Korean | English

pISSN : 1975-7700 / eISSN : 2734-0570

2020 KCI Impact Factor : 0.42
Home > Explore Content > All Issues > Article List

2010, Vol.5, No.6

  • 1.

    Smart Device Based Intelligent Lighting Automatic Control System for Energy Saving

    DongWoo Lee | 2010, 5(6) | pp.1~7 | number of Cited : 1
    Abstract PDF
    This paper presents an intelligent lighting automatic control system to save electric energy efficiently. It consists of hardware components and a software system which integrates and manages the hardware components. The hardware components are smart devices, each of which has its own computing power. Due to their computing power, various control modes can be used adapting to application environment. The software system can communicate with each smart devices and remotely set and modify their functions. A database is used to store the usage data of the system. The stored usage data can be analyzed and applied to appropriately adjust the control modes that results in dramatic saving electric power energy.
  • 2.

    A Comparative Study on Service Quality, Customer Satisfaction and Loyalty between Korean and Chinese Hotel's Website

    이동건 | 사륜가 | Lee Sang Joon | 2010, 5(6) | pp.9~20 | number of Cited : 0
    Abstract PDF
    By investigating visitors of Shanghai Expo in 2010, Chinese and Japanese would be very popular to participate in Yeosu Expo, 2012. In this paper, we aim at taking place Yeosu Expo successfully. So, we study the service quality of hotel website for Korean and Chinese respectively. We build a research model for difference of recognition to service quality, customer satisfaction and loyalty of hotel web service among the two nation people. We propose five service quality factors (information, transaction, design, communication and security) affecting customer satisfaction and loyalty of hotel web service with literature review. The research hypotheses are proved by actual analysis to the user of hotel website. The results of this paper will provide strategic data successfully for management of hotel web site in Yeosu Expo and other convention events.
  • 3.

    e-Learning English Learning: a Case of English Learning Using the MOODLE

    Jungtae Kim | 2010, 5(6) | pp.21~27 | number of Cited : 6
    Abstract PDF
    This article demonstrates how the MOODLE is used in the field of English learning. The MOODLE is an open source Learning Management System (LMS). It has been widely used in the field of e-Learing distance education because of its characteristics of the asynchrony principle: anyplace and anytime, and using the various functions of MOODLE. However, there is little publication in English learning although the use of the LMS has been gradually increasing in the field. This paper illustrates a case of construction and implementation of MOODLE-based blended learning and collaboration methods used in a course of English grammar and reading offered at a Korean college.
  • 4.

    The teaching evaluation criteria for the inclusion of students with E/BD

    최진오 | 2010, 5(6) | pp.29~39 | number of Cited : 4
    Abstract PDF
    This research proposes the evaluation criteria for the instruction including students with emotional and behavior disorders(E/BD). In order to make it, as a first step, instructional evaluation criteria for general and special education teachers were analyzed and then, characteristics of successful teaching for students with E/BD were combined. Through these procedures, the evaluation criteria were developed including 6 areas, 23 sub-areas, and 59 evaluation elements. The evaluation criteria for the instruction including students with E/BD are specific formats of those which can be changed based on disability types. Implications are discussed for future studies verifying the effectiveness of the proposed criteria.
  • 5.

    Proposed IT Convergence Strategy for High-tech Medical Complex Cluster Based on u-Healthcare

    양진영 | 박정용 | 류동현 | 2010, 5(6) | pp.41~49 | number of Cited : 0
    Abstract PDF
    The bio-medical industry is getting more important as new promising technology in the 21th century with aging society and well-being trend. It began 'high-tech medical complex cluster' which is pushed ahead by core business of developing policies concerning medical industry on August 10, 2009. Medical cluster is that it is emphasis on needs of IT-BT-Care Service Fusion and IT-Medical Service Fusion for medical demand of future global and constructing health care R&D Hub. Therefore, in this paper for the success Medical cluster IT integration to analyze the role through its association with u-Healthcare IT strategy around the model proposed strategy to promote IT to medical Convergence strategy.
  • 6.

    The Forgotten Roles and New Roles of Output in Second Language Acquisition

    변진석 | 2010, 5(6) | pp.51~64 | number of Cited : 0
    Abstract PDF
    For the past two and a half decades the roles of output in second language acquisition (SLA) have been discussed in many ways in the framework of the output hypothesis proposed by Swain (1985). However, some roles of output proposed in the early version of output hypothesis have not been investigated enough though they may play important roles in SLA. In addition, recent literature in SLA suggests that there may be some roles of output that have not been investigated so far. Therefore, this paper overviews the roles of output proposed in the early and the recent versions of output hypothesis and discusses the roles that need to be revisited and those that need to be investigated in the current SLA.
  • 7.

