Korean | English

pISSN : 1975-7700 / eISSN : 2734-0570

Home > Explore Content > All Issues > Article List

2017, Vol.12, No.3

  • 1.

    Determinants of Social Networking Services Fatigue: Focusing on Veblen’s Perspective

    Sung Yul Ryoo , kyung kyu kim | 2017, 12(3) | pp.395~403 | number of Cited : 0
    Abstract PDF
    In hyper-connected communication environment, users of social networking services (SNSs) often consume highly conspicuous SNSs in order to advertise their SNSs, thereby achieving greater social status. SNSs users have a willingness to pay a higher time and effort for making social relationships and then engage in conspicuous consumption of SNSs by overpaying for conspicuous social relationships. These overpayment for conspicuous consumption of SNSs may cause SNSs fatigue. As SNSs have rapidly grown, there has been little attempts to examine why individuals continue to overuse SNSs even though they have felt regret on using it. Using Veblen’s conspicuous consumption theory as the overarching theory, this study regards both conspicuous consumption tendency and competitiveness as antecedents of conspicuous SNSs consumption. This study also regards conspicuous SNSs consumption as an determinant SNSs fatigue. The data used in this study were collected from 342 individuals through online surveys. The results show that conspicuous consumption tendency has significant impacts on conspicuous SNSs consumption. Competitiveness also significantly influenced conspicuous SNSs consumption. Then, conspicuous SNSs consumption was a significant predictor of SNSs fatigue. The contribution for research is that it develops and tests a integrative model of understanding conspicuous SNSs use by employing Veblen’s conspicuous consumption theory.
  • 2.

    A Energy Efficient Group Management MAC Scheme for Mobile Sensor Devices in IoT Systems

    Kyunghee Sun , Jaesun Lee , Intae Ryoo | 2017, 12(3) | pp.405~414 | number of Cited : 0
    Abstract PDF
    Mobile sensor devices are one of the key components of IoT systems and can collect data in inaccessible or hazardous areas. The battery capacity of mobile sensor devices is limited and battery replacement for mobile sensor devices may be difficult or impossible. Therefore, mobile sensor devices in IoT systems should minimize energy consumption. In this paper, we propose an energy efficient Group Management MAC scheme for mobile sensor devices in IoT systems. The proposed Group Management MAC scheme groups the sensor devices based on the hop (distance) from the sink node. The mobile sensor devices transmits collected data only to other mobile sensor devices of next higher group level. When any mobile sensor device moves and can’t transmit data to the next higher group level, the sensor device is assigned a new group ID and transmits data to the new route. In addition, the energy efficiency of the entire IoT system can be improved by transmitting data based on a pre-configured buffer threshold value that are set differently for each group. The proposed Group Management MAC scheme shows excellent behavior in the aspect of energy efficiency for the IoT system by simulation. Therefore, the proposed scheme might be adaptable for mobile sensor devices used in various kinds of computing and networking environments.
  • 3.

    An Elastic Hybrid Multicast Based on Delay through Cross Transfer of BMD

    구명모 , 심종채 , 백현철 and 1 other persons | 2017, 12(3) | pp.415~422 | number of Cited : 1
    Abstract PDF
    Hybrid multicast is composed of IP multicast and application layer multicast based on host for efficient use of bandwidth and expansion of multicast group. Many applications using hybrid multicast use transfer method that sends a packet to the distributed multicast group like a binary tree in order to reduce overlay transfer path. These method reconstructs the overlay transfer paths according to the packet loss and delay time in order to adapt the network condition. However, complexity and end-to-end delay time increase caused by reconstruction of the overlay transfer path. In this paper, we propose an elastic path management method based on delay to quickly adapts to the network state without reconstructing the overlay transfer path in hybrid multicast. In proposed method, we elect a BMD(Bridge Multicast Domain) which is a multicast group located on the cross transfer path within control range for elastic transfer path construct. This method can recover the lost packets through cross transfer between overlay transfer paths using BMD. Also can reduce the recovery time of loss rate and end-to-end delay time through backward transfer without reconstruction of overlay transfer path. Simulation results show that the loss rate and the end-to-end delay time are recovered more quickly than the traditional method.
  • 4.

