Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2016, Vol.21, No.10

  • 1.

    Automatic Generation of Machine Readable Context Annotations for SPARQL Results

    ji Woong Choi | 2016, 21(10) | pp.1~10 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an approach to generate machine readable context annotations for SPARQL Results. According to W3C Recommendations, the retrieved data from RDF or OWL data sources are represented in tabular form, in which each cell’s data is described by only type and value. The simple query result form is generally useful, but it is not sufficient to explain the semantics of the data in query results. To explain the meaning of the data, appropriate annotations must be added to the query results. In this paper, we generate the annotations from the basic graph patterns in user’s queries. We could also manipulate the original queries to complete the annotations. The generated annotations are represented using the RDFa syntax in our study. The RDFa expressions in HTML are machine-understandable. We believe that our work will improve the trustworthiness of query results and contribute to distribute the data to meet the vision of the Semantic Web.
  • 2.

    Robust pupil detection and gaze tracking under occlusion of eyes

    LeeGyungju | 김진서 | Gyeyoung Kim | 2016, 21(10) | pp.11~19 | number of Cited : 1
    Abstract PDF
    The size of a display is large, The form becoming various of that do not apply to previous methods of gaze tracking and if setup gaze-track-camera above display, can solve the problem of size or height of display. However, This method can not use of infrared illumination information of reflected cornea using previous methods. In this paper, Robust pupil detecting method for eye's occlusion, corner point of inner eye and center of pupil, and using the face pose information proposes a method for calculating the simply position of the gaze. In the proposed method, capture the frame for gaze tracking that according to position of person transform camera mode of wide or narrow angle. If detect the face exist in field of view(FOV) in wide mode of camera, transform narrow mode of camera calculating position of face. The frame captured in narrow mode of camera include gaze direction information of person in long distance. The method for calculating the gaze direction consist of face pose estimation and gaze direction calculating step. Face pose estimation is estimated by mapping between feature point of detected face and 3D model. To calculate gaze direction the first, perform ellipse detect using splitting from iris edge information of pupil and if occlusion of pupil, estimate position of pupil with deformable template. Then using center of pupil and corner point of inner eye, face pose information calculate gaze position at display. In the experiment, proposed gaze tracking algorithm in this paper solve the constraints that form of a display, to calculate effectively gaze direction of person in the long distance using single camera, demonstrate in experiments by distance.
  • 3.

    Applying the Technology Acceptance Model to the Digital Exhibition: A Case study on <Van Gogh Inside: Festival of Light and Music>

    Rhee Boa | 김신효 | 신수민 | 2016, 21(10) | pp.21~28 | number of Cited : 1
    Abstract PDF
    The aim of this research is to analyze Perceived Usefulness(PU) and Perceived Ease of Use(PEOU) based on Technology Acceptance Model in <Van Gogh Inside: Festival of Light and Music>, and how viewing experiences and knowledge of motion graphics have an impact on attitude toward using and behavioral intention to use. Both usability for learning and usability for appreciation in terms of PU have significant correlations with the degree of satisfaction and immersion, and behavioral intention to use. On the other hand, PEOU has an influence on degree of exhibition satisfaction and immersion, and onto behavioral intention to use with the exception of intention to revisiting <Van Gogh Inside>. Unlike PU or PEOU, previous viewing experiences do not have correlation with attitude toward using and behavioral intention to use. Only previous knowledge of motion graphics has a correlation with degree of satisfaction and immersion, and behavioral intention to use. As the influence on PU and PEOU’s attitude toward using and and behavioral intention to use has been verified, our findings show that two variables of TAM enable the prediction of user’s technology acceptance on digital exhibitions and as a result prove the suitability for TAM as an evaluation model for digital exhibition of remediating the originals. This study offers a fresh understanding of the importance of motion graphic effects which influence attitude toward using and behavioral intention to use from the perspective of curating methodology.
  • 4.