    A Study on Institutional Characteristics of a Teacher-Student Dialogue In an ESL Writing Conference

    김일희 | 조영우 | 2010, 5(6) | pp.65~74 | number of Cited : 0
    Abstract PDF
    This study investigates institutional characteristics of a teacher-student talk in an ESL writing conference. Unlike a typical institutional talk, the student in this conversation had a higher level of academic status and professional knowledge than the ESL teacher. The talk was analyzed using a conversation analytic method and ethnographic observation. The results showed that despite the atypical knowledge levels and relationships between the teacher and the student, their shared social knowledge regarding the goal of the writing conference helped the teacher successfully utilize the student's knowledge for her pedagogic purpose. Thus, this study demonstrates that orientation toward the core goal is the primary characteristic of institutional talk.
  • 8.

    French Influence on Learning English Lexical Stress by French Learners of English

    재스민 혜슉 | Yoon, Tae-Jin | 2010, 5(6) | pp.75~84 | number of Cited : 0
    Abstract PDF
    Lexical stress in English plays an important role in native speakers’ perception and processing of speech. However, French learners of English have a fixed, final-stress system which differs from the free, variable-stress system of English. This difference in stress systems between the two languages may result in interference by the native language stress system in the production of English stress by French learners of English. This experiment sets out to test the hypothesis of native language interference in stress production. One female native English speaker and one female French learner of English produced 50 initially-stressed, trisyllabic English words (balanced for word frequency) twice in a carrier phrase ‘I didn’t say __but you said __ yesterday.’ A 2 (language) × 3 (syllable position) repeated-measures ANOVA was conducted on the data for each parameter of stress: fundamental frequency, amplitude and duration. The results supported the hypothesis of native language interference for the French learner of English. Implications of further work on second language acquisition and pedagogy were discussed.
  • 9.

    Implementation of Server Virtualization System and User Memory Management using Server Based Computing

    사공현 | Kwak, Jong Wook | 2010, 5(6) | pp.85~92 | number of Cited : 0
    Abstract PDF
    Server based Computing integrates and manages server data efficiently and also provides separate desktop environment to each end-user. In this paper, we proposes a sever virtualization technique to enhance a server utilization ratio and to reduce wasted resource in each stand-alone computing environment. In addition, we also propose virtual OS memory allocation algorithm. In this paper, memory allocation method, called hard hand-off, allocate and reallocate memory space to each end-user, based on the number of current users and server capacity. We can reduce a memory reallocation time, by separating immutable OS area and user data area.
  • 10.

    A Study of a Mobile Work Environment Monitoring System Using Inference Engine ‘JESS’

    전근환 | Ahn Yoon-Ae | 2010, 5(6) | pp.93~101 | number of Cited : 1
    Abstract PDF
    A detrimental work environment causes a decline in work efficiency and contributes to various occupational diseases. To prevent occupational disasters and build a pleasant work environment, it is necessary to develop a monitoring system to keep operators safe from the hazards. This paper proposes a system that makes it possible to monitor a work environment using a mobile device, an inference engine called ‘JESS.’ The proposed system implements a monitoring interface in which JESS and JAVA are interlocked to make it applicable to the Open Service Gateway Interface (OSGi)-based framework. A dangerous situation can be reported immediately to operators through the mobile device. The system mentioned in this paper is not constrained to a particular computer platform and can be easily interlocked with OSGi-based middleware.
  • 11.

    Authentication based on Cluster in Machine to Machine

    Ryu Gab Sang | 이근호 | 2010, 5(6) | pp.103~109 | number of Cited : 3
    Abstract PDF
    As the developing of the information technology, more and more devices are with the capacity of communication and networking. The M2M(Machine to Machine) businesses which communicate with the Machines have been developing rapidly. The M2M communication is viewed as one of the next frontiers in wireless communications. In this paper, we propose a secure cluster based on a clustering scheme that provides an authentication scheme in M2M. We present detailed security threats against M2M cluster architecture. Our proposed procedure, called ACM(Authentication based on Clusters in M2M), designs an authentication procedure that relies on mutual trust between machines in clusters.
  • 12.

    A BLP/BIBA union access control model based on mandatory security property

    Choi Eun-Bok | joo gi park | 2010, 5(6) | pp.111~121 | number of Cited : 1
    Abstract PDF
    This paper presents union access control model to solve access control model's inconsistency based on the mandatory access control property. We found security definition, rule and axiom by confidentiality and integrity in mandatory access control policy as well as analyzed all union circumstances of access control model. Also, we suggest BLP/BIBA union access control model that can provide mandatory access control model's confidentiality, integrity and availability.
  • 13.

