Korean | English

pISSN : 1975-7700 / eISSN : 2734-0570

2020 KCI Impact Factor : 0.42
Home > Explore Content > All Issues > Article List

2011, Vol.6, No.6

  • 1.

    A Study for the E-commerce Activation of Eco-friendly Agricultural Product through the Reliability Analysis of Shopping Mall

    Oh-Seong Jeon | Lee Sang Joon | kwon, Gwiyoung | 2011, 6(6) | pp.1~14 | number of Cited : 2
    Abstract PDF
    Desire for safety and health on agricultural produce became an overall social phenomenon. Demand for environment-friendly agricultural produce is constantly on the rise. The volume of production is on the rapid increase as well with the government’s active support for eco-friendly agriculture. The pace of growth in e-commerce transactions of eco-friendly agricultural products tends to be relatively slow because of complexity of distribution stages, imbalance of supply and demand, poor delivery system, high prices, and consumers’ low awareness on reliability. In this paper we empirically researched that e-commerce transactions will be promoted if consumers’ satisfaction levels can be high by increasing the reliability on major component elements like producers, certification organizations, and distributors.
  • 2.

    Optimization of Oriental Medicine Survey Using Data Mining Techiniques

    김영태 | Park Sangchan | Sangchul Lee and 4other persons | 2011, 6(6) | pp.15~22 | number of Cited : 2
    Abstract PDF
    The purpose of this study is to optimize the survey items for oriental medicine, appling data mining techniques used in the fields of engineering. If survey items can be minimized through systematic survey data analysis, customer attributes may be identified in advance to increase service efficiency and customer satisfaction in oriental medicine. In this study, cluster analysis was conducted to classify the groups into one with Pyungwi-san symptom and the other without the symptom. Subsequently, the rules were determined by clustering with higher scale response through decision tree analysis to construct the optimized survey for Pyungwi-san symptom.
  • 3.

    A Study on User Authentication using Speech Recognition in Smart Work Environment

    Yoo-Kyeong Wi | 곽진 | 2011, 6(6) | pp.23~31 | number of Cited : 1
    Abstract PDF
    Smartwork is flexible work type providing convenient work environment to people. Many countries are promoting introduction of smartwork provide for convenient work environment. As the importance of smartwork is increasing, countermeasure of security threats become more important. Especially, we found it necessary to countermeasure the problem, because illegal program and malicious code can be installed by unauthorized devices or the attacker can trying to leak confidential information. In this paper, we propose user and device based light-weight authentication protocol using XOR operation and hash operation.
  • 4.

    A Study on Secure Device Authentication Protocol in Smart Work Environment

    Su-Young Jung | 곽진 | 2011, 6(6) | pp.33~40 | number of Cited : 0
    Abstract PDF
    Smart work is flexible work type providing convenient work environment to people. Many countries are promoting introduction of smart work provide for convenient work environment. This importance about security threat was increased while interest about smart work was increased. Especially, if not authentication device, the attacker possible leak data for company's secret information. In this paper, we propose user and device based light-weight authentication protocol using XOR operation and hash operation.
  • 5.

    Design of Enhanced Secure Authentication and Authority Management in Cloud Computing Environment

    정현미 | LEE GANG SOO | 2011, 6(6) | pp.41~50 | number of Cited : 0
    Abstract PDF
    In the existing web service environment, the service that is provided after verifying identities at the step of user identification and authentication was in the majority, but the authorization step is most important in the service environment that provides IT infrastructures like cloud computing services. Due to the characteristics of the cloud computing service, the user authentication has to be led to the authentication technology for the user authority management. In this paper, we designed a suitable authorization method that can guarantee sufficient controls and personal information protection about the user information by designing to combine SSO(Single Sign On) and PKI(public-key infrastructure).
  • 6.

    Access control system use of the smart wallet based on One-time password

    Choi Yo Han | Hee-Suk Seo | 2011, 6(6) | pp.51~59 | number of Cited : 0
    Abstract PDF
    Access control is the primary means for security. in today, Key makes use of RFID for the most access control. But it is not safe more using RFID access control system As attackers develop technology. In this paper, we are vulnerable to cloning using RFID access control system as a solution for the one-time password-based access control system utilizing. Using smart wallet in order to perform user authentication process, the device requires pairing of smart phones. However, security procedures are applied only to the level of security strength is low. In this paper, a smart wallet's existing in order to increase the security of the pairing process, introduced a one-time password. Take advantage of it to apply to the access control system should provide the system configuration.
  • 7.

