Skip to main content
Top

2011 | Book

Convergence and Hybrid Information Technology

5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011. Proceedings

Editors: Geuk Lee, Daniel Howard, Dominik Ślęzak

Publisher: Springer Berlin Heidelberg

Book Series : Communications in Computer and Information Science

insite
SEARCH

About this book

This book constitutes the refereed proceedings of the 5th International Conference on Convergence and Hybrid Information Technology, ICHIT 2011, held in Daejeon, Korea, in September 2011. The 85 revised full papers presented were carefully reviewed and selected from 144 submissions. The papers are organized in topical sections on communications and networking; motion, video, image processing; security systems; cloud, RFID and robotics; industrial application of software systems; hardware and software engineering; healthcare, EEG and e-learning; HCI and data mining; software system and its applications.

Table of Contents

Frontmatter

Communications and Networking

Study on Architectural Model and Design of P2P-Based Streaming Client

P2P technology is widely used for distributing contents. The P2P applications increase the load of ISP on handling massive and unpredictable P2P traffic. By the way, P2P itself provides very good performance on receiver-side when it receive large-sized files from multi-points. Furthermore, the usage of P2P technology is enhanced its area on multimedia streaming. Nowadays, the volume of multimedia is tends to be massive and need high performance of network. In the case of server-client model, there are definitely limitations on accommodating a number of users. In this paper, we present architecture for providing P2P-based streaming services and framework model for client agent.

Wook Hyun, SungHei Kim, ChangKyu Lee, ShinGak Kang
Time Slot Assignment Algorithm in WSNs to Reduce Collisions

Existing hybrid MAC in wireless sensor networks (WSNs) is to combine TDMA and CSMA MAC techniques to adapt sensor nodes into the environment from low contention state to high contention state. It operates in pure CSMA mode when the traffic requirement is comparably low in WSN. On the other hand, as the sensor data is generated in high rate, hybrid MAC is shifted to TDMA-based operation. The main advantage of pure TDMA is no collision among nodes with pre-allocation of each time slot. Every time slot is allocated to nodes in need and it is owned only by pre-allocated node. Non-owner node may not use any other time slots that are not allocated to it. We propose new time slot assignment method to assign every empty slot to nodes which are not in need currently. Even though they are not in need now, the sensor nodes may get more data to send in some time later. In that case, if more time slots were allocated to nodes in advance, the owner nodes can get empty slots to send without contention resulting of reduction in collision and increase in overall traffic throughput.

Jookyoung Kim, Joonki Min, Youngmi Kwon
A Management for the Deployment of PoC Using Dynamic Routing Algorithm in the IMS Nodes

Nowadays, by increasing the network traffic in the IMS, the role of Network Management System (NMS) is very important because of limited network resource. It can perform two kinds of routing ways with the capability of static or dynamic routing. In the IMS network, network traffic is very fickle, therefore, a dynamic routing way is more efficient than static routing one because it can make the flow of traffic changeful among nodes in the IMS. In this paper, we suggest a management function of NMS, applying a dynamic routing algorithm in order to manage IMS nodes. Finally, we apply the algorithm by deploying a PoC service, one of the prominent application services in the IMS.

Jae-Hyoung Cho, Jae-Oh Lee
Network-Oriented Intelligent Agent Infrastructure for Internetworking with Guaranteed Quality of Service in High-Speed Network

This paper describes an Agent-based InterNetworking Platform (AINP) which has a hierarchical infrastructure for internetworking with guaranteed Quality of Service in a high-speed network. The AINP system intelligently controls and manages the AINP network through network-oriented agents due to its policy which is periodically updated using the user/network-state information. In this approach, for implementing network-oriented agents and agent-based communications in intelligent AINP infrastructure, a Common Information Model is used which is the international standardization of object-oriented modeling. Extensible Markup Language is used for encapsulation and the HyperText Transfer Protocol is used for transference of user/network-state information. We concluded that the AINP was robust and suitable for an intelligent network management system in a high-speed network.

Joonhyeon Jeon, Donghyeok Kim, Gunmin Kim
Study on Emergency Services for VoIP Based on IP Network vs. Domestic Emergency Network

Enhanced 9-1-1 (E9-1-1) Service is a public safety feature that allows customers to report an emergency or request emergency assistance by dialing the 3-digit telephone number “9-1-1.” Emergency calls originated in this manner are then routed to the appropriate Public Safety Answering Point (PSAP) based on the location from which the call was originated. In this paper, we are intended to analyze the structure of system to efficiently provide emergency service using SIP protocol-based internet telephone under IP network environment, and the assessment of its performance.

IlJin Lee, OkJo Jeong, ShinGak Kang
EOI: Entity of Interest Based Network Fusion for Future Services

The Internet has been getting popular to access by today’s life. For that, we need to construct a novel model of Internet architecture in a simpler and better way. The present paper talks about a new approach towards future services. This paper tries to build hybrid architecture by combining Joint Directors of Laboratory (JDL) model and SENSEI architecture. This hybrid model recommends data fusion process for Entity of Interest (EOI) based architecture. The EOI based fusion model has supported internet connectivity over things. The EOI has consisted user and machine (objects) in the domain of application. Thus, the proposed novel model will be applicable to all present and future applications domain ranging from energy sectors to the food sectors.

Gaurav Tripathi, Dhananjay Singh, K. K. Loo
Potential Field Based Routing for IPv6 over Low Power WPAN

Requirements of IPv6 over Low Power WPAN (6LoWPAN) are energy conservation and low protocol complexity. Incorporating the desirable features, potential-field-based routing known as ALFA (autonomous load-balancing field-based any cast routing) achieves autonomous load-balancing and efficient path-length provisioning with little control overhead in a wireless mesh network (WMN), which is a hub-and-spoke type network similarly to 6LoWPAN. In this paper, we provide the protocol architecture of ALFA for 6LoWPAN to consider energy consumption. Distinct from the case of ALFA in a WMN, when the energy level of a sensor node declines to a threshold, the exchange of its potential information holds and its energy shortage is reported to a sink node.

Sangsu Jung, Dhananjay Singh
Throughput Analysis of Wireless Mesh Network Test-Bed

Wireless mesh networks (WMNs) is bringing wide popularity as a flexible and cost-effective access in wireless network technology. Many researchers had done their wireless mesh network experiments through simulations. The simulation results and real world implementation results have big differences. In this paper, we have set up the testbed in our lab. Our experiment is based on IEEE 802.11s draft 4.0. In our experiment, we select the best path with the help of modified air time metric for both reactive and proactive path discovery. In this paper, we have evaluated the throughput results of different data packet size for UDP transmission protocols.

Madhusudan Singh, Song-Gon Lee, Whye Kit Tan, Jun Huy Lam
Cooperative Heterogeneous Network Interworking between WiMAX and WiFi

As more wireless devices are being connected to the Internet, data traffic is growing and expected to increase beyond wireless network’s capacity in near future. Considering radio spectrum is limited, the efficient way to support increasing data traffic in cellular networks such as mobile WiMAX, operating in license band, is using WiFi network operating in license exempt band. By employing WiFi, mobile WiMAX network can offload some traffic to WiFi networks. In terms of admission control and Quality of Service (QoS) control, WiFi employs simple strategy as compared with cellular network. However, when WiFi is used for traffic offloading of cellular networks, cellular users’ QoS should be continuously guaranteed in the WiFi networks. Therefore, clear interworking scenarios and control procedures between WiFi and WiMAX should be defined. In this paper, we present two most prospective collaborative heterogeneous interworking scenarios between WiFi and WiMAX, and collaborative heterogeneous architecture and protocols are proposed. Efficient and easy handover scheme in the overlay collaborative heterogeneous network interworking is also proposed and its benefits are verified with simulations.

