Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2017, Vol.22, No.8

  • 1.

    Design and Fabrication of Test Equipment for mass production of Automatic Test Equipment(ATE)

    Dong-Il Kim | Kyung-Jin Choi | 2017, 22(8) | pp.1~7 | number of Cited : 2
    Abstract PDF
    In this paper, we proposed the test equipment that can perform separate performance tests to mass-produce the Automatic Test Equipment. Until now, the performance test of the ATE has been performed after it has been assembled perfectly. It is possible to perform the performance test only when the external device manufacturing and setting of measurement resources and the internal wiring work have been completed. So we have been studying test equipment that separately tested the switching devices that played a key role in the performance of the ATE. To build the test equipment, we reviewed the circuit card assemblies that make up the switching devices. We designed a test equipment that satisfies the performance test and apply the completed test equipment to the actual production process to analyze whether it was effective in improving the time and workability of the performance test. The test equipment has the advantage that it can be used universally in the mass production process of ATE with the same type of switching device.
  • 2.

    Development of the Smart Belt System for Preventing Loss of Items using Beacon

    Kim Myeongseon | JinHyeon Joo | GeunDeok Park | 2017, 22(8) | pp.9~14 | number of Cited : 0
    Abstract PDF
    In this paper, we propose the smart belt system for preventing loss of items using Beacon. The proposed system monitors the distances of the registered items via the belt that is always worn. The belt determines the loss of the items by measuring the relative distance via RSSI (Received Signal Strength Indicator) value of the signals received from the BLE (Bluetoothl Low Energy) sensor, which is attached on the items such as bags and wallets. If the registered item is determined to be lost, the belt rings to remind the user of the loss. The missing status could be known to users through the smartphone application connected to the belt. The smartphone application communicates with the belt using Beacon, and provides users with a quick and easy way to check the status of their items.
  • 3.

    Scene-based Nonuniformity Correction Complemented by Block Reweighting and Global Offset Initialization

    Yonghee Hong | Keun-Jae Lee | Hong-Rak Kim and 1other persons | 2017, 22(8) | pp.15~23 | number of Cited : 2
    Abstract PDF
    In this paper, the block reweighting and global offset initialization methods are proposed to complement the improved IRLMS algorithm which is the effective algorithm in registration based SBNUC algorithm. Proposed block weighting method reweights the error map whose abnormal data are excluded. The global offset initialization method compensates the global nonuniformity initially. The ordinary registration based SBNUC algorithm is hard to compensate global nonuniformity because of low scene motion. We employ the proposed methods to improved IRLMS algorithm, and apply it to real-world infrared raw image stream. The result shows that new implementation provides 3.5~4.0dB higher PSNR and convergence speed 1.5 faster then the improved IRLMS algorithm.
  • 4.

    QoE Provisioning for Handovers in Mobile communication Networks

    Jongchan Lee | Lee Moonho | 2017, 22(8) | pp.25~32 | number of Cited : 0
    Abstract PDF
    In this paper we propose a resource management method which enables to guarantee the quality of experience (QoE) for handover in the overlaid macro-femtocell networks. How to cope with the resource demand of handover calls is necessary to efficiently support the movement of mobile terminals, the QoE degradation or the load control. We attempt to satisfy the QoE requirements of users and maximize the capacity of the system at the same time. In order to achieve this goal, this scheme divides the shared resources into two part for the movement of MT and QoE degradation, and allocates those resources with the competition between four types of handovers. Simulation results show that our scheme provides better performances than the conventional one with respect to the outage probability, data transmission throughput.
  • 5.

    Real-Time Safety Driving Assistance System Based on a Smartphone

    Joon-Gyu Kang | Yoowon Kim | Moon Seog Jun | 2017, 22(8) | pp.33~39 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a method which implements warning to drivers through real-time analysis of risky and unexpected driver and vehicle behavior using only a smartphone without using data from digital tachograph and vehicle internal sensors. We performed the evaluation of our system that demonstrates the effectiveness and usefulness of our method for risky and unexpected driver and vehicle behavior using three information such as vehicle speed, azimuth and GPS data which are acquired from a smartphone sensors. We confirmed the results and developed the smartphone application for validate and conducted simulation using actual driving data. This novel functionality of the smartphone application enhances drivers' situational awareness, increasing safety and effectiveness of driving.
  • 6.

    Energy D2D Tx-Rx assignment in the Cellular System

    Oh Chang Yoon | 2017, 22(8) | pp.41~46 | number of Cited : 1
    Abstract PDF
    In this paper, we investigate the D2D Transmitter(Tx) and Receiver(Rx) pair assignment problem in the cellular system where D2D users share the uplink resource of the cellular system. Sharing the uplink resource of the cellular system may cause interference to the cellular system, though it is beneficial to improve the D2D user Capacity. Therefore, to protect the cellular users, D2D transmit power should be carefully controlled. In this work, we focus on optimal Tx-Rx assignment in such a way that the total transmit power of users is minimized. First, we consider the optimum Tx-Rx assignment in general and the corresponding complexity. Then, we propose an iterative D2D Tx-Rx assignment algorithm with low complexity that can minimize total transmit power of users. Finally, we present the numerical examples that show the complexity and the convergence to the unique transmit power level.
  • 7.

    Open Hardware Platforms for Internet of Things : Evaluation & Analysis

    Jae-Yeon Seo | kim myeong hwi | Jang, Beakcheol | 2017, 22(8) | pp.47~53 | number of Cited : 1
    Abstract PDF
    In this paper, we present open hardware platforms for Internet of Things (IoTs) emphasizing their strengths and weaknesses. We introduce six representative platforms, Raspberry PI, Arduino, Garileo, Edison, Beagle board and Artik. We define important performance issues for open hardware platforms for IoTs and analyze recent platforms according to the performance issues. We present recent research project using open hardware platforms introduced in this paper. We believe that this paper provide wise view and necessary information for open hardware platforms for Internet of Things (IoT).
  • 8.