    The Security Requirement based on Intelligent Vehicular Network in M2M Environment

    KimGiWeon | KIM, SOO KYUN | 이근호 | 2010, 5(6) | pp.123~129 | number of Cited : 1
    Abstract PDF
    A success of the intelligent vehicular networks has to pass through the analysis of potential security threats and the design of a robust security architecture able to cope with security threats. In this paper, we present the security of intelligent vehicular networks in M2M environment. We provide a detailed security threat analysis and an appropriate security management of the intelligent vehicular networks in M2M . We have explained why intelligent vehicular networks need to be secured, and why this problem requires a specific approach. We proposed a security requirement that imbedded system security, forensic security, user and vehicular authentication, key management and threshold encryption scheme.
  • 14.

    Design and Implementation of Care Plan System for the Aged using Android Application

    하은실 | 2010, 5(6) | pp.131~137 | number of Cited : 3
    Abstract PDF
    This paper describes a design and implementation of a care plan system for the aged people. The designed system will help to communicate among home, nursing home and hospital, to support with high quality and special health service. This silver care business model was also proposed based on the Android SDK platform. The e-business model includes editing care plan systems weekly,monthly and quartly, deciding the level of physical and mental conditions, and medical service information mall in order to support the various requirement depending on physical and mental activities and residential environment of the aged people.
  • 15.

    The implementation of Agricultural machinery monitoring system based on wired and wireless Internet

    김현주 | 이광석 | 2010, 5(6) | pp.139~146 | number of Cited : 0
    Abstract PDF
    Recently the Mobile Internet is a fast and convenient access are being built environment by High-performance CPU and OS, full touch screen and UI, with the diffusion of smartphone. The mobile Internet service have the advantage which the user moves and uses a variety of Internet. In this paper was designed and implemented WIDL-based mobile Internet to support both wired and wireless integrated agricultural machinery monitoring system. The proposed model can be integrated management of operational information for agricultural machinery based on wired and wireless Internet. In particular, in the event of failure of agricultural information on the caues of the acquisition is available in real-time mobile Internet, Thereby minimizing the waste of time is expected to do.
  • 16.

    A Study on the NPCM System for Mobile Environment

    Hong Han Kuk | KWANG HYUK IM | 2010, 5(6) | pp.147~154 | number of Cited : 0
    Abstract PDF
    With the rapid spread of smart phone, online and offline are blurring the boundaries and integrated management for data of personal connections that is managed divided into offline and online is being made available. Offline personal connections have high data reliability, and online social networking data have high scalability and convenience. It is needed research for personal connections management(PCM) system that combines the advantages of data of offline personal connections and online social networking data, maximizing the usefulness of rapidly evolving mobile environment. In this paper, we propose name card personal connections management(NPCD) system for mobile environment, and verify the proposed system by presenting the test-operated results during certain periods.
  • 17.

    Design of Microstrip Patch Antenna for Mobile Communication

    문선주 | Kim,SeokHun | Choi, Jae Yeon | 2010, 5(6) | pp.155~162 | number of Cited : 0
    Abstract PDF
    In this study, a very efficient small antenna used in ISM band is designed and implemented. Additionally the desirable characteristic of the antenna is obtained by analysis and experiments. The suitable types of antenna are determined by considering the bandwidth, the electric field intensity of transmitter and receiver and the cell size. It is shown that the separation height between the patches plays a significant role in improving the impedance bandwidth of the antenna. An wideband technique is introduced to design a microstrip antenna to improve the narrow band characteristic. Two types of the microstrip antennas are implemented. The maximum bandwidth of the antenna with parasitic elements is obtained by repeating a number of experimental trials and referring to the analytic approximation formula.
  • 18.

    Design and the Characteristic Analysis of Balun for Broadband Horn Antenna

    문선주 | Lim, Dong Kyun | Choi, Jae Yeon | 2010, 5(6) | pp.163~169 | number of Cited : 0
    Abstract PDF
    In this study, the balun for the broadband TEM horn antenna is designed and analyzed. The assumption can make the analysis easy that there exists the only the vertical component of the current on the conducting plates. According to this assumption, the TEM horn antenna can be approximated to many dipole antennas. The TEM horn is feeded by the balun which is designed here. The two stage cascaded Lange coupler composes the balun and the impedance transformer is already designed by the short-linear matching method and the linear double taper method. The TEM horn antenna is analyzed by measuring the input impedance and the return loss. The transfer characteristics of the balun is also analyzed.
  • 19.

