Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2015, Vol.20, No.3

  • 1.

    Wi-Fi Directional Test Simplification for Smart Set-Top Box Based on Pair-Wise Testing

    Jae Chul Lee | Kim, yoon | 2015, 20(3) | pp.1~8 | number of Cited : 1
    Abstract PDF
    The most used smart set-top box in home driven by the Android OS and based on Wi-Fi technologyhas to ensure nothing wrong with the Wi-Fi service regardless of the various user's installationenvironment. The direction test method about the nondirectional of the Wi-Fi doesn't be determined as the standard and each manufacturers devise the their own test methods and conduct the tests. In this paper,we created the 720 test cases considering 2 components of upload & download, the 10 elements of thevertical angle and the 36 elements of the horizontal angle looking at the wireless router in order to verifyomni-directional Wi-Fi capability. In reality, from viewpoint in terms of cost and time constraint, it isdifficult to test all the test cases. Therefore, we decided to reduce test cases by applying Pair-wisetesting technique which is one of combinational testing techniques based on ISO / IEC 29119-4. And weobtained the test cases in which the Pair-wise technique was applied by Allpairs tool which output testcases automatically and conducted the test. It could be confirmed that the proposed technique shortened48.61% of the time to be spent in progressing the existing test cases and that the trace about the part inwhich the problem was generated with the result of the simplified test case was possible enough.
  • 2.

    An Ontology-Based Hazard Analysis and Risk Assessment for automotive functional safety

    노경현 | LEE KEUM SUK | 2015, 20(3) | pp.9~17 | number of Cited : 2
    Abstract PDF
    The ISO 26262 standard requires a preliminary hazard analysis and risk assesment early in thedevelopment for automotive system. This is a first step for the development of an automotive system todetermine the necessary safety measures to be implemented for a certain function. In this paper, wepropose an ontology-based hazard analysis and risk assessment method for automotive functional safety. We use ontology to model the hazard and SWRL(Semantic Web Language) to describe risk analysis. Theapplicability of the proposed method is evaluated by the case study of an ESCL(electronic steering columnlock) system. The result show that ontology deduction is useful for improving consistency and accuracy ofhazard analysis and risk assessment.
  • 3.

    Learning Wind Speed Forecast Model based on Numeric Prediction Algorithm

    Seyoung Kim | Jeongmin Kim | RYU, KWANG RYEL | 2015, 20(3) | pp.19~27 | number of Cited : 0
    Abstract PDF
    Technologies of wind power generation for development of alternative energy technology have beenaccumulated over the past 20 years. Wind power generation is environmentally friendly and economicalbecause it uses the wind blowing in nature as energy resource. In order to operate wind power generationefficiently, it is necessary to accurately predict wind speed changing every moment in nature. It isimportant not only averagely how well to predict wind speed but also to minimize the largest absolute error between real value and prediction value of wind speed. In terms of generation operating plan,minimizing the largest absolute error plays an important role for building flexible generation operating planbecause the difference between predicting power and real power causes economic loss. In this paper, wepropose a method of wind speed prediction using numeric prediction algorithm-based wind speed forecastmodel made to analyze the wind speed forecast given by the Meteorological Administration and patternvalue for considering seasonal property of wind speed as well as changing trend of past wind speed. Thewind speed forecast given by the Meteorological Administration is the forecast in respect to comparativelywide area including wind generation farm. But it contributes considerably to make accuracy of wind speedprediction high. Also, the experimental results demonstrate that as the rate of wind is analyzed in moredetail, the greater accuracy will be obtained.
  • 4.