Hae Jung Kim, Chan Jung Park, Ronny Yongho Kim

Motion, Video, Image Processing

Texture-Based Pencil Drawings from Pictures

We re-render a black-and-white picture as a pencil drawing by overlapping pencil textures along the flow of the picture. The pencil textures are generated by overlapping pencil stroke textures captured from real strokes. An input picture is segmented into iso-tonal regions, each of which is textured in a direction determined by an algorithm for detecting smooth and feature-sensitive flow on the picture. Finally, we add contours and feature lines to emphasize salient shapes in the scene. We present several images that show the degree of realism which can be achieved.

Yunmi Kwon, Kyungha Min
Camera Colour Fidelity through Adapting ICC Profiles

Observing colour robustly in images captured with off-the-shelf cameras can be a challenge. Particularly if the observation is conducted over a long time, while encountering light changes. Factors playing into using this colour information directly for quantitative reasoning: unknown processing in the camera’s firm ware, unpredictable variations in illumination conditions, and colour descriptors possibly not comparable with those of other devices. The research presented outlines an approach based on standard compliant colour management as specified by the International Colour Consortium (ICC). Initially, a device is characterised, resulting in an ICC profile for the starting conditions. Software tracks the changes of a number of coloured objects in the scene. With these changes a colour corrective transformation is fused into the ICC profile, compensating for the colour shift induced over time. An ICC profile transformation yields device independent CIE LAB colour space information. This paper describes background and process of the colour correction – including profile adaptation without process interruption – along with validation experiments conducted.

Guy K. Kloss
Breast Mass Segmentation in Digital Mammography Using Graph Cuts

This paper presents a novel method for the segmentation of breast masses on a mammography. Accurate segmentation is an important task for the correct detection of lesions and its characterization in computer-aided diagnosis systems. Many popular methods exist, of which most of them rely on statistical analysis. Similar to other methods, we propose a graph theoretic image segmentation technique to segment the breast masses automatically. This method consists of two main steps. First we introduce a thresholding method to obtain the rough region of the masses by eliminating all other artifacts. Then, on the basis of this rough region, the graph cuts method was applied to extract the masses from the mammography. The results were evaluated by an expert radiologist and we compared our proposed method with the level set algorithm, which shows the highest success rate. In contrast, we experiment our method on two different databases: DDSM and MiniMIAS. Experimental results show that the proposed method has the potential to detect the masses correctly and is useful for CAD systems.

S. Don, Eumin Choi, Dugki Min
ScaleLoc: A Scalable Real-Time Locating System for Moving Targets

In this paper an inexpensive, low-power and scalable location system for mobile objects under indoor environments, ScaleLoc, is proposed and its performance is evaluated by simulation. IEEE 802.15.4a (Chirp spread spectrum) protocol is adopted and the location of a target is determined with trilateration. As the number of mobile objects increases, the performance may deteriorate due to communication collisions. For graceful degradation and system scalability, an arbitration scheme is adopted. Sufficient information for localization such as the node-ids and locations of reference nodes is supplied by arbitration nodes.

Si-Young Ahn, Jun-Hyung Kim, Jun-Seok Park, Ha-Ryoung Oh, Yeong Rak Seong
Research on Advanced Performance Evaluation of Video Digital Contents

The purposes of this study are to present performance evaluation improvements of filtering technology needed for technological protection measures as a means of copyright protection technology of a variety of contents distribution environment and to draw test experiment evaluation results targeting P2P· Web-hard· Torrent service etc. Though the filtering techniques different by contents genre such as a sound source stabilized image· video· text· games· SW etc. have been proposed, this study attempts to propose improved performance evaluation measurement items for performance evaluation of existing video filtering technology, limiting to the field of video. This study attempts to define performance evaluation items of existing filtering such as tenacity and reliability, time taken for feature point extraction and recognition, consistency on providing same results, minimum unit needed for recognition, filtering on random part, accuracy for time information and time precision, media type classification, size of feature information, size of feature DB according to evaluation item by improved evaluation method and to conduct a performance evaluation experimental test for technical measurement against data set needed for evaluation, methods for quantization of evaluation results.

Seok-Hoon Kim, Byung-Ryul Aan
High Resolution Image Reconstructed by ARPS Motion Estimation and POCS

In POCS (projection onto convex sets)-based reconstruction of HR (high resolution) image, the quality of reconstructed image is gradually improved through iterative motion estimation and image restoration. The amount of computation, however, increases because of the repeated inter-frame motion estimation. In this paper, an HR reconstruction algorithm is proposed where modified ARPS (adaptive rood pattern search) and POCS are simultaneously performed. In the modified ARPS, the motion estimates obtained from phase correlation or from the previous steps in POCS reconstruction are utilized as the initial reference in the motion estimation. Moreover, estimated motion is regularized with reference to the neighboring blocks’ motion to enhance the reliability. Computer simulation results show that, when compared to conventional methods which are composed of full search block matching and POCS restoration, the proposed method is about 30 times faster and yet produces HR images of almost equal or better quality.

Wonsun Bong, Yong Cheol Kim
Implementation of a Real-Time Image Object Tracking System for PTZ Cameras

In this paper, we implement a real-time surveillance monitoring and image object tracking system using PTZ (Pan-Tilt-Zoom) camera. For image object tracking, we use the mean shift tracking algorithm based on the color image distribution of detected object. Mean shift algorithm is efficient for real-time tracking because of its fast and stable performance. In this system, MatLab language is used for clustering moving object and accessing the PTZ protocol and RS-485 communication for controlling the position of PTZ cam-era in order to arrange the moving objects in the middle part of the monitor screen. This system can be applied to an effective and fast image surveillance system for continuous object tracking in a wider area.

Sang-Gu Lee, R. Batkhishig
Statistical Analyses of Various Error Functions for Pattern Classifiers

There are various error functions for pattern classifiers. This paper analyzes the error functions such as MSE(mean-squared error), CE(crossentropy) error, AN(additive noise) in MSE, MLS(mean log square) error, and nCE(nth order extension of CE) error functions in a statistical perspective. Also, the analyses include CFM(classification figure of merit). The results of analyses provide considerable insights into the properties of different error functions.

Sang-Hoon Oh
FPGA Implementation of Image Processing for Real-Time Robot Vision System

This paper presents a real-time robot vision system integrating adequate image processing and pan-tilt motion control which is implemented by FPGA reconfigurable logic device. The digital image processing acquired by CMOS image sensor is performed on the embedded FPGA board and Linux real-time video communication module. The integrated robot vision system aims to achieve a suitable platform available from both hardware and software. In addition, we also present spatial recognition by edge detection and tracking function of moving objects by determining color which are necessary for autonomous mobile robots.

Hayato Hagiwara, Kenichi Asami, Mochimitsu Komori

Security Systems

Security Requirements Prioritization Based on Threat Modeling and Valuation Graph

Information systems manage assets that are critical for the business processes of organizations. Therefore, it is imperative that information systems be guaranteed and secured from the beginning of their development life cycle. Several approaches such as misuse cases, attack tree, and threat modeling have been proposed by way of security requirements. However, these approaches do not prioritize security requirements, though it is necessary in many cases. For example, when the security budget is insufficient, security requirements need to be prioritized to decide what will be developed and what will not. In this paper, we propose an extension to threat modeling by creating a process that allows the prioritization of security requirements via the valuation of assets, threats, and countermeasures modeled in a tree-like structured graph that we refer to as a “valuation graph.”

