Korean | English

pISSN : 1975-7700 / eISSN : 2734-0570

Home > Explore Content > All Issues > Article List

2015, Vol.10, No.6

  • 1.

    A Multi-modal Interaction Glove for Immersive Education

    Choi Dong-Soo , SangKyu Byeon , Sang-Youn Kim and 1 other persons | 2015, 10(6) | pp.619~626 | number of Cited : 1
    Abstract PDF
    The virtual reality systems may be used as a new educational tool because a user can be provided immersive sensation as he/she experiences a real object. One of the most important factors in developing educational tool based on virtual reality is to make a user naturally interact with a target object and to convey the sense of reality to a user. The sense of the reality means that a user feels or experiences an object in virtual world as the object exists in real world. In order to increase the sense of the reality, this paper addresses a multimodal interface device that allows a user not only to naturally interact with virtual objects but also to sense graphic and haptic feedback according to his/her interaction. The proposed system measures a user’s motion based on IMU (an inertia measurement unit) and then re-creates haptic feedback by the proposed multimodal interface device. To generate the haptic feedback in response to user’s interaction with virtual objects, our system consists of a haptic part for creating haptic information, a motion sensing part to measure user’s motion input, and a virtual environment part. We have also implemented educational contents in the virtual environment and have manipulated the educational contents with the proposed multimodal interaction device.
  • 2.

    The Mediating Role of End-Users' Trust in SaaS Adoption Context

    Sangcheol Park | 2015, 10(6) | pp.627~641 | number of Cited : 0
    Abstract PDF
    With the spread of smart-devices, SaaS (software as a service) as one of cloud computing services has became common since many of service providers offer various types of cloud services. At the point there were both security and trust issues as one of major obstacles to revitalization of cloud computing industry, this study attempts to present trust in SaaS as one of key factors in SaaS adoption from the end-users' perspective. This study further presents both information privacy concerns and security concerns as antecedents of trust in SaaS. To test the proposed research hypotheses, this study collects data from 101 undergraduate students who have no experiences on using Google Docs as an typical example of SaaS at two survey rounds. By conducting both PLS (partial least squares) and mediated regression analysis, this study found that trust in Saas was fully mediating effects in the relationships between information privacy concerns/ security concerns and SaaS Adoption. Based on the results, this study has presents both research and practice implications given the importance of security and trust issues in cloud computing services.
  • 3.

    An Encrypted Response Model using Application Access Failure information for the Attack of IP Spoofing in a Cloud Computing Environment

    Yang Liu , KimSangBok , PARK JAE HEUNG and 1 other persons | 2015, 10(6) | pp.643~651 | number of Cited : 2
    Abstract PDF
    The big data is typically collect a large amount of information. It is processed of receiving a service and is based on a cloud computing environment. These environments are easily exposed to illegal accesses, which use IP Spoofing compared to that of a single system. In this study traceback information is used to identify normal users in order to response to illegal accesses in a cloud computing environment. Then, services are provided after the identification process for the normal access frequency of users by comparing it with access failure information within a specific time. If there exists mismatches in traceback information or the access failure information exceeds a critical value, the access will be identified as an illegal access. Then, the access is immediately interrupted and is recorded as illegal access information. In addition, as an access that is attempted at an unexpected location, which is not registered in the existing user traceback information due to movements of normal users, is presented, the data will be provided after encrypting it for responding illegal accesses due to leaks of OTP. The model presented in this study is safe for authorized users against illegal accesses, which use IP Spoofing in a cloud computing based big data collecting environment, and improves service availabilities.
  • 4.

    A Method for Detecting Unauthorized Internet Access Node in Private Financial Network

    Hyung Jin Cho , Kim, Eunjin , Huy Kang Kim | 2015, 10(6) | pp.653~664 | number of Cited : 0
    Abstract PDF
    Recently, many companies make efforts to enhance security to detect and prevent an APT(Advanced Persistent Treat) attack that mainly target on the companies' PC devices. Most global companies run several branch offices that have numerous PC devices, but they are not easily controlled by a central security policy. Although security policies enforce to prevent unauthorized internet access, there are various detour techniques such as using tethering, open VPN or RogueAP. If a company fails to control all end user's PC devices, this can threaten the company's overall security. Especially, this can be the most critical problem in finance business domain. In this paper, we introduce a method to detect unauthorized internet access node in the closed private network. We conduct this method to find out the unauthorized nodes against the security policy. We deploy this detection method in the real network of a finance company in South Korea. As a result, we can classify several types of unauthorized nodes, and improve the detection techniques.
  • 5.

