{"title":"Association Rule Discovery Considering Strategic Importance: WARM","authors":"D. Choi","doi":"10.3745/KIPSTD.2010.17D.4.311","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.4.311","url":null,"abstract":"This paper presents a weight adjusted association rule mining algorithm (WARM). Assigning weights to each strategic factor and normalizing raw scores within each strategic factor are the key ideas of the presented algorithm. It is an extension of the earlier algorithm TSAA (transitive support association Apriori) and strategic importance is reflected by considering factors such as profit, marketing value, and customer satisfaction of each item. Performance analysis based on a real world database has been made and comparison of the mining outcomes obtained from three association rule mining algorithms (Apriori, TSAA, and WARM) is provided. The result indicates that each algorithm gives distinct and characteristic behavior in association rule mining.","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130441833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated Test Data Generation for Testing Programs with Multi-level Stack-directed Pointers","authors":"I. Chung","doi":"10.3745/KIPSTD.2010.17D.4.297","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.4.297","url":null,"abstract":"Recently, a new testing technique called concolic testing receives lots of attention. Concolic testing generates test data by combining concrete program execution and symbolic execution to achieve high test coverage. CREST is a representative open-source test tool implementing concolic testing. Currently, however, CREST only deals with integer type as input. This paper presents a new rule for automated test data generation in presence of inputs of pointer type. The rules effectively handles multi-level stack-directed pointers that are mainly used in C programs. In addition, we describe a tool named vCREST implementing the proposed rules together with the results of applying the tool to some C programs.","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114930696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing Effects of Government Promoting Policies for IPTV Adoption","authors":"B. Lee, Hyunsik Seo, Sungjoon Lee, Jun Ho Kim","doi":"10.3745/KIPSTD.2010.17D.3.233","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.3.233","url":null,"abstract":"ABSTRACT This research aims to examine the efficiency and effectiveness of the governmental policies promoting IPTV by verifying their influences on the adoption empirically. The government unveiled several policies including creating demands in public sectors, developing diverse public contents, subsidizing the production of converged contents, easing the regulations to promote IPTV industry. While a lot of previous literature has already proved that a system quality, a content quality, and a perceived price have influences on the adoption of IPTV, the effects of governmental policies are not well understood despite of their contributions to the adoption. Rather, most of existing research on governmental policies in the context of technology adoption have focused on regulatory frameworks. The results of the study show that governmental policies have influences on consumers' perceived system quality and content quality. It is also found that perceived system quality, content quality and perceived price have influences on adoption intention. This study can contribute to the field in a way that it proves the important roles of governmental policies in the diffusion of new technologies including IPTV.Keywords:IPTV, Government Promoting Policies, TAM, SEM","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129887520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development Process Improvement of Open-market System by using Agile Methodology","authors":"Yong-hee Lee, Gun-ho Lee","doi":"10.3745/KIPSTD.2010.17D.3.203","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.3.203","url":null,"abstract":"This study improves the productivity of software development of open-market systems using agile methodology. The current processes of an open-market system are analyzed and inefficient processes are identified which are changed by applying the agile practice principles in Lean software. This study analyzes the process lead times and defects after the processes are changed to see the improvement effect.","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128420549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effect of Composition and Security Activities for Information Security Architecture on Information Asset Protection and Organizational Performance","authors":"Guhyeon Jeong, Donggyu Yi, S. Jeong","doi":"10.3745/KIPSTD.2010.17D.3.223","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.3.223","url":null,"abstract":"ABSTRACT This study was carried out for the purpose of inquiring into the effect of composition and security activities for information security architecture on information asset protection and organizational performance in terms of general information security. This study made a survey on 300 workers in the government, public institutions and private companies, which it showed that management factors of risk identification and risk analysis, in general, have an usefulness to composition and security activities for information security architecture to prevent inside information leakage. And the understanding and training factors of IT architecture and its component were rejected, requiring the limited composition and security activities for information security architecture. In other words, from the reality, which most institutions and organizations are introducing and operating the information security architecture, and restrictively carrying out the training in this, the training for a new understanding of architecture and its component as an independent variable made so much importance, or it did not greatly contribute to the control or management activities for information security as the generalized process, but strict security activities through the generalization of risk identification and risk analysis management had a so much big effect on the significant organizational performance. Keywords:Architecture Configuration, Security Activities, Information Asset Protection, Organizational Performance","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134303891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying Particle Swarm Optimization for Enhanced Clustering of DNA Chip Data","authors":"Minsoo Lee","doi":"10.3745/KIPSTD.2010.17D.3.175","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.3.175","url":null,"abstract":"Experiments and research on genes have become very convenient by using DNA chips, which provide large amounts of data from various experiments. The data provided by the DNA chips could be represented as a two dimensional matrix, in which one axis represents genes and the other represents samples. By performing an efficient and good quality clustering on such data, the classification work which follows could be more efficient and accurate. In this paper, we use a bio-inspired algorithm called