    Design of Two-times Faster Bit-Serial MultiplierUsing Normal Basis of GF(2m)

    Cho Yong Suk , 민경일 | 2017, 12(3) | pp.423~429 | number of Cited : 0
    Abstract PDF
    Finite field arithmetic has recently gained growing attention due to its wide range of applications in signal processing, error control coding and especially in cryptography. In these applications, there is a need to design low complexity finite field arithmetic units. One important factor that could greatly affect computation performance is the basis in which finite field elements are represented. Among the basis, representation of fields elements using a normal basis is quite attractive for hardware implementation since the squaring operation over can be performed by only one-bit cyclic shift to left. In this paper, we propose a new architecture of two-times faster bit-serial finite field multiplier using a normal basis. In the proposed multiplier, the bits of an operand are grouped into the two parts and each part is implemented simultaneously by bit-serial multiplier. Therefore, the proposed multiplier takesclock cycles, to finish one multiplication operation in a binary field of size m. The proposed architecture is two-times faster than bit-serial architectures but with lower area complexity than bit-parallel ones. It is shown that the new design has higher regular architecture compared to other similar proposals and therefore, well-suited for VLSI implementation. The main advantage of the proposed architecture is that a trade-off between hardware complexity and delay time can be achieved. Therefore, the proposed multipliers are more suitable for resource constrained cryptographic systems where the value of m is large but space is of concern.
  • 5.

    Temporal Coherent Sketch Rendering using Background Image

    Chang, Jae-Khun , 김영권 , Seung-Taek Ryoo | 2017, 12(3) | pp.431~438 | number of Cited : 0
    Abstract PDF
    Video based stylized rendering have temporal coherence problems occurred by illumination and shape difference in corresponding pixel between previous and current frame. Especially, the rendered image is distorted in the background part rather than the foreground part. In this paper, we suggest original image correction method using background image to reduce flickering effect at background part in correction step and post blurring method using rendered image to improve sketch rendering effect in rendering step. In correction step, video frames can be input through video file or web camera, and then the original video frames can be corrected by using the frame difference between original and background image. In rendering step, we transform corrected frame into grayscale image and invert the color. And then we blur the inverted frame using bilateral filtering and apply color dodge algorithm in the blurred frame. To reduce flickering effect and improve sketching effect, post-blurring method using bilateral filtering is applied again in the rendered frame. Correction method using background image can be reduced flickering effect caused by the difference between previous and current frame. Also, post-blurring method using bilateral filtering can be represented smooth sketch rendering through removing unnecessary noise. Suggested method can be applied to realtime rendering and can be used in various fields such as image and game contents generation.
  • 6.

    The Responding Model for Sniffing and Session Hijacking Using Traffic Variation Information and RST Signal Analysis

    Jae Yeong Choi , Baek Hyun Chul , PARK JAE HEUNG and 1 other persons | 2017, 12(3) | pp.439~446 | number of Cited : 0
    Abstract PDF
    At present, our society requires fast and accurate information in various fields, and shares information collected and processed through various devices existing around us. However, in the process of collecting, establishing and providing this information, the number of cases of illegal access to important information about person, country or company sharply increases. These cases of illegal access cause enormous damage to person, country or company. Illegal access to information may occur diversely, and in case an attack occurs, the situation is that a sniffing attack, which regular users cannot perceive, aggravates material/psychological damage to the corresponding company or person who gets damaged. Besides, with regard to a session hijacking attack making an illegal access attempt to actively steal information after attackers themselves pretending to be true sender/receiver in the process of sniffing, the situation is that damage gets worse. Nowadays, in the environment where each individual person has various devices that enables networking, the number of these attack techniques continue to increase. This paper analyzes whether RST signal is generated, which is needed for session reconnection and traffic information between users so as to make it possible to take countermeasures against sniffing and session hijacking attack. In the process of session hijacking, a regular user session is temporarily interrupted by generating RST signal inevitably. And this paper analyses whether this RST signal is generated. Besides, traffic information is analyzed because, in case a sniffing attack using ARP redirect or ICMP redirect occurs, the previous path changes, which may show deviation from traffic information in the ordinary path. This paper designed a model for countermeasures enabling proper and stable service against sniffing and session hijacking and it was made possible to be applied to the detection of attack that may occur diversely in the future on the basis of these data for analysis.
  • 7.

