Korean | English

pISSN : 1975-7700 / eISSN : 2734-0570

2020 KCI Impact Factor : 0.42
Home > Explore Content > All Issues > Article List

2016, Vol.11, No.2

  • 1.

    A Study on the Waterworks Facilities Monitoring System Using Anti-Metal RFID Tag

    Byung Mo Kang | Byoung-Chan Jeon | Hong,In-Sik | 2016, 11(2) | pp.73~85 | number of Cited : 0
    Abstract PDF
    This paper aims to examine on the reading of RFID tags and tag data used to manage the waterworks facilities. Waterworks facilities, depending on the location where you want to install, are divided into the ground facilities and underground facility. It is the way how to manage these facilities that use the identification index of the installed facility. One of the way how to use the identification display is a way to manage and search for RFID or NFC tag. There is the strength in the aspect that the way using NFC tag is possible to be active by smartphone without a dedicated reader. However, NFC tag reading has to contact and read proximately. Most of waterworks facilities are not able to use smartphone because it is difficult to read tag by smartphone and protect telecommunication security, caused by the area of facility. Because the waterworks facilities are composed of metal, when people use RFID tag, people can't search anything. This paper solved the issue with using as anti-metal RFID tag on the 900 MHz frequency being available of metal material. This paper proposes a system which users easily get and treat information in the case of the dealing with the waterworks facility with the RFID reader, notebook with bluetooth, monitoring program, the control of database and the RFID reader system, being equipped to facilities. The system development environment has been built based on C# and tag information management database was built using the MySQL.
  • 2.

    Advanced Radiation Performance for Mobile Phone Antennas with Magneto-Dielectric Sheet

    Yong Jin Kim | 2016, 11(2) | pp.87~93 | number of Cited : 2
    Abstract PDF
    Due to the advanced development of wireless technologies, mobile communication systems have developed into a 4G LTE system, recently. It is important to implement the antenna with a small size and a broadband characteristic for the 4G LTE system. It have been considered to use magnetic materials for the mobile antenna implementation. However, because of the high loss of magnetic materials in the UHF band, it is in fact difficult to apply the antenna of cellular frequency bands. So, the magnetic materials is applied mainly to the low frequency antenna using several tens of MHz as like NFC antenna. To overcome the frequency limit according to the loss of the magnetic materials, it has been researched for low-loss magneto-dielectric materials available in the cellular frequency band. In this paper, the antenna structure with magneto-dielectric material sheet is proposed so as to minimize the loss of magnetic material in the cellular frequency band. The magneto-dielectric material sheet is shaped with hexa-ferrite composites which is fabricated by Samsung Electro-Mechanics Co., Ltd. By applying the magneto-dielectric sheet to the mobile phone antenna of the cellular frequency band, it is demonstrated by measuring the advanced performance characteristics of the antenna resulting a compact size and wide-band characteristics.
  • 3.

    The Service of Children Education and Communion Using the Smartphone and RTP

    Byoung-Chan Jeon | Kwang Yeon Lee | Youngil Cho and 1other persons | 2016, 11(2) | pp.95~106 | number of Cited : 0
    Abstract PDF
    Growth environment and conversations with people of children is the most important time as education and emotionally. During this time, encouragement , praise, consultation is the main task of the kindergarten and nursery school teachers. But Praise and encouragement is always well-being well done compared to advice and consultation. In addition childrens does not describe or explain their trouble and worries to parents and teachers as well. Due to advances of smartphone, enables video calling, instant messaging and other services have used cameras, and wireless network technology increased processing capacity, as well as equip the 3D teleconferencing parent education , children, youth education development plan study being conducted actively. Transfer the video and audio of the smart phone to the server using the RTP and The server control and monitoring of the client. In this paper, suggesting the service which will give courage and confidence and can opens the heart and communicates with child instead of parents or teachers, by a friendly avatar in small, simple and smart phones, those are applied of increasingly developing hardware technology advantages.
  • 4.

    A Cloud-Based Security Model Designed to Prepare Deployment Nationwide The Regional Public Hospitals Telemedicine Clusters

    Chang Ho An | 백현철 | PARK JAE HEUNG and 1other persons | 2016, 11(2) | pp.107~118 | number of Cited : 2
    Abstract PDF
    Today, the government health policies and plans to introduce telemedicine system for the care of the Environment based on the upcoming ubiquitous. Remote medical system, from the standpoint of the patient utilizing the medical institution, means away from constraints of time and space. However, these policies have sparked strong opposition from private institutions, such as when subjected to pharmacists. In particular, the cause of repulsion for each individual security policies, lack of medical information has become an important factor in the rebound. and there is a limit to convince its medical institutions. This paper is a multifaceted network configuration for future cloud-based medical facilities for individual survival in relation to telemedicine enforcement. In addition, this individual will be clustered environment, telemedicine among national institutions are organized by the Gyeonggi Province Hospital Medical Center area as the model was constructed virtually. However, since the concentration of the individual critical information are clustered attack for unauthorized collection of personal information can also be increased dramatically. Therefore, this paper, in preparation for the ubiquitous care environment will emerge in our society in the future, illegal information gathering attack occurs configure a remote medical cluster system sharing a mutual infringement of the information and the encryption scheme service availability and proactively using which it was designed for defense cooperation model.
  • 5.

