2016 (266)
2015 (278)
2014 (298)
2013 (203)
2012 (72)
2011 (41)
2010 (25)
2009 (27)
2008 (39)
2007 (7)
Spatio-Temporal Lite DBMS for u-GIS
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.1-12
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The spatio-temporal lite DBMS provides spatio-temporal data types and spatio-temporal operators by extending spatial data types and spatial operators specified in OpenGIS “Simple Features Specification for SQL,” provides an arithmetic operation coding compression method reflecting the characteristics of spatio-temporal data, and supports spatio-temporal index for efficient spatio-temporal data search in flash memory, which is a mobile storage device.
Factors of Characterisation and Urban Content
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.13-22
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A character is regarded as an essential element for storytelling, revealing the concept of a content piece. The character is freely created through an author's imagination, but methodology is required to make it a concrete figure. Thus, this paper will explore the elements that make characterisation possible and find ways to represent characters. It will further investigate whether the methodology can be applied to digital content, which occupies an important position in the urban computing arena. The ‘DuGong’ character in the 2012 Expo in YeoSu, Korea, serves as a good example.
An Efficient Multi-agent System for E-health Functionalities
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.23-34
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In recent years Agent technology has had a significant growth in all fields, especially in the field of E-health. Agent-oriented software engineering based on agent-oriented methodology is a novel phenomenon in the field of software engineering, which nowadays, is used in the production of distributed systems. The special features of agent such as intelligence and autonomy, cause reduction in running costs and performing automatic functions in some systems like electronic health which have been implemented by Agent technology. Using New communication technologies, distributed systems and intelligent Agents are also considered as a novel phenomenon in medicine. This paper aims to analyze the Agent-oriented Software engineering, Agent Oriented Programming, Multi Agent System as well as providing agent-based system for the hospital by the utilization of agent characteristics.
A Power-Efficient Mechanism of IEEE 802.15.6 WBAN for Wireless USB Support
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.35-50
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, an IEEE 802.15.6 wireless body area networks (WBAN) medium access control protocol is developed to support a wireless USB (WUSB) application as a protocol adaptation layer (PAL). Further, we propose a Power Efficient Mechanism (PEM) technique based on the WUSB over WBAN protocol. The proposed time synchronization technique reduces power consumption. It is executed using the WUSB over WBAN protocol at each sensor node. We design the PEM and simulate for performance evaluation. From the results, we observe that the PEM reduces power consumption at the nodes by minimizing the number of the message packet transmissions required for time synchronization.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.51-62
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper we present a novel container ISO-code recognition method which uses vertical edge information, a spatial structure window, and texture clustering. The vertical edge information is extracted using a top-hat transform. The candidate region and type of ISO-Code is obtained using a Spatial Structure Window (SSW) which wraps around the vertical edges. The ISO-Code is extracted using texture clustering by the K-Means algorithm which is then recognized by a Back-propagation Neural Network (BP). Experiments confirmed the robustness of the recognition algorithm on real images and videos.
Concurrent Data Mining and Genetic Computing Implemented with Erlang Language
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.63-76
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The discovery process of data mining concerns an automatic extraction of interesting patterns and correlations from a large database. These patterns can reveal implicit relationships among set of objects that lead to the generation of actionable rules to be used for financial forecast, medical diagnosis, and many other useful applications. Current studies in data mining and genetic computing concentrate on how to effectively find all objects frequently co-occurring or correlated. For a massive database, parallel method is a solution for the scalability problem. In this paper, we present the design of parallel methods to the genetic algorithms, clustering, and association mining tasks. The implementation of the proposed method is based on the concurrent functional programming paradigm using the Erlang language that handles parallelism via a message passing mechanism. We test our implementations on the synthetic data sets and the real genetic data. The results show a good runtime improvement.
An Improved Location Estimation Method for Wifi Fingerprint-based Indoor Localization
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.77-86
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The Accurate indoor localization is a challenging task due to the absence of GPS. Among numerous proposals, Wifi fingerprint-based localization is one of the most promising approach, since most buildings are nowadays equipped with Wifi access points for wireless network coverage. Due to the nature of Wifi access points in which any user can deploy and manage their own, fingerprints from some access points lead to estimation errors. Location estimation algorithms should consider these factors and be able to locate users with low error distance. Finding the nearest neighbor using Euclidean distance in signal space is most widely used method in estimating location. However, this paper shows that Euclidean distance is prone to error when unstable access points are present. Also, Euclidean distance does not differentiate strong signals and weak signals, which can also mislead location estimation. We propose a different way to determine the nearest neighbor, which penalizes signals from unstable access points, and signifies strong signals compared to weak signals. Experiments with real measurements show that the proposed algorithm reduces mean error distance by 57% and 90-percentile error distance by 64% compared to the Euclidean distance method.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.87-94
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This study aims to develop educational contents for marriage immigrants by analyzing the programs of the multicultural family support centers and developing the curricular appropriate for them. A number of the programs intend to intensify social welfare for the marriage immigrants by promoting Korean proficiency. Therefore, it is essential to establish a comprehensive educational system for marriage immigrants, who are more likely to face complex circumstances in a variety of fields such as child-caring and job hunting. Educational capital is one of the most significant qualities in life in Korea. In this context, this study suggests that the measures for expanding education capital should help marriage immigrants sustain their cultural identity and heighten self-esteem. Accordingly, Air and Correspondence High Schools can be utilized by devising the curricula customized for marriage immigrants.