    A Design of the Safe Zone Managing Algorithm with the Variable Interval Sensing Scheme for the Sensor Networks

    Cha,Hyun-Chul | 2016, 21(10) | pp.29~35 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a scheme to prolong the lifetime of the sensor network by reducing the power consumption of the sensor node. The proposed algorithm reduces the number of transmissions and sensing at the application layer. We combine the VIS scheme with the MSZ algorithm and call it as the SZM/VIS algorithm. The actual temperature data was collected using the sensor nodes to assess the performance of the proposed algorithm. The proposed algorithm was implemented through the programming and was evaluated under various setting values. Experimental results show that the SZM/VIS has a slightly improved transmission ratio than that of the MSZ while has the periodic transmission capability like as the MSZ. Also the SZM/VIS can significantly reduces the sensing ratio like that of the VIS. Our algorithm has the advantages of instantaneous, simplicity, small overhead and robustness. Our algorithm has just negligible side effects by controlling the parameter properly depending on the application types. The SZM/VIS algorithm will be able to be used effectively for the applications that need to be managed within a certain range of specific properties, such like crop management.
  • 5.

    Energy Efficient Transmit and Receive Strategy for Green Communications: K users extension

    Oh Chang Yoon | 2016, 21(10) | pp.37~42 | number of Cited : 0
    Abstract PDF
    We investigate multi user joint rate scheduling and power allocation problem for a delay sensitive CDMA systems. First, we characterize the existing two user joint rate scheduling and power allocation. We then extend the problem to the case of the multi user systems. In general, there is no simple optimum solution for the multi user scheduling problem. To that end, we propose a sub optimum solution, termed ‘virtual user approach’. We show the performance of the virtual user approach to verify the benefit of complexity.
  • 6.

    A Study on the Ethical Issues and Sharing Behavior of User’s Information in the Era of Big Data

    Lee Myungsuk | 2016, 21(10) | pp.43~48 | number of Cited : 0
    Abstract PDF
    This study is to examine how big data collects user’s information and is used; the status quo of exposures of user’s information, and various measures of self-control by the user. This study is also to look their ethical issues and discuss problems of privacy concerning big data. As a way for users to self-control their information, they need to check the log-in state of web portal sites and set up their account so that customized advertisement and location information cannot be tracked. When posting a blog, the value of posting should be controlled. When becoming a member of a web site, users must check the access terms before agreement and beware of chained agreements and/or membership joins in order to control the exposure of their personal information. To prevent information abuse through big data through which user’s information is collected and analyzed, all users must have the right to control, block or allow personal information. For an individual to have the right to control over his information, users must understand the concept of user’s information and practice ethics accompanied by newly given roles in the Internet space, which will lead to the establishment of the sound and mature information society on the Internet.
  • 7.

    Confirmation Method of Target Detection for Vehicle Mounted Metal Detector

    Byung-Min Jung | Beom-Su Shin | YuShin Chang and 1other persons | 2016, 21(10) | pp.49~54 | number of Cited : 1
    Abstract PDF
    In this paper, the confirmation method of target detection for the vehicle mounted metal detector (MD) has been described. The vehicle mounted MD with the arrayed 6 coils to detect the width of 2.4 m was demonstrated. It is important and necessary to inform the location of the objects detected by the MD. The confirmation method of target detection was verified by using the MD GUI and the analysis of the receive signal processing. The receive signal processing is performed by comparing the threshold and the difference of the signal calibrated at initial location and the signal detected at present location.
  • 8.

    Analysis of Bluetooth Indoor Localization Technologies and Experiemnt of Correlation between RSSI and Distance

    김양수 | Jang, Beakcheol | 2016, 21(10) | pp.55~62 | number of Cited : 3
    Abstract PDF
    In this paper, we present indoor localization technologies using the bluetooth signal categorizing them into proximity based, triangulation based and fingerprinting based technologies. Then we provide localization accuracy improvement algorithms such as moving average, K-means, particle filter, and K-Nearest neighbor algorithms. We define important performance issues for indoor localization technologies and analyze recent technologies according to the performance issues. Finally we provide experimental results for correlation between RSSI and distance. We believe that this paper provide wise view and necessary information for recent localization technologies using the bluetooth signal.
  • 9.