the Particle Swarm Optimization algorithm to propose an efficient clustering mechanism for large amounts of DNA chip data, and show through experimental results that the clustering technique using the PSO algorithm provides a faster yet good quality result compared with other existing clustering solutions.","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114866534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Framework for Supporting Business Services based on the EPC Network","authors":"Taewoo Nam, Keunhyuk Yeom","doi":"10.3745/KIPSTD.2010.17D.3.193","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.3.193","url":null,"abstract":"Recently, there have been several researches on automatic object identification and distributed computing technology to realize a ubiquitous computing environment. Radio Frequency IDentification (RFID) technology has been applied to many business areas to simplify complex processes and gain important benefits. To derive real benefits from RFID, the system must rapidly implement functions to process a large quantity of event data generated by the RFID operations and should be configured dynamically for changing businesses. Consequently, developers are forced to implement systems to derive meaningful high-level events from simple RFID events and bind them to various business processes. Although applications could directly consume and act on RFID events, extracting the business rules from the business logic leads to better decoupling of the system, which consequentially increases maintainability. In this paper, we describe an RFID business aware framework for business processes in the Electronic Product Code (EPC) Network. This framework is proposed for developing business applications using business services. The term \"business services\" refers to generated events that can be used in business applications without additional data collection and processing. The framework provides business rules related to data collection, processing, and management, and supports the rapid development and easy maintenance of business applications based on business services.","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128021844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Adaptive Sampling Technique based on the Kalman Filter for Sensor Monitoring","authors":"Minkee Kim, Jun-Ki Min","doi":"10.3745/KIPSTD.2010.17D.3.185","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.3.185","url":null,"abstract":"ABSTRACT In sensor network environments, each sensor measures the physical environments according to the sampling period, and transmits a sensor reading to the base station. Thus, the sample period influences against importance resources such as a network bandwidth, and a battery power. In this paper, we propose new adaptive sampling technique that adjusts the sampling period of a sensor with respect to the features of sensor readings. The proposed technique predicts a future readings based on KF (Kalman Fiter). By using the differences of actual readings and estimated reading, we identify the importance of sensor readings, and then, we adjust the sampling period according to the importance. In our experiments, we demonstrate the effectiveness of our technique. Keywords:WSN, Adaptive Sampling, Kalman Filter 1. 서 론 1) 무선 센서 네트워크 (Wireless Sensor Network: WSN) 는 제한된 전원을 지닌 수 백에서 수 천개의 센서들로 이루어져있다. 최근 마이크로 센서 기술과 무선 통신 기술의 발전으로 대량 저비용 센서들로 구성된 무선 센서 네트워크는 군사 보안, 환경 모니터링 등의 다양한 분야에 적용가능하게 되었다. WSN의 규모가 커지면서 기존의 대역폭, 배터리 등의 문제가 점점 더 대두되고 있는 시점이다. 제한된 대역","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116508347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effect of Motivation-Reward Fit on Commitment and Knowledge Sharing Activities in Communities of Practice","authors":"Inhak Kim, Ji-hyeon Lee, Joon Koh, Hee-Woong Kim","doi":"10.3745/KIPSTD.2010.17D.3.209","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.3.209","url":null,"abstract":"ABSTRACT As the business competition between firms is getting intense, one of the sources of competitive advantage is effectively and efficiently to create, share, and apply information/knowledge among employees. Most of the firms which conduct knowledge management are operating a Community of Practice(CoP) in order to create, share and utilize this kind of information/knowledge resource. Recently, the CoP is getting out of its informal and spontaneous manner and is beginning to be led by the top management, receiving official support, in order to achieve the organization’s strategic goals. However, the corporation’s strategic operation of the CoP is not only against its original characteristics but also hampers the spontaneity of its participants. Every participant has different motivation to participate and different preference for reward type. This study, with the survey of 114 respondents, found that intrinsic motivation as well as extrinsic motivation significantly affect the motivation-reward fitness. Also, the motivation-reward fit was found to influence CoP commitment which ultimately leads to knowledge sharing activity in the CoP context. This research will help knowledge management companies to figure out how the two things of participants’ motivation and their reward types can fit together, and how such fitness ultimately affects the participants’ commitment and their knowledge sharing activities.Keywords:Community of Practice, CoP, Motivation, Reward Type, Commitment, Knowledge Sharing","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131827806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HAMM(Hybrid Address Mapping Method) for Increasing Logical Address Mapping Performance on Flash Translation Layer of SSD","authors":"Ji-Won Lee, Hongchan Roh, Sanghyun Park","doi":"10.3745/KIPSTD.2010.17D.6.383","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.6.383","url":null,"abstract":"ABSTRACT Flash memory based SSDs are currently being considered as a promising candidate for replacing hard disks due to several superior features such as shorter access time, lower power consumption and better shock resistance. However, SSDs have different characteristics from hard disk such as difference of unit and time for read, write and erase operation and impossibility for over-writing. Because of these reasons, SSDs have disadvantages on hard disk based systems, so FTL(Flash Translation Layer) is designed to increase SSDs’ efficiency. In this paper, we propose an advanced logical address mapping method for increasing SSDs’ performance, which is named HAMM(Hybrid Address Mapping Method). HAMM addresses drawbacks of previous block-mapping method and super-block-mapping method and takes advantages of them. We experimented our method on our own SSDs simulator. In the experiments, we confirmed that HAMM uses storage area more efficiently than super-block-mapping method, given the same buffer size. In addition, HAMM used smaller memory than block-mapping method to construct mapping table, demonstrating almost same performance.Keywords : Solid State Disks, Flash Translation Layer, Logical Address Mapping","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132713015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}