Keun-Young Park, Sang-Guun Yoo, Juho Kim
An Efficient Hardware Countermeasure against Differential Power Analysis Attack

Extensive research on modern cryptography ensures significant mathematical immunity to conventional cryptographic attacks. However, power consumption in cryptographic hardware leak secret information. Differential power analysis attack (DPA) is such a powerful tool to extract the secret key from cryptographic devices. To defend against these DPA attacks, hiding and masking methods are widely used. But these methods increase high area overhead and performance degradation in hardware implementation. In this aspect, this paper proposes a hardware countermeasure circuit, which, is integrated hardware module with the intermediate stages in S-Box. The countermeasure circuit utilizes the dynamic power dissipation characteristics of CMOS and provides countermeasure against DPA attacks.

Amlan Jyoti Choudhury, Beum Su Park, Ndibanje Bruce, Young Sil Lee, Hyotaek Lim, Hoon Jae Lee
A Study on Smartphone APP Authoring Solution Design for Enhancing Developer Productivity

This paper is to propose an authoring solution design for the development of smartphone applications with optimized productivity, by reducing cost and time period of development. Especially, more emphasis is placed on design methodology for authoring solution for developers to develop a business application program running on smartphones with easiness and speediness. The final objective of the thesis is to propose a method on how to develop a daily work process program by industry on a real time basis, using an authoring solution for smartphone application. In other words, this thesis covers a high-tech authoring solution design for the smartphone applications to be used by experienced developers with enough working knowledge in office.

Young-Hyun Chang, Dea-Woo Park
A Study of Disaster Preparedness Systems Operations Analysis and Financial Security Measures of Large Banking Network

The recent server system failure, which happened in April 2011, of Nonghyup bank left it in disgrace that the overall management of server system in the banking network has been in insolvent operation. It is one of the most urgent issues that the computer system administration and security should be properly managed as IT technology develops at speed of lightning. In this thesis, it will be comprehensively investigated how the financial institutions deal with the management system against the computer failure and the optimum solution to take care of their financial computer systems and information protection policies. For the optimized operation of banking network system, it is necessary to come up with the improvement plan through the quantitative evaluation of centralized and distributed processing system. The stability in the information protection system needs to deal with the role-based access control and distributed security management system against the access of internal & external users or illegal intruders. In this survey, it will be highlighted that the next generation of banking network infrastructure, which has been reinforced in terms of its stability.

Jong-Il Baek, Dea-Woo Park
Malware Variant Detection and Classification Using Control Flow Graph

The number of malware increases steadily and is too many. So a malware analyst cannot analyze these manually. Therefore many researchers are working on automatic malware analysis. As a result of these researches, there are so many algorithms. The representative example may be a behavior based malware automatic analysis system. For example, these are the Bitblaze [1], Anubis[2], and so on. However these behaviors based analysis result is not enough. So for more detail analysis and advanced automatic analysis feature, the automatic static analysis engine is necessary. Then some projects apply an automatic static analysis engine and the research on automatic static analysis is working. These analysis methods use the structural characteristic of malware, and that is the reason the malware is also software, there is a toolkit for a malware generation, and a malware author reuse some codes. For automatic static analysis, it is so useful that the static analysis engine uses the structural characteristic of malware. However previous researches have some problem. For example, these are a performance, false positive, detection ratio, and so on. Therefore we’ll describe another method that used the structural characteristic of malware.

Donghwi Shin, Kwangwoo Lee, Dongho Won
A Study on the Twofish Security Processor Design Using USB Interface Device

Since most cryptographic systems are PCI type, it is not suitable for users except experts to handle security system. In particular, most security programs used have not been verified against crack and are exposed to attack of virus or hacker. In this regard, this thesis designed Twofish cryptographic algorithm that uses USB, which can be easily used by users at general computers. Users can use security system easily using USB. In addition, Twofish cryptographic algorithm with various variable key lengths can be applied to various security system. Such Twofish cryptographic algorithm can improve performance for encryption and decryption, and increase efficiency of mobile security system in addition to USB.

Seon-Keun Lee, Sun-Yeob Kim, Yoo-Chan Ra
A Cyber-Security Implementation Framework for Nuclear Power Plant Control Systems

Control systems of nuclear power plants have been faced with the risk of cyber-security attacks from inside or outside agents. Thus control systems should efficiently and strongly account for the attacks. We propose a cyber-security implementation framework by integrating conventional concepts and paradigm such as CC, PP, ST, operational system evaluation, certification and accreditation, risk management, and etc.

Cheol-kwon Lee, Jae-gu Song, Dong-young Lee, Hyun-mi Jung, Gang-soo Lee
Design and Implementation of Mobile Forensic Tool for Android Smart Phone through Cloud Computing

As time progresses, smart-phone features and wireless availability highlight the inner-mobile security issue. By detailed process of inner-mobile acquisition, analyzed result and reporting will be regarded as significant proof on the court. In this paper, researcher forensics implements system of Android smart-phone and delivers the acquisition data through cloud computing to get the forensic analysis and reporting. According to the forensic procedure of National Institute of Standards and Technology (NIST), forensics examiner acquires the inner-data when mobile turns on and then instantly sends it through the clouds. Results will be displayed immediately.

Yenting Lai, Chunghuang Yang, Chihhung Lin, TaeNam Ahn
A SSL VPN Design Method for Enterprise FMC Security System Development

Fixed mobile convergence service is an integrated environment which requires the function such as integrated authentication procedure, billing management, wire and wireless inter-networking, location management, and provides independent services of the connection technology. The connection technology in the integrated environment should provide fusibility, security, and elaborated connection control functions to the user, and also should provide convenience to the manager. Therefore, in this paper, we proposed a secure sockets layer virtual private network design method for enterprise Fixed mobile convergence security system.

Hyun-mi Jung, Kyung-su Han, Gang-soo Lee
Malicious Software Detection System in a Virtual Machine Using Database

Malicious behavior detection using emulator or virtual machine is becoming an interesting issue in information security field because it is easy to re-initialize the system and execute codes in independent separate spaces which do not give any bad influence to the system. This paper proposes fast malicious codes detection system by using database of previous malicious codes.

Hyun-woo Cheon, kyu-Won Lee, Sang-Ho Lee, Geuk Lee

Cloud, RFID and Robotics

Enhanced Tag Identification Method for Efficient RFID System

Recently, many studies are made about RFID system which is spread in many areas such as logistics and distribution, medical treatment. For it is necessary to identify many objects during short time, RFID system needs the method to minimize the tag collision and to shorten the processing time for tag identification. Therefore, this paper proposes the method to identify the tag by using two readers, instead of conditions of only one reader which is generally used for the improvement of tag identification speed in RFID system. The proposed method minimizes tag collision and improves tag identification speed by identifying each of limited tag ID through the use of two readers.

Bong-Im Jang, Yong-Tae Kim, Yoon-Su Jeong, Gil-Cheol Park
A Study on the MSNR Cryptographic Processor Design Appropriate for the RFID/USN Environment

Creation of RFID/USN environment has increased very rapidly due to activation of ubiquitous. Security environment suitable for RFID/USN environment, however, failed to comply with the speed of security thread increase in reality. Therefore, this thesis presented MSNR suitable for RFID/USN. MSNR presented showed increase in processing rate of 1.3 times compared to existing AES and showed 2 times of improvement in performance in terms of overall system efficiency. Therefore, MSNR is considered as the cryptographic algorithm suitable to overcome conditions of environmental resource conditions such as RFID/USN.

