Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2012, Vol.17, No.4

  • 1.

    A Study on the Estimation of Energy Expenditure and falls measurement system for the elderly

    임채영 | 전기만 | Ko, Kwang Cheol and 2other persons | 2012, 17(4) | pp.1~9 | number of Cited : 1
    Abstract PDF
    As we are turnning into the aged society, accidents by falling down are increasing in the aged people's group. In this paper, we design the system with the 3-Axis acceleration sensor which is composed by a single chip. The body activity signal is measured with the signal detector and RF communicator in this proposed system and the and falling by the entering signal pattern analysis with 3-Axis acceleration sensor. For the RF communication, we are using nRF24L01p and 8bits ATmega uC for the processor. The error of energy expenditure estimation between motor driven treadmill and proposed a body activity module was 7.8% respectively. Human activities and falling is monitored according to analyze and judge the critical value of the Signal Vector. as falled down if they don't turn off the alarm after specific period and the aged person's after falling down activities are their position and more.
  • 2.

    The Design and Implementation of Network Intrusion Detection System Hardware on FPGA

    김택훈 | SangKyun Yun | 2012, 17(4) | pp.11~18 | number of Cited : 1
    Abstract PDF
    Deep packet inspection which perform pattern matching to search for malicious patterns in the packet is most computationally intensive task. Hardware-based pattern matching is required for real-time packet inspection in high-speed network. In this paper, we have designed and implemented network intrusion detection hardware as a Microblaze-based SoC using Virtex-6 FPGA, which capture the network input packet, perform hardware-based pattern matching for patterns in the Snort rule, and provide the matching result to the software. We verify the operation of the implemented system using traffic generator and real network traffic. The implemented hardware can be used in network intrusion detection system operated in wire-speed.
  • 3.

    A Study on Application of STEAM education with Robot in Elementary School

    PARK JUNG HO | 2012, 17(4) | pp.19~29 | number of Cited : 21
    Abstract PDF
    According to the result of PISA and TIMSS, it was reported that interest for Math and Science was far lower compared to high achievement of Them. The purpose of this study is to investigate effects of robot based STEAM education on elementary school students' Math learning behavior and Science motivation. Robot based STEAM education integrated science, mathematics and art with a theme of 'Energy' was practiced for test group and For control group, those three subjects were taught separately in order to achieve this purpose. Curriculum of fourth grade second semester's science, mathematics and art was analysed to teach a robot based STEAM class and STEAM class Model with the theme 'Energy was designed and applied to elementary students. In science class, heat transfer experiment was conducted with robots and the result was related to drawing polygonal lines in mathematics. In art class, robot components were used to describe the heat energy in shapes and colors. The research shows that students' Math learning behavior and Science motivation were improved more with robot based STEAM education than with traditional lessons(p<.05). It proves that robot based STEAM class can be effective for improving interest in elementary Math and Science.
  • 4.

    A Study on Comparison of Road Surface Images to Provide Information on Specific Road Conditions

    EunGyeom Jang | 2012, 17(4) | pp.31~39 | number of Cited : 2
    Abstract PDF
    On rainy days, water films form on wet road surfaces and reduce the braking force of vehicles, which often ends up in accidents. For safe driving, the road information signage provides information on road and weather conditions warning drivers of wet road conditions. Still, current information on road conditions is neither localized nor detailed but universal. The present study used the images on CCTVs installed on roads to compare the images of road surfaces in an attempt to suggest a mechanism determining factors that hamper safe driving based on the images. In the image comparison, a normal road image taken on a sunny day is used as an original image, against which road conditions occurring on rainy days are categorized and determined on a case-by-case basis to provide drivers with early warning for the sake of safe driving.
  • 5.

    Detection of Gradual Scene Boundaries with Linear and Circular Moving Borders

    Jang Seok-Woo | Seong-Yun Cho | 2012, 17(4) | pp.41~49 | number of Cited : 0
    Abstract PDF
    This paper proposes a detection method of wipes including horizontal wipes with linear moving borders, such as horizontal or vertical wipes, Barn Doors, and Iris Rounds with circular moving borders. The suggested method first obtains a difference image between two adjacent frames, and extracts lines and circles by applying Hough transformation to the extracted difference image. Then, we detect wipe transitions by employing an evaluation function that analyzes the number of moving trajectories of lines or circles, their moving direction and magnitude. To evaluate the performance of the suggested algorithm, experimental results show that the proposed method can effectively detect wipe transitions with linear and circular moving borders rather than some existing methods.
  • 6.

