In this paper, we design and implement location information system and user mapping systemusing DSDV(Destination Sequenced Distance Vector) routing algorithm in ad-hoc networkenvironment to efficient manage a number of mobile devices. The software part in proposed systemconstruct ad-hoc network using DSDV routing algorithm and it activate alarm system, such asvibration, when one of devices disappears in the network. The hardware system, called u_LIN(User Location Information Node) construct ad-hoc network and it helps to find a disappeareddevice by using warning system. When we evaluate the performance of our prototype system, wehave checked a correct operation, within the range of 250m in case of 1:1 communication andwithin the range of 100m in case of 1:N communication. The implemented system in this paper ishighly expected to flexibly use in juvenile protection system, stray-child protection system, touristguide system and so on.
In this paper, the two-wheels robot using a predictive controller to maintain the balance of theposture control in real time have been examined. A reaction wheel pendulum control method isadopted to maintain the balance while the bicycle robot is driving. The objective of this researchwas to design and implement a self-balancing algorithm using the dsPIC30F4013 embeddedprocessor. To calculate the attitude in ARS using 2 axis gyro(roll, pitch) and 3 axis accelerometers(x, y, z). In this study, the disturbance of the posture for the asymmetrical propose to overcomethe predictive controller which was a problem in the control of a remote system by introducing the two wheels of the robot controller and the linear prediction of the system controller combines thesimulation was performed. Also, the robust characteristic for realizing the goal of designing a loopfilter too robust controller is designed so that satisfactory stability of the control system to improvestability of the system to minimize degradation of performance was confirmed.
In this paper, we propose a mobile application categorization method using word clusterinformation. Because the mobile application description can be shortly written, the proposedmethod utilizes the word cluster seeds as well as the words in the mobile application description,as categorization features. For the fragmented categories of the mobile applications, the proposedmethod generates the word clusters by applying the frequency of word occurrence per category toK-means clustering algorithm. Since the mobile application description can include someparagraphs unrelated to the categorization, such as installation specifications, the proposedmethod uses some word clusters useful for the categorization. Experiments show that the proposedmethod improves the recall (5.65%) by using the word cluster information.
This paper proposes a method of boosting-based classification for the purpose of real-time facedetection. The proposed method uses depth images to ensure strong performance of face detectionin response to changes in lighting and face size, and uses the depth difference feature to conductlearning and recognition through the I-MCTBoost classifier. I-MCTBoost performs recognition byconnecting the strong classifiers that are constituted from weak classifiers. The learning process for the weak classifiers is as follows: first, depth difference features are generated, and eight ofthese features are combined to form the weak classifier, and each feature is expressed as a binarybit. Strong classifiers undergo learning through the process of repeatedly selecting a specifiednumber of weak classifiers, and become capable of strong classification through a learning processin which the weight of the learning samples are renewed and learning data is added. This paperexplains depth difference features and proposes a learning method for the weak classifiers andstrong classifiers of I-MCTBoost. Lastly, the paper presents comparisons of the proposed classifiersand the classifiers using conventional MCT through qualitative and quantitative analyses toestablish the feasibility and efficiency of the proposed classifiers.
In this paper, we propose a robust lip detection algorithm using color clustering. At first, weadopt AdaBoost algorithm to extract facial region and convert facial region into Lab color space.
Because a and b components in Lab color space are known as that they could well express lip colorand its complementary color, we use a and b component as the features for color clustering. Thenearest neighbour clustering algorithm is applied to separate the skin region from the facial regionand K-Means color clustering is applied to extract lip-candidate region. Then geometriccharacteristics are used to extract final lip region. The proposed algorithm can detect lip regionrobustly which has been shown by experimental results.
In this paper, an improved two-step P2P traffic classification scheme is proposed to overcomethe limitations of the existing methods. The first step is a signature-based classifier at thepacket-level. The second step consists of pattern heuristic rules and a statistics-based classifier atthe flow-level. With pattern heuristic rules, the accuracy can be improved and the amount oftraffic to be classified by statistics-based classifier can be reduced. Based on the analysis ofdifferent decision tree algorithms, the statistics-based classifier is implemented with REPTree. Inaddition, the ensemble algorithm is used to improve the performance of statistics-based classifier. Through the verification with the real datasets, it is shown that our hybrid scheme provides higheraccuracy and lower overhead compared to other existing schemes.