Dynamic Congestion Control Algorithm for Vehicular Ad-hoc Networks
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.95-108
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Vehicular Ad Hoc Network (VANET) has received increased attention from scholars and industries in recent years. Meanwhile, Congestion control remains the major concern for VANET application due to its characteristics such as bandwidth limitation, fast change of topology and lack of central coordination. Researchers have proposed a number of solutions to overcome these challenges and also to reduce congestion in VANET environment. These solutions are based on packet generation rate, transmit power control, utility function, carrier sense threshold or a combination of them. In this paper, the existing congestion control approaches is classified into three main classes, namely, proactive, reactive and hybrid. Besides, we propose and implement an algorithm by which carrier sense (CS) threshold or MaxBeaconingLoad (MBL) value can be assigned dynamically for fine-tuning the Distributed Fair transmits Power Adjustment for VANETs (D-FPAV) congestion control approach. In addition to optimal channel bandwidth usage, the proposed algorithm can be used in any situation considering traffic and non-traffic conditions.
A New Distributed Caching Technique for Accelerating the Web Query Processing
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.109-116
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Because of the fast growing volume of web documents during the past decades, the efficiency of the web search engine has become more crucial than ever. Such efficiency can be estimated with both factors of the query relevance of search results answered and the financial cost for query processing. Between them, the ways for improving query relevance of web searches have been intensively studied in the research topics like hyperlink-based ranking, topic-sensitive document classifications, and semantic-awareness in rank evaluations. However, there have been not studies that provide an efficient solution to cut the financial cost of query processing, while retaining high query relevance. In this light, we propose a distributed cache scheme and a server-clustering technique that can be used to reduce the query processing cost. With the help of such techniques for accelerating the web query processing, we saved around 70% of the server cost of a commercial web search engine implemented in South Korea. We believe that our experiences can give a valuable insight to anyone who wants to develop a large-scale search engine.
A Meta-Model Transformation between DDS and DBMS Representation of Data for DDS-DB Integration
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.117-126
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Data Distribution Service for Real-Time Systems (DDS) is the OMG publish/subscribe standard that aims to enable scalable, real-time, dependable, high performance and interoperable data exchanges. DDS introduces a virtual Global Data Space where applications can share information by simply reading and writing data-objects addressed by means of an application-defined name (Topic) and a key. Large numbers of publishers and subscribers on DDS can create huge amounts of Topic data. The commonly accepted approach to large-scale real-time data management is to use a database for persistence. This paper provides an integral solution for data distribution and database management in the real-time applications space. This paper outlines a mapping between DDS and DBMS meta-model and DDS-DB integration mechanism for supporting data persistence. The prototypes of mapping tools have been implemented. This paper also concludes with general remarks and a discussion of future works.
Design of Augmented Object Compositing System based on Diminished Reality
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.127-136
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Recently that the contents get various due to spread of prosumer and contents can be shared with others due to appearance of SNS, the private internet broadcasting services be-come activated gradually. For this reason, they were used to the editorial broadcasting base virtual studio system to support more high quality broadcasting than traditional methods like real-time personal broadcasting using PC and web-cam. However that such services provide various broadcasting environments only through background image and cannot provide the suitable contents for the broadcasting, it decreases the immersion of the users and cannot present the reality of broadcasting service. Therefore this paper suggests and designs the structure of improved augmented objects composition system using real-time object removal technique.