    Analysis and Evaluation of a Need of Safeguard in Korean’s Internet Banking Based on PDR Matrix

    허건일 | Chang Min Park | Kim, Huy Kang | 2016, 11(2) | pp.119~154 | number of Cited : 0
    Abstract PDF
    Complaints among users have increased because of insufficient explanation about safeguard and forced use of safeguard. Someone has said that Internet banking safeguard(hereafter safeguard) is unnecessary because large-scale Internet banking fraud has happened continuously although financial companies have taken complaints among users lying down. But this is a misconception that people try to couple inconvenience caused by ActiveX with use of safeguard. We should judge necessity of respectively safeguard based on objective capacity and interrelation, as opposed to safeguard is unnecessary because of inconvenience. Therefore in this paper we analyzed and evaluated existing domestic safeguard’s necessity based on PDR matrix namely, information security lifecycle which is classified Prevention, Detection, Response and six of Internet banking threats(account theft, public certificate snatch, malware infection, input data modification, input data snatch, phishing/pharming). This made us identify four overlapped sections and two empty sections of safeguard and know that all safeguards are certainly necessary except graphic authentication in P section of account theft and phishing/pharming, phishing prevention program in P section of phishing/pharming in case of overlapped section by evaluating their capacity. But we recognized a gap between the findings of our research and user’s thought by surveying Internet banking users. So we proposed three ways to narrow the gap such as giving specific information regarding Internet banking threat and safeguard to user, giving information considered user’s level to user, guaranteeing user’s a choice regarding use of safeguard.
  • 6.

    Bypassing Scheme for Inclusive Last Level Caches

    Lee Sang Jeong | Youngil Cho | 2016, 11(2) | pp.155~162 | number of Cited : 2
    Abstract PDF
    The design of an effective last level cache(LLC) continues to be an important issue in processor‘s performance. Recent works on high performance caches have shown that cache bypassing is an effective technique to enhance the performance of last level caches. However, commonly used inclusive cache hierarchy cannot benefit from this technique because bypassing inherently breaks the inclusion property. This paper presents a solution to enabling cache bypassing for inclusive caches. It introduces a bypass buffer to an LLC. Bypassed cache lines skip the LLC while their entries are allocated into the bypass buffer. And it is a simple, low-hardware overhead, yet effective, cache bypassing scheme that dynamically chooses which blocks to insert into the LLC and which blocks to bypass it based on past access/bypass patterns on a miss. Our proposed scheme is evaluated using a detailed simulation environment where its effectiveness, performance-improvement capabilities, and robustness are demonstrated. We present experimental results showing IPC(Instruction Per Cycle) comparison of the proposed scheme and OBM(Optimal Bypass Monitor) against LRU for SPEC CPU2006 benchmarks. The result show that the proposed scheme and OBM can improve IPC by an average of 18% and 14%, respectively. And the proposed scheme reduces the miss rate by 16% compared to LRU.
  • 7.

    An Audit Model for Usability of the Mobile Web UI/UX

    Ji Hye Choi | DongSooKim | Hee Wan Kim | 2016, 11(2) | pp.163~175 | number of Cited : 1
    Abstract PDF
    Smart mobile devices are small in size, and they have various kind of terminal, operating system and Internet browser. Mobile web services have a personalized property to provide individualized service. We can not get good service if we use the mobile services on the move. So, it is inconvenient for us to use the mobile service if we are not designed in consideration of the characteristics of the smart phone. This paper is a study of the UI/UX that make the mobile web. And, we derived the properties of the mobile portability, convenience and personality. It was derived audit area and audit time for audit check framework. The audit area was based on the components of the mobile Web UI/UX, and it was derived by applying the web evaluation criteria and quality evaluation criteria. The audit time was compared with the mobile application development process and the web development process, and it was derived by the mobile web development process. We have designed an audit check framework for the usability of the mobile Web UI/UX. and usability, and we derived the audit check items by the audit time in accordance with the audit framework criteria. We verified the suitability via surveys of experts for verification of the audit check items.
  • 8.