Seon-Keun Lee, Sun-Yeob Kim
A Study on Applying RFID Systems of Korean Pharmaceutical Industry

In order to streamline the distribution process, the Korean government is currently preparing for a policy that mandates introducing RFID systems to various industrial participants that belong to the supply chain. Different from the industrial products, medical products are subject to a strict regulation on activities such as manufacture, distribution and consumption since it is directly related to people’s life and health. This paper outlines RFID item-level tagging systems, a world first implemented by H pharmaceutical company and demonstrates the strategies based upon its accumulated experience along with the effect of introducing RFID systems.

Kwang NamGung, Yongjung Choi, Youngho Kwon, Chulwoo Jun, Seongjin Park, Jaejong Han
Authentication Platform for Provisioning in Cloud Computing

Spreading of Cloud Computing draws users to ask for service provide that is more improved, faster, and securer. So, there come security issues in Cloud Computing continuously and there have been a lot of studies on authentication and accee control. Provisioning is a technology related to the process and action that prepare knowledge and resources and supply what needed in advance to find the opitimum among them. Provisioning is one of the technologies to make Cloud Computing more efficiently. This paper proposes an authentication for provisioing in Cloud Computing.

Hyokyung Chang, Changbok Jang, Hyosik Ahn, Euiin Choi
Grid Network Management System Based on Hierarchical Information Model

We defined three-hierarchical information model and GNSI (Grid Network Service Interface) to reserve and activate network resources in grid environment. Management scheme of three-hierarchical information model is a little more complicated than that of existing two-hierarchical information model, but our model increases the utilization of network resources by allowing grid application to use several grid network resources over the same path. We designed and implemented grid network management system based on GNSI interface and three-hierarchical information model of network resources. We tested reservation and activation on grid network resources in the test-bed of GMPLS network overlaid over KREONET research network. We also successfully carried out international interoperability test on the control of grid network by deploying FENIUS-API over global research network.

YoungWook Cha, KyoungMin Lee, ChoonHee Kim, Junguk Kong, JeongHoon Moon, Woojin Seok, HuhnKuk Lim
SMCC: Social Media Cloud Computing Model for Developing SNS Based on Social Media

Social media-based Social Networking Service (SNS) has grown dramatically over the last decade. Numerous users have strengthened their human networks by joining SNS. Although many service providers tend to develop SNS according to the needs of users, it is difficult to develop SNS based on large amounts of social media using traditional techniques with related to processing and transmitting it in large and DB system for storing it. Therefore, in this paper, we present a new concept of Social Media Cloud Computing model (SMCC) combined with cloud computing environment that provides elastic computing resources for processing and storing big social media data and platforms for providing SNS’s development environments. Our services deal with the whole cloud computing services such as SaaS, PaaS and IaaS.

Myoungjin Kim, Hanku Lee
Development of Visual Navigation System for Patrol Service Robot

The visual navigation system for a mobile patrol robot using image processing by FPGA and real-time device driver is presented. The CMOS image sensor and the stepper motor driver ICs are connected to external I/O ports of the FPGA. The image processing and motor drive circuits are implemented into the FPGA device together with state machine and FIFO memory buffer to adjust timing for pixel data transmission. The real-time device driver couples the flexible hardware circuits with software applications for the robot vision.

Kenichi Asami, Hayato Hagiwara, Mochimitsu Komori
Mobility Information and Road Topology Based Inter-vehicle Routing Protocol in Urban

Vehicular ad-hoc networks (VANETs) are special cases of mobile ad-hoc networks (MANETs) where nodes are highly mobile, so network topology is changing very fast. In VANET, vehicles move non-randomly along roads. Inter-vehicle communication is wirelessly connected using multi-hop communication without access to some fixed infrastructure. Because of the rapid movement of vehicles and the frequent topology change of VANET, link breakages occur repeatedly and the packet loss rate increases. Geographical routing protocols such as greedy perimeter stateless routing (GPSR) are known to be very suitable and useful for VANET. However, they can select stale nodes for relay nodes and generate the local maximum problem. This paper presents an inter-vehicle routing protocol based on mobility information of vehicles and digital map on city roads to solve those problems in urban area. Mobility information includes the position, velocity, and direction of vehicles. Road topology is used to obtain the location of intersections and whether it is an overpass or a dead end road. Simulation results using ns-2 show performance improvement in terms of packet delivery ratio than existing routing protocols.

Si-Ho Cha, Keun-Wang Lee
Communication Quality Analysis for Remote Control of a Differential Drive Robot Based on iPhone Interface

This paper presents a tangible interface based on iPhone for robot control. In this scheme, two axes of the acceleration sensor attached inside iPhone are used for remote control of a mobile robot. In particular, this study presents four possible communication methods for wireless communication between a mobile robot and iPhone. For each method, the communication quality of delay time and number of acquisition data is analysed and compared. The experimental results show that the proposed iPhone-interface control is effectively used for controlling a mobile robot remotely.

Hahmin Jung, Yeonkyun Kim, Dong Hun Kim
Remote Control and Monitoring of an Omni-directional Mobile Robot with a Smart Device

New robot applications using smart devices are recently providing interesting and feasible solutions to longstanding problems. In this study, we propose a remote control and monitoring method using an omni-directional mobile robot with a smart device. We also developed remote control and monitoring application software for the smart device by using Microsoft’s .Net Compact Framework and Bluetooth data communication to support various smart OS Platforms. We evaluated the feasibility and the effectiveness of the proposed method by conducting several experiments involving remote control of a mobile robot using a gravity sensor in a smart device and remote monitoring.

Yong-Ho Seo
User Following of a Mobile Robot by Fusing Different Kinds of Sensors

This paper presents a mobile robot system for an user-following by detecting the direction of an user based on a fusion of ultrasonic sensors. One of the most important characteristics of the ultrasonic sensor has a property of the straight within a constant angle range. In addition, the ultrasonic sensor is able to promptly detect the user with fast operating speed and resists influence of external environment. The mobile robot follows the user quickly through a simple hardware and algorithm. Extensive simulation presents to illustrate the viability and effectiveness of the proposed user-following mobile robot system.

Yeon-Gyun Kim, Hahmin Jung, Dong Hun Kim

Industrial Application of Software Systems

A Remote Firmware Upgrade Method of NAN and HAN Devices to Support AMI’s Energy Services

As AMI system is applyed in Korea gradually, electric company can provide a lot of services to customers like DR(Demand Response), CSS (Customer Service System). In this case, field deployed devices which are AMI’s basic component must be able to upgrade its firmware to support the services. In this paper, we introduce the remote firmware upgrade management system(FUMS) using distributed processing for field deployed device like DCU, and HAN Devices(Smart Meter, IHD, LCD,PCD) in Korea AMI. This article provides FUMS architectures and the upgrade process of communication between FUMS Server and DCU and between DCU and HAN Devices.

Young-jun Kim, Do-eun Oh, Jong-min Ko, Young-il Kim, Shin-jae Kang, Seung-Hwan Choi
Real-Time Monitoring System for Watercourse Improvement and Flood Forecast

This works presents the developed Monitoring System to carry out the processing, compilation, analysis and presentation of the data collected from the deployed monitoring platforms based on Future Networks for the semiarid zone of the “El Albujón” located in the South of Spain. This Future Networks-based system is used for the evaluation and improvement of the watercourses and flood forecast. The developed system is formed by the parts Complex Event Processing and a flexible architecture focused on Web Services and applications, which presents a new relevance with respect to the current solutions in aspects such as the real-time event processing of the collected information, and the capacity to offer the scalability, flexibility and ubiquity for the access and collection of the information, which are features required for the future watercourse improvement and flood forecast solutions based on Future Internet.