    A Simulation Study of Sequent Multiprocessor system

    Lim Chung Kyu | 이정열 | 2011, 6(6) | pp.61~67 | number of Cited : 0
    Abstract PDF
    In this thesis, the Sequent multiprocessor system based on memory sharing are simulated and discussed.. This system is to overcome the limits of single processor, and is shared memory multiprocessors running version of UNIX and supporting both the Berkeley UNIX and UNIX system V command sets on the symmetry. The characteristics and microtasking routines of the system are shown. A parallel algorithm is implemented on the Sequent system with a certain number of processors, from 1 to 4, respectively. The execution time and the speed-up are used to measure the performance per processors. In conclusion, computational results are cited in the thesis.
  • 8.

    E-textiles Visualization System for Digital Costume Design

    이동욱 | 오승원 | 김진술 and 1other persons | 2011, 6(6) | pp.69~76 | number of Cited : 2
    Abstract PDF
    In Digital costume is clothing for performer which consists of lighting devices and clothing materials. It can provide stronger visual effects than traditional performer costume. Because the digital costume is hard to modify after built, design of the digital costume is one of the most important procedures. This paper proposes Digital costume visualizer, which visualizes digital costume in 3D virtual space. The visualizer creates virtual digital costume based on the costume model and luminous pattern which created by a user. To create a visual appearance which similar to the real digital costume we applied Bloom effect to the luminous patterns. By applying several control values to the Bloom effect, the visualizer can provide various visual effects. As a result, the visualizer provides enough functionalities and effects for design process of the digital costume.
  • 9.

    Development and Prospects of Cultural Industry in China

    张换兆(Huan-Zhao Zhang) | 김상욱 | 2011, 6(6) | pp.77~83 | number of Cited : 6
    Abstract PDF
    This paper analyses the structure and characteristics of cultural industry in China, from sector and regional approach. The China cultural industry could divide the public sector cultural industry and management sector cultural industry. In the pre-the reform and opening policy period, the public sector cultural industry had an important roles, but in the after-the reform and opening policy period, the management sector cultural industry have an important roles. The cultural entertainment industry become the major sector. In particular, the internet bar leads the cultural entertainment industry in China. The lower-value added cultural industry sector more developed than the higher-value added sector in China. The cultural industry of Shanghai, Zhejiang, Jiangsu, Guangdong, Sichuan, Shandong regions more developed than another regions in China. The development of cultural industry and regional economic development have an strong relations. The regional concentration index C5 is 38.31%, and C10 is 59.34%. The proportion of cultural industry in 2009 GDP is only 0.3%. But, along with economic development level, the cultual demand also could increase, and the cultural industry also would develop.
  • 10.

    Scheme for Prevention Sleepiness Using Automation Traffic Information in Intelligent Vehicle

    김수균 | 이근호 | 2011, 6(6) | pp.85~91 | number of Cited : 0
    Abstract PDF
    The convergence of industry is invigorated by the advancement of IT(Information Technology). As the developing of the information technology, more and more devices and machines are with the capacity of communication and networking. The M2M(Machine to Machine) businesses which communicate with the machines and devices have been developing rapidly. The development of an intelligent vehicle is an industry where IT is necessary as the improvements promote safety driving while offering public service. It generates traffic signal extension and diagnostic service of the cars as well. In this paper, we suggest a technique to check drowsy driving, which is being the greatest cause of vehicular accidents. We provide a method to warns to surrounding cars and lower outage rate by sleepiness driving to driver opening window if sleepiness is expected because of measures temperature and carbon dioxide amount in vehicle.
  • 11.

    Development and Application of STEAM Education Program Using Crayon Physics

    오정철 | 김종훈 | 2011, 6(6) | pp.93~102 | number of Cited : 1
    Abstract PDF
    For this study, we researched recent trends of STEAM education from case studies documented in domestic and foreign papers. By doing so, we develop and apply the STEAM education program through the use of Crayon Physics. This program is designed for the 7th lesson ("A Serviceable Tool") of 6th graders' science in elementary school. As a result, the creativity index and positive attitude about science of the students who went through the researched program increased with meaningful difference compared to that of the sample population. Specifically, there was a sharp increase in originality and exquisiteness. Furthermore, positive responses increased in both the cognition and interests among affected regions related to science. The result of this study shows that the STEAM Education Program, using Crayon Physics, can improve creativity. And we can confirm that it brings positive changes for the Science-Related Affective Domains.
  • 12.