    Reliability Analysis of Systems Using Simplified Neutrosophic Sets

    Cho, Sang Yeop | 2016, 11(2) | pp.177~186 | number of Cited : 1
    Abstract PDF
    Neutrosophy is a branch of philosophy which studies the origin, nature and scope of neutralities, as well as their interactions with different spectra. Neutrosophic sets(NS) are powerful general formal framework, which generalizes the concept of the classic set, fuzzy set, interval valued fuzzy set, intuitionistic fuzzy set, and interval intuitionistic fuzzy set from philosophical point of view. However, it will be difficult to apply in real science and engineering area because neutrosophic sets are defined on real standard and nonstandard subsets of . Therefore many researchers proposed the subclasses of neutrosophic set which can be applied to real world problem solving. There are single valued neutrosophic set(SVNS), interval valued neutrosophic set(IVNS), simplified neutrosophic set(SNS), and so on in the subclasses of neutrosophic set. Simplified neutrosophic set is a subclass of a neutrosophic set and includes the concept of a single valued neutrosophic set and an interval valued neutrosophic set. In this paper we propose the way to evaluate the system reliability based on simplified neutrosophic set. It can manipulate truth membership, indeterminacy membership, and falsity membership as point, subinterval, and point/subinterval because of SVNS, IVNS ⊆ SNS.
  • 9.

    BER Performance of MIMO-OFDM Systems with I/Q Imbalances

    Woojong Kim | Sang Kyu Park | Kwangmin Hyun | 2016, 11(2) | pp.187~195 | number of Cited : 0
    Abstract PDF
    In next-generation wireless communication systems, high-rate data transmission is required with the multimedia contents. MIMO-OFDM(Multiple Input Multiple Output – Orthogonal Frequency Division Multiplexing) with multi-level modulation and iterative decoding schemes is used to cope with the data traffic problem. But the performance of the communication system is affected by I/Q(In-phase/Quadrature) imbalance with imperfect practical circuits in noisy environment. In order to overcome the I/Q, amplitude and phase, imbalance, estimating noise variance is one of the important methods to enhance the system performance especially with MMSE(Minimum Mean Square Error) scheme. In this paper, we analyzed BER(Bit Error Rate) performances of MIMO-OFDM system with I/Q imbalance where we considered iterative decoding and MMSE scheme. The estimated noise variance value is used to calculate weighting matrix for MMSE filter. For MMSE, according to the amount of I/Q imbalance, it impacts on noise variance estimating performance, and larger the amount of I/Q imbalance leads to worse SNR resulting in performance degradation. If a specific threshold value of noise variance, to decide whether MMSE function is operated or not, is used. we can get better performance with simultaneous operation of iterative decoding and MMSE than without MMSE scheme depending on the amount of I/Q imbalance. The simulation results validate the proposed technique in BER performance.
  • 10.

    Similarity Enhancement of Face Recognition Performance between Real Faces and Facial Videos through Adjustment of a Display Device

    Mi Young Cho | 정영숙 | Byung Tae Chun | 2016, 11(2) | pp.197~204 | number of Cited : 0
    Abstract PDF
    As face recognition technology, unlike other biometric methods, is more direct, user friendly, and convenient, it is applicable to many areas including security systems and service robot. However, the performance of face recognition systems in a real service environment does not always satisfy the expectations of users, because the performance of face recognition systems is influenced by the user's pose, expression change and lighting in the real environment. So, there is the performance gap between a real service and laboratory environment. To reduce the gap, there are many approaches using such as an algorithm, a mannequin and a high-definition photograph. Unfortunately, it has a limitation to construct a test environment in which the various situations faced by a user and an face recognition system are created similar to those encountered in real environments. Recently, with the development of the display device and capture devices, the performance evaluation method using the high-quality face video output from the display device in place of the actual human face to are proposed. In this paper, we demonstrate the similarity enhancement of face recognition performance between real face and facial videos from display device through gamma adjustment.
  • 11.

    Design and Implementation of a Responsive Website for Personalized News Article Recommendation and Newspaper Production System

    Ho-Sang Park | EOM. I. K | Kim young in | 2016, 11(2) | pp.205~214 | number of Cited : 1
    Abstract PDF
    Recently, there has been an increasing demand in personalized web news article recommendation service that customizes the newspaper according to the user’s preference. However, it can be true that the current research in news services through extracting the people with common interests and similar characteristics is still lacking. This study will give guidance to news recommendation system and creating a customized newspaper by using collaborative filtering techniques and newspaper articles framing techniques. To implement this system, we built a server that collects the users’ scrapped articles information and ratings of the users’ scrapped news articles; the server performs collaborative filtering algorithms to recommend the articles by the similarity measurement. News articles are collected from the web sites of each media outlet by using crawling techniques, and embodied search function by using web portal site’s API. In order to make this service practically usable, user interface was put in consideration during the development, and enabled to be used on PC, tablet and smartphone by embodying responsive web design. The proposed recommend system perform scoring users based on their interests area, and then recommend new newspaper articles to the users by using collaborative filtering techniques considering user scrapped news articles. Experimental results demonstrate that the proposed system can provide useful news to users by using responsive website design, user's newspaper article scrap information and collaborative filtering algorithm. It is highly expected that using the proposed collaborative filtering system would provide more accuracy in selecting suitable news for each individual, which will increase the level of user satisfaction.