Cristina Sotomayor Martínez, Antonio J. Jara, Antonio F. G. Skarmeta
Material Information System According to Change of Building Type

This paper develops the virtual building technology that helps make building design effectively done by constructing building materials as components and assembling them as patterns. It also aims to develop the Flexible Building Design System that supports a technology which makes change of constructing easy and reduces the cost effectively through a simulation of building design like design, analysis, change information, etc., by grafting the virtual building technology into the process of building. It especially is possible for a designer and user to change a building easily by using patterns and according to the change, pattern information of materials needed and the plans of the building are made automatically. Kin-search that can be happened through personal proficiency or knowledge virtualization is also the reason why the technology should be embodied.

Jung-Soo Han, Gui-Jung Kim
A Design of Execution Tool for an IPTV Service Deployment

There are diverse terminal equipments like computer smart phone and tablet PC these days. According to the situation, service providers are developing and serving each Internet Protocol Television (IPTV) services depending on the user’s terminal equipments. However, these developments make inconsistent services and duplicate services causing waste of resources. Therefore, we suggest an IPTV execution tool independent on service deployment at IP Multimedia Subsystem (IMS). The IPTV execution tool is composed with the part of user’s terminal design and part of Application Server (AS)’s service design. And, this tool reduces the dependence of the terminal platform and allows easy to develop IPTV services.

Jung-Ho Kim, Jae-Hyoung Cho, Jae-Oh Lee
Middleware Integration of DDS and ESB for Interconnection between Real-Time Embedded and Enterprise Systems

As technology evolves, the border of embedded system and enterprise system is gradually meaningless. ESB is a well-known middleware for integration of enterprise services and systems, and DDS is a promising real-time communication middleware for embedded systems. This paper introduces structurally integrated architecture between DDS middleware and ESB middleware for interconnection between real-time embedded systems and enterprise information systems. An integrated architecture of DDS and ESB allows integration of embedded system environment and enterprise system environment. It supports integration of diverse embedded devices from ubiquitous systems with real-time communication and allows effective data processing using enterprise services, which are generated from embedded systems. We design DDS binding component for ESB to allow DDS communication to enterprise services. This DDS-ESB integration architecture could be applied in the field that generates huge of data for monitoring and processes data for providing user services in real-time, such as u-City or home network.

Yunjung Park, Duckwon Chung, Dugki Min, Eunmi Choi
Application of SOA in Safety-Critical Embedded Systems

Service-Oriented Architecture (SOA) are having a widespread use in enterprise computing applications, being Web services the most common implementation. The use of SOA has also been proposed for embedded systems, although very little could be found in the literature on the use of SOA for Safety-Critical Embedded Systems. This paper discusses the use of SOA for the development of this class of systems. Safety-critical embedded systems have specific requirements such as high reliability and real time response, making the use of SOA more challenging than for standard applications. To make concepts clear, a case study on Avionics for Unmanned Aerial Vehicles (UAVs) is presented. This is a complex application based on a reference model proposed by the authors. SOA shows to be a promising approach to implement parts of this reference model, especially in what concerns the missions played by the aircraft.

Douglas Rodrigues, Rayner de Melo Pires, Júlio Cézar Estrella, Marco Vieira, Mário Corrêa, João Batista Camargo Júnior, Kalinka Regina Lucas Jaquie Castelo Branco, Onofre Trindade Júnior
A Study on the Integration of Power System Operational Data and Application

Modern utilities monitor and control the power system via a vast network of communication-enabled devices. The data generated from power plants to consumers has been treated independently and applications monitoring and controlling the power system have been operated separately. However, operation of the power system is now completely dependent on the exchange of data among the applications to achieve a comprehensive view of end-to-end reliability of the power system. In this paper, the integration of power system operational data and application is described.

Do-Eun Oh, Young-Il Kim, Young-Jun Kim, Seung-Hwan Choi, Il-Kwon Yang
KepriSNS: A Business SNS Platform Based on Open-Source

Social Network Service (SNS) is a service that enables internet users make human network and strengthen the existing human relationships. But, many companies, currently, are aware of the importance of SNS for business areas. The emergence of SNS has brought a lot of changes in the business environment of companies. At the first, companies have utilized the SNS service as the communication channels with their customers. But, they have recently been considering SNS as a way to strengthen their organizations. Our company has the prototype version, KepriSNS, before building an official business SNS platform. This paper addresses the considerations for building a business SNS platform and introduces the development of KepriSNS based on open-source StatusNet.

Dongwook Kim, Changhun Chae, Namjoon Jung
A View of Future Technologies and Challenges for the Automation of Localisation Processes: Visions and Scenarios

Scenarios are often used to cope with uncertainty in areas with long planning horizons and research. They provide a vehicle that can play an important role in the development of shared visions of the future: creating powerful expectations of the potential of emerging technologies and mobilising resources necessary for their realisation. This paper describes a Web-based problem solving environment providing such a scenario by tracing, sharing, executing, and monitoring examples through a number of current localisation research topics, prototypes, and imagined as well as real technologies. For each of its components, it will consider related opportunities, drivers, barriers and challenges, and describe the key technological building blocks required.

Lamine Aouad, Ian R. O’Keeffe, J. J. Collins, Asanka Wasala, Naoto Nishio, Aram Morera, Lucia Morado, Lorcan Ryan, Rajat Gupta, Reinhard Schaler

Hardware and Software Enginering

Design of Reference Model for Improvement of Security Process

This paper is intended to proposal maturity model of security process. There are many risk items that cause the security requirement problems during software development. This paper evaluates the efficiency of security lifecycle that detection of new risk items and remove ratio at the security requirement lifecycle. For the similar domain projects, we can remove security risk items and manage to progress them by using security lifecycle, which can greatly improve the software process.

Eun-Ser Lee
A Formal Framework for Aspect-Oriented Specification of Cyber Physical Systems

Cyber physical systems consist of three parts: the dynamics and control (DC) parts, the communication part and computation part. In this paper, we propose an aspect-oriented specification framework for cyber physical systems. The proposed aspect–oriented formal framework is such a formwork. On the one hand, it can deal with continuous-time systems based on sets of ordinary differential equations. On the other hand, it can deal with discrete-event systems, without continuous variables or differential equations. We present a combination of the formal methods Timed-CSP, ZimOO and differential (algebraic) equations or differential logic. Each method can describe certain aspects of a cyber physical system: CSP can describe communication, concurrent and real-time requirements; ZimOO expresses complex data operations; differential (algebraic) equations model the dynamics and control (DC) parts. This aspect oriented formal specification framework simplifies the requirement analysis process of cyber physical systems. A case study of train control system illustrates the specification process of aspect-oriented formal specification for cyber physical systems.

Lichen Zhang, Jifeng He
Aspect-Oriented QoS Specification for Cyber-Physical Systems

Cyber-physical systems having quality-of-service (QoS) requirements driven by the dynamics of the physical environment in which they operate. The development of cyber physical is challenging due to conflicting quality-of-service (QoS) constraints that must be explored as trade-offs among a series of alternative design decisions. The ability to model a set of possible design alternatives and to analyze and simulate the execution of the representative model helps derive the correct set of QoS parameters needed to satisfy cyber physical system requirements. This paper proposes an aspect-oriented QoS modeling method based on UML and formal methods. We use an aspect-oriented profile by the UML meta-model extension, and model the crosscutting concerns by this profile. In this paper, we build the aspect-oriented model for specifying Quality of Service (QoS) based on the combination of UML, RTL and ERTL. An examples depicts how aspect-oriented methods can be used.

Lichen Zhang, Jifeng He
V & V Practices of SP Quality Certification Model

In order to make high quality software and high reliability software, systematic development management and organizational support are essential needed. Since 1990’s Software process models such as ISO/IEC 15504 and CMMI have been used to improve organization capability. Korean Software Process Quality Certification is established by law in 2008 year. The way of eastern Asian’s thinking and western thinking is different This model contains the difference. Especially, verification and validation practice implementation of eastern Asian is different from western.