    SPARQL-DL Processor to Extract OWL Ontologies from Relational Databases

    ji Woong Choi | Myung Ho Kim | 2015, 20(3) | pp.29~45 | number of Cited : 0
    Abstract PDF
    This paper proposes an implementation of SPARQL-DL, which is a query language for OWL ontologies,for query-answering over the OWL ontologies virtually generated from existing RDBs. The proposedSPARQL-DL processor internally translates input SPARQL-DL queries into SQL queries and then executesthe translated queries. There are two advantages in the query processing method. First, another repositoryto store OWL ontologies generated from RDBs is not required. Second, a large ABox generated from anRDB instance is able to be served without using Tableau algorithm based reasoners which have a problem in large ABox reasoning. Our algorithm for query rewriting is designed to create one corresponding SQLquery from one input SPARQL-DL query to minimize the overhead by establishing connections with RDBs.
  • 5.

    Predicting Interesting Web Pages by SVM and Logit-regression

    Jun,Do-Hong | 김형래 | 2015, 20(3) | pp.47~56 | number of Cited : 0
    Abstract PDF
    Automated detection of interesting web pages could be used in many different application domains. Determining a user’s interesting web pages can be performed implicitly by observing the user’s behavior. The task of distinguishing interesting web pages belongs to a classification problem, and we choose whitebox learning methods (fixed effect logit regression and support vector machine) to test empirically. Theresult indicated that (1) fixed effect logit regression, fixed effect SVMs with both polynomial and radialbasis kernels showed higher performance than the linear kernel model, (2) a personalization is a criticalissue for improving the performance of a model, (3) when asking a user explicit grading of web pages, the scale could be as simple as yes/no answer, (4) every second the duration in a web page increases, theratio of the probability to be interesting increased 1.004 times, but the number of scrollbar clicks (p=0.56)and the number of mouse clicks (p=0.36) did not have statistically significant relations with the interest.
  • 6.

    Target Geolocation Method Using Target Detection in Infrared Images

    김재협 | 정준호 | 서정재 and 2other persons | 2015, 20(3) | pp.57~67 | number of Cited : 1
    Abstract PDF
    In this paper, we proposed the geolocation method using target detection information in infrared images. Our method was applied to geolocation system of hostile targets in ground-to-ground field. The majordistortion that has bad effect of geolocation was composed of optic, topography, GPS(Global PositioningSystem) and IMU(Inertial Measurement Unit) of reconnaissance unit. We proposed enhanced geolocationmethod to cope with optic and topography distortion using polynomial fitting and slant-range calculationmodel to overcome earth curvature problem, and the result showed that the performance of our methodwas good for system requirements.
  • 7.

    Experimental Proof for Symmetric Ramsey Numbers

    Sang-Un, Lee | 2015, 20(3) | pp.69~74 | number of Cited : 0
    Abstract PDF
    This paper offers solutions to unresolved 43 ≤ R(5,5) ≤ 49and 102 ≤ R(6,6) ≤ 165 problems ofRamsey’s number. The Ramsey’s number R(s,t) of a complete graph Kn dictates that n-1 number ofincidental edges of a arbitrary vertex v is dichotomized into two colors:(n-1)/2=R and (n-1)/2=B . Therefore, if one introduces the concept of distance to the vertex , one may construct a partite graph Kn = KL + v + KR , to satisfy (n-1)/2=R of {KL,v} and (n-1)/2=B of {v,KR}. Subsequently, given that KL forms the color R of Ks-1 , Ks is attainable. Likewise, given that KR forms the color B of Kt-1 , Kt is obtained. By following the above-mentioned steps, R(s,t) = Kn was obtained, satisfying necessary andsufficient conditions where, for KL and KR , the maximum distance should be even and incidental edges ofall vertices should be equal are satisfied. This paper accordingly proves R(5,5)=43 and R(6,6) = 91.
  • 8.

    A Study on the Definition of Security Requirements of Vulnerability Management in Analysis Step

    SeongYoon Shin | Lee Hyun Chang | 2015, 20(3) | pp.75~80 | number of Cited : 1
    Abstract PDF
    Vulnerability management is in compliance with security policies, and then, this is to ensure thecontinuity and availability of the business . In this paper, the application vulnerability management and ITinfrastructure of the system is that it must be identified. And a viable vulnerability management plan shouldbe drawn from the development phase. There are many that are not defined vulnerability in the area ofidentification and authentication, encryption, access control in identification and classification ofvulnerabilities. They define the area without missing much in technical, managerial, and operational pointof view. Determining whether the response of the identified vulnerability, and to select a countermeasurefor eliminating the vulnerability.
  • 9.

