Korean | English

pISSN : 1975-7700 / eISSN : 2734-0570

Home > Explore Content > All Issues > Article List

2012, Vol.7, No.1

  • 1.

    A Study on Service Quality Oriented U-service Reference Model for U-eco City Integrated Operations Center(IOC-UC)

    MIN JUNG LEE , Lee Jungwoo | 2012, 7(1) | pp.1~10 | number of Cited : 3
    Abstract PDF
    In order to provide U-services successfully, the researches have been focused on U-eco City Integrated Operation Center(IOC-UC) which will gather, process, and store information on U-services and make appropriate recommendations to service operators in U-City. To improve the reusability and flexibility of U-service and to avoid duplicate development, the service reference models for IOC-UC have been studied. Recent researches on U-services address on the definition and classification of u-service, but do not consider service quality. In this study, we suggest the service reference model for IOC-UC considering service quality framework such as PCF(Process classification framework), QFD, 4M1E and DMAIC and considering UML such as usecase diagram, class diagram and sequence diagram which enable to represent the static and dynamic characteristics of U-service. The service reference model can communicate among different agencies efficiently and minimize time and cost for developing new IOC.
  • 2.

    Smart Home Platform Based on SOA

    김진홍 , 김현호 | 2012, 7(1) | pp.11~19 | number of Cited : 0
    Abstract PDF
    Smart Home is defined as a residential space in which wired and wireless devices provide safe, secure, and convenient services. It is a service that comes in a total package of plug and play, smart, and screen. For instance, lighting can be customized automatically for a resident with a remote controller. The characteristic of Smart Home is not only electric security system, but also voice recognition system. The structure of Smart Home Service Architecture with Smart Platform is usually server-centered and thus causes many problems especially in a dynamic environment, resulted in a very difficult interaction. In addition, the most important issue for Smart Home is how to provide efficient, appropriate services to its residents. In order to solve the problem in general environment and provide appropriate services to smart home platform, we propose Smart Home Platform that is based on SOA. Smart home platform has service-centric mechanism and applies a component that uses Open Services Gateway Initiative (OSGi) platform, which provides smart home service in smart network environment.
  • 3.

    A Study on Security Threat of Broadcasting Convergence Service and Mobile Environment for N-Screen

    지성인 , Hee-Suk Seo | 2012, 7(1) | pp.21~27 | number of Cited : 1
    Abstract PDF
    Today, new television service is activated called IPTV. Content delivery method called VOD(Video On Demand) can watch the program which viewers want to watch. And be on the rise N-Screen Service which use same platform and clouding system in multiple terminal. Recently, Smart Phone, Tablet PC and Smart TV is appear, so it is said N-Screen Service is becoming. IT convergence service like IPTV as appear threaten on the original internet, because it is stand on the basis IP network and broadcasting technology. Therefore, security threaten and weak point should be identified for Security mechanism of IT convergence service is correctly applied.
  • 4.

    Development of First Person Collision Avoidance Game

    SYUNGOG AN , 이용운 , Soo Kyun Kim | 2012, 7(1) | pp.29~34 | number of Cited : 0
    Abstract PDF
    Most collision avoidance games are using two dimensional graphics in third person point of view. This thesis proposes an unconventional developmental method for first person collision avoidance games using three dimensional graphics. This method breaks away from the up, down, left and right movements of the traditional third person point of view. The point of view is changed to first person and the movements are much like that of First Person Shooters (FPS). Also, the new method uses an Oriented Bounding Box (OBB) in which the axis is frequently changing rather than the conventional Axis Aligned Bounding Box (AABB) used two dimensional games in which the axis is fixed in one position. The objective of the OBB is to allow elaborate collision detection skills in three dimensional graphics, just as in two dimensional graphics. The advantage of this method is that it was developed to be compatible even in low quality PCs.
  • 5.