Sun Myung Hwang
P2P Based Collision Solving Technique for Effective Concurrency Control in a Collaborative Development Environment

This paper provides a way to overcome the limitations of general collaborative software development tools that completely restrict co-ownership of resources among individuals in a team oriented developmental environment. It also provides a solution for users to co-own resources and at the same time manage version control and solve collision problems that may occur due to the co-ownership of resources. The collaborative software development tool presented in this paper is made up of the classical client/server structure with the P2P (peer to peer) method which supports information exchange among individuals. This tool is developed based on open source software CVS (Concurrent Version System). Functional efficiency was confirmed by comparing it to the utility of prior existing collaborative software development tools.

Hyun-Soo Park, Dae-Yeob Kim, Cheong Youn
Optical Properties of Photoluminescence of Carbon Doped Silicon Oxide Films Annealed by Rapid Temperature for Passivation

To research the chemical and optical properties, SiOC films made by the inductively coupled plasma chemical vapor deposition were analyzed the chemical shift by the Fourier transform infrared spectra and photoluminescence spectra. The chemical shift obtained in Fourier transform infrared spectra resulted from the increase of right shoulder Si-O bond in the main bond due to the delocalization and lowering polarization of carbon in Si-CH

3

. Increasing of the right shoulder bond of Si-O in side of higher wave number caused to change the degree of amorphous bonding structure depending on the reduction of polarization after annealing. The phenomenon of the delocalization in the carbon related bond of Si-CH

3

was also confirmed by the chemical shift in the photoluminescence spectra. The PL intensity increased after annealing at samples 9 and 13 with low polarity. Low polarization induced to decrease the thickness of SiOC film, which could contribute to improve the stability due to the low surface energy and the effect of electron deficient of carbon. It was observed the blue shift by FTIR (Fourier transform infrared spectra) and red shift by PL (photoluminescence) spectra in LP (low polarization) SiOC films.

Teresa Oh
Design and Implementation of an Ultra-Low Power Energy Harvesting Sensor Network

This paper proposes an ultra-low power sensor network system for energy harvesting environments. The system is composed of two types of sensor nodes: master nodes, which can acquire relatively sufficient energy from batteries or mains, form the backbone of the entire system; and slave nodes, which are powered by using energy harvesting technology, are scattered around the master nodes. To overcome the limitation of harvestable energy, a slave node is usually turned off and is activated when a master node sends a request signal which contains the ID of the slave node. To verify the energy effectiveness of the proposed architecture and techniques, a simple pilot system is implemented and tested. The experimental results show that the proposed techniques drastically reduce energy consumption of the sensor nodes.

Jung Kyu Yang, Jun-Seok Park, Yeong Rak Seong, Ha-Ryoung Oh
Implementation of Location Awareness UWB PHY

This study searched the IEEE 802.15.4a technology which is the standard of the location awareness WPAN system which provides the communication and location. The UWB technology can provide the function of the location awareness as it is adopted as the standard technology for the communication and location which requires the degree of precision within several dozens of centimeters in a relatively narrow area. Relevant common products will be released from now on because the research and development have actively been proceed at home and abroad as the IEEE 802.15.4a standard was completed.

Byoung-Sup Shim, Hyoung-Keun Park
Hardware Implementation and Performance Analysis of NLM-128 Stream Cipher

A NLM generator is an alteration of LM generator with the addition of NFSR. NLM generator is high speed with low power consumption and has high security level. NLM-128, an instance from NLM family, is implemented and analyzed. This paper examines the hardware performance of NLM-128. An ALTERA FPGA Cyclone II device (EP2C35F672C8) is chosen to analyze the performance of NLM-128. The results show an output performance of 83.33Mbps with low power consumption. In addition, it is easy to be implemented in hardware because NLM-128 requires little logic gates only.

Soh Yee Lee, HoonJae Lee
Optical Clock Signal Extraction of Nonreturn-to-Zero Signal by Suppressing the Carrier Component

We propose a simple optical clock signal extraction scheme of a nonreturn-to-zero signal and experimentally demonstrate the clock signal extraction using a single FBG filter. The proposed optical signal processing shows the 10Gb/s PRZ pattern which can be used for optical clock recovery.

Jaemyoung Lee

Healthcare, EEG and E-Learning

Dynamic Message Server for Personal Health Data Transmission in u-Health Service Environment

As the social environment rapidly changes and health concerns increase, medical expenses have also been increasing. Also, the source of value in the medical service industry is changing from single service competitiveness to a total solution philosophy. In addition, any attempt to manage personal health data and U-Health continue to grow by innovations and are processed through IT convergence services such as Google Health or Touch Doctor. Basic U-health services are created by sending and receiving data between personal health devices, gateways, service providers and medical institutions. It is incomplete to implement U-Health, although a guideline based on standard focusing Continua is currently suggested. Thus in this paper, we designed a message server based on relevant requirements and standards. The proposed server can implement dynamic modules. It also allows many different standards to be accepted and expanded, so it is expected to help U-Health service provider systems to be implemented.

Eun Jeong Choi, Hee Joung Hwang
Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device

Personalized radio-frequency identification (RFID) tags can be exploited to infringe on privacy even when not directly carrying private information, as the unique tag data can be read and aggregated to identify individuals, analyze their preferences, and track their location. This is a particularly serious problem because such data collection is not limited to large enterprise and government, but within reach of individuals. In this paper, we describe the security analysis and implementation leveraging globally networked mobile RFID service. We propose a secure mobile RFID service framework leveraging mobile networking. Here we describe the proposed framework and show that it is secure against known attacks. The framework provides a means for safe use of mobile phone-based RFID services by providing security to personalized RFID tags.

Namje Park
Implementation of Mobile Healthcare Monitoring System with Portable Base Station

We propose mobile healthcare monitoring system embedded using a portable base station. The portable base station is integrated with ECG sensor node and responsible to act as a gateway to interface two wireless technologies: Zigbee and Bluetooth. We show the working principle of portable base station and also demonstrating it with a few practical approaches. Wearable biosensors, mobile application for vital signal monitoring, PC program for remote vital signals monitoring are also demonstrated.

Jiunn Huei Yap, Yun-Hong Noh, Do-Un Jeong
Detection of P300 in a BCI Speller

This paper has presented the algorithm for P300 Speller Paradigm. The dataset used has been dataset II of the BCI competition III 2005. The novelty in the approach is that for each epoch the dataset has been split, organized and then preprocessed by average function of number of raw / column that was intensified. For each character classification is based on the Euclidean distance between a pattern P300 calculated on the training set and patterns of six rows and six columns calculated on the testing set.

Monica Fira
Analysis for Characteristics of Electroencephalogram (EEG) and Influence of Environmental Factors According to Emotional Changes

Neurofeedback is a kind of bio feedback that induces the brain wave pattern or the regional cerebral blood flow (rCBF). For the last thirty years, this technique was clinically applied in order to increase the effect of the psychotherapy. However, most of the studies which were carried out until now were just simple ones that analyze the patterns of the brain waves according to specific stimulations. It seems that the studies related to the environmental factors for the specific time have not been carried out yet. There was a problem caused by the difference according to the surrounding environment when a specific type of stimulation is applied to a specific patient. Such a problem was an obstacle in the clinical utilization of this technique. In order to solve such a problem, this study has analyzed the characteristics of the brain waves along with the changes of the surrounding environment for the time when the stimulation is applied to the patient. Based on the results, the trend for inducing emotional changes in the environmental factors was analyzed. Also, a way to utilize brain waves for stable neurofeedback treatments, and related training techniques and health-care tools, which were not influenced by the environmental changes, was suggested.