    A Study on the Waterworks Facilities Asset Management System using RFID and NFC Tag

    Byung Mo Kang , Hong,In-Sik | 2017, 12(3) | pp.447~456 | number of Cited : 0
    Abstract PDF
    This paper is a study on asset management of waterworks facilities using RFID and NFC tags. Asset management identification code management method shall be applied to manage the assets in accordance with the installation location of the asset management facilities. A method of managing RFID and NFC tags installed on the ground and underground facilities is to use a dedicated reader or a smart phone depending on the type of tag. When using smartphones alone, you can use the RFID reader for Bluetooth. For facility property management, install the NFC tags on facilities that are capable of close proximity reading. Moreover, RFID tag can be capable of reading at a distance of several tens of centimeters, so that it can be applied to a facility where proximity reading is impossible to perform asset management. Also, since most of the water supply facilities are made of metal materials, using generic tags can result in problems that are impossible to avoid reading. To solve this problem, an RFID or NFC tag having an anti-metal function can be used to solve this problems. In this paper, we proposed a system for managing property of waterworks facilities by reading RFID and NFC tag installed in facilities using smartphone and Bluetooth RFID reader. And developed apps that can be used on smartphones. In the development environment, the app runs on the Android OS marshall version 6.0, and the asset management database uses SQLite for smartphones and the asset management server uses MS-SQL.
  • 8.

    A Study on Vehicle Information Extraction from Night Vehicle Image

    Byung-Tae Chun | 2017, 12(3) | pp.457~463 | number of Cited : 1
    Abstract PDF
    Recently, research on the extraction of vehicle information has been actively conducted. Vehicle information has many applications such as unmanned management system, and most of the methods of vehicle information collection are non-contact method. In this paper, we propose a method to extract headlight area information and license plate area information. After the binarization is performed on the whole image, the large area is extracted to the headlight area through the condition check. The license plate area extraction method consists of two stages: a license plate candidate region extraction step and a vehicle candidate region verification step. The license plate candidate region binarizes the boundary detection result and extracts the clustered region as a candidate region. The extracted candidate region of the vehicle is reduced by considering the position of the headlight and the region of the license plate is extracted by using the candidate region verification method in the reduced range. Experimental results show that the detection results of the vehicle headlight area and the license plate area are good. The extracted headlight area can be utilized in the search for illegal headlights in the future.
  • 9.

    Establishment of Testbed for Detection of Harmful Traffic in SDN-based Network

    김정윤 | 2017, 12(3) | pp.465~472 | number of Cited : 0
    Abstract PDF
    SDN-based networks have many advantages over existing networks. SDN is different from existing network configuration It is a method of delivering packets based on software functions in network equipment, which has many advantages in terms of cost and operation over existing network structure. However, since it is built around OpenFlow, which is the most widely known interface in SDN, it is also vulnerable to security. So SDN tried to solve this by providing virtualized security function based on NFV(Network Function Virtualization). The advantage of NFV is that it is possible to apply security only to the place where security is needed by using controller without need to set up like existing equipment. In this paper, I tried to investigate a method to filter harmful traffic without the ACL(Access Control List), ZFW(Zone-Based Firewall) and other functions set in the security device in the NFV that operates for security in the SDN environment. The hardware-based security technologies currently used are inevitably subject to delays and can not be used to prevent security attacks that are executed in various ways by changing port numbers. Therefore, the purpose of this paper is to improve the security performance of SDN based on NFV by analyzing traffic pattern and filtering harmful traffic and nontoxic traffic. For this study, a test network based on actual SDN was constructed and the pattern - based harmful traffic detection technology was proved.