    The Enhancement of the Boundary-Based Depth Image

    안양근 | Jiman Hong | 2012, 17(4) | pp.51~58 | number of Cited : 0
    Abstract PDF
    Recently, 3D technology based on depth image is widely used in various fields including 3D space recognition, image acquisition, interaction, and games. Depth camera is used in order to produce depth image, various types of effort are made to improve quality of the depth image. In this paper, we suggests using area-based Canny edge detector to improve depth image in applying 3D technology based on depth camera. The suggested method provides improved depth image with pre-processing and post-processing by fixing image quality deterioration, which may take place in acquiring depth image in a limited environment. For objective image quality evaluation, we have confirmed that the image is improved by 0.42dB at maximum, by applying and comparing improved depth image to virtual view reference software. In addition, with DSCQS(Double Stimulus Continuous Quality Scale) evaluation method, we are reassured of the effectiveness of improved depth image through objective evaluation of subjective quality.
  • 7.

    Dried pepper sorting using independent component analysis on RGB images

    Ki-Hyeon Kwon | 임정대 | 2012, 17(4) | pp.59~65 | number of Cited : 0
    Abstract PDF
    Hot pepper can be easily faded or discolored in drying process, so we need to use the sorting technique to improve the quality for dried hot pepper. Independent Component Analysis (ICA) is one of the most widely used methods for blind source separation. In this paper we use this technique to get a concentration image of the most important component which plays a role in the dried pepper. This concentration image is different from the binary image and it reflects the characteristics of major components, so that we know the distribution and quality of the component and how to sort the dried pepper. Also, the size of the concentration image can tell the relation with capsaicinoids which make hot taste. We propose a sorting method of the dried hot pepper that is faded or discolored and lacked a major component likes capsaicin in drying process using ICA concentration image.
  • 8.

    Dynamic Modeling of Eigenbackground for Object Tracking

    SungYoung Kim | 2012, 17(4) | pp.67~74 | number of Cited : 2
    Abstract PDF
    In this paper, we propose an efficient dynamic background modelling method by using eigenbackground to extract moving objects from video stream. Even if a background model has been created, the model has to be updated to adapt to change due to several reasons such as weather or lighting. In this paper, we update a background model based on R-SVD method. At this time we define a change ratio of images and update the model dynamically according this value. Also eigenbackground need to be modelled by using sufficient training images for accurate models but we reorganize input images to reduce the number of images for training models. Through simulation, we show that the proposed method improves the performance against traditional eigenbackground method without background updating and a previous method.
  • 9.

    The Motion Artifact Reduction using Periodic Moving Average Filter

    Lee Jun Yeon | 2012, 17(4) | pp.75~82 | number of Cited : 1
    Abstract PDF
    The Photoplethysmogram is a similar periodic signal that synchronized to a heartbeat. In this paper, we propose a periodic moving average filter that use similarity of Photoplethysmogram. This filtering method has the average value of each samples through separating the cycle of PPG signal. If there are some motion artifacts in continuous PPG signal, disjoin the signal based on cycle. And then, we made these signals to have same cycle by coordinating the number of sample. After arrange these cycles in 2 dimension, we put the average value of each samples from starting till now. So, we can eliminate the motion artifacts without damaged PPG signal.
  • 10.

    A Comprehensive Performance Evaluation in Collaborative Filtering

    Seokjong Yu | 2012, 17(4) | pp.83~90 | number of Cited : 4
    Abstract PDF
    In e-commerce systems that deal with a large number of items, the function of personalized recommendation is essential. Collaborative filtering that is a successful recommendation algorithm, suffers from the sparsity, cold-start, and scalability restrictions. Additionally, this work raises a new flaw of the algorithm, inconsistent performance of recommendation. This is also not measurable by the current MAE-based evaluation that does not consider the deviation of prediction error, and furthermore is performed independently of precision and recall measurement. To evaluate the collaborative filtering comprehensively, this work proposes an extended evaluation model that includes the current criteria such as MAE, Precision, Recall, deviation, and applies it to cluster-based combined collaborative filtering.
  • 11.