This paper has proposed Hybrid QoS Routing Link State Update(LSU) Algorithm that has hada both advantage of LSU message control in periodic QoS routing LSU algorithm and QoS routingperformance in adaptive LSU algorithm. Hybrid LSU algorithm can adapt the threshold basednetwork traffic information and has the mechanism that calculate LSU message transmissionpriority using the flow of statistical request bandwidth and available bandwidth and determine thetransmission of the message according to update rate per a unit of time. We have evaluated theperformance of the proposed algorithm and the existing algorithms on MCI simulation networkusing the performance metric as the QoS routing blocking rate and the mean update rate per link, it thus appears that we have verified the performance of this algorithm that it can diminish to10% of the LSU message count.
We analyze the execution time of Reed-Solomon coding, which is the MAC-layer forward errorcorrection scheme used in CDMA2000 1xEV-DO broadcast services, under different air channel conditions. The results show that the time constraints of MPEG-4 cannot be guaranteed byReed-Solomon decoding when the packet loss rate (PLR) is high, due to its long computation timeon current hardware. To alleviate this problem, we propose three error control schemes. Our staticscheme bypasses Reed-Solomon decoding at the mobile node to satisfy the MPEG-4 time constraintwhen the PLR exceeds a given boundary. Second, dynamic scheme corrects errors in a best-effortmanner within the time constraint, instead of giving up altogether when the PLR is high; thisachieves a further quality improvement. The third, video-aware dynamic scheme fixes errors in asimilar way to the dynamic scheme, but in a priority-driven manner which makes the video appearsmoother. Extensive simulation results show the effectiveness of our schemes compared to theoriginal FEC scheme.
As the importance of big data analysis increases to improve the competitiveness of a corporate,a unified big data project development methodology is required in order to study the problem of acorporate in a systematic way and evaluate the problem w.r.t. a business value after solving theproblem. This paper propose Scientific Data Anslysis and Development methodology(SDAD) whichare integrated methodology of software development and project management for easier applicationinto a field project. SDAD consisits of 6 stages(problem definition stage, data preparation stage,model design stage, model development stage, result extraction stage, service development state),each stages has detailed processes(47) and productions(93). SDAD, furthermore, unified previous ISP, DW, SW development methodologies in terms of the data analysis and can easily interchangethe productions with them. This paper, lastly, introduces a way to assign responsible persons foreach process and provide communication procedures in RACI chart to improves the efficiency of theinteraction among professionals from different subjects. SDAD is applied to a Bigdata project inKorea Employment Information Services institution and the result turned out to be acceptablewhen evaluated by the supervision.
This study was conducted to investigate the impact of information technology resources andquality of information in logistics information system on logistics performance of logisticscompanies. The questionnaire targets IT manager of logistics companies. In the questionnairesurvey for empirical analysis, we conducted a survey and used 125 responses for statisticalanalysis to validate hypotheses. The results from the empirical model suggest that quality of information in logistics information system tend to be influence by IT resource. And firm's logisticsperformance is effected by the usefulness of quality of information in logistics information system.
Many businesses, government offices, educational institutions, according to the characteristicsof each business and information system is used. However, prevalence of smart phones and a widerange of mobile devices with services, which requires users with mobility, according to the latestmobile services and in many places, and is under development. Interworking between existingsystems and mobile systems to be set aside for the development cost and time, a waste of humanresources is getting worse. Also, in many places to provide mobile services to existing systems needto fix the problem is coming. In this paper, to solve the problem of interworking between existingsystems and mobile systems for the data transfer and processing of existing server, web services server, and mobile systems has been developed between the library.
This paper revises the Quine-McCluskey Algorithm to circuit minimization problems.
Quine-McCluskey method repeatedly finds the prime implicant and employs additional proceduressuch as trial-and-error, branch-and-bound, and Petrick’s method as a means of circuitminimization. The proposed algorithm, on the contrary, produces an implicant chart beforehand tosimplify the search for the prime implicant. In addition, it determines a set cover to streamline thesearch for 1st and 2nd essential prime implicants. When applied to 3-variable and 4-variableexperimental data, the proposed algorithm has indeed proved to obtain the optimal solutions muchmore simply and accurately than the Quine-McCluskey method.
