{"title":"Performance improvement on mobile devices using MVC+Prefetch Controller Pattern","authors":"Byung-jai Im, Eunseok Lee","doi":"10.3745/KIPSTD.2011.18D.3.179","DOIUrl":"https://doi.org/10.3745/KIPSTD.2011.18D.3.179","url":null,"abstract":"Current mobile devices have surpassed its boundaries as a more communication tool to a smart device which provides additional features. These features have supported the smart life of its users, but have reached its limit from low-performance processors and short-battery time. These issues can be resolved b implementing higher performing hardware, but they come with a burden of high cost. This paper introduces a new way of managing computing resources in a mobile device by enhancing the quality of human-computer interaction. The real-speed felt by users are mainly influenced by the time it takes form a user`s input to the device to display the completed result on the screen. Since the size of the screen for mobile devices are small, if the processor only fetch data to be used for displaying on screen, the time can be significantly reduced. MVC+Prefetch Controller pattern accomplished this goal by using the minimum amount of data from DB to fetch display and still manages to support high-speed data transfer to achieve seamless display. This idea has been realized by practice using Samsung mobile phone S8500, which demonstrated the superior performance on user`s perspective.","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125280813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Extended Frequent Pattern Tree for Hiding Sensitive Frequent Itemsets","authors":"Dan-Young Lee, Hyoung-Geun An, Jae-Jin Koh","doi":"10.3745/KIPSTD.2011.18D.3.169","DOIUrl":"https://doi.org/10.3745/KIPSTD.2011.18D.3.169","url":null,"abstract":"Recently, data sharing between enterprises or organizations is required matter for task cooperation. In this process, when the enterprise opens its database to the affiliates, it can be occurred to problem leaked sensitive information. To resolve this problem it is needed to hide sensitive information from the database. Previous research hiding sensitive information applied different heuristic algorithms to maintain quality of the database. But there have been few studies analyzing the effects on the items modified during the hiding process and trying to minimize the hided items. This paper suggests eFP-Tree(Extended Frequent Pattern Tree) based FP-Tree(Frequent Pattern Tree) to hide sensitive frequent itemsets. Node formation of eFP-Tree uses border to minimize impacts of non sensitive frequent itemsets in hiding process, by organizing all transaction, sensitive and border information differently to before. As a result to apply eFP-Tree to the example transaction database, the lost items were less than 10%, proving it is more effective than the existing algorithm and maintain the quality of database to the optimal.","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131696950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Rule Case Simplification Algorithm to be used in a Rule-Based System","authors":"Baowei Zheng, Jeong-Mo Yeo","doi":"10.3745/KIPSTD.2010.17D.6.405","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.6.405","url":null,"abstract":"ABSTRACT A rule is defined as a case to determine the target values according to combination of various Business factors. The information system is used to represent enterprise’s business, which includes and implements the amount of these rules to Rule-Based System. A Rule-Based System can be constructed by using the rules engine method or Relational Database technology. Because the rules engine method has some disadvantages, the Rule-Based System is mostly developed with Relational Database technology. When business scales become larger and more complex, a large number of various rule cases must be operated in system, and processing these rule cases requires additional time, overhead and storage space, and the speed of execution slows down. To solve these problems, we propose a simplification algorithm that converts a large amount of rule cases to simplification rule cases with same effects. The proposed algorithm is applied to hypothetical business rule data and a large number of simplification experiments and tests are conducted. The final results proved that the number of rows can be reduced to some extent. The proposed algorithm can be used to simplify business rule data for improving performance of the Rule-Based System implemented with the Relational Database.Keywords : Business Factor, Rule, Rule-Based System, Relational Database, Rules Engine","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"os-25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127691645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PRMS: Page Reallocation Method for SSDs","authors":"Dong-Hyun Lee, Hongchan Roh, Sanghyun Park","doi":"10.3745/KIPSTD.2010.17D.6.395","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.6.395","url":null,"abstract":"Solid-State Disks (SSDs) have been currently considered as a promising candidate to replace hard disks, due to their significantly short access time, low power consumption, and shock resistance. SSDs, however, have drawbacks such that their write throughput and life span are decreased by random-writes, nearly regardless of SSDs controller designs. Previous studies have mostly focused on better designs of SSDs controller and reducing the number of write operations to SSDs. We suggest another method that reallocates data pages that tend to be simultaneously written to contiguous blocks. Our method gathers write operations during a period of time and generates write traces. After transforming each trace to a set of transactions, our method mines frequent itemsets from the transactions and reallocates the pages of the frequent itemsets. In addition, we introduce an algorithm that reallocates the pages of the frequent itemsets with moderate time complexity. Experiments using TPC-C workload demonstrated that our method successfully reduce 6% of total logical block access.","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131886616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effects of Trust and Cognitive Absorption on Smart Phone Use and User Satisfaction","authors":"B. Lee, Yoon-Ki Yeo, Ki-youn Kim, Jong hoon Lee","doi":"10.3745/KIPSTD.2010.17D.6.471","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.6.471","url":null,"abstract":"The purpose of this study is