    Yi et al.’s Group Key Exchange Protocol : A Security Vulnerability and its Remediation

    Youngsook Lee | 김지연 | Dongho Won | 2012, 17(4) | pp.91~98 | number of Cited : 1
    Abstract PDF
    A group key exchange (GKE) protocol is designed to allow a group of parties communicating over a public network to establish a common secret key. As group-oriented applications gain popularity over the Internet, a number of GKE protocols have been suggested to provide those applications with a secure multicast channel. Among the many protocols is Yi et al.’s password-based GKE protocol in which each participant is assumed to hold their individual password registered with a trusted server. A fundamental requirement for password-based key exchange is security against off-line dictionary attacks. However, Yi et al.’s protocol fails to meet the requirement. In this paper, we report this security problem with Yi et al.’s protocol and show how to solve it.
  • 12.

    Group Mobility Control Mechanism for Micro Unmanned Aerial Vehicle

    남수현 | 최명환 | Hyohyun Choi | 2012, 17(4) | pp.99~107 | number of Cited : 0
    Abstract PDF
    We propose control mechanism of UAV(Unmanned Aerial Vehicle) group for making the communication network to the base station after the target is found. We assume UAVs can communicate to each other by wireless LAN without existing communication infrastructure. UAVs started to fly in linear formation, after finding target, UAVs move to the base station to send the information about the target. At least one UAV stays the position that the target is found. This paper explains the mechanism supporting reliable connectivity during UAV group's flying. We verify the proposed scheme and evaluate the performance through NS-2 simulation. The proposed scheme can be applied to the disaster area and war zone, which the existing communication infrastructure cannot be worked.
  • 13.

    A Study on the User Context Awareness based on the Smart Phone

    김기백 | 장원석 | 최재완 and 2other persons | 2012, 17(4) | pp.109~119 | number of Cited : 3
    Abstract PDF
    As it is developing and growing up the mobile telecommunication, commercial mobile, and the application on it, the smart phone is attracting public attention techniques, hereafter. In this paper, we can make the context-awareness platform to supply users with the interface for their appropriate contexts using the smart phone. Therefore, we use the sensors in the smart phone, and the values from them are analyzed. As a result, we can estimate the user's contexts, such as the sitting and standing, movement, the lights, positions, locations, etc. In addition, we happen the suitable events from them for users. Therefore, we can provide the perspective interfaces for them. In addition, to prove the more efficiency of the proposed platform, we implemented the shooting game, and could know that the performance is the more advanced than the others. The proposed algorithm can be used for the mobile environments, which high efficiency is required such as the game, or the implementation of mobile applications which are more efficient to the user interfaces, etc.
  • 14.

    A Framework for Biometric Security based on OTP in Mobile Devices

    SeungJin Han | 2012, 17(4) | pp.121~127 | number of Cited : 2
    Abstract PDF
    Biometric technology has been proposed as a new means to replace conventional PIN or password because it is hard to be lost and has the low possibility of illegal use. However, unlike a PIN or password, there is no way to modify the exposure if it is exposed and used illegally. To solve the problems, we propose to apply OTP using biometric information to mobile devices for more secure and adaptable authentication. In this paper, we propose a secure framework for delivering biometric information as mobile OTP to the server (TTP) and compared this paper with existed methods about security and performance.
  • 15.

    Performance Improvement of Queen-bee Genetic Algorithms through Multiple Queen-bee Evolution

    Sung-Hoon Jung | 2012, 17(4) | pp.129~137 | number of Cited : 0
    Abstract PDF
    The queen-bee genetic algorithm that we made by mimicking of the reproduction of queen-bee has considerably improved the performances of genetic algorithm. However, since we used only one queen-bee in the queen-bee genetic algorithm, a problem that individuals of genetic algorithm were driven to one place where the queen-bee existed occurred. This made the performances of the queen-bee genetic algorithm degrade. In order to solve this problem, we introduce a multiple queen-bee evolution method by employing another queen-bee whose fitness is the most significantly increased than its parents as well as the original queen-bee that is the best individual in a generation. This multiple queen-bee evolution makes the probability of falling into local optimum areas decrease and allows the individuals to easily get out of the local optimum areas even if the individuals fall into a local optimum area. This results in increasing the performances of the genetic algorithm. Experimental results with four function optimization problems showed that the performances of the proposed method were better than those of the existing method in the most cases.
  • 16.