Jeong-Hoon Shin, Dae-Hyeon Park
Development of Real-Time Learning Components Using Expanded SCORM

e-Learning 2.0, which is based on Web 2.0 technology characterized by users’ participation, sharing, and social networking, is being changed to a new e-Learning paradigm. Existing LMS/LCMS have limitations in providing various types of interactive components of video contents. It lacks real-timeness and interactivity between teachers-learners and learners-learners in video contents operation. Thus, in order to overcome such limitations of e-Learning and to maximize learning effects, this study proposes a system emphasizing the characteristic (interactivity) of e-Learning 2.0 by implementing real-time interactive video contents (bidirectional learning components) usable in online video lectures. For this purpose, we design a standard by expanding the SCORM standard used currently in building LMS/LCMS, and implement e-Learning 2.0 environment based on the design.

Junghyun Kim, Doohong Hwang, Kangseok Kim, Changduk Jung, Wonil Kim
CSP Based SCORM Interface for E-Learning System

Generally, CSP used to analyze and describe the system’s process. And SCORM proposed the international standard to manage the learning contents for e-learning system. Therefore we developed e-learning system that is able to support learning materials include learning contents and topics according to SCORM interface. We also used CSP to the system to analyze the system’s process and identified the logics efficiently.

HwaYoung Jeong, BongHwa Hong
Implementation of Web Service Based U-Learning

In this article, we aimed a web service based learning system for ubiquitous computing environment. In the environment, there used many devices and it can be different types according to company. To support the learning service with each different type, we implemented the web service considering meta data related the device types. The meta data include information of device characteristics such as screen size, memory capability, and type of operating system. The management service for the meta data register in UDDI. And the other web service is deal with control of learning contents.

HwaYoung Jeong, BongHwa Hong

HCI and Data Mining

Intelligent System Modeling for Human Cognition

The development of computer-based modeling systems has allowed the operationalization of cognitive science issues. Human cognition has become one of the most interested areas in artificial intelligence to emulate high-level human capability. This paper introduces a methodology well-suited for designing of an intelligent system to evaluate human cognition. The research investigates how to elicit and represent cognitive knowledge from human being. Crucial to this research is to identify the collective perception to aggregate the congruence or sharing of individual psychological cognition. Unlike standard approaches based on the statistical techniques, the modeling presented employs a theory of fuzzy relation to deal with the required issues of similarity.

Youngdo Joo, Younghwa An
Laser Pointer Based Constrained Input Scheme for Educational Game Software Framework

In this paper, we present a new educational game interface using laser pointer based interaction with screen. Previous researches have focused on the display issue including stereoscopic and multimedia research, however they still use uneasy and un-natural interface based on keyboard/mouse or joystick along with PC for educational interaction. We implemented a laser based input device which composed of laser pointer and large active screen which tracks laser pointer. Laser based input device can give lots of flexibility on teaching staffs, and we propose an efficient character input configuration for the laser based large screen model for effective educational software framework. Experimental results show that we can easily input characters and numbers with more than 99 % of recognition rate.

Jun Hee Cho, Seong-Whan Kim
Public Transport Navigation System with Augmented Reality Interface

This paper provides an overview of an experimental mobile augmented reality system that combines the municipal public transport navigation capabilities with augmented reality visualization on a mobile device. The system is able to provide directions to tram and bus stops and monitors user journey in real time using geolocation data and schedule information. The system described herein has been implemented in a prototype form, that has been tested in a real case usage scenario in an urban environment.

Jakub Królewski, Piotr Gawrysiak
Best Recommendation Using Topic Map for On-Line Shopping System

Topic map is generally used to recommend shopping list as analyze a user preference in internet shopping mall. It is useful method to propose the preference that is related access rate and selecting time of production. In this research, we apply this method to analyze the user characteristics in on-line shopping system. To analyze user preference, we used the topic preference vector that is able to calculate the access rate with visiting time and production selection. And we designed and developed the path of on-line shopping site. It will help to navigate the shopping by recommendation of on-line shopping list.

HwaYoung Jeong, BongHwa Hong
Pattern and Event Based Logical UI Modeling for Multi-Device Embedded Applications

While there have been many research activities for model-based engineering for user interfaces (UIs) for multiple devices, they are still far from practical. We identify three major limitations for the conventional approaches. We propose a Pattern and Event based Logical UI Modeling framework (PELUM) to model UIs targeted for multiple embedded systems. PELUM encompasses (1) a pattern-based method for deriving a UI implementation from a UI model, (2) a meta-model for modeling both abstract UI and task model, whose name is Logical User Interface Model (LUM), and (3) its supporting tool. We incorporate events as a first-class modeling entity, essential to model UIs for embedded systems. PELUM does not employ the task model widely used in the conventional approach. Instead, we incorporate events as navigators to cover the task model in LUM. We also incorporate patterns as types of each LUM component. This makes UI modeling concise.

Saehwa Kim
Smart Device Oriented Intelligent Context-Awareness System for U-SAFE Service Using Object Oriented Modeling Technique

Smart phone technology has the potential to improve crime figures by preventing certain crimes altogether or diminishing their frequency or severity. Elementary school sexual assault incidents as well as female serial murder cases have captured the public‘s attention, and when facing such social hazards, the user with a smart mobile device that is equipped with fusion technology may evade physical harm or evade the danger altogether. This paper discusses the components of context awareness system for this purpose and describes a putative implementation on a phone. The u-SAFE service aims to fight crime when it inputs phone sensing information (audio, video, image) and performs context acquisition and analysis, and pattern analysis of data tempered by knowledge of the user‘s activity history.

Se-Hoon Jung, Chun-Bo Sim
An Effective Method to Find Better Data Mining Model Using Inferior Class Oversampling

Decision trees are known to have very good performance in the task of data mining of classification, and sampling is often used to determine some proper training sets. Among many parameters the accuracy of generated decision trees depends upon training data sets much, so we want to find some better classification models from the given data sets by oversampling the instances that have higher error rates. The resulting decision trees have better accuracy for classes that had lower error rates, but have worse accuracy for classes that have higher error rates. In order to take advantage of the better accuracy and compensate the worse accuracy, we suggest using class association Experiments with real world data sets showed promising results.

Hyontai Sug
A New Approach for Calculating Similarity of Categorical Data

Similarity measure is very important in data mining techniques such as clustering, nearest-neighbor classification, outlier detection and so on [1][4]. There are many similarity measures have been proposed. For numeric data, there are many Minkowski distance-based similarity measures. However, the similarity measures for categorical data have been studied for a long time, it also has many issues. The main issue is to understand relationship between categorical attribute values. For categorical data, the similarity measure is not clear as well as numeric data. In this paper, we propose a new approach to understand relationship between categorical data. This approach is based on artificial neural network to extract significant features for computing distance between two categorical data objects.

Cheng Hao Jin, Xun Li, Yang Koo Lee, Gouchol Pok, Keun Ho Ryu
Associated Word Extraction System for Search Query Expansion Based on HITS

As the utilization of internet becomes generalized, people are able to contact vast information through web. However, as the quantity of information increases rapidly, search engines show the status of limitation in search performance, that they display the information which users do not need. Because of this, it became that users should spend more time and effort to search necessary information. This study suggests a method that a search engine can find out accurate information which users need, and provide it to users swiftly by using query expansion.

