{"title":"Development of Integrated Missile System Design Framework Using Distributed Computing Environment","authors":"Seung-Jin Lee, Woohyun Kim, Jae-Woo Lee, Y. Byun","doi":"10.1109/ICCSA.2007.26","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.26","url":null,"abstract":"In this study, framework is developed for integrated missile system design and optimization using distributed computing environment. Analysis tools, optimization tools, database, and CAD are integrated in the missile MDO framework. All components are integrated with middleware for distributed computing environment.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121113499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Publisher-side Event Filtering for QoS-Awareness in Ubiquitous Computing","authors":"Kyungrae Cho, Sung-Keun Song, H. Youn","doi":"10.1109/ICCSA.2007.51","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.51","url":null,"abstract":"In the ubiquitous computing environment a user may interact with a large number of devices. The publish'subscribe paradigm is suitable for the various applications by allowing the subscribers to declare their interests and receive only the notifications of interest. This paper propose a novel event filtering approach preventing waste in the space of the event queue of the event channel due to unwanted events and reducing the network load. Performance evaluation reveals that the proposed scheme displays significant improvement over the existing event service, Java messaging service (JMS) and Omnievent service in terms of event delivery time for various numbers of servers and data sizes.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128304351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-based Dynamic Channel Management for Efficient Event Service in Pervasive Computing","authors":"Young Kwon You, S. Han, Sung-Keun Song, H. Youn","doi":"10.1109/ICCSA.2007.68","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.68","url":null,"abstract":"In pervasive computing environment a number of distributed applications asynchronously exchange data using the event-based mechanism. The OMG defined CORBA Event Service for asynchronous messaging, which provides a flexible channel for asynchronous communication among the distributed and collocated objects. In the existing Event Service channels are created manually by the developers or users to process and disseminate the events. Also, the channel management is static which may cause bottleneck in some channels. In this paper, thus, we propose a dynamic context-based channel management scheme by efficiently combining name service with event service. It is embedded in the CALM(Component- based Autonomic Layered Middleware) developed by us, which has been implemented based on ORB. Computer simulation reveals that the proposed approach significantly reduces the event delivery and processing time of the existing omni Event Service and TIBCO.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134230246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Keun-Sang Park, Young-deog Yun, Chang-Han Kim, S. Lee
{"title":"Comparison of the Task Performances with the Multi-display Computer","authors":"Keun-Sang Park, Young-deog Yun, Chang-Han Kim, S. Lee","doi":"10.1109/ICCSA.2007.44","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.44","url":null,"abstract":"For this study we are going to apply a type of computer tasks which are used in an actual control room. Subjects are supposed to perform the primary task (typing task watching the main monitor) and the secondary task (clicking targets with the mouse, which appear randomly in the sub-monitor) at the same time. The secondary tasks were differentiated with three different task intensities. During the experiment, the primary and secondary tasks were measured and evaluated depending on the intensities of the subtasks and the locations of the sub-monitors. Followings are the conclusions which were obtained after the evaluation: 1) The higher the task intensity is, the lower the task performance. 2) Regardless of the task intensity, the task performance of the subtask is high in the center of the monitor. When the task intensity is low, the center section of the monitor becomes the starting point for searching. 3) When the task intensity is high, the task performance in the left section of the monitor becomes low.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116536752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Restructuring E-learning With Ontologies","authors":"G. Kizilkaya, E. Torun, P. Aşkar","doi":"10.1109/ICCSA.2007.76","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.76","url":null,"abstract":"This paper examines the role of ontologies in the e-learning environments. A brief review of various ontologies is discussed in three areas: Learning design, learning content and learner profile. A new perspective for curriculum and instructional design is proposed.