    Quicksort Using Range Pivot

    Sang-Un, Lee | 2012, 17(4) | pp.139~145 | number of Cited : 2
    Abstract PDF
    Generally, Quicksort selects the pivot from leftmost, rightmost, middle, or random location in the array. This paper suggests Quicksort using middle range pivot and continually divides into 2. This method searches the minimum value and maximum value in the length of list . Then compute the initial pivot key and swaps until or . After the swap, the length of list separates in two lists and and the pivot values are selected by . This process repeated until the length of partial list is two. At the length of list is two and , swaps as . This method is simpler pivot key process than Quicksort and improved the worst-case computational complexity to .
  • 17.

    The Impact of Cumulative Effcet of Cash Donation on Business Performance

    김형구 | 2012, 17(4) | pp.147~153 | number of Cited : 3
    Abstract PDF
    This paper has investigated the impact of corporate donation expenditure which has recently drawn great attention in Korean society on businessl performance and conducted an empirical analysis on the causal relations. In addition, concurrent effect has been analyzed using cross-sectional data between two variables (corporate donation expenditure and business performance) while sequential effect has been examined using panel data. The result of this study can be summarized as follows:First, corporate donation expenditure had a positive impact on ROA and ROS. However, PER and ROE had no impact on corporate donation expenditure Second, cumulative effcet of corporate cash donation would have a bigger impact on short-term business performance than long-term performance. In the future, The results of this study is expect through cash donations in the social contribution to be more aggressive in carrying out social responsibilities.
  • 18.

    A Study on the Effect of Core Competencies and Value Innovation Strategies on Business Performance in the Manufacturing Industries

    RHO, HYUNG JIN | 2012, 17(4) | pp.155~161 | number of Cited : 13
    Abstract PDF
    The purpose of this paper is to analyze the structural relationship of the impact on the business performance when it pursues resource based production strategies, nurtures core competency, develops core product lines and innovate its business models as part of a strategy of value innovation and to validate how the nurturing core competency can have an impact on the execution of the value innovation strategies. This paper confirms that there is a structural relationship, which is logically and conceptually valid, among the core competence, value innovation strategies and business performance of manufacturing companies. In order to maximize the business performance which is the eventual objective of a company, it must strategically nurture its core competence, which will be a main driver of the future competitiveness and diversify its management based on the value innovation strategies.
  • 19.

    A study of improved ways of the predicted probability to criminal types

    정영석 | Jin Mook Kim | Park Koo Rack | 2012, 17(4) | pp.163~172 | number of Cited : 7
    Abstract PDF
    Modern society, various great strength crimes are producing. After all crimes happen, it is most important that prevent crime beforehand than that cope. So, many research studied to prevent various crime. However, existing method of studies are to analyze and prevent by society and psychological factors. Therefore we wishes to achieve research to forecast crime by time using Markov chain method. We embody modelling for crime occurrence estimate by crime type time using crime occurrence number of item data that is collected about 5 great strength offender strength, murder, rape, moderation, violence. And examined propriety of crime occurrence estimate modelling by time that propose in treatise that compare crime occurrence type crime occurrence estimate price and actuality occurrence value. Our proposed crime occurrence estimate techniques studied to apply maximum value by critcal value about great strength crime such as strength, murder, rape etc. actually, and heighten crime occurrence estimate probability by using way to apply mean value about remainder crime in this paper. So, we wish to more study about wide crime case and as the crime occurrence estimate rate and actuality value by time are different in crime type hereafter applied examples investigating.
  • 20.

    A Quantitative Method for Quality Improvement of Information System Audit Evaluation

    Lee,Ki-Young | 김영호 | KI JOON HAN | 2012, 17(4) | pp.173~184 | number of Cited : 5
    Abstract PDF
    As a result of the compulsory of information system audit and a rise in audit demand, the quality improvement of information system audit is being emphasized. However, since the current information system audit heavily depends on the auditor's experience, skill, and subjective judgments, it incurs distrust in the objectivity and reliability of audit results from audit interest person. Furthermore, so far research activities aimed at securing the objectivity and reliability of audits have not been adequately carried out. Therefore, this paper presents a quantitative method for information system audit evaluation in order to contribute to the quality improvement of overall information system audit through securing compliance, objectivity, and reliability of information system audit. The quantitative method is largely composed of two sectors, such as evaluation areas and items, scores calculation for evaluation items, and can generally apply the information system audit standard to information system audit evaluation.