Critical evaluation of two UML profiles for Distributed Embedded Real-Time Systems Design
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.137-146
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The successful implementation of Service-Oriented Computing (SOC) for the development of Distributed Embedded Real-time Systems (DERTS) in the recent years has proved the importance of service-orientation over previous paradigms. However, efforts are still needed on systematic service-oriented design of DERTS, especially on the modeling of DERTS. Several UML profiles are proposed for modeling of embedded real-time system and SOC separately. However, a holistic modeling solution, covering both the domains, is still missing. Therefore, a thorough investigation of existing UML profiles is necessary before proposing the holistic modeling solution. In this regard, this paper investigates two UML profiles: MARTE and SoaML profiles from the view of service-oriented development of DERTS. The paper highlights the portions of the two profiles that can be adopted and provides some suggestions that can be used for service-oriented modeling of DERTS. The results of this investigation would be useful in developing a service-oriented based meta-model for DERTS.
Exemplar Based Image Inpainting on a Projection Framework
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.147-156
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
An exemplar based inpainting method on a projection framework is presented. A ker- nel based projection is adopted to detect dominant gradient in the neighbor regions of the restoration target. The priority function which determines the patching order is redened based on the projection framework. In addition, considering the observation that similar patches are usually found near the reference points, a distance based weighting is added to the similarity metric between two patches. It reduces the artifact eects caused by exhaus- tive patch searching. It improves the plausibility of the restoration especially when global structures are involved in the target region. The experimental results show that the proposed method enhances the plausibility of restored regions, especially when global structures are overlaid on the target region.
Performance Improvement for Web based Simulation Service on EDISON_CFD
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.157-168
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Web based simulation is used in various kinds of applications by providing a familiar on-line environment to use existing simulation programs. EDISON (EDucation-research Integration through Simulation On the Net) project supports web simulation service with advanced research/development contents. These advanced education-research simulation programs and contents are utilized to improve the natural sciences and engineering students' research ability and adoptability for the advanced technology e-AIRS (e-Science Aerospace Integrated Research System), the trial service of EDISON_CFD, is employed to support CFD lectures 2011. In this paper, to support stable system, we present e-AIRS performance improvement such as resource reorganization, job assignment control, stable simulation list loading, and waiting time. To show the improvement effect, we describe before and after of e-AIRS performance and users’ feedback between 1st and 2nd semester 2011.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.169-178
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
ebXML (Electronic Business using eXtensible Markup Language) is an e-business standard developed by UN/CEFACT and OASIS, which enables enterprises to exchange business messages, conduct trading relationships, communicate data in common terms and define and register business processes using Web services. Web service security technologies emerging recently have extensibility and flexibility suitable for security implementation such as encryption, digital signature, access control and authentication. In this paper, we propose ebXML business transaction models for trading game contents that allow trading partners to securely exchange business transactions by employing Web service security standard technologies. We show how each Web service security technology meets the ebXML standard by constructing the experimentation software and validating messages between the trading partners.
Optimized Software Test Management Using Risk Based Approach
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.179-194
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Test Management is the process of managing the software test life cycle (STLC) of the application under test (AUT). It starts with test planning activity and ends with test results reporting. The objectives of test management are to manage requirements dynamically, effectively utilize the 'testing cycle' time and efficient use of testers in terms of their productivity. Test management tool known as 'Quality Center (QC)' is widely used for managing the STLC of the project. Test case prioritization techniques schedule test cases for execution in an order that attempts to maximize some objective function. A variety of objective functions are applicable; one such function involves rate of fault detection — a measure of how quickly faults are detected within the testing process. An improved rate of fault detection during regression testing can provide faster feedback on a system under regression test and let debuggers begin their work earlier than might otherwise be possible. In this paper we have presented a method of choosing risk-based test cases. Our risk analysis is based on a practical risk model, and is similar to that used by some organizations.
A Scalable Integration Testing Approach considering Independent Usage Pattern of Global Variables
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.195-204
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Embedded systems are used to design and control variety of complex system. Now-a-days embedded system has been used in every aspect of our daily life such as automobiles, home appliances, cell phones, security system etc. It is also being used in highly safety critical system like aerospace, medical devices, military equipment etc. So it is necessary to test the system before being released. Usually in embedded system there are different modules which have a real time interaction between each other. The best and easiest way to make this relationship is by global variables. But in embedded software global variables potentially causes many issues such as lack of access control, implicit coupling and dependencies with different module of the source code. Large number of integration module and its associated global variables introduce the problem of scalability. This paper propose an automated test case generation approach to solve dependency problem considering the definition-use of global variable and generate scalable test cases according to feasible test sequences.
Patent Analysis Using Bayesian Network Models
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.205-212
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Technology management is important to both companies and nations. Recently, economic competitiveness for both depends on technological prowess. Patents are a representative index of technological competitiveness because a patent document has diverse and detailed information about developed technologies. Hence, patent analysis is an efficient tool for technology management activities such as R&D planning and technology marketing. In this paper, we propose a patent analysis method using Bayesian network models. A Bayesian network is a graphical model representing the relationships between variables. We use International Patent Classification codes as the variables of a Bayesian network model to obtain the technological associations between codes. We verify the performance of our research using retrieved patent documents related to the BMW motor company.