    Analysis of Changes in the Muscle Activity and Fatigue of the Erector Spinae using IT Convergent Type Medical Equipment

    Junghyun Choi | 2015, 10(6) | pp.665~673 | number of Cited : 3
    Abstract PDF
    The purpose of this study was to observe how changes in the upper body angle in a sitting posture on a chair affect the muscle activity and fatigue of the erector spinae to provide basic data on a correct sitting posture. This study involved 24 healthy males and females in their 20s. The average body angle of the subjects in each posture was 94 degrees in posture 1, 79 degrees in posture 2, and 109 degrees in posture 3. To examine the signal amount of the erector spinae, the erector spinae in the left and right cervical spine, thoracic spine, and lumber spine was selected, and each muscle's maximal voluntary isometric contraction (MVIC) was measured before the experiment. In the experiment using IT convergent type medical equipment, the three angles measured with a motion analyzer in a sitting posture on a chair were directed, and the electromyography signals for each posture were measured and recorded. Each electromyography signal was compared and analyzed, thereby extracting information on the characteristics of the electromyography signals according to each posture. The muscle activity of the longissimus thoracis increased in postures 1 and 2 compared with that in posture 3, and the muscle activity of the longissimus lumborum increased in posture 3 compared with that in postures 1 and 2(p<0.05). The muscle fatigue of the left longissimus thoracis (LLT) in posture 1 and the right longissimus thoracis (RLT) in posture 3 was significantly high(p<0.05). Therefore, as shown in the present experiment, to take a sitting posture while maintaining the upper body angle like in the posture 1 and the posture 2 is considered to be helpful for preventing low back pain or other spinal column diseases.
  • 6.

    Environment of a MOOCs Platform Based on Open Source - Focused on K-University Platform -

    Kim Jin-Il , 윤장혁 , Chang,Sun Young | 2015, 10(6) | pp.675~686 | number of Cited : 2
    Abstract PDF
    The MOOCs, Massive Open Online Courses, service that allows anyone in the world to take courses of famous universities online for free has shown an increasing number of students due to a rapid increase in the number of participating universities and courses offered worldwide. From that point, many universities/institutions in Korea want to take part in MOOCs services. Therefore, the first and most importantly thing we must do is how to configure MOOCs platform suitable for educational environment of Korea. The purpose of this paper is to Development and design the K university’s own MOOCs platform, based on open source, in order to offer MOOCs and systemmatically support for further efficient and effective teaching-learning. To attain the research goal, we have collected sufficient data for open source MOOCs from preceding studies, and then the teaching-learning functions of those various open source MOOCs; Coursera, edX, Udacity, Open edx, comparatively analyzed. And then we present some of the main objectives of this MOOCs platform, Finally, we describe the design, architecture of the proposed MOOCs platform.
  • 7.

    A Study of On-body User Interface: PiAM(Palm interAction Module)

    Seng-Kyoun Jow , 이현우 , JInsul Kim and 3 other persons | 2015, 10(6) | pp.687~697 | number of Cited : 0
    Abstract PDF
    User interface providing easy and efficient control environments with user is emerging as a core keyword in ICT market and smart phone industry as the influence and importance of UI has increased recently. To succeed in ICT market, however, UI has to satisfy industrial requirements including simple and easy control, intuitional access and high recognition. Thus study for providing user-friendly interface has been actively researched. In this paper, we investigate user interface based on human’s body such as palm, hand. Human body can be a good candidate as an UI because not only further concentration is not required but also it can be controlled directly. First, we analyze the usability of existing various user interfaces, then we study for obstacles to be solved and provide the direction of user interface to be evolved. As a candidate of on-body based user interface, we design, implement UI prototype system, named as PiAM and applied to smart TV service to provide easy and direct manipulation environment. Also for the realization of PiAM prototype system, detailed procedures to recognize input of hand and finger is described for touch and continuous events using palm.
  • 8.

    Effect of Parameters of Genetic Algorithm on Results in Action Games

    Myun Sub Lee | 2015, 10(6) | pp.699~706 | number of Cited : 0
    Abstract PDF
    In this paper, it was intended to identify effect of parameter values of genetic algorithm on results. As the study subject, an action game with 10 actions was used. In the action game, intelligent characters were set to find optimal solutions by evolving by themselves along with repetition of generations. Among several parameters of the genetic algorithm, population size, cross rate, and mutation rate were changed and applied. The range of population size was set to be from 50 to 950, and the cross rate and the mutation rate were applied, changing from 0.7% to 1.0% and from 0.005% to 0.24% respectively. As the results, it was achieved to find optimal solution after 90 generations. It was found that the combination of parameters to identify optimal solution within the most rapid time were 300 in population size, 1 in cross rate, and 0.01 in mutation rate. Because this combination of parameters cannot be found with some trials, there are some difficulties that a number of repeated experiments with various combinations of parameters are required
  • 9.