    A Enhanced Security Model for Cloud Computing in SSO Environment

    EunGyeom Jang | 2017, 22(8) | pp.55~61 | number of Cited : 1
    Abstract PDF
    Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.
  • 9.

    Security Architecture for T4 Class Common Data Link

    Lee, Sang-Gon | Lee, HoonJae | Kim,Hyeong-Rag and 1other persons | 2017, 22(8) | pp.63~72 | number of Cited : 1
    Abstract PDF
    In this paper, we propose a security architecture for HDLC-based T4 class common data link. The common data links are composed of point-to-point, multi-to-point, and point-to-multi mode. For multi-to-point mode, one node has a bundle of point-to-point links with different end-point on the other side of the links. Thus multi-to-point mode can be considered as a bundle of point-to-point mode. Point-to-multi mode is broadcasting link. For point-to-point mode we adopted robust security network scheme to establish a secure data link, and for multi-to-point mode we use broadcast encryption scheme based on ID-based cryptography to distribute encryption key for broadcasting message encryption. We also included MACsec technology for point-to-point data link security. Computational and communicational complexity analysis on the broadcast encryption have been done.
  • 10.

    Ordinary B-tree vs NTFS B-tree: A Digital Forensics Perspectives

    Cho Gyu Sang | 2017, 22(8) | pp.73~83 | number of Cited : 1
    Abstract PDF
    In this paper, we discuss the differences between an ordinary B-tree and B-tree implemented by NTFS. There are lots of distinctions between the two B-tree, if not understand the distinctions fully, it is difficult to utilize and analyze artifacts of NTFS. Not much, actually, is known about the implementation of NTFS, especially B-tree index for directory management. Several items of B-tree features are performed that includes a node size, minimum number of children, root node without children, type of key, key sorting, type of pointer to child node, expansion and reduction of node, return of node. Furthermore, it is emphasized the fact that NTFS use B-tree structure not B+structure clearly.
  • 11.

    An Efficient Music Notation by Plain Text for General Music Lovers

    Seung-Taek Yi | Inbum Kim | SANGHYUN PARK | 2017, 22(8) | pp.85~91 | number of Cited : 0
    Abstract PDF
    Although various music composition programs for PCs have become commonplace, the reasons why people think it is hard to make music are the lack of experience with musical instruments, the lack of knowledge of music or composition, and the fear of learning MIDI software. In this paper, we propose an effective method to solve this problem by using plain text based method which makes it easy for the general people who do not know MIDI, have little experience of musical instruments, and cannot even read music to make their own music. As a result, many people who like music but have not been able to produce their own music may produce and distribute music, and collaborate with others to produce better quality music.
  • 12.

    A Study on Creative and Convergent SW Education Programs for improving Computational Thinking

    Lee Myungsuk | 2017, 22(8) | pp.93~100 | number of Cited : 11
    Abstract PDF
    After the fourth industrial revolution came along, SW education to improve creativity and problem-solving ability began in elementary, middle, and high schools first and then in universities as well positively; however, research on the curriculum or what it has to pursue is not yet enough. Here, this study will investigate the current status of SW education provided in software-oriented schools operated in universities and also given as cultural studies in general universities and examines the curriculum or the standard plan for education. In most schools, it is operated as similar subject names, and diverse methods are tried on- and off-line to cultivate computing thinking skills. Also, to study SW education programs that can be operated in the general cultural courses of universities and find out how to utilize them, this author suggests the goal setting, educational contents, and teaching methods for SW education. As follow-up tasks, it will be needed to apply the suggested programs to the field and find out new evaluation methods in order to cultivate creative and convergent persons of ability.
  • 13.

    Teaching-Learning Model for Programming Language Learning with Two-Step Feedback

    Bo-Seop Kwon | 2017, 22(8) | pp.101~106 | number of Cited : 1
    Abstract PDF
    In this paper, we propose a new teaching-learning model with two-step feedback on programming language learning, which is a basic preliminary learning for programming. Programming learning is aimed at improving problem solving skills and thinking by experiencing problem solving through programming. For programming, the learner must know how to work with the computer and what to do with it. To do this, concrete thinking should be established and described in an accurate programming language. In recent, most studies have focused on the effects of programming learning and have not studied the effects of education on language itself. Therefore, in this study, the teaching-learning model for programming language education is presented and applied to the field, and the results are compared with the existing instructional- teaching model.
  • 14.

    A Study on Excellent Universities with Video and Media Field in the USA

    Lee, Soon-mi | 2017, 22(8) | pp.107~112 | number of Cited : 0
    Abstract PDF
    In this paper, I studied several universities which are especially famous for video and media fields in the United States to develop our international competitiveness. I selected the outstanding US universities and researched the various indexes of corresponding department, internship program and other activities related with company. Then, analyzed the research results and compared with the department of Video Broadcasting at the K women’s university in our country. As a result, the retention rate and the graduate rate of the 4-years universities(bachelor’s degree) are very higher than the 2-years associated degree among the US universities. On the other hand, although the department of Video Broadcasting at the K women’s university is the associated degree course, it shows up the highest the retention rate and the graduate rate than the US universities. Therefore, we are able to recognize that K Women’s University has managed its students well. However, the employment rate of the K Women’s University was poor than the US universities due to the lack of the internship programs, other activities supported by companies and the career service center.