An Algorithm and a Tool for Comparing Ontology Versions
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.213-222
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper we developed and implemented COMP algorithm. An algorithm that provides an approach to compare ontologies versions. COMP performs all tasks automatically and the intervention of the user is not required. The objective is to underline the interest of having a tool for the analysis of the differences between versions of ontology of the same domain. We present a tool named CVO based on COMP algorithm that helps handling and comparing ontologies in OWL. The domain of study relates to the medical field of the breast cancer disease.
Hybrid Model Based Testing for Mobile Applications
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.223-238
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Mobile application testing requires the use of a model to guide such efforts as test selection and test verification. Often, such models are implicit, existing only in the head of a human tester, applying test inputs in an ad hoc fashion. The mental model testers build encapsulates application behavior, allowing testers to understand the application’s capabilities and more effectively test its range of possible behaviors. When these mental models are written down, they become sharable, reusable testing artifacts. In this case, testers are performing what has become to be known as model-based testing. Model-based testing is a new and evolving technique for generating a suite of test cases from requirements. Testers using this approach concentrate on a data model and generation infrastructure instead of hand-crafting individual tests. In this paper we discuss the characteristics of automotive model-based development processes, the consequences for test development and the need to reconsider testing procedures in practice. Furthermore, we introduce the test tool HMBT (Hybrid Model Based Testing) which masters the complexity of model-based testing in the automotive domain. To illustrate this statement we present a small mobile applications case study. HMBT is based on graphical test models that are not only easy to understand but also powerful enough to express very complex, fully automated closed loop tests in real-time.
Interference Aware MAC scheduling for Collision Avoidance using Energy Detection Scan
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.239-248
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Advances in MEMS (Micro Electro Mechanical Systems), microprocessor, and wireless technologies, have accelerated deployment of network-capable computing devices attached to various objects over the world. These devices should be small in size and have a characteristic of extremely low power consumption. Therefore, in 2004, IEEE 802.15.4 has been established as a global standard for LR-WPANs. After that, the phenomenal popularity of this standard has also led to indiscreet deployment of other WPANs. Therefore, LR-WPANs can suffer from collision by other WPAN devices. In order to solve collision problem in IEEE 802.15.4, in this paper we introduce a novel channel scheduling scheme which is an adaptive method with fast recovery. The proposed scheme can minimize the possibility of beacon collisions by efficiently managing the multiple available channels in a hybrid manner combining proactive and reactive methods.
Results of Coding Rules Testing of Train Control System Software
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.249-258
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Recently, the railway system is advancing to be intelligent according to the development of computer technology, and especially, many functions of train control system which are cores to the railway system are being operated by the software. Accordingly, the source code testing to validate safety of the railway train control system software becomes to be more important, and related international standards highly recommend (HR: Highly Recommended) inspections on the source code also. For this purpose, studies in relation to the development of source code validation tool were started from several years ago in Korea. To verify the applicability of validation tools developed as a part of these studies, the applicability test was performed for the railway signaling system being applied to the domestic railway. This paper drew the result of application test for this actual source code of train control system being applied to railway sites and analyzed its result.
Development of BYOD Strategy Learning System with Smart Learning Supporting
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.259-268
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
With the proliferation of mobile devices such as laptops, tables and smartphone, the BYOD trend is increasingly spreading in schools learning, transforming the way students learn and how, where and when they consume educational information. This study is to develop system that supported smart learning interaction and evaluation learning using advantage of BYOD devices. The developed system can be managed learners and classes in the server. Using the App for tablet PC or SmartPhone, the learning evaluation, real-time interaction and feedback is possible. The schools adopting a BYOD strategy are numerous benefits for schools and for students, the generation of students being exposed to mobile devices basically from birth, will be reborn as a system to support learning.
The Study of AMGA RAP-based Web Application
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.269-280
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The ARDA Metadata Catalog Grid Application (AMGA) web application has been widely used; however, it has drawbacks such as easy-to-use interface, no direct building of the Virtual Organization Membership Service (VOMS) proxy and no maintenance after AMGA server version 1.3. In response, we adapted a new development procedure and toolkit from Graphic User Interface (GUI) client, a Client/Server (C/S) program, to a web application to manage the both Eclipse Rich Client Platform (RCP) and Rich Ajax Platform (RAP) at the same time. The AMGA web application provides many interesting features for manipulation of collections, metadata schema, entries, access control, user/group information, federation and others. Additionally, this web application includes a powerful SQL query editor that enables users to make complicated sentences under specific query conditions. In this paper, we describe the implementation of the AMGA web application focusing on the transformation of AMGA Manager using Eclipse RCP to a RAP-based web application.