    Third-person shooter with Ogre3D Engine

    Park Dong-Won , 김태환 , Soo Kyun Kim and 1 other persons | 2012, 7(1) | pp.35~42 | number of Cited : 0
    Abstract PDF
    As the current hardware is going through rapid advancements, the software is also developing in wide ranges according to the various uses. These progressions resulted in more convenience in game development through the use of the game engine. Game engines present important algorithms into simple functions, which allows easier development and shorter duration of the developing process and thus reducing overall costs. The objective of this paper is to body out a unique game factor which applies various game genre that are more advanced than the existing genres, by adopting a new system, based on the graphic engine Ogre 3D, that applies the object of the card into third-person shooter games which enables the summoning of various equipment and thus allows the gamer to enjoy more diverse battles.
  • 6.

    A Study on Educational Effect of Digital Logic Circuit Using Multisim

    강원미 , Lim, Dong Kyun | 2012, 7(1) | pp.43~50 | number of Cited : 2
    Abstract PDF
    In this paper, we present a method that improves the study achievement by designing a digital clock and simulating it with multisim program on the subject, Digital Logic Circuit. The subject, Digital Logic Circuit, is a theory-practice combined subject which allows the students to learn designing skills using basic theories. Using this property of the class, we intend to increase the effect of the study by using multism program to simulate practices shown on the textbook and show the actual circuit performance. Multisim program directly shows the simulated result on the 7 segment schematic just like the actual circuit, arousing learning motivation. This learning motivation causes more active class participation and a hard work trying to understand more difficult parts. For this study, H university students majoring in Electric department were selected to test this method. After the analysis of the class evaluations, 92.8% of students said that they understood the class clearly and 89.2% of students commented that the assessments using Multisim helped the effects of the class to increase.
  • 7.

    The Development of an Immersive Simulator for Snowboarding

    김상연 , 박원형 , Hee-Suk Seo | 2012, 7(1) | pp.51~58 | number of Cited : 0
    Abstract PDF
    In this paper, we suggest an immersive snowboard simulator which allows users to experience the same sensation as if they enjoy snowboarding on the snow, and furthermore it enables users to experience phenomena in virtual environment which are difficult to illustrate in real world. We develop a motion creation system for generating the motion and haptic behavior of the snowboard according to the user's motion command, and we construct a graphic system for visualizing the virtual environment as the motion creation system moves. In order to provide motion feedback information to users, the proposed system computes the snowboard's acceleration and uses it. The vibrotactile feedback in this proposed system is achieved by manufacturing an eccentric motor which creates vibration according to its revolution. The proposed system can be used as a training system for snowboarders because the system provides a variety of haptic and motion sensation.
  • 8.

    PTZ Camera Based Real-time Object Tracking System Using OpenCV

    조지훈 , LEE SANG GU | 2012, 7(1) | pp.59~65 | number of Cited : 2
    Abstract PDF
    In this paper, we implement a robust real-time surveillance system of image object tracking for Pan-Tilt-Zoom(PTZ) cameras. For image object tracking, we use the CAM shift tracking algorithm based on the HSI color image distribution of detected moving objects. CAM shift algorithm is very efficient for real-time tracking because of its fast and robust performance. In the proposed system, C++ and OpenCV libraries are used for image processing and accessing the PTZ protocol and RS-485 communication for controlling the positions of PTZ camera in order to arrange the moving object images in the middle part of the monitor screen. This system can be applied to an effective and fast image surveillance system for continuous object tracking in a wider area.
  • 9.

    Analysis of the Differences of Learner's Introvert-Extrovert Trait on the Degree of Concentration and Satisfaction at the Asynchronous Web Discussion

    김태웅 | 2012, 7(1) | pp.67~77 | number of Cited : 5
    Abstract PDF
    The purpose of this study is to find the differences of learner's introvert-extrovert trait on the degree of concentration and satisfaction at the asynchronous web discussion. The data for this research was collected from the total of 56 learners. The research data is testified through ‘MANOVA method’. The results of this study were summarized as followed : First the learner's introvert-extrovert trait affects the learner's discussion concentration degree. That is, the introvert trait was more effective than the extrovert trait in the discussion concentration degree. Second the learner's introvert-extrovert trait affects the learner's discussion satisfaction degree. That is, the introvert trait was more effective than the extrovert trait in the discussion satisfaction degree. Based on these research results, it was suggested that learner's introvert-extrovert trait should be utilized in order to improve the discussion concentration and satisfaction on the Asynchronous web discussion.
  • 10.