    A Robust Mutual Authentication between User Devices and Relaying Server(FIDO Server) using Certificate Authority in FIDO Environments

    SeungJin Han | 2016, 21(10) | pp.63~68 | number of Cited : 2
    Abstract PDF
    Recently, Biometrics is being magnified than ID or password about user authentication. However, unlike a PIN, password, and personal information there is no way to modify the exposure if it is exposed and used illegally. As FIDO(Fast IDentity Online) than existing server storing method, It stores a user's biometric information to the user device. And the user device authentication using the user's biometric information, the user equipment has been used a method to notify only the authentication result to the server FIDO. However, FIDO has no mutual authentication between the user device and the FIDO server. We use a Certificate Authority in order to mutually authenticate the user and the FIDO server. Thereby, we propose a more reliable method and compared this paper with existed methods about security analysis.
  • 10.

    A Real-time Remote Logging Model for Development of Location-Based Mobile Applications

    Yun-seok Choi | 2016, 21(10) | pp.69~76 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a real-time remote logging model for development of android applications using LBS(Location based Service). The model has two major parts: Mobile Log Management Service and Remote Log Server. Mobile Log Management Service consists of the log collector and the remote log manager. The log collector is an aspect of AOP which can collect logs from the target application without modifications of source codes. The remote log manager has a background service component so that it can receive logs whenever the log collector captures logs from the target application. Remote Log Server communicates with Mobile Log Management Service by socket interface. Therefore, Remote Log Server can show logs in real-time. To validate the efficiency of the proposed model, we show a case study, and compare the model with other models
  • 11.

    A Certificate Revocation List Distribution Scheme over the eMBMS for Vehicular Networks

    HYUNGON KIM | 2016, 21(10) | pp.77~83 | number of Cited : 2
    Abstract PDF
    To verify the trustworthiness of messages, public key certificates and certificate revocation list(CRL) has been standardized for vehicular networks. However, timely distribution of large CRLs to vehicles should be more elaborated with low bandwidth utilization from a practical point of view. To address this concern, we propose a CRL distribution scheme using long term evolution(LTE) point-to-multicast transmission, namely the enhanced multimedia broadcast multicast service(eMBMS). The schem is much more resource efficient than the existing unicast CRL distribution schemes for vehicular networks and it allows realizing the regional CRL distribution schemes efficiently in LTE network. By means of ns-3 simulation, we analyze the performance, latency, and execution time of the scheme in terms of varying coverage of the multimedia broadcast multicast service over single frequency network (MBFSN).
  • 12.

    Effects of Nonviolent Communication(NVC) Program consist of Communication Ability, Relationship and Anger in Nurses

    Mi-Ok Lee | Lee Sangbok | 2016, 21(10) | pp.85~89 | number of Cited : 4
    Abstract PDF
    This study investigated the effects of nonviolent communication(NVC) program consisted of communication competency, relationship and anger in 48 nurses. Data were collected by Choe(2004)‘s Communication Competency Scale, Ju(2005)'s Relationship Scale and anger of Visual Analogue Scale. Statistic analysis consisted of average, standard deviation, minimum and maximum, paired t-test using SPSS 21 program were done. After NVC program, nurses's communication competency(p=.000) and relation (p=.000) were improved. Nurse's anger was lowered(p=.000). The results will provide the basic data to develop the Mini-NVC programs for various work fields as like ER, ICU nurses and will provide the evidences for safe and non-violent work environment and more related studies.
  • 13.