This study is to suggest the theoretical and practical implications by analysing the moderatingeffects of social supports in the relationships between the elder abuse experience and mentalhealth. For this study, we sampled 270 of the elder abuse experience who has received councilservices for the aged. The results of this study showed that the elder abuse experience affect themental health significantly and social support moderates the relationship between the elder abuseexperience and the mental health. This study suggested some theoretical and practical implicationson the base of the results.
This study is to suggest ideas for policies and theories by analysing the control effectiveness ofparents’ raising attitude on the influence of adolescents’ self-control and Internet Expectation. Forthis, the questionnaire surveys composed of measures on adolescents’ self-control, InternetExpectation, and parents’ raising attitude, were carried out to 312 high school students in Gmetropolitan city, and the relation of the variables were studied. As a result of research, it wasfound out adolescents’ self-control and Internet Expectation influenced the internet addiction.
Expecially, the influence of adolescents’ self-control and Internet Expectation of internet addictionwas differed by the parent’s raising attitude. In this research, the ideas of policies were suggestedbased on the analysis of the results.
This study aims to draw the implication in improving middle school students' school adjustmentand suggest policy methods for their school adjustment depending on the degree of social support.
As a result of the research, it was found that middle school students' resilience factors such asself-control ability and interpersonal relationship ability had the influence on their impulsecontrol, self-esteem, communication and self-expansion ability on their social competence.
Emotional regulation, impulse control, self-esteem, communication and self-expansion ability had the influence on school adjustment. It was also known that middle school students' socialcompetence had high influence on their school adjustment and their self-expansion ability had thehighest influence on social competence. Middle school students' resilience factors such as emotionalregulation, empathy and self-expansion ability may be different in their influence on socialcompetence. Impulse control may be different depending on their school adjustment and a degree ofsocial support, and social competence may be different depending on their school adjustment and adegree of social support.
The lifelong education institute in Korea has given the stable groundwork of lifelong education,according to the enforcement of the lifelong education policy for the embodiment of the lifelongeducation society by Lifelong Education Act newly revised and promulgated in 2007. After that,the lifelong education in Korea has developed, getting the system. Therefore, in this point, thisstudy theoretically provided the history of the lifelong education institute, the content of LifelongEducation Act, and the current lifelong education institute. Above all, this study has significancethat it discussed the lifelong education institute in Korea in the comprehensive level.
The objective of this study is to weight analysis portable backpack system of infantry weaponsystems for ergonomic design in manual materials handling tasks. For the product design, weanalyzed the ergonomic guidelines and status of similar weapon systems by comparing the efficientoperation performance provide for the basic data. Result of this study, the relationship betweenportability and mobility presented for schematic. In the short distance of the short biomechanical criterion, 1-2 hours in the middle of moving psychophysical criterion, 4 hour or more long-distancecriterion applied for the physiological criterion for easy of trade-offs that need to be considered.
This study suggests for 4 research items for infantry backpack system in manual materialshandling tasks. Throughout the result of anthropometric populations, the 5%tile body weight for-0.91kg but 95%tile in 34.17kg considered to be margin for free, easy and efficient operation forthe weight margin between portability and mobility in manual materials handling tasks.
Cyberspace is closely related with one another, transcending the spacetime throughout theworld, and is already located in the most important area of our lives. However, if theorganizational cyber terror happens like the national paralysis crisis of major informationnetwork such as the previous 1.25 the Internet crisis, the possibility of cyber crisis highlydamaging our whole society such as the leakage of the national secrecy and advancedtechnology is increasing. But we haven’t set up the institutional procedure systematicallyperforming the national cyber security management affairs yet. So, in case of cyber crisis, thisis highly likely to damage the aspects of national and personal level. On this point, this study looks into the examples of legislation related to our cyber security, and suggests the implicationon the revision direction of national cyber security management regulations through relativeexamination about the examples of legislation in major countries.