to explore determinants which affect the significant increase in the user acceptance of smart phone. This study also analyzes the effect of each variable on the actual acceptance by empirical methods. In this study, first, the system quality and the service quality are defined as independent variables based on developed IS success model of DeLone & McLean(2003). Second, we proposed the research model by providing trust and perceptual immersion as intermediate variables, and user satisfaction and actual use as dependent variables by the proceeding research for accepting information technology and new service. Third, the statistical analysis is conducted by surveying to 200 smart phone users for verifying a validity of research models and hypotheses. As a result, almost hypotheses are accepted in confidence interval except for the hypothesis between security and trust variable.","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134219871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Formal Specification of Reusable Framework of Embedded System","authors":"Eunsook Cho, Chul-Jin Kim, Chee-Yang Song","doi":"10.3745/KIPSTD.2010.17D.6.431","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.6.431","url":null,"abstract":"Because embedded system is combined system of hardware and software, we should design by considering elements such as real-time, reactive, small size, low weight, safe, reliable, harsh environment, low cost, and so on. However, those are poorly reflected on current embedded system development. Especially, there is few existed framework-based embedded system development. As a result, there are many internal codes which is not related with system operation in currently developed embedded system, and reusability or variability is not considered into embedded system development. Therefore we propose a formal specification technique using Z language to guarantee completeness or consistency of design of reusability framework proposed for improving reusability of embedded system. Also we assure correctness of framework design by checking Z model through Z-Eves Tool.","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130513751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bottom-up Composition and Verification of Embedded Software","authors":"Yunja Choi","doi":"10.3745/KIPSTD.2010.17D.6.415","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.6.415","url":null,"abstract":"This paper proposes service-oriented composition and verification techniques for incrementally extracting high-level abstract behavior of unit components in a systematic manner. Proposed techniques include the definition for abstract component, which is a basic building-block of the abstraction process, an algorithm for port-based synchronized abstraction, and projection abstraction. A verification framework is developed using the proposed techniques and its efficiency is demonstrated through a case example.","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128675434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Customized Digital TV System for Individuals/Communities based on Data Stream Mining","authors":"S. Shin, W. Lee","doi":"10.3745/KIPSTD.2010.17D.6.453","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.6.453","url":null,"abstract":"The switch from analog to digital broadcast television is extended rapidly. The DTV can offer multiple programming choices, interactive capabilities and so on. Moreover, with the spread of Internet, the information exchange between the communities is increasing, too. These facts lead to the new TV service environment which can offer customized TV programs to personal/community users. This paper proposes a `Customized Digital TV System for Individuals/Communities based on Data Stream Mining` which can analyze user`s pattern of TV watching behavior. Due to the characteristics of TV program data stream and EPG(electronic program guide), the data stream mining methods are employed in the proposed system. When a user is watching DTV, the proposed system can control the surrounding circumstances as using the user behavior profiles. Furthermore, the channel recommendation system on the smart phone environment is proposed to utilize the profiles widely.","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115006048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sang-Hyuck Han, Jung-Su Jung, Seung-Il Jin, Young-Kuk Kim
{"title":"A Dynamic Management Technique for Weighted Testcases in Software Testing","authors":"Sang-Hyuck Han, Jung-Su Jung, Seung-Il Jin, Young-Kuk Kim","doi":"10.3745/KIPSTD.2010.17D.6.423","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.6.423","url":null,"abstract":"As software becomes large-scale and complicated, the need for Quality Assurance and management is increased and software testing is becoming more important. The main aims of software testing are not only detecting and handling the defects in the system but also investigating and managing the present system. But automatic testing tools require lots of time and efforts to detect and manage the risk in the system because test-cases used in the general automatic testing tools have the simply static information. In this thesis, the dynamic management technique for weighted testcases is designed to test the high-risk testcases preferentially by giving the testcases dynamic weight.","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"122 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115166087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Analysis of Attribute and Operation based on COTS System","authors":"Eun-Ser Lee, Joong-soo Kim","doi":"10.3745/KIPSTD.2010.17D.6.443","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.6.443","url":null,"abstract":"COTS system is increasingly seen as one of the main jobs of reuse development. It involves reliability of COTS that might affect the project schedule or the quality of the software being developed and taking action to avoid these risks. The results of the COTS analysis should be documented in the project plan along with an analysis of the attribute and operation. Effective risk management makes it easier to cope with problems and to ensure that these do not lead to unacceptable budget or schedule slippage. This research provides criteria of analysis of risk items to the estimation of process milestone on COTS development.","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131382200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}