    Development of Livestock Monitoring Device based on Biosensors for Preventing Livestock Diseases

    Park Myeong Chul | 정현철 | Ok-Kyoon Ha | 2016, 21(10) | pp.91~98 | number of Cited : 1
    Abstract PDF
    Outbreaks of highly contagious livestock diseases can cause direct and indirect economic impacts such as lower productivity of cattle farms, fall in tourism in damaged areas and countries, and decline in exports. They also incur tremendous social costs associated with disease elimination and restoration work. Thus, it is essential to prevent livestock diseases through monitoring and prediction efforts. Currently, however, it is still difficult to provide accurate predictive information regarding occurrences of livestock diseases, because existing cattle health monitoring or forecasting systems are only limited to monitor environmental conditions of livestock barns and check activities of cattle by using a pedometer or thermal image. In this paper, we present a biosensor-based cattle health monitoring system capable of collecting bio-signals of farm animals in an effective way. For the presented monitoring system, we design an integrated monitoring device consisting of a sensing module to measure bio-signals of cattle such as the heartbeat, the breath rate and the momentum, as well as a Zigbee module designed to transmit the biometric data based on Wireless Sensor Network (WSN). We verify the validity of the monitoring system by the comparison of the correlations of designed device with a commercial ECG equipment through analyzing the R-peak of measured signals.
  • 14.

    Active Rule Manager for the Mobile Agent Middleware System

    Yonsik Lee | 천은홍 | 2016, 21(10) | pp.99~105 | number of Cited : 0
    Abstract PDF
    The active rule system is a key element of the rule-based mobile agent middleware system for activeness and autonomy of the sensor network. The rule manager, which is the main components of active rule based mobile agent framework and active rule system, performs the control and management of the rule-related processes. In this paper, we design and implement the roles and functions of the rule manager in detail. The proposed rule manager plays an important role in the sensor network environment. The sensor data server loads the active rule on the mobile agent by the rule manager according to the situations, and the mobile agent migrates to the destination node and performs the designated action. This active rule-based mobile agent middleware system presents the usefulness for the various sensor network applications. Through the rule execution experiment using the rule-based mobile agent, we show the adaptability and applicability of rule-based mobile agent middleware system to the dynamic environmental changes in sensor networks.
  • 15.

    Real-time Virtual Integration of heterogeneous system and Union Query System

    민성현 | LEE SANG JOON | Ho Young Kwak | 2016, 21(10) | pp.107~114 | number of Cited : 0
    Abstract PDF
    In this paper, we propose the building method for the unified IoT service platform between the variety of legacy systems with the heterogeneous structures and the operating environments. To accommodate the structural diversity of legacy systems, we develop a virtual integrated structure and interface abstracting method. By this, the new platform can use the data sources of the legacy systems as if the data source is in the new platform. In a manner without modification of the legacy systems with performing minimum tasks, we proposes a model that can be integrated without affecting the availabilities of the legacy systems.
  • 16.

    A Study on the Model Driven Development of the Efficient Combat System Software Using UML

    Seung-Mo Jung | 이영주 | 2016, 21(10) | pp.115~123 | number of Cited : 1
    Abstract PDF
    In this paper, we propose a Model Driven Development using UML(Unified Modeling Language) in an efficient Combat System Software development methods. UML is managed by the OMG (Object Management Group) as a Unified Modeling Language. Recently, In developing the software for the system, development time is contrary to a short, while it must meet a number of requirements of our customers. If you develop a non-efficient software early, the structure of the software become more complex in proportion to the number of requirements. As a result, a serious problem in the system, such as an increase in defective products due to the lowering of the reliability and communication problems between the developer has occurred. To overcome those problems, the aim of this paper is to develop a reusable high efficient Combat System Software by applying Model-Centric Development (Not Code-Centric Development). If Combat System Software development method using the UML proposed in this paper is used, easy communication among developers can help reduce the serious errors in systems. Also, it has the advantage that the future needs of software maintenance/repair become easy by using high readability object Model.
  • 17.