    Temperature Monitoring System using Optic Fiber Sensor and Historical Temperature Information

    이창근 | 구명모 | 김영수 and 2other persons | 2010, 5(6) | pp.171~177 | number of Cited : 0
    Abstract PDF
    Today, due to changes of the environmental factors, temperature sensors are required in the industry area in which an unexpected accident may occur in oder to measure the temperature exactly. RTD sensor is used most often among the temperature sensors. Because of high stability and high sensitivity it is possible to measure the high accuracy temperature measurement. However, due to the influence of the external environment, a temperature difference can occur. It may cause high precision to control difficult which required in the automatic control systems. Therefore, in this paper, we suggest a temperature monitoring system which can be monitored the temperature changes exactly using optic fiber sensor less influenced in the external environment. We also analyze and evaluate the collected temperature information in the system using the RTD temperature sensor. After the experiment results, we could measure the more accurate temperature changes in the system using optic fiber sensor.
  • 20.

    A Design of D-PACs for Access Control and Profile Storage on Ubiquitous Computing

    양명섭 | 양진영 | Changbok Jang | 2010, 5(6) | pp.179~189 | number of Cited : 1
    Abstract PDF
    Users are able to use the information and service more free than previous wire network due to development of wireless network and device. For this reason, various studies on ubiquitous computing have been conducted. Also, applications in ubiquitous computing environment will be connected wireless network and various devices. According to, recklessness access of information resource can make trouble of system. So, access authority management is very important issue both information resource and adapt to system through founding security policy of needed system. But, existing security model is easy of approach to resource through simply user ID and password. For this reason, we suggest D-PACs(Dimension Profile and Access Control system), which stores location, time, and frequency information of often used services, and propose model of automated context-aware access control using ontology that can more efficiently control about resource through inference and judgment of context information that collect user's information and user's environment context information in order to ontology modeling.
  • 21.

    Classroom Environment Monitoring System using USN

    진광윤 | Yoo Hee Kyung | 최신형 | 2010, 5(6) | pp.191~196 | number of Cited : 0
    Abstract PDF
    Ubiquitous computing enables a more convenient life, and can be applied to various fields. In this paper, we propose an applied model in the classroom using the home network service based on the ubiquitous technology and implement a system which is capable of monitoring classroom environment. In conclusion, this research provides a system that collect and analyze temperature and illusion value in real-time. Based on this, we are able to control the various devices installed in the classroom.
  • 22.

    Effects of IPTV Utilization by Introducing Haptic Device

    이동건 | 김진술 | Lee Sang Joon and 1other persons | 2010, 5(6) | pp.197~209 | number of Cited : 0
    Abstract PDF
    The convergence of broadcasting and communication based on development of digital technology and the Internet are accelerating. IPTV, emerging as one of the new business model is coming into the spotlight as the most popular media. The improvement of input device is needed in order to use interactive services, advantages of IPTV. The development of haptic device is being prepared to improve interactivity of IPTV service. In this paper we studied how the IPTV product quality and consumers' characteristics affect motivation and intention to use of IPTV service when we introduce a haptic device. Research model and research hypotheses were established and surveyed. We found usability, responsiveness and cost of IPTV haptic device effect on the perceived ease of use of IPTV. And we found functionality, reliability, playfulness of IPTV haptic device impact on the perceived usefulness of IPTV. In addition, IPTV perceived usefulness and ease of use was also effect on intention to use. These results suggested meaningful results about what IPTV service providers, haptic device manufacturers, platform operators and content providers should be prepare to vitalize IPTV industry.
  • 23.

    Analysis of the Relative Importance for Major Factors in Shopping Malls on the Agricultural Products using AHP

    이충수 | 2010, 5(6) | pp.210~217 | number of Cited : 3
    Abstract PDF
    The e-commerce of agricultural products is expected to play an important role to improve the distribution structure, that has long and complex distribution channels of agricultural products. Currently, the shopping malls on the agricultural products increasing. In this paper we will provide the important factors to consider to build and operate shopping malls on the agricultural products. For this, we analyze the relative importance for evaluation factors of shopping malls on the agricultural products using AHP(Analytic Hierarchy Process)
  • 24.

