Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

http://journal.kci.go.kr/jksci
Home > Explore Content > All Issues > Article List

2013, Vol.18, No.6

  • 1.

    Design and Implementation of Firmware for Low-cost Small PCR Devices

    Wan Yeon Lee , 김종대 | 2013, 18(6) | pp.1~8 | number of Cited : 1
    Abstract PDF
    In this paper, we design and implement a firmware for low-cost small PCR devices. To minimize machine code size, the proposed firmware controls real-time tasks simultaneously only with support of the hardware interrupt, but without support of the operating system program. The proposed firmware has the host-local structure in which the firmware receives operation commands from PC and sends operation results to PC through usb communication. We implement a low-cost small PCR device with the proposed firmware loaded on microchip PIC18F4550 chip, and verify that the implemented PCR device significantly reduces cost and volume size of existing commercial PCR devices with a similar performance.
  • 2.

    Fuzzy ∞ Filtering for Discrete-Time Nonlinear Markovian Jump Systems with State and Output Time Delays

    Kap Rai Lee | 2013, 18(6) | pp.9~19 | number of Cited : 0
    Abstract PDF
    This paper deals with fuzzy ∞ filtering problem of discrete-time nonlinear Markovian jump systems with state and output time delays. The purpose is to design fuzzy ∞ filter such that the corresponding estimation error system with time delays and initial state uncertainties is stochastically stable and satisfies an ∞ performance level. A sufficient condition for the existence of fuzzy ∞ filter is given in terms of matrix inequalities. In order to relax conservatism, a stochastic mode dependent fuzzy Lyapunov function is employed. The Lyapunov function not only is dependent on the operation modes of system, but also includes the fuzzy membership functions. An illustrative example is finally given to show the applicability and effectiveness of the proposed method.
  • 3.

    Fire Detection Approach using Robust Moving-Region Detection and Effective Texture Features of Fire

    Truc Kim Thi Nguyen , 강명수 , Cheol Hong Kim and 1 other persons | 2013, 18(6) | pp.21~28 | number of Cited : 0
    Abstract PDF
    This paper proposes an effective fire detection approach that includes the following multiple heterogeneous algorithms: moving region detection using grey level histograms, color segmentation using fuzzy c-means clustering (FCM), feature extraction using a grey level co-occurrence matrix (GLCM), and fire classification using support vector machine (SVM). The proposed approach determines the optimal threshold values based on grey level histograms in order to detect moving regions, and then performs color segmentation in the CIE LAB color space by applying the FCM. These steps help to specify candidate regions of fire. We then extract features of fire using the GLCM and these features are used as inputs of SVM to classify fire or non-fire. We evaluate the proposed approach by comparing it with two state-of-the-art fire detection algorithms in terms of the fire detection rate (or percentages of true positive, PTP) and the false fire detection rate (or percentages of true negative, PTN). Experimental results indicated that the proposed approach outperformed conventional fire detection algorithms by yielding 97.94% for PTP and 4.63% for PTN, respectively.
  • 4.

    An Energy Balanced Multi-Hop Routing Mechanism considering Link Error Rate in Wireless Sensor Networks

    이현석 , 허정석 | 2013, 18(6) | pp.29~36 | number of Cited : 0
    Abstract PDF
    In wireless sensor networks, energy is the most important consideration because the lifetime of the sensor node is limited by battery. Most of the existing energy efficient routing protocols use the minimum energy path to minimize energy consumption, which causes an unbalanced distribution of residual energy among nodes. As a result, the power of nodes on energy efficient paths is quickly depletes resulting in inactive. To solve these problems, a method to equalize the energy consumption of the nodes has been proposed, but do not consider the link error rate in the wireless environment. In this paper, we propose a uniform energy consumption of cluster-based multi-hop routing mechanism considering the residual energy and the link error rate. This mechanism reduces energy consumption caused by unnecessary retransmissions and distributes traffic evenly over the network because considering the link error rate. The simulation results compared to other mechanisms, the proposed mechanism is energy-efficient by reducing the number of retransmissions and activation time of all nodes involved in the network has been extended by using the energy balanced path
  • 5.