    The Design of Fault Tolerant Dual System and Real Time Fault Detection for Countdown Time Generating System

    김정석 | Han Yoo Soo | 2016, 21(10) | pp.125~133 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a real-time fault monitoring and dual system design of the countdown time-generating system, which is the main component of the mission control system. The countdown time-generating system produces a countdown signal that is distributed to mission control system devices. The stability of the countdown signal is essential for the main launch-related devices because they perform reserved functions based on the countdown time information received from the countdown time-generating system. Therefore, a reliable and fault-tolerant design is required for the countdown time-generating system. To ensure system reliability, component devices should be redundant and faults should be monitored in real time to manage the device changeover from Active mode to Standby mode upon fault detection. In addition, designing different methods for mode changeover based on fault classification is necessary for appropriate changeover. This study presents a real-time fault monitoring and changeover system, which is based on the dual system design of countdown time-generating devices, as well as experiment on real-time fault monitoring and changeover based on fault inputs.
  • 18.

    A stdudy of Knowledge management system needs and efficient hospital computerized operating

    Young Gi Yun | Young-Suk Chung | park koo rack | 2016, 21(10) | pp.135~142 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a plan for the introduction of a knowledge-based system proposed by the traditional computing sciences, in order to operate the computer system computerized hospital workers effectively. Hospital computational features of the operating system for this purpose, were made about the working conditions, computational difficulties of the hospital administrator. It is necessary for a knowledge management system for results-effective IT system operational review findings apply to the hospital, where a hospital computer system having features and hospitals computational workers must be resolved on the technical and environmental constraints with It became aware of the need. This study further shows that an effective hospital computer system to derive additional operating a variety of issues to consider for the base and the introduction of a knowledge management system can gradually solve the problem.
  • 19.

    How Individual Consumer’s Characteristics Affects Intention to use Smart Watch

    Soon-Hong Kwon | Yangwhan Lim | 2016, 21(10) | pp.143~148 | number of Cited : 1
    Abstract PDF
    Although various wearable devices applying information technologies are launched, only some of them are forming their own markets, and product which general consumers started to use in their daily life is believed to be smart watch. This study is intended to find factors why such smart watches are selected in terms of individual consumer’s characteristics in smart watches whose market is under its early stage. Smart watches are not forming their markets yet and this product is rather closer to a device attached to smart phone. But they would form markets only if their value is approved by themselves. This study looked into a structure under which smart watch forms its preference in terms of individual consumer and consumers are willing to use it. This study has its meaning by looking into factors why smart watch is spreading in market in terms of individual consumer’s characteristics. Results from this study are believed to provide fruitful implication to establish market strategy for wearable devices including smart watch that is not much used yet by consumers.
  • 20.

    A Study on the Moderating Effects of Social Support for Oiettolie Propensity Adolescent in the Process of Internet Game Addiction

    김효순 | 김서연 | Hwie- Seo, Park | 2016, 21(10) | pp.149~156 | number of Cited : 1
    Abstract PDF
    The purpose of this study is to suggest some policy and theoretical implications for the youth‘s internet game addiction by analyzing the moderating effects of social support in the relationship of Oiettolie propensity and game addiction behaviors. For the purpose of this study, this study established a causal model about the relationships among the research variables through review of previous studies and surveyed high school students for empirical research. The results of this study are the followings. First, lack of communication and impulsivity have significant influences on Oiettolie propensity. Second, Oiettolie propensity has a significant influence on youth's game addiction. Third, social support moderates the relationship between Oiettolie propensity and youth’s internet game addition. This study suggests some implications for the youth internet game addiction.
  • 21.