Situation Based Dynamically Adaptive Workflow
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.281-290
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Workflow has been useful in business area for a long time since it helps business process be well defined and be automated. Recently, its use becomes broader and its original model becomes changed. Recent technology such as smart phone and positioning system brings about more dynamic situation to where the workflow can be adopted. The workflow is not routed by the predefined path and condition. Due to this reason, real-time workflow or dynamic workflow is more frequently discussed. The real-time workflow supports not only fixed routing but also dynamic routing according to the environmental context changed in real-time. The paper introduces the concept of dynamic workflow model which is to route the work flow in terms of efficiency or capacity of resources. The simulation model designed for medical examination application showed that dynamic model and its algorithm have some efficiency in total timing needed for customer’s health-care test.
Parallel Acceleration on Manycore Systems and Its Performance Analysis: OpenCL Case Study
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.291-300
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
OpenCL (Open Computing Language) is a heterogeneous programming framework for developing applications that executes across a range of device types made by different vendors[11] which efficiently maps to both heterogeneous and homogeneous, single or multiple device system consisting of CPUs, GPUs and others types of devices. OpenCL provides many benefits in the field of high-performance computing and one of the most important aspects is its portability. This paper presents a comparison of the performance of OpenCL executing a matrix multiplication over a manycore CPU and GPU with performance analysis. The analysis are carried out to understand manycore CPU and GPU performance characteristics. Such analysis approach can be further extended to include more system parameters and refined to fit the actual execution time of parallelized applications. The simulation uses Ubuntu 12.04 in a desktop with an Intel i7 960 processor and a graphic card Nvidia GeForce GTX 460.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.301-310
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Providing an efficient and reliable multicast for data dissemination applications on a large scale is a challenge, especially when the applications require a very short delivery delay and high throughput. The combination of a local recovery approach based on active services with those using FEC/ARQ gives rise to a new class of reliable multicast protocols called APES "Active Parity Encoding Services". This paper carries out a comparative study between reliable multicast protocols belonging to this class in terms of loss recovery latency. We use the simulation to study the impact of coding/decoding time and loss rate on the performance of this class of protocols. Our numerical results show that the approach Get-Repairs Store-Repairs, besides the reduction in storage space at the active router, provides a substantial gain in terms of loss recovery latency and thus contributes to improve the real time reliable multicast.
Future Smart Device Development Architecture
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.311-322
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The spreading use of wireless internet and smartphone accelerates the growth of location-based service and mobile-cloud computing. However, mobile computing devices such as smartphones, personal media players, pose challenges due to its intrinsic nature of battery capacity, constraints of wireless networks and device limitation. First, a fundamental challenge arises from power-inefficiency of location awareness. The location-based application is one of killer applications in smartphone. Usually, the locations-based applications steadily consume power for a long time. So, we propose energy efficient location-based servic. Second, another challenge arises from power-inefficiency in terms of mobile-cloud computing. Our framework reduces power dissipation by substituting less-power-intensive sensors, when the smartphone is in static state such as being put on a table in an office. The substitution is controlled by finite state machine with user movement detection strategy. The core technology of our framework is based on web service and SOAP protocol because the web service is the best fit for the framework that is not depending on a certain smart-phone OS platform. To this end, we propose the framework architecture and evaluate the system using the application of PI value computation. The result shows that our mobile cloud computing platform performs better as increasing number of cloud nodes and that our resource management strategy improves the power consumption.
SMTL Oriented Model Transformation Mechanism for Heterogeneous Smart Mobile Models
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.3 2013.05 pp.323-332
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Until now, there are not existed any research to reuse any software on heterogeneous smartphones for interoperating between Android/iphone and iphone/Android. To do this, our previous approach [7, 8, 12, 13, 14, 15, 16] just used UML metamodel and model transformation language, ATL, based on model oriented Architecture/development (MDA/MDD) to embedded systems. But it has limited for Model Transformation language to represent all transformation rules with ATL. This limitation is not suitable for heterogeneous smartphone model transformation, and also impossible to extension of ATL. To solve this problem, this paper suggests Smartphone Model Transformation Language (SMTL) oriented model transformation mechanism for heterogeneous smartphone. We define SMTL which easily manipulates more input model in SMTL engine. Through invoking operation in SMTL engine, it is directly mapped with API in Eclipse modeling Framework (EMF). In addition, design to use XPath as XML technique instead of OCL to search data in source model.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.