    An Optimization Rule for Channel Assignment Problem (CAP)

    Sang-Un, Lee | 2013, 18(6) | pp.37~45 | number of Cited : 1
    Abstract PDF
    In the absence of a single deterministic rule for the channel assignment problems, heuristic algorithms are predominantly employed to partly solve the problems. This paper thus proposes deterministic rules for the channel assignment problems. These deterministic rules have successfully yielded the optimal solution when applied to the Philadelphia’s 9 case examples.
  • 6.

    Digital Tachograph Vehicle Data Digital Authentication System

    Joon-Gyu Kang , Yoowon Kim , 임웅택 and 1 other persons | 2013, 18(6) | pp.47~54 | number of Cited : 4
    Abstract PDF
    In this paper, we proposed an efficient digital authentication service system for the vehicle data collected from digital tachograph. In domestic, There is no method available to verify that information has not been forged and reliable information for collected vehicle data. The proposed method in this paper can prove transmitted vehicle data that have not been forged using the signature value. The signature value of digital authentication is produced with the digital signature generation key after obtaining the hash value of vehicle data. It is achieved through checking the stored hash value and the hash value match that is obtained with the digital signature verification key from the digital signature value. We confirmed the proposed system can ensure reliability of vehicle data through the system implementation and experiment.
  • 7.

    Extraction of Sexual Assault to Women in Elevator Using Average Intensity Measure

    SeongYoon Shin , Lee Hyun Chang , Rhee Yang Weon | 2013, 18(6) | pp.55~61 | number of Cited : 0
    Abstract PDF
    TSexual violence is physical and mental violence that violates the sexual self-determination contrary to the intention of the other party such as rape, forced molestation, sexual harassment,caught hidden camera. It is one of the many criminal acts that male is perpetrators and female is victims. Sexual harassment, one of the sexual violence is forced sexual harassment. It is considered a color frame where each pixel has 3 color components such that RGB. The averaging the absolute difference between the current frame and te next frame is divided by the absolute difference between the current frame and the previous frame. If there was a difference between the frame pair before a scene change the discontinuity value indicating a scene change could be relatively small. Therefore, Thus, the use of the redefined equation and redefined algorithm can be seen as it is much more good via experiment.
  • 8.

    An Object-Oriented Analysis and Design Methodology for Secure Database Design -focused on Role Based Access Control-

    Joo Kyung-Soo , 우정웅 | 2013, 18(6) | pp.63~70 | number of Cited : 2
    Abstract PDF
    In accordance with the advancement of IT, application systems with various and complex functions are being required. Such application systems are typically built based on database in order to manage data efficiently. But most object-oriented analysis·design methodologies for developing web application systems have not been providing interconnections with the database. Since the requirements regarding the security issues increased, the importance of security has become emphasized. However, since the security is usually considered at the last step of development, it is difficult to apply the security during the whole process of system development,from the requirement analysis to implementation. Therefore, this paper suggests an object-oriented analysis and design methodology for secure database design from the requirement analysis to implementation. This object-oriented analysis and design methodology for secure database design offers correlations with database that most existing object-oriented analysis and design methodologies could not provide. It also uses UMLsec,the modeling language, to apply security into database design. In addition, in order to implement security, RBAC (Role Based Access Control) of relational database is used.
  • 9.

    3-layer 2.5D Metabolic pathway layout algorithm

    송은하 , slyong | 2013, 18(6) | pp.71~79 | number of Cited : 0
    Abstract PDF
    Metabolic pathway, represented by well-displayed graph, have a complex binding structure,which makes the graphical representation hard to visualize. To apply automatic graph layout techniques to the genome-scale metabolic flow of metabolism domains, it is very important to reduce unnecessary edge crossing on a metabolic pathway layout. we proposed a metabolic pathway layout algorithm based on 3-layer layout. Our algorithm searches any meaningful component existing in a pathway, such as circular components, highly connected nodes, and the components are drawn in middle layer. Then the remaining subgraphs except meaningful components are drawn in upper and lower layer by utilizing a new radial layout algorithm. It reduces ultimately reduced the number of edge crossings. Our algorithm solve the problem that edge crossings exponentially increase as the number of nodes grows.
  • 10.