    Study on efficient financial income elderly long-term care facilities size

    JEONG SEONG BAE | 2016, 21(10) | pp.157~166 | number of Cited : 1
    Abstract PDF
    The aims of this study are to contribute to efficient revenue management by analysis of the scale in elderly long-term care facilities. The data was used for input of the elderly long-term care costs Scale, and calculated the staffing standards and social welfare facilities workers with living wage guidelines in the Department of Health and Human Services. Revenue efficiency is the highest order of size are as follows. I8(98 people) \43,517,010, H6(86 people) \36,568,332, G8(78 people) \29,426,532, F8(68 people) \23,227,532, E8(58 people) \19,701,254, D8(48 people) \19,155,187, C6( 36) \14,389,109, B8(28 people) \9,920,031, A8(18 people) \3,721,031. It seems that its revenue efficiency even higher than the larger the scale. Meanwhile, The researchers focused on C6 (36 patients) model. Suggestion of this study are following; First, the arrangement can be provided based on needs of the elderly care facility staffing standards. Secondly, an elderly care facility selected wage guidelines. Thirdly, the elderly efficiency guidelines established by the size of a nursing facility. This study and other financial income factor are not the applicable limits.
  • 22.

    An Structure Equation Model Analysis of Elementary School Students on Their School Adjustment Resilience

    Lee, Shin Sook | KIM, Yong-Seob | 2016, 21(10) | pp.167~174 | number of Cited : 0
    Abstract PDF
    This study aims to reveal the influence of praise effects of elementary school students on their self-esteem and school adjustment resilience. First, it conducted theoretical study and reviewed the preceding studies and assumed that verbal and physical praise which are sub-factors of praise effects in elementary school students affected their self-esteem and school adjustment resilience. It was also assumed that there was a mediating effects of self-esteem between praise effect and school adjustment resilience of elementary school students. As a result of study on praise effects of elementary school students, it was found that verbal praise had an influence on their self-esteem and school adjustment resilience and physical praise affected their learning attitude. Self-esteem of elementary school students had an influence on their school adjustment resilience. Verbal praise of elementary school students had the greatest influence on their learning attitude. This study proposed policy suggestions of self-esteem and school adjustment resilience as an alternative based on the results of the study.
  • 23.

    An Activation Plan of Electronic Contract Real Estate

    Sungho Youn | 2016, 21(10) | pp.175~182 | number of Cited : 3
    Abstract PDF
    In the 21st century knowledge and information society, Electronic Contracts made with the intention of electronic computer information networks are emerging as a new legal problem which can not be solved in the conventional legal system governing contracts. In other words, the indicator's decision determines the effect and formation of the contracts in the face-to-face or written contracts but electronic decision through computer information network is established the working process of electronic signals- electronic contracts are not only difficult to separate the decision-making process but questioned to be solved by the theory of the general legal action. Ministry of Transportation is scheduled to introduce real estate sales and lease contract using a variety of electronic devices such as computer, tablet PC, smart phones and so on without a paper contract. This system is conducted to global expansion of Seoul in demonstration zone on May 8, 2016 and will be implemented nationwide in the second half of 2017. Electronics contract Real estate has some benefits because made by linking electronic contract system and the electronic registration system - the economic effects discounts on various kinds of fees, the prevention from real estate fraud beforehand and the solution to the complexity of the process the seller and the buyer visits The Real estate agency. However, it has some problem- the disorder in the real estate contract market, the occurrence of the real estate agency accident and the author of the electronic real estate contracts have limited only to realtor. In this paper, I suggest the activation plan to search for establishment and effect of electronic contracts and declaration of intention in electronic depending on the Electronic Contract Real Estate system.
  • 24.

    Analysis of 2015 Middle School Informatics Curriculum by Viewpoint of Core Competence

    Choe Hyun-Jong | 2016, 21(10) | pp.183~190 | number of Cited : 1
    Abstract PDF
    In this paper, we have looked at through core competences and contents of Informatics curriculum in middle school by expert questionnaire and Focus Group Interview(FGI). Among nine core competences of Informatics subject in curriculum, abstraction and automation were easily found, but creative harmony and cooperation were indirectly confirmed in the statements of teaching and assessment sections of Informatics curriculum in middle school. It was also identified that some core competency elements are redundant or hardly to found in the contents of Informatics curriculum. In addition, various opinions about Informatics curriculum have been put forward over the FGI. The results of this study will be the case that can be consulted on new revised Informatics curriculum to be developed further.