    A Study on the Design and Implementation of ODSP in Different PLC of Production Process

    Dal-Joong Kim , Phyoung-Jung Kim , 하수철 | 2015, 10(6) | pp.707~721 | number of Cited : 2
    Abstract PDF
    In this paper, we designed and implemented by ODSP(OPC Data Sharing Platform) to share data in real time the production facilities of different PLC. Also We made a ODSP that a management of manufacturing process integrated data from real-time. Interface of the production relies on providing DLL by the manufacturer for communication. We solved problem that Interface module programed in every DLL communication for different PLC with gathering server logic. In this paper, ODSP was implemented by system that solved providing real-time information about the End User for several different PLC data. ODSP services in real time from the different PLC by the OPC data sharing platform and stores the data in real-time, it is implemented to take advantage of a variety of information through the connection with other systems. In addition, automation equipment can be applied to production test reports submitted proof of origin for imports through the FTA partners in the export business operators. ODSP can be the self diagnosis of the real-time manufacturing graph, production management monitoring, facility management and production process. This shows middle-and-small companies can expand production management, process management, and PLC data sharing to real-time production operation management by the level and sector, and can control production facility by the real-time base.
  • 10.

    A Study on the Improvement of FDS Effectiveness over the Case Analysis on E-commerce Credit-card Fraud-to-sales

    Seung Hyun Kim , Huy Kang Kim , Kim, Eunjin | 2015, 10(6) | pp.723~734 | number of Cited : 2
    Abstract PDF
    As the advancement of information and communications technology (ICT) and the rapid growth of Fintech (Finance Technology) industry, the proportion of online e-commerce increases sharply in the credit-card payment market recently. Also, various payment services such as mobile card and the easy payment system have emerged in the e-commerce area, and electronic finance frauds and accidents using credit cards have also become more sophisticated and diversifiable accordingly. Thus, establishing FDS (Fraud Detection System) that considered differentiated e-commerce environmental features from the offline based current FDS system is needed to advance the prevention and detection of credit card frauds and accidents in e-commerce. In this paper, we compare the operating environment of the offline credit-card transaction and online e-commerce. Then we propose improvement method of credit-card e-commerce FDS detection that specialized online e-commerce. This method is considered the feature of the online credit-card transaction and the pattern of fraud usage in addition to operating offline transaction based FDS currently. And we verify the propriety and efficiency of the proposed method by applying it to the FDS system currently managed by a financial company.
  • 11.

    An Electronic Attendance-absence Recording System using AIDC(Automatic Identification and Data Capture) Technique and Face Recognition

    이준혁 | 2015, 10(6) | pp.735~743 | number of Cited : 1
    Abstract PDF
    In this paper, we designed and implemented an electronic attendance-absence recording system using automatic identification and data capture technology, and face recognition. AIDC(Automatic identification and data capture) techniques provide fast, easy and accurate data collection methods. AIDC methods in general do not require human involvement in order to capture data, these methods include technologies like: barcodes, biometrics, RFID(Radio Frequency IDenfitication), NFC(Near Field Communication) and others. It has recently introduced the electronic attendance-absence system using NFC core technologies of automatic identification of student and data collection technology in schools. NFC is a set of short-range wireless technologies, typically requiring a distance of 4cm or less to initiate a connection. NFC allows you to share small payloads of data between an NFC tag and an reader device. However, an electronic attendance-absence recording system using NFC can not prevent unauthorized attendance, and has disadvantages that limit the movement. In this paper, we implemented an electronic attendance-absence system with face recognition technology and NFC to prevent unauthorized attendance. The proposed system will increase the accuracy of this feature out to build a new database through learning not only to detect a student to take a photograph. In addition, it is possible to carry a smaller size by using a small devices that are raspberry pi and arduino.
  • 12.

    A System for Remote Service of Floral Tributes made of Images

    HWANG SU CHEOL | 2015, 10(6) | pp.745~752 | number of Cited : 0
    Abstract PDF
    Green IT and IT fusion technology penetrates deep into various fields of our life and is giving the relaxed and rich living to us. Recently there have been a few studies for applying this technique into funeral hall. Instead of sending floral tributes made of flowers into funeral hall, they are studies for servicing ones made of images. In this study we have solved some problems on the service model of Images Floral Tributes and implemented the detail and full system from prototype one. We made a program of an ftp client and a media player which plays iteratively floral tributes made of images received into designated folder continually and also implemented the web site for service of images floral tributes which may be commercialized. It is made in combination of filter graph manager, interface generation, filter generation, stream and manipulation module etc. by using DirectShow technology in Visual C++ MFC. Additionally for providing a convenience to video maker we have suggested a necessary of function which automatically generates images floral tributes included a letter of condolence in current system and an importance of censorship about the content of the letter. If this service is widely available, it seems to be a big change in the delivery of cultural of floral tributes.