Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Digital Industry and Information Management
Journal Basic Information
Journal DOI :
The Korea Society of Digital Industry & Information Management
Editor in Chief :
Volume & Issues
Volume 11, Issue 4 - Dec 2015
Volume 11, Issue 3 - Sep 2015
Volume 11, Issue 2 - Jun 2015
Volume 11, Issue 1 - Mar 2015
Selecting the target year
Computer Vision Platform Design with MEAN Stack Basis
Hong, Seonhack ; Cho, Kyungsoon ; Yun, Jinseob ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 3, 2015, Pages 1~9
DOI : 10.17662/ksdim.2015.11.3.001
In this paper, we implemented the computer vision platform design with MEAN Stack through Raspberry PI 2 model which is an open source platform. we experimented the face recognition, temperature and humidity sensor data logging with WiFi communication under Raspberry Pi 2 model. Especially we directly made the shape of platform with 3D printing design. In this paper, we used the face recognition algorithm with OpenCV software through haarcascade feature extraction machine learning algorithm, and extended the functionality of wireless communication function ability with Bluetooth technology for the purpose of making Android Mobile devices interface. And therefore we implemented the functions of the vision platform for identifying the face recognition characteristics of scanning with PI camera with gathering the temperature and humidity sensor data under IoT environment. and made the vision platform with 3D printing technology. Especially we used MongoDB for developing the performance of vision platform because the MongoDB is more akin to working with objects in a programming language than what we know of as a database. Afterwards, we would enhance the performance of vision platform for clouding functionalities.
Design and Development of Electronic Attendance-absence Recording System Using Binary XML
Lee, Jaekun ; Yeom, Saehun ; Bang, Hyeja ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 3, 2015, Pages 11~19
DOI : 10.17662/ksdim.2015.11.3.011
Due to recent development in mobile devices, the mobile device utilization and many related applications have been increasing. Most of initial applications on mobile devices just showed simple information, but now they processes huge data. However, smart devices have certain limitations in processing massive data. Especially, if the size of data increases, the speed of data processing adversely decreases, so the performance of programs also decreases. If hardware specification of the mobile devices is not enough to handle it, response time will be drastically delayed. To overcome these drawbacks, most of application running on mobile devices communicate with their servers to manage data. XML is a proper language for data communication to send and receive data between servers and mobile devices, because it defines rules of document`s format and it is a textual data format and small-sized language. However, mobile devices have limitation such as memory, CPU and wireless network to process huge data and XML also takes a lot of time to communicate with servers and devices and handle data, so it could be overhead in service time. Binary XML is an alternative of performance improvement in data processing, which has XML`s benefits and minimizes the XML size by binary coding. However, most of binaryXML which are used on applications don`t fit on mobile applications. In this paper, we surveyed many kinds of binaryXML, compared merits and demerits to find a binaryXML for mobile applications. We propose how to use binary XML and implemented an electronic attendance system using binary XML to overcome the limitation of XML and to reduce the load of data communications between servers and devices.
Design and Implementation of Personalized IoT Service base on Service Orchestration
Cha, Siho ; Ryu, Minwoo ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 3, 2015, Pages 21~29
DOI : 10.17662/ksdim.2015.11.3.021
The Internet of Things (IoT) is an Infrastructure which allows to connect with each device in physical world through the Internet. Thus IoT enables to provide meahup services or intelligent services to human user using collected data from those devices. Due to these advantages, IoT is used in divers service domains such as traffic, distribution, healthcare, and smart city. However, current IoT provides restricted services because it only supports monitor and control devices according to collected data from the devices. To resolve this problem, we propose a design and implementation of personalized IoT service base on service orchestration. The proposed service allows to discover specific services and then to combine the services according to a user location. To this end, we develop a service ontology to interpret user information according to meanings and smartphone web app to use the IoT service by human user. We also develop a service platform to work with external IoT platform. Finally, to show feasibility, we evaluate the proposed system via study.
A Custom Code Generation Technique for ASIPs from High-level Language
Alam, S.M. Shamsul ; Choi, Goangseog ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 3, 2015, Pages 31~43
DOI : 10.17662/ksdim.2015.11.3.031
In this paper, we discuss a code generation technique for custom transport triggered architecture (TTA) from a high-level language structure. This methodology is implemented by using TTA-based Co-design Environment (TCE) tool. The results show how the scheduler exploits instruction level parallelism in the custom target architecture and source program. Thus, the scheduler generates parallel TTA instructions using lower cycle counts than the sequential scheduling algorithm. Moreover, we take Tensilica tool to make a comparison with TCE. Because of the efficiency of TTA, TCE takes less execution cycles compared to Tensilica configurations. Finally, this paper shows that it requires only 7 cycles to generate the parallel TTA instruction set for implementing Cyclic Redundancy Check (CRC) applications as an input design, and presents the code generation technique to move complexity from the processor software to hardware architecture. This method can be applicable lots of channel Codecs like CRC and source Codecs like High Efficiency Video Coding (HEVC).