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126056659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Evaluation for Information Assurance","authors":"Yong-Tae Kim, G. Park, Tai-hoon Kim, Sang-ho Lee","doi":"10.1109/ICCSA.2007.55","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.55","url":null,"abstract":"In general, threat agents' primary goals may fall into three categories: unauthorized access, unauthorized modification or destruction of important information assets, and denial of authorized access. Security countermeasures are implemented to prevent threat agents from successfully achieving these goals. Because the general systems of today are composed of a number of components such as servers and clients, protocols, services, and so on, the possibility of success of attack may be increased. As though Systems connected to network have become more complex and wide, unfortunately, the researches for the systems are focused on the 'performance' or 'efficiency'. While most of the attention in system security has been focused on encryption technology and protocols for securing the data transaction, it is critical to note that a weakness (or security hole) in any one of the components may comprise whole system. Security engineering is needed for reducing security holes may be included in the Information systems. This paper proposes a method for securing the Information systems by evaluation of security functions of system component. This paper proposes Information system security evaluation and certification for achieving some level of assurance each owners of their Information systems want to get.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124156908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Youngtae Jo, Chongmyung Park, Joahyoung Lee, Inbum Jung
{"title":"Energy Effective Time Synchronization inWireless Sensor Network","authors":"Youngtae Jo, Chongmyung Park, Joahyoung Lee, Inbum Jung","doi":"10.1109/ICCSA.2007.43","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.43","url":null,"abstract":"Advance in processor, memory and wireless communication technique have led to an increase of economical and small wireless sensor nodes. To provide the right responses quickly for the diverse events, wireless sensor nodes have cooperation with together. For successful cooperation, the time synchronization among sensor nodes is an important requirement for application execution. In wireless sensor networks, message packets are used for the time synchronization. However, the transmission of message packets dissipates the battery energy of wireless sensor nodes. Since wireless sensor nodes works on the limited battery capacity, the excessive use of message packets has a negative impact upon their lifetime. In this paper, reference interpolation protocol is proposed for reducing the number of message packets for the time synchronization. The proposed method performs time interpolation between the time of reference packets and the global time of the base station. The proposed method completes the synchronization operation with only two message packets. Due to the simple synchronization procedure, our method greatly reduces the number of synchronization messages. From the decrease in the transmission of message packets, the convergence time among wireless sensor nodes is shortened and the lifetime of wireless sensor nodes is also prolonged as much as the amount of saved battery energy.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130041693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Topology Control Scheme for Avoiding Sensing Hole in Wireless Sensor Networks","authors":"Kyungjun Kim, Byung-Rae Cha","doi":"10.1109/ICCSA.2007.75","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.75","url":null,"abstract":"One of the main challenges in wireless sensor networks is to maximize network life time and to minimize power consumption. We propose an energy efficient mechanism for selecting active node which involved in sensing operation in a given dense field. This mechanism can reduce the communication cost by decreasing the number of sensing nodes in highly dense area. Our simulation results show that our mechanism reduces the number of transmitted packets the maximum 60% in dense sensing area.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121440938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jeong-Oog Lee, Seung-Jin Lee, Ho-Jun Lee, Jae-Woo Lee
{"title":"Development of a Database for Integrated Missile System Design in Web Services-based MDO Framework","authors":"Jeong-Oog Lee, Seung-Jin Lee, Ho-Jun Lee, Jae-Woo Lee","doi":"10.1109/ICCSA.2007.54","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.54","url":null,"abstract":"In this study, a database has been developed for integrated missile system design. The framework is based on Web services and Globus toolkit. Various analysis tools, optimization tools, database, and CAD are integrated into the missile MDO framework. The DB has been designed in a way where all the design related data can be shared among various analysis tools and optimization tools so that the required information can be transferred quickly.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124513949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jong Gu Lee, Eun Mi Kim, Cheol-Jung Yoo, Ok-Bae Chang
{"title":"Application and evaluation of edge detection system employing the ADD","authors":"Jong Gu Lee, Eun Mi Kim, Cheol-Jung Yoo, Ok-Bae Chang","doi":"10.1109/ICCSA.2007.64","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.64","url":null,"abstract":"In order to detect and locate edge features precisely in real images we have developed an algorithm by introducing a nonlocal differentiation of intensity profiles called adaptive directional derivative (ADD), which is evaluated independently of varying ramp widths. In this paper, we first develop the edge detector system employing the ADD and then, the performance of the algorithm is illustrated by comparing the results to those from the Canny's edge detector.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130666070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}