    Design and Development of Origami Application base on STEAM Education for Improving Geometric Problem-Solving Abilities

    김병수 | Jonghoon Kim | 2011, 6(6) | pp.103~110 | number of Cited : 2
    Abstract PDF
    Many scholars choose 'Integration and Creativity' as abilities of a talent for leading the future. Korean MEST's selection of strengthening STEAM education as a priority task might be a suggesting a new vision for the future education. Also, because of the stream of times of the implementation of digital textbooks and smart-learning, integration education using ICT is foreseen as the essential field for every other educational teaching and learning activities. In this study, we have tried to develop the application for learning contents of geometric figures by learner's manipulation with Origami. We expect learners to be able to get help to improve their geometric problem-solving ability from this application based on STEAM education.
  • 13.

    Study on building up m-learning vocabulary contents for teenage Korean language learners who aim to settle down in korea

    심형철 | 심혜령 | 2011, 6(6) | pp.111~119 | number of Cited : 4
    Abstract PDF
    Due to the development of mobile technology, current paradigm of education is gradually shifting to m-learning from e-learning. Following this change, the necessity of adequate education strategy and contents development for m-learning in Language education is becoming evident. So this paper suggests the following for the establishment of educational mobile contents in Korean language education: searching for appropriate ways and targets in the mobile environment of Korean language education, settling the educational contents based on the targets, selecting and analyzing adequate materials for building up the educational contents. And based on the previous discussion, this paper discusses loan word education for the teenage Korean language leaners who aim to settle down in Korea.
  • 14.

    Designing a Teaching Method of Blended English Language Instructions Using Web 2.0 Technologies

    변진석 | Jungtae Kim | 2011, 6(6) | pp.121~126 | number of Cited : 4
    Abstract PDF
    The development of web2.0 technology has contributed to language instructional design in terms of increasing interaction between learners and their motivation. Also the combination of web2.0 technology and storytelling activities would diversify instructional activities. A blended teaching method through the appropriate combination of both offline and online activities would enhance the effect of learning greatly. The blended teaching method is an instructional method that maximizes the effect of online instruction whose advantageis learner-centered repetitive and/or preview study free of the limitation of time and space and that of offline instruction whose advantage is direct interaction between the teacher and learners or between different learners. In designing such a blended English teaching method, integrating several web2.0 technologies such as Phrasr, Dumpr, Jaycut, Prezi, Dipity into offline teaching activities would surely increase learners 'interaction and motivation in learning.
  • 15.

    A Study on Management Information Systems Curriculum in MBA

    김광현 | 2011, 6(6) | pp.127~132 | number of Cited : 0
    Abstract PDF
    In MBA program, Majoring MIS is not added Information Technology but mixed Information Technology with Management. Information Technology and Management Strategy have to balanced. Subjects of Management are more than Information Technologies in curriculum. Now it has to be changed. Through concrete research of curriculum, I propose new Model. Universities have been constantly challenged to develop and maintain an MBA curriculum which adequately prepares student to succeed in a business environment. In particular, academia has struggled to identify and incorporate the ideal balance of technology and strategy into the Management Information Systems course. This paper examines the literature and summarizes the most critical content that should be included in the core MIS course of an MBA program.
  • 16.

    Development of Artificial Intelligence Education Program for Convergence Education based on RST Approach

    김준우 | 임광혁 | 주지영 | 2011, 6(6) | pp.133~141 | number of Cited : 1
    Abstract PDF
    In general, convergence education programs aim to convey a multidisciplinary topic which embraces subjects such as science, technology, engineering and mathematics, and technology usually acts as an integrator in convergence education programs. In this context, it is pointed out that providing the applications and experiences of advanced technologies is an essential part of the convergence education programs. To achieve the goal of convergence education programs, it is very important to overcome the gap between technology experiences and studying theory, and education programs should provide a clear link from technology experiences to studying theory. On the basis of this strategy, this paper develops an artificial intelligence education program targeted at the middle and high school students.
  • 17.