    Performance Analysis of 3D Deformable Object Simulation for Smartphone Performance Analysis of 3D Deformable Object Simulation for Smartphone

    전재홍 , Min Hong | 2012, 7(1) | pp.79~84 | number of Cited : 0
    Abstract PDF
    Due to the development of various types of applications, the activated smartphone market has been rapidly expanded these days. Increasingly game market uses smart devices rather than PC environment because customers use smartphones anytime and anywhere they want. Smartphone users want games which have more sense of reality so than recent released games include physics engines in their applications. However smartphones in market cannot sufficiently provide computing speed which is required by physics engine. This paper implemented and provided the possibility of applications for various types of 3D deformable object simulation with physics engine in IOS based smartphones. Also this paper analysed the possibility of inclusion of physics engine for collision detection and handling of 3D deformable objects in smartphone.
  • 11.

    Design of AC to AC Voltage Converter Using Solid State Switches

    Um Keehong | 2012, 7(1) | pp.85~91 | number of Cited : 0
    Abstract PDF
    Conventional power transformer adopted AC/DC and DC/AC converters in order to transform an AC voltage signal to another AC voltage signal. Recently, a few studies have been done on the direct conversion of an AC voltage to another AC voltage. In this paper, we present a digital controller system which can be applied to intelligent AC to AC voltage conversion to be used for an automatic voltage control by using only few transistors, replacing conventional electrical power transformers with solid state switches. We have designed an AC to AC voltage converter by adopting solid state switches in order to obtain an AC output power. It was possible to obtain highly efficient AC to AC converter by adopting AC power switches for pulse-width modulator(PWM). By introducing only few solid-state switches, high power solid state devices and networks of power distribution. The P-spice simulation showed the effective output of our converter we designed.
  • 12.

    Similarity Measure Between Interval-valued Vague Sets Using Gravities, Spreads, Heights, and Similarities

    양명섭 , DongEun Lee , Cho, Sang Yeop | 2012, 7(1) | pp.93~100 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a similarity measure between interval-valued vague sets. The proposed method considers the similarity of the gravities between interval-value vague sets, the difference of the spreads, the heights, and the degree of similarities between interval-valued vague sets. In conventional researches on similarity measures, those have studied on the degree of match between the antecedents in rules and facts, similarity measure based on level average integration, similarity measure based on geometric concept, similarity measure based on geometric distance and COG points, similarity measure based on geometric distance, perimeters, similarity measure between the interval-valued trapezoidal fuzzy numbers, and heights, and similarity measure between interval-valued vague sets based on COG, spreads, and heights. The interval-valued vague sets are a kind of the fuzzy sets of which the upper bound and the lower bound are represented as the intervals of the interval-valued fuzzy sets respectively. We also prove three properties of the proposed similarity measure: 1) Two interval-value vague sets A and B are identical iif =1, 2) =, 3) If A and B are real numbers, then =. Let interval-valued vague sets A and B. It provides a useful way to deal with similarity measure between interval-valued vague sets in fuzzy systems, fuzzy decision making systems, fuzzy reliability analysis.
  • 13.

    RFID-based Location System for Handicapped Students using RTLS

    Young Hwan Oh | 2012, 7(1) | pp.101~109 | number of Cited : 1
    Abstract PDF
    Recently the popularity and explosive growth of smartphone has brought location-based services (LBS) into the mainstream. RTLS(Real Time Location System) is the system to provide information and real-time location of tagged objects by using RTLS tag. RFID(Radio-frequency identification) is the use of a wireless non-contact radio system to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered by the radio waves used to read them and contains electronically stored information which can be read from up to several metres away. In this paper, I propose the location system for handicapped students using RFID, which is interested in one of technologies, to implement helping system for students with disabilities to detect the location information, if there are in an emergency status, in ubiquitous campus. Therefore real-time system with location information is implemented for students with disabilities has ID card with the RFID tag and location of the school facilities.
  • 14.