Jung-Hun Lee, Suh-Hyun Cheon

Software System and Its Applications

MDA Approach for Non-functional Properties of Dependable and Distributed Real-Time Systems

Non-functional properties are highly important for dependable and distributed real-time systems as they are designed to operate in environments where failure to provide functionality or service can have enormous cost both from financial, influential or physical aspects. Therefore it is essential that these properties are calculated as precisely as possible during the design and operation of such systems. In this paper, we propose an aspect-oriented MDA approach for non-functional properties to develop dependable and distributed real-time systems. A case study illustrates the aspect oriented MDA development of dependable and distributed real-time systems.

Lichen Zhang, Jifeng He
Implementation of Smart Car Using Fuzzy Rules

We proposed an algorithm to automatically control the seat, and notify dangerous traffic conditions for smart car system. The system is needed to adapt to both the driver and the circumstance for maximum convenience and safety. In order to solve these problems, we proposed an algorithm for developing smart vehicles.

In this paper, it is simulated to compare the performance of a normal car with that of the algorithm-implemented vehicle in a potential accident. Through the computer simulation, we proved that the algorithm-implemented vehicle automatically adjusted the mirrors and seat for the maximum comfort and driver’s awareness of the circumstance. We used fuzzy neural network algorithm for design of optimal car speed, and proposed the system to prevent intelligently against traffic accidents.

You-Sik Hong, Myeong-Bok Choi, June-Hyung Lee, Cheol-Soo Bae, Jang-Mook Kang, Jae-Sang Cha, Geuk Lee, Seong Jin Cho, HyunSoo Jin, Chun-Myoung Park, Baek ki Kim, Kwang-Deok Han, Su Kyun Sun, Chul Jang, S. C. Yu
A Fuzzy Framework for Software Libraries Matching

The use of intelligent computational techniques to improve the software engineering process is a problem of increasing interest in the literature. This paper is focused on the use of these techniques with the aim to assist in the process of software libraries matching. Most integration systems only take into account the information about the structural component of the concepts. However, many conventional data models consider both structural and behavioral knowledge. In this paper, a novel approach that uses both kinds of knowledge is presented. To do that, multiple criteria that can be taken into account to determine class matches are considered, including those that are related to this

new

behavioral information. These criteria are then integrated into a hierarchical fuzzy multicriteria decision making model.

Nicolás Marín, Clara Sáez Árcija, M. Amparo Vila
Simulation of Non-linear Singular System Using RK-Butcher Algorithm

In this paper, a new method of study on non-linear singular systems from fluid dynamics using the RK-Butcher algorithm is presented. To illustrate the effectiveness of the RK-Butcher algorithm, four cases in non-linear singular systems from fluid dynamics have been considered and compared with the classical fourth order Runge-Kutta, and are found to be very accurate. Local truncation error graphs for the non-linear singular system based nuclear reactor core problem are presented in a graphical form to show the efficiency of this RK-Butcher method. This RK-Butcher algorithm can be easily implemented in a digital computer and the solution can be obtained for any length of time.

V. Murugesh, K. Murugesan, Kyung Tae Kim
A Memory Access Pattern Based Data Distribution Technique for Array Processors

The successful use of array-type multiprocessors strongly depends on how to efficiently distribute data and code in target applications. However, producing efficient code for such multiprocessors is a difficult task. Hand-coding efficient parallel programs for these processors can be extremely difficult, time consuming and error-prone, so developers have turned to automatic compiler techniques to ease the task.

To efficiently execute an multimedia application on array processors, a good data partitioning is required. Default partitioning such as row-wise or column-wise may not produce a good data distribution and, thus, will prolong the total execution time of an application.

The two main approaches to this are using compilers that 1) generate data transfer code, and/or 2) generate code for data distribution. Neither has been completely successful for all types of programs.

In this paper, we propose efficient methods for finding the data distribution for array processors while minimizing the total execution time. The experimental results indicate that our noble technique would be able to support many user programs efficiently.

Doosan Cho
Design of Efficient Reconfigurable Digital Compensator for Advanced Wireless Transmitter Using Computational Digital Signal Processing

This paper presents an efficient digital compensator that can be used for adjustment of gain and phase imbalances in linear amplification with nonlinear components (LINC) transmitters. The proposed compensator is designed in signal component separator (SCS) block using computational digital signal processing (DSP). Complex baseband equivalent signals and systems are considered to analyze error vector magnitude (EVM) and adjacent channel power ratio (ACPR) of the transmitter. Look up tables (LUT) based on the analyzed EVM and ACPR are used to compensate gain/phase imbalances of RF paths in the LINC transmitter. The suggested method is efficient to implement using computational software and DSP, and thus the compensator is reconfigurable for various input signals and RF transmitters. The LINC transmitter with the proposed compensator is implemented, and the suggested scheme is verified by showing the improvement of EVM and ACPR performance for the transmitted signals.

Jonggyun Lim, Hyunchul Ku
Joint Rate Control Algorithm with Look-Ahead in Multi-channel IPTV Services

This paper presents a joint rate control method for the multi-channel video services. Each encoder analyzes the spatio-temporal complexities of its video frames and reports the result to the look-ahead statistical multiplexer. And then the multiplexer assigns a QP level to each encoder. The proposed joint QP control scheme regulates the quality of the video sequences and minimizes decoder buffering delay, and in consequence improves the overall QoS level in multi-channel IPTV system.

Young-Il Yoo, Kyeong-Hoon Jung, Ki-Doo Kim, Dong-Wook Kang
SERLOG: Generating and Analysis Server Push Workloads

In the WWW, server push, which allows bidirectional communication between the server and the web browser, is an essential part of modern web application. In order for the server push to ensure high levels of interaction with the browser, the performance of the server application is of utmost importance. The server push application has a different communication mechanism from the typical web application, hence making it hard for the currently-existing load test tools to run an accurate performance test. In this paper, in order to run an accurate performance test of the server push application, we analyzed the workload characteristics of server push, while designing and implementing SERLOG, a load test tool that can run accurate tests on the performance. In addition, through comparisons with the other web load testing tools, we have proved how SERLOG accurately represents the workload of server push and provides the necessary performance data.

Dong-Il Cho, Sung-Yul Rhew
Hierarchical Views for Distributed Databases of Semantically Condensed Data through Web Links to Sensor Data

A number of sensor networks may produce a huge amount of data, and there has been a necessity the data are processed in a single system. However the viewing or navigating toward data interested has not been evolved suitably because of the overwhelming volumes of sensor data. This work introduces a data browsing technique from distributed databases of sensor data condensed according to semantics shared among servers. Web links of a colored presentation could enhance the view of sensor data indexed along a hierarchy from distributed databases in the geographic regions.

MinHwan Ok
An Efficient Nested Query Processing for Distributed Database Systems

Performance of OLAP queries becomes a critical issue as the amount of data in the data warehouses increases rapidly. To solve this performance issue, we proposed a high performance database cluster system called HyperDB in which many PCs can be mobilized for excellent performance. In HyperDB, an OLAP query can be decomposed into sub-queries, and each of the sub-queries can be processed independently on a PC in a short time. But if an OLAP query has nested form (i.e., nested SQL), it could not be decomposed into sub-queries. In this paper, we propose a parallel distributed query processing algorithm for nested queries in HyperDB system. Traditionally, parallel distributed processing of nested queries is known as a difficult problem in the database area.

Yu-Jin Kang, Chi-Hawn Choi, Kyung-En Yang, Hun-Gi Kim, Wan-Sup Cho
Backmatter
Metadata
Title
Convergence and Hybrid Information Technology
Editors
Geuk Lee
Daniel Howard
Dominik Ślęzak
Copyright Year
2011
Publisher
Springer Berlin Heidelberg
Electronic ISBN
978-3-642-24106-2
Print ISBN
978-3-642-24105-5
DOI
https://doi.org/10.1007/978-3-642-24106-2

Premium Partner