    A Background Subtraction and Post-Processing for Effective Foreground Object Detection

    Young-Sub Kim | 박종대 | Kwangseok Lee and 2other persons | 2011, 6(6) | pp.143~150 | number of Cited : 0
    Abstract PDF
    This paper is studies on object detection using background subtraction techniques and effective post-processing technique on detected objects. AMF(Approximated Median Filtering) as a typical background subtraction technique is effective to processing time and memory use by recursive technique. But it generates loss on the interior of object and processing time slow because of process of positively curved region. To overcome problems, this paper is proposed to modified AMF and we prove a superiority of modified AMF by performance evaluations of adaptive Gaussian mixture model and Eigen-background. Also, to precisely rapidly detect objects, we propose a effective post-processing method on a binary foreground segmentation mask acquired through a proposed background subtraction techniques and prove through experiments.
  • 18.

    Development of Image Processing Program for RFLP Analysis

    KimGiWeon | 정진영 | Kim,SeokHun | 2011, 6(6) | pp.151~156 | number of Cited : 0
    Abstract PDF
    RFLP analysis in molecular biology is a commonly used method. For example, RFLP analysis is used to identify mutations in the genes. RFLP method caused by genetic defects in the Mediterranean can be used to diagnose anemia. It also proved useful in diagnosing hemophilia. This method analyzes the differences in banding patterns. In general, the number of band patterns and the position of a pattern is analyzed. In this paper, we develop image processing program. The program will automatically perform RFLP analysis. First, the input DNA band patterns were pre-processed. Then the features of the input patterns were extracted. By pattern matching with the standard pattern similarity was calculated. In this paper, the number of banding patterns and location of the banding pattern was used to calculate the similarity.
  • 19.

    Acoustic Signal Localization and Estimation Method for the Number of Speakers in Mixed Speech Signals for Security System

    Young-Sub Kim | Kwangseok Lee | 고시영 and 1other persons | 2011, 6(6) | pp.157~163 | number of Cited : 0
    Abstract PDF
    This paper is a study on acoustic signal localization and estimation method of speaker number in mixed speech signals radiated to many speakers for security system. A proposed system of acoustic signal localization has reduced a complexity of calculation on sound arrival time-gap between microphones using geometry structure and NCC(Normalized Cross Correlation). Additionally, we allow for economic terms using two low price sound card and four condenser microphones. And then, sound features is abstracted for confirmation of speaker number using a property (that) it have notable modulation pattern that intensity envelope of purest sound signal can be determined around the 4~5Hz for speaker number estimation in mixed sound signal and we estimate speaker numbers using GMM.
  • 20.

    A Study on the Technical Regulation for Magnetic Filed Inductive Radio Equipment with 8.2MHz Frequency Band

    Kang,Young-Jin | 김선엽 | 2011, 6(6) | pp.165~171 | number of Cited : 0
    Abstract PDF
    In this paper, we researched needs of new technical standard for magnetic inductive radio equipments using 8.2MHz frequency band. For this, we analyzed the problem of Korean output regulation in the relevant band through an analytic comparison of the current trend of each country and their standard value in 8.2MHz frequency band. In connection with the value of standard regulation of each country, which has been proposed in the registration of the appropriate electro-magnetic wave, the paper aims to propose the standard value of magnetic field strength that could actually be introduced for suitable unauthorized magnetic filed inductive wireless devices in Korea. Therefore, provided that the Korean standard may be established based on the standard regulation of the magnetic field inductive radio equipment using 8.2MHz in this paper, this is expected to be committed to the distribution and advancement of magnetic field inductive wireless devices.
  • 21.

    Implementation of the user-interface controller and simulator with wireless transceiver for CNC machine

    추연규 | 2011, 6(6) | pp.173~179 | number of Cited : 0
    Abstract PDF
    CNC(Computer Numerical Control) machine frequently used in the industrial fields has integrated system control based on open network and open control system these days through technical innovation being a successful combination of internet technology. It is uncomfortable to many workers to handle user-interface board of big scale CNC machine because it is based on cable network. On this paper, we proposed and designed the user-interface controller with wireless tranceiver for CNC machine available to replace the previous controller with interface cable. We designed the simulator and verified it with LabVIEW based on GUI programming tools. The wireless controller consists of the low power microcontroller for numerical operation and the wireless module using 2.4GHz frequency. We designed the wireless controller with an emphasis on the low power and battery management, user’s convenience and effectiveness and robustness for noise on the industrial field.