    Design of Enterprise FMC System Security Module by Security Requirements

    정현미 , 장수진 , LEE GANG SOO | 2012, 7(1) | pp.111~117 | number of Cited : 0
    Abstract PDF
    According to FMC standardization document, by using the various public network resources by using strengthened VPN, the FMC service can offer the consistent virtual private network service. The FMC service has to develop into UC environment putting together the communication part and business system altogether. In this paper, enterprise FMC system was designed by FMC General Requirements. SSL VPN based security for security-enhanced FMC of FMC Controller, FMC Security Client and FMC security management tool module was designed and module-specific functions were depending on FMC General Requirements.
  • 15.

    The Response Method for SCADA System Threats

    정현미 , 한경수 , LEE GANG SOO | 2012, 7(1) | pp.119~127 | number of Cited : 1
    Abstract PDF
    Recently, nuclear power, electricity, steel, semiconductors, chemicals, airports, dams, and other major industrial facilities are under threatened through the appearance of Stuxnet which is a malicious code to be aimed SCADA systems. If the national infrastructure were invaded by a foreign force in some way or other, there could be really devastating effects on our daily lives at all on-offline. Therefore, we need to make provisions for this problem by threat-case analysis before the invasion is occurred, and countermeasures considering future risks are needed after the national infrastructure is invaded. Hence, in this paper, we analyzed about the case of SCADA system threats and discussed its response methods.
  • 16.

    Quantization Noise Reduction Algorithm Using Wavelet Coefficients Characteristic and Signal Adaptive Filter

    Kyung Nam Park | 2012, 7(1) | pp.129~137 | number of Cited : 1
    Abstract PDF
    In this paper, we propose a postprocessing algorithm, which reduces the quantization noises in block-coded images by using wavelet coefficients and signal adaptive filter. The proposed algorithm performs block classification as smooth region and complex region using the magnitude and phase of wavelet transform coefficients. In smooth region on the block boundary filtering is perform to remove grid noise. Complex region is classified into edge and staircase noise by using the variation ratio of wavelet coefficient and remove staircase noise only. We removes ringing artifacts using signal adaptive filter in edge blocks of complex region. Simulation results show that the proposed algorithm gives better results than the conventional algorithm from both a subjective and an objective viewpoint.
  • 17.

    Design and Implementation of Mobile Web Services Based on the Mobile OK Standard

    이수인 , DongEun Lee , Jaehyeon An | 2012, 7(1) | pp.139~146 | number of Cited : 0
    Abstract PDF
    The core paradigm of Participation, Sharing, Dispersion of Web 2.0 has evoked various changes and advancements in wired web services. Web services have evolved from provider-centric contents to user-centric contents environment. Users now have the ability to create information at the touch of the mobile device from anywhere. Accordingly, an emphasis on the importance of convergence of wired and wireless web services and a need for multiple-device compatibility has become prevalent. However, these services face various difficulty caused by the lack of standardization in consolidated wired/wireless web services. This study looks solutions to resolving these problems by compliance of the Mobile OK standard. Additionally, it sought to discover a method to provide a trouble-free way of accessing contents by implementing the Mobile 2.0 wireless web service for increased effectiveness of user participation. The application created from this study provides a unconstrained environment for access and offer credible information which can be shared and gathered in a economical way.
  • 18.