    A study on the classification systems of domestic security fields

    Jeong Hoon Jeon | 2015, 20(3) | pp.81~88 | number of Cited : 5
    Abstract PDF
    Recently the Security fields is emerged as a important issue in the world, While a variety of techniquessuch as a Cloud Computing or a Internet Of Things appeared. In these circumstances, The domesticsecurity fields are divided into the Information Security, the Physical Security and the ConvergenceSecurity. and among these security fields, Convergence security is attracted much attention from variousindustries. the classification systems of a new field Convergence Security has become a very importantcriteria such about the Statistics calculation, the Analysis of status industry sector and the Road maps. However, In the domestic, The related institutions classified each other differently the ConvergenceSecurity Classification. so it is urgently needed a domestic security fields systematic classification due tothe problems such as lack of reliability of the accuracy, compatibility of a data. Therefore, this paper willbe analyzed to the characteristics of the domestic security classification systems by the cases. and will beproposed the newly improved classification system, to be possible to addition or deletion of anclassification entries, and to be easy expanded according to the new technology trends. this proposed toclassification system is expected to be utilized as a basis for the construct of a domestic securityclassification system in a future.
  • 10.

    Recognition of Basic Motions for Figure Skating using AHRS

    Ki-Hyeon Kwon | Hyung-Bong Lee | 2015, 20(3) | pp.89~96 | number of Cited : 3
    Abstract PDF
    IT is widely used for biomechanics and AHRS sensor also be highlighted with small sizedcharacteristics and price competitiveness in the field of motion measurement and analysis of sports. In thispaper, we attach the AHRS to the figure skate shoes to measure the motion data like spin,forward/backward, jump, in/out edge and toe movement. In order to reduce the measurement error, wehave adopted the sensors equipped with Madgwick complementary filtering and also use Euler angle toquaternion conversion to reduce the Gimbal-lock effect. We test and experiment the accuracy andexecution time of the pattern recognition algorithms like PCA, ICA, LDA, SVM to show the recognitionpossibility of it on the basic motions of figure skating from the 9-axis trajectory information which is gathered from AHRS sensor. From the result, PCA, ICA have low accuracy, but LDA, SVM have goodaccuracy to use for recognition of basic motions of figure skating.
  • 11.

    Research on the Implementation of Infrared Threat Surrogate for DIRCM Performance Analysis

    천승우 | 김희정 | 조수형 and 2other persons | 2015, 20(3) | pp.97~106 | number of Cited : 0
    Abstract PDF
    In this paper, the development of infrared threat surrogate system is described and it can be used toverify the performance of DIRCM system. In this research, threat surrogates are manufactured using sameF# and reflective optics used in 1st- and 2nd-Gen. real seeker so that the threat surrogate system can beused to develop code-based jamming techniques. Also the threat surrogate system can analyze thesaturation jamming effect for image seeker using FPA detector. The result shows that 1st- and2nd-generation threat surrogates have relatively precise tracking performance and jamming effect.
  • 12.

    An Algorithm for Minimum Feedback Edge Set Problem

    Sang-Un, Lee | 2015, 20(3) | pp.107~113 | number of Cited : 0
    Abstract PDF
    This paper presents a polynomial time algorithm to the minimum cardinality feedback edge set andminimum weight feedback edge set problems. The algorithm makes use of the property wherein the sumof the minimum spanning tree edge set and the minimum feedback edge set equals a given graph's edgeset. In other words, the minimum feedback edge set is inherently a complementary set of the former. Theproposed algorithm, in pursuit of the optimal solution, modifies the minimum spanning tree finding Kruskal'salgorithm so as to arrange the weight of edges in a descending order and to assign cycle-deficient edgesto the maximum spanning tree edge set MXST and cycle-containing edges to the feedback edge set FES. This algorithm runs with linear time complexity, whose execution time corresponds to the number of edgesof the graph. When extensively tested on various undirected graphs both with and without the weighed edge, the proposed algorithm has obtained the optimal solutions with 100% success and accuracy.
  • 13.