Enhanced Belief Propagation Polar Decoder for Finite Lengths
Iqbal, Shajeel ; Choi, Goangseog ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 3, 2015, Pages 45~51
DOI : 10.17662/ksdim.2015.11.3.045
In this paper, we discuss the belief propagation decoding algorithm for polar codes. The performance of Polar codes for shorter lengths is not satisfactory. Motivated by this, we propose a novel technique to improve its performance at short lengths. We showed that the probability of messages passed along the factor graph of polar codes, can be increased by multiplying the current message of nodes with their previous message. This is like a feedback path in which the present signal is updated by multiplying with its previous signal. Thus the experimental results show that performance of belief propagation polar decoder can be improved using this proposed technique. Simulation results in binary-input additive white Gaussian noise channel (BI-AWGNC) show that the proposed belief propagation polar decoder can provide significant gain of 2 dB over the original belief propagation polar decoder with code rate 0.5 and code length 128 at the bit error rate (BER) of
The Study of Improvement of Personal Information Leakage Prevention in Mobile Environment
Choi, Heesik ; Cho, Yanghyun ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 3, 2015, Pages 53~62
DOI : 10.17662/ksdim.2015.11.3.053
Recently, number of tablet or Smartphone users increased significantly in domestic and around the world. But violation of personal information such as leakage, misuse and abuse are constantly occurring by using mobile devices which is very useful in our society. Therefore, in this paper it will talk about the problems in the network environment of the mobile environment such as tablet and Smartphone, Mobile Malware, hacking of the public key certificate, which could be potential threat to mobile environment. This thesis will research for people to use their mobile devices more reliable and safer in mobile environment from invasion and leakage of personal information. In order to use Smartphone safely, users have to use Wi-Fi and Bluetooth carefully in the public area. This paper will research how to use App safely and characteristic of risk of worm and Malware spreading. Because of security vulnerabilities of the public key certificate, it will suggest new type of security certification. In order to prevent from the information leakage and infect from Malware in mobile environment without knowing, this thesis will analyze the improved way to manage and use the mobile device.
Scheduling Method based on SINR at Cell Edge for multi-mode mobile device
Kum, Donghyun ; Choi, Seungwon ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 3, 2015, Pages 63~68
DOI : 10.17662/ksdim.2015.11.3.063
We consider a cell edge environment. In cell edge, a user interfered by signal which is generated by a base stations not including the user. In cell edge environment, that is, there are inter cell interference (ICI) as well as multi user interference (MUI). Coordinated multi-point transmission (CoMP) is a technique which mitigates ICI between base stations. In CoMP, therefore, base stations can coordinate with each other by sharing user state information (CSI) in order to mitigate ICI. To improve sum rate performance in CoMP, each base station should generate optimal user group and transmit data to users selected in the optimal user group. In this paper, we propose a user selection algorithm in CoMP. The proposed method use signal to interference plus noise ratio (SINR) as criterion of selecting users. Because base station can`t measure accurate SINR of users, in this paper, we estimate SINR equation considering ICI as well as MUI. Also, we propose a user selection algorithm based on the estimated SINR. Through MATAL simulation, we verify that the proposed method improves the system sum rate by an average of 1.5 ~ 3 bps/Hz compared to the conventional method.
A Study on Secure Routing Technique using Trust Value and Key in MANET
Yang, Hwanseok ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 3, 2015, Pages 69~77
DOI : 10.17662/ksdim.2015.11.3.069
MANET is composed of only the mobile nodes have a limited transmission range. The dynamic topology by the frequent movement of nodes makes routing difficult and is also cause exposed to security vulnerabilities. In this paper, we propose the security routing technique consisted of mechanism of two steps in order to respond effectively to attack by the modification of the routing information and transmit secure data. The hierarchical structure is used and the authentication node that issues the key of the nodes within each cluster is elected in this proposed method. The authentication node manages key issues and issued information for encrypting the routing information from the source node. The reliability value for each node is managed to routing trust table in order to secure data transmission. In the first step, the route discovery is performed using this after the routing information is encrypted using the key issued by the authentication node. In the second step, the average reliability value of the node in the found path is calculated. And the safety of the data transmission is improved after the average reliability value selects the highest path. The improved performance of the proposed method in this paper was confirmed through comparative experiments with CBSR and SEER. It was confirmed a better performance in the transmission delay, the amount of the control packet, and the packet transmission success ratio.
Interactive Multipath Routing Protocol for Improving the Routing Performance in Wireless Sensor Networks
Jung, Kwansoo ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 3, 2015, Pages 79~90
DOI : 10.17662/ksdim.2015.11.3.079
Multipath routing technique is recognized as one of the effective approaches to improve the reliability of data forwarding. However, the traditional multipath routing focuses only on how many paths are needed to ensure a desired reliability. For this purpose, the protocols construct additional paths and thus cause significant energy consumption. These problems have motivated the study for the energy-efficient and reliable data forwarding. Thus, this paper proposes an energy-efficient concurrent multipath routing protocol with a small number of paths based on interaction between paths. The interaction between paths helps to reinforce the multipath reliability by making efficient use of resources. The protocol selects several nodes located in the radio overlapped area between a pair of paths as bridge nodes for the path-interaction. In order to operate the bridge node efficiently, when the transmission failure has detected by overhearing at each path, it performs recovery transmission to recover the path failure. Simulation results show that proposed protocol is superior to the existing multipath protocols in terms of energy consumption and delivery reliability.
Channel Grade Method of multi-mode mobile device for avoiding Interference at WPAN
Jung, Sungwon ; Kum, Donghyun ; Choi, Seungwon ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 3, 2015, Pages 91~98
DOI : 10.17662/ksdim.2015.11.3.091
There is a new evolution in technological advancement taking place called the Internet of Things (IoT), The IoT enables physical world objects in our surrounding to be connected to the Internet. ISM (Industrial Scientific Medical) band that is 2.4GHz band authorized free of charge is being widely used for smart devices