedent Tendency in the Tourism Business Field

Recently complaints of tourists and consumers on tourism increase rapidly. According to this, many conflicts are occurring and so law interpretation relating to tourism is increasing. However, there is no tourism law and civil code on contracts relating to tourism, only handling law relations among contracting parties by domestic travel standardized agreement and domestic and overseas travel standardized agreement and so tourism consumers cannot be protected. The research analyzed 36 cases of precedents from 1992 to now, for recent 20 years, based on 8 theme words relating to tourism. In the result, the analysis results of 36 cases could be divided into three in large: 22 cases of concept of tourism business and classification of business types, 8 cases of problems of related law interpretation, 3 cases related to taxation, 3 cases related to others, etc. Problems of tourism filed appearing through tourism precedent analysis showed two in large and the first is that tourism business defined by the Framework Act on Tourism is not clear. The second is that judgement standard of additional facilities is vague. Based on results, regarding defining types of tourism business at Tourism Promotion Act and registration, permission, or designation, etc by this, it should be defined more clearly, not entangled and have good people not charged taxes accidentally or punished.

Seung-Il Moon, Sang-Hyeon Park, Ho-Young Choi, Ki-Min Song
A Study on the Efficient Supply Chain Management in the Parts Manufacturers of Nuclear Power Plants

This study aims to propose an improved trading environment for purchasing low material and alternatives to reform supply chain management among firms which are the parts manufacturers of nuclear power plants. To do this, we deliberate issues to be improved by analyze the purchase and acquisition process between suppliers and purchasers, interview, and survey among those firms in considering specific environment around those firms.

Lee-Sang Jung, Chang-Seung Ha, Seok-Yong Lee
An Android Phone Workplace Management System

Power plants need quite a wide area of the site. In the power plants, various types of machinery and equipment are distributed throughout the workplace, to manage them checking the operation is necessary on a regular time interval. In general, the workplace inspector writes error data by hand and then inputs them to information system. In this paper, we present an Android platform’s workplace management application design, which makes it possible to manage failure or error data of the workplace.

Shinhyeong Choi
TOD as a Rail Integrated Urban Regeneration Strategies of Old City through Case Study about Toyama Station and Surroundings Area in Japan

Considering national greenhouse gas emissions extract from buildings(25%) and transportation(17%), it is important to construct environmentally friendly city that is for modern human life. Urban planning method using TOD as an element of city planning scheme that is proposing sustainable built environment is a key element of low carbon and green city by interconnecting public transit and land use plan to cause high density development around station influence area. The purpose of this study is to explore TOD city revitalization method focusing on Toyama railway station & Surroundings area in Japan in order to find applicable measures in Korea. In Toyama, there are some projects like a revitalization plan of new city center, activation of public transportation, and downtown inhabitation warning project which are developed by effective transportation link with Toyama Railway Station. From this on, it’s an important compound to be recognized as an element of urban facilities.

Shin Yekyeong
Concrete Strength Reduction of DSCT Member by Welding Heat

Strength reduction was investigated when a double-skinned composite tubular (DSCT) member was exposed to welding heat. And a method for a DSCT member to maintain its original strength against the welding heat when modular DSCT members are composed. Welding causes the heat of 20,000

°C

on the weld zone and the heat of 1,300°C around the weld zone. The strength of concrete nearby the weld zone decreases by high temperature. In this study, the concrete strength cases were investigated when arc welding and electro slag welding were used as the welding methods. Through heat transferring analysis of welded DSCT members, a preventing method preventing concrete strength reduction was proposed. The proposed method showed it prevented concrete strength reduction and it was verified by finite element analysis (FEA).