    Highly Reliability Network Technology for Transmitting a Disaster Information

    KIM KYUNG JUN | Dongju Kim | 장대진 and 2other persons | 2015, 20(3) | pp.115~124 | number of Cited : 0
    Abstract PDF
    In this paper we analyse the previous (Quality of Services) and QoE(Quality of Experience) methods,and propose a high reliable network system framework and its service forwarding method that is able to provide seamless N-Screen services for proliferating disaster informations. The service satisfactionmeasurement, i.e., QoE, of contents consumers in N-screens services is going to be important the factorin disaster information proliferation because N-Screen services in the previous methods based on multidevices only focused on information transmission. The proposed system around these services iscomposed of a disaster information process framework for accepting user's service requirement, pushservice modules for minimizing the number of packets to be caused when carrying out the push service,and a push service controller for maximizing QoE measures. In order to provide a seamless N-Screenservice on diverse screens, such as smartphone, PC, and big screen, we also have Open API(ApplicationProgramming Interface) functions. Through these results, we expect to evaluate QoS and QoE quality inthe seamless N-Screen service.
  • 14.

    An Investigation of the Impacts of Employer's Rewards Strategies on Employee’s Commitment with Comparison of Home-based Contact Center

    Jaeyoung Kim | Cho, BooYun | 2015, 20(3) | pp.125~137 | number of Cited : 3
    Abstract PDF
    Information technology enables home-based working which is a new way to satisfy the firm and itsemployees. Firms are under pressure of cost reduction, and employees want to maintain balance of lifebetween work and family. Considering the organization’s capability can be the core competency, firm’s efforts to acquire workers’ commitment have been important issue in human resource management. However, researches to increase the workers’ loyalty and commitment within home-base working have notbeen widely studied. This study tries to identify the relationships among firms’ rewards supportingstrategies and workers’ perceived commitment with the working system as a context. Results confirm thatthe organization’s extrinsic and intrinsic rewards affect the worker’s continuous commitment, and themediating role of normative commitment between workers’ perceived affective commitment and continuouscommitment has been found. Also, we empirically identify the moderating role of working systems(i.e.,home-based, vs. office-based) within organization’s rewards supporting strategies and workers’commitment perceptions.
  • 15.

    Fashion Glasses: Marketing Service Activation Strategy to Intensify the product in On-line Environment

    SeongYoon Shin | Lee Hyun Chang | 2015, 20(3) | pp.139~144 | number of Cited : 3
    Abstract PDF
    Recently, to satisfy the customer's requirements for glasses such as rating of glasses or choosing,glasses industry is supporting various types and tools for making one's appearance good. Among variousforms of online shopping with the development of online shopping and the rapid growth of IT technology,the intense competition also more deepen. The strategies for differentiated marketing and features forcompetitiveness of businesses in the online and offline shopping areas are required that our marketingtarget be settled the glasses marketing by analyzing. In this research, we study the strategy for implementing a site for glasses to customizing a person not to distinguish whether the customer is olderor younger etc. For the purpose of implementing a site for glasses, first, we suggest a differentiatedmethodology through analysis of glasses industry service and features of existential representative glassessites. Through the activation of the marketing strategies, marketing in a glasses market is expected to becompetitive.
  • 16.