    A Study on Log Analysis of Dynamic Web Pages

    김완규 , HyunJu Kim , 김일 | 2012, 7(1) | pp.147~157 | number of Cited : 0
    Abstract PDF
    Web sites such as portals, shopping malls, and online newspapers provide users with different contents depending on time or person of accessing, even though the users access the same URL. It is impossible for the existing log analysis method of click-stream to conduct log analyses in the following two aspects: first, in the personalization system which provides different information for each user; second, in the dynamic web pages on which different contents are exposed depending on the reponses of the user by using roll-over tab functions. In this paper, we seek to investigate the dynamic web pages using roll-over tab functions. We, by doing so, design and implement the log analysis system which analyzes the exposure and response of contents provided in the dynamic web pages.
  • 19.

    The Spam Detection Model for Web Forums using Text Mining Techniques

    Jiyoung Woo | 2012, 7(1) | pp.159~166 | number of Cited : 3
    Abstract PDF
    The spam in the discussion web forum causes user inconvenience and lowers the value of the web forum as the open source of user opinion. The importance of postings is evaluated in terms of the number of involved authors, so the spam distorts the analysis result by adding the unnecessary data in the opinion analysis. We propose the automatic detection model of spam postings in the web forum. We extract text features of posting contents using text mining techniques from the perspective of linguistics and then perform supervised learning to recognize spam from normal postings. Significant features are derived through the learning process and the automatic detection model is built based on those features. To build the automatic detection model of normal postings and spam, four evaluators are asked to recognize the spam posting in prior. We adopted the Naive Bayesian, Support Vector Machine (SVM), decision tree, which are known to perform well in data and text mining tasks. We can extract the text features to recognize the spam and detect automatically the newly posted spam. We apply the proposed model to the YahooFinace-Walmart forum, which is the world largest Walmart-related web forum.
  • 20.

    Analysis of Characteristics of IT Outsourcing for Insider Security of Enterprise

    Jiyeon Kim , Kim,Hyung Jong | 2012, 7(1) | pp.167~173 | number of Cited : 0
    Abstract PDF
    As many enterprises implement an information system to manage their business, IT outsourcing that operates and manages the system is increasing. Information systems can integrate all business resources and manage business processes, which enables the outsourced employees to obtain critical information about enterprise business. Actually, a large portion of security incidents regarding information leakage of enterprises are being caused by IT outsourcing. However, there is a lack of guidelines that can be used to establish security measures for the outsourcing, because domestic and foreign information security management systems (ISMS) do not specify various types of IT outsourcing even though they provide security requirements for organizations. In this paper, we classify various types of IT outsourcing and define their characteristics considering information system’s architecture, such as the status of network isolation, IT resource type, employees’ location and their access authorization.
  • 21.

    An Analysis of Response Time According to Cell Morphology for Charged Particle Type Electronic Paper

    김기훈 , Kim Young Cho | 2012, 7(1) | pp.175~181 | number of Cited : 0
    Abstract PDF
    In the closed space of the electronic paper display panel, the charged particles moving by external electric fields are acted by 4 types of forces. To understand these forces, experimental analysis is reasonable because theoretical approach is almost impossible due to by complex parameters. We measure and analyze response time according to the cell size defining the pixel size and the length between transparent electrodes in electronic paper display. In case of restricting the application area to the small signage, because large cell size id permitted, the movement of the particles are stable in the cell size over the definite value. It is regarded that having moving space for particles by obtaining the definite length between electrodes contributes improvement of lifetime of particles.
  • 22.

    M2V(Machine to Vehicle) Authentication Scheme based on Telematics in M2M

    Keun-Ho Lee | 2012, 7(1) | pp.183~188 | number of Cited : 0
    Abstract PDF
    As the developing of the information technology, M2M market of the global telecommunication companies are using communication between devices and machines. New M2M business model is growing rapidly of the many companies. In this paper, the concept of telematics and vulnerabilities of vehicle network security are discussed. The convergence of vehicle and information technology provided to user that the development of mobile communication technology have improved quality of service but as a result security threats became diverse. In this research, we proposed new business model that be occurred to the participation of mobile carriers in telematics business. We analyzed mobile radio communication network security vulnerabilities. We proposed smart phone and vehicle authentication scheme with M2M device as a way to solve vulnerabilities.