Deokhee Won, Taek Hee Han, Seungjun Kim, Young Jong Kang
Mesoporous Co(III) bis(tetrazolate) Framework for CO2 Adsorption

Mesoporous Co(III) bis(tetrazolate) metal organic framework was prepared by the reaction of cobalt (III) nitrate and tetrazole in water. The crystalline nature of the material was verified by its X-ray diffraction pattern. Its Fourier transform-infrared spectrum showed absence of N-H stretching vibration proving nitrogen coordination with cobalt. Its non-electrolytic nature was verified by its insolubility in water. Its surface area, pore size and pore volume were 543 m

2

/g, 4.9 nm and 0.67 cm

3

/g respectively. Its thermogravimetric analysis showed stability up to 250 °C. Its mesopore provided an opportunity to examine its CO

2

uptake, and it was nearer to 6 wt%. This study revealed potential for other metal based tetrazolate derivatives for CO

2

sorption.

Pushparaj Hemalatha, Mani Ganesh, Mei Mei Peng, Wang Seog Cha, Muthiahpillai Palanichamy, Hyun Tae Jang
Towards a Framework for Ubiquitous Computing Technologies: Analyzing Users’ Values Using Value Focused Thinking Approach

Using the value focused thinking(VFT) approach, twenty two in-depth interviews were conducted eliciting the interviewees’ underlying values in using ubiquitous computing technologies. Nineteen values/objectives were successfully elicited: five fundamental objectives that users fundamentally value in ubiquitous computing and fourteen means and objectives leading to these fundamental objectives. The findings suggest that research frameworks currently cited in ubiquitous computing literature may largely fit with users’ value structure while current technological developments are focused more on the supply side perspective. Technological development may need some course corrections linking towards the demand side perspective of ubiquitous computing technologies. A means-end network of value objectives in ubiquitous computing is presented at the end. This value network may be useful as a guideline for technological development and provide a basis for appropriate business service model development for ubiquitous computing.

Jungwoo Lee, Min Sun Kim
Effort Estimation in Incremental Software Development Projects Using Function Points

Nowadays, software development methodologies, such as Rational Unified Process or agile methodologies, recommend developing software by increments instead of following a waterfall lifecycle model. Although Function Points is one of the most known techniques to estimate effort and cost in software projects, there is little work that indicates how to adapt it in non-waterfall lifecycles, such as incremental ones.

This paper presents an approach called Incremental-FP that allows estimating effort for each increment using unadjusted function points (UFP) and COCOMO’s effort adjustment factor (EAF). This approach could be complemented with the Use Case Precedence Diagram to determine use case prioritization, and the rules proposed in a previous work to count UFP with UML class diagrams.

We also present the results by applying our approach in projects with undergraduate students. We obtained good results, because the difference between estimated effort and real effort was lower than 20% for the second increment. Moreover, the results obtained with Incremental-FP were better than the ones obtained with adjusted function points.

José Antonio Pow-Sang, Ricardo Imbert
Semantic Approach to Verifying Activity Diagrams with a Domain Specific Language

The Unified Modeling Language is widely used as a design tool for modeling a software system via a set of diagrams providing both static and dynamic views of the system. However, the applications of UML have many problems, namely model inconsistent behaviors, model misconception, and mistake interpretation. The notations are used in different definitions that may not conform to the UML specification. This paper thus present a semantic approach to verifying UML activity diagrams with a domain specific language called Action Description Language (ADL). The method would facilitate the inspection of activity diagrams for the conformance to UML specification, resulting in better quality of design blueprints that would lead to quality software systems.

Chinnapat Kaewchinporn, Yachai Limpiyakorn
Backmatter
Metadaten
Titel
Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity
herausgegeben von
Tai-hoon Kim
Carlos Ramos
Haeng-kon Kim
Akingbehin Kiumi
Sabah Mohammed
Dominik Ślęzak
Copyright-Jahr
2012
Verlag
Springer Berlin Heidelberg
Electronic ISBN
978-3-642-35267-6
Print ISBN
978-3-642-35266-9
DOI
https://doi.org/10.1007/978-3-642-35267-6

Premium Partner