    A Study on the Game Addiction of Children with Domestic Violence Experience

    kim na yea | 2015, 20(3) | pp.145~156 | number of Cited : 6
    Abstract PDF
    The aim of this study is to identify whether the domestic violence experience of children has an impacton their game addition and to verify the direct effects and moderating effects of social support. Thesurvey was conducted to the children who were 5th and 6th graders in Gwangju and Jeonnam. Theresponses from 328 subjects of domestic violence experience from were analyzed. The analytic results are as the following. When verifying the impact of a domestic violence experience of children on their game addiction, domestict violence was found as the key variable that has a negativeimpact on children’s game addiction. The results indicated that children with higher levels of domestictviolence more likely to have higher levels of game addiction. Furthermore, boy's addiction degree to gamewas higher than girls' and lower education levels of mother, higher grades were found to be associatedwith higher game addiction. The impact of children’s social support on their game addiction was analyzed. The analytic results suggest that social support has a impact on their game addiction. In other words,higher social support means lower game addiction. The moderating effect of social support was analyzed. Social support check the moderating effect ofdomestic violence of children on their game addiction. The Implications of these findings were discussed.
  • 17.

    A Research on the Control Effect of Teacher’s Support in the Course of School Adaptation for Children from Multi-cultural Families

    노선덕 | 강길현 | 2015, 20(3) | pp.157~167 | number of Cited : 9
    Abstract PDF
    In this study, we studied the influence that the stress placed on children (originating from presence oftwo cultures at multi-cultural families) can have on adapting to school, and further assessed the controleffect of teachers’ support as a protection factor. In order to achieve the goal of the research, weidentified samples of children between Grades 3-6 who came from multi-cultural families to carry outsurveys. Based on the results of our analysis, the experience of discrimination and language conflicts experienced by children from multi-cultural families affected their academic activities (among adaptationfactors to school experiences), while teachers’ support appeared to have a control effect. However, for theinfluence of language conflicts on friend relationships (among adaptation factors to school experiences),teachers’ support did not have a control effect. As such, based on this research result, we’ve proposedplans to improve school adaptation of children from multicultural families.
  • 18.

    An Empirical Study on the Innovation Strategy of User Experience by Utilizing Digital Technology

    RHO, HYUNG JIN | 2015, 20(3) | pp.169~176 | number of Cited : 4
    Abstract PDF
    The purpose of this paper is to study renovation plan of value chain from a user's viewpoint by makingpractical application of digital technology. And it is surely meaningful to investigate the importantmotivation factors of continuous using smart-phone, and to analyze the improving effect toward to the quality of life in continuous using smart-phone. By this study we can expect the value improving effect ofuser experience. The results of hypothesis testing can be summarized as follows:First, the hypothesis that positive affect has a plus effect on pragmatic value is accepted. Secondly,the hypothesis that positive affect has a plus effect on hedonic value is accepted. Thirdly, the hypothesisthat negative affect has a minus effect on pragmatic value is accepted. Fourthly, the hypothesis thatnegative affect has a minus effect on pragmatic value is rejected. Fifthly, the hypothesis that pragmaticvalue has a plus effect on life satisfaction is accepted. Sixthly, the hypothesis that hedonic value has a pluseffect on life satisfaction is rejected. In the competition among enterprises, user experience instead of goods themselves became influentialas a differential factor. And many advanced enterprises began taking a serious view of customer'shappiness and user experience improvement.
  • 19.

    The Effects of Infant Teacher’s Job Characteristics on Job Satisfaction -Focusing on Moderating Effects of the Type of Institute-

    Kyung-Suk Kim | 2015, 20(3) | pp.177~184 | number of Cited : 2
    Abstract PDF
    This study aims to identify the effects of job factors related to children's teachers on job satisfaction and present suggestions through an analysis of the modulating effects according to the type of institute. Inorder to achieve this purpose, this study set up a cause and effect model on teacher's efficacy, emotionalintelligence, friendship, and a reward system as factors of job satisfaction and analysed them based oninterviews using a questionnaire. To look into the results of the analysis, it was discovered that a reward system had the greatest effecton job satisfaction for the subjects, followed by emotional intelligence, friendship, and teacher's efficacy. In an analysis of modulating effects according to the type of institute, the effect of emotionalintelligence differed significantly depending on kindergartens and day care centers. Teacher's efficacy,friendship and a reward system were not significantly different. Based on the results above, this studyprovides basic data for the development of strategies for children's teachers to effectively achieve jobsatisfaction.