    An Analysis of customer satisfaction for shopping mall using multi LS-SVM : Focused on the Perception of Chinese Students in Korea

    SuYoung Pi , 박혜정 , Young-Jik Kwon | 2013, 18(6) | pp.81~89 | number of Cited : 3
    Abstract PDF
    Currently Internet shopping (or shopping online) is becoming the common consumption channel for Chinese, and it is more likely to continue to grow. Although E-tailers (or the Internet shopping mall) in China is rapidly growing, there are not very many shopping malls that can meet customer satisfaction. E-tailers in Korea analyze the quality evaluation and customer satisfaction of shopping malls. If the Internet shopping that is suitable for Chinese students studying in Korea is built, it is expected to strengthen international competitive power. In this paper, the comparative analysis of Customer satisfaction for Internet shopping between Chinese students studying in Korea and Korean university students is provided. Furthermore, we analyze the customer satisfaction model of Chinese students studying in Korea by using the multi lease square support vector machine that obtains the global optimal solution. Analysis of customer satisfaction of Chinese students studying in Korea are not only used for E-tailers in Korea, but it can strengthen international competitive power.
  • 11.

    The Efficient Management Method about the Workers of the Welfare Facilities for Improving the Quality of Elderly Medical Service

    Cho Woo Hong , PARK CHUN GYU , son myoung dong | 2013, 18(6) | pp.91~99 | number of Cited : 0
    Abstract PDF
    This study has a purpose of analyzing the difference of care giver’s subjective awareness of self-efficacy and job satisfaction according to the types of welfare facilities, before studying the structural relationship between the management variables about workers at the welfare facilities for improving the quality of elderly medical welfare service. As a result of empirical analysis, there was no awareness difference of care givers according to the types of the elderly medical welfare facilities, but in general it was emphasized that the care givers’ satisfaction with self-efficacy and job satisfaction was very essential in providing the elderly medical service. Therefore, this study has significance that it provided the theoretical fundament for efficient management method about the workers of the elderly medical welfare facilities.
  • 12.

    Life design education, the aging of the baby boomers Study

    Choi Young Ho , 전성남 | 2013, 18(6) | pp.101~109 | number of Cited : 11
    Abstract PDF
    Applicable life cycle phase in midlife baby boomers. These, as well as support one parent without the loss of stable employment and income-based children's education and their retirement should be ready at the same time to double, triple economic burdened. Recently in the preparation of these non-retirement and retirement is a major concern. This study we want to look at the characteristics of the baby boomer generation, retirement life planning education status of the country and abroad, retirement life planning program to revitalize the aging of the baby boomer generation life design education. Retirement life planning for raising awareness and design education in the baby boomer life, specifically, how to realize how microscopic analysis to explore the policy and practical alternatives
  • 13.

    Reexamination of the Cyber Insult Crime For securing the Internet Ethics

    Jae Nam Kim , Jong-Ryeol Park | 2013, 18(6) | pp.111~120 | number of Cited : 0
    Abstract PDF
    Recently, in the cyberspace, the posts that have only insults and abuses without the fact are getting spread rapidly as a trend, it makes the damage to people also, and the social concerns have been raised about its phenomenon. Meanwhile, because of the insulting actions that performed in cyberspace, the results of infringement of personal rights conditions getting difficult to repair. Also, it is difficult to find who the person who acts as a perpetrator is. So, it is hard to report a crime or sued for damages, also, it is really difficult to deal with a criminal contempt. Also, cause of a lot of deficient areas, the Cyber Insult Crime act is need and strengthened penalties or Mitigation about the crime subject to victim's complaint are need. However, give the criminal penalties to criminal is sufficient. So, to construct a new special criminal law, it is not advisable. Thus, governed by the Criminal Code Section 311 is preferably.