    Design and Implementation of Unified Management System for Electronic Components Production

    Ryu Gab Sang | 이근호 | 2010, 5(6) | pp.219~225 | number of Cited : 0
    Abstract PDF
    Small & Medium manufacturers are buying the production information system to improve productivity. In this paper, we propose the production information system for the domestic electronics manufacturers. The system was applied international standard. MESA-11 and ISA-95 for compatibility of the application. And integrated production management system was implemented using the CBD development approach to ensure high performance and high quality. The developed system has proved to contribute to productivity improvements.
  • 25.

    A study on recognition for the software use of individual user and PC seller

    조운석 | Lee Sang Joon | 2010, 5(6) | pp.227~238 | number of Cited : 0
    Abstract PDF
    The using of Information Technologies is essential for every sector of any industry, and the role of software is becoming more important for enlargement of its practical application. While the purchasing prices for software are increasing, the willing for producing pirated copies are existing as well. Therefore in this work, the problems associated with the reasons which cause the piracy, its process and the present software piracy situation of individual users were discovered. According to PC seller’s opinion, the high prices for the software are the main reason which leads to piracy. The possible relationship between PC sellers and software piracy was trying to be found. PC selling stores workers and the ordinary users – who visited these stores for buying a computer – as well as company workers and students were participating in the survey to gather the information. After the analysis of the survey we came to the following consequences. Acceptable prices are needed to use the genuine software, and it was found that campaigning can be more effective rather than fighting against the piracy. Based on survey several types of programs were discussed with regard to promotion of using genuine software.
  • 26.

    Performance Evaluation for Speech Recognition and Extraction of the Speech Characteristic Vector by using the Principal Component Analysis Method

    이광석 | 김현주 | 2010, 5(6) | pp.239~245 | number of Cited : 0
    Abstract PDF
    The new method of characteristic extraction is proposed, considering the statistic characteristic of human speech, unlike the conventional methods of the traditional speech characteristic extraction. PCA(Principal Component Analysis) is applied to new this method. Then, the new method is applied to real speech recognition to assess performance. When results of the number recognition in this research and the conventional Mel-cepstrum of speech characteristic parameter are compared, there is 0.5% difference of recognition rate. Better recognition rate is expected than word or sentence recognition in that less convergence time than the conventional method in extracting speech characteristic. Also, Better recognition rate is expected when the optimum vector is used by statistic characteristic of data.
  • 27.

    Implementation of Automatic Onion Selection System using Real-time Image Processing

    KimGiWeon | 양진영 | Kim,SeokHun | 2010, 5(6) | pp.247~253 | number of Cited : 0
    Abstract PDF
    Defect of onion was depreciated the product value and cause storage disease seriously. In this paper dose a onion surface check using a real time image process at the onion production line. Finally developing a automatic selection system using image processing technique. This system does false retrieval of a onion at a onion production line. At first, a onion image was read in real time using a CCD camera. In this paper, we use an area scan CCD camera. Image is converted into a binary code image using a high-speed imaging process board afterwards. And RGB color image is converted into a HSI color image. Then, onion surface feature is extracted by a HSI color image. Surface false retrieval is finally executed using a onion feature. In this paper, we use an area feature of a onion image.
  • 28.

    Study on the Optimal Method of Handover Operation for HRI

    Lee Sang Joon | Jang, Byeong-Ok | 2010, 5(6) | pp.255~261 | number of Cited : 0
    Abstract PDF
    In the era of ubiquitous, ubiquitous home-service robot exist on one of the most important roles for human-helper. We propose the advanced methods of determination of grasp sites for handover operations. And also, we address useful operations for handover: two-step handover with midair re-grasp. We show the effectiveness of our algorithm for interaction between human and robots with 3D graphical simulations, and then it is tested with our humanoid real home service robot. The designed 3D grasp planner is modeled using each different objects and finally, proved the proposed grasp method which is considering etiquette factor for efficient human grasp.
  • 29.

    3D Point Set Rendering for iPhone

    Sun-Jeong Kim | 2010, 5(6) | pp.262~268 | number of Cited : 1
    Abstract PDF
    In this paper, 3D point set rendering algorithm is adapted to iPhone. Recent advances in scanning technology have led to a rapid increase in the availability and size of geometric data set. Instead of reconstructing a 3D mesh from a given point set, directly rendering it is very efficient in the running-time and space requirement. In addition, the smart phones such as iPhone have the advantage of rendering a point set because they may have not enough resources to display a 3D mesh whose size is bigger than the size of a point set representation. This paper introduces the rendering scheme of a 3D point set using OpenGL ES 2.0 in iPhone4. Shader techniques in OpenGL ES 2.0 enables to obtain the high-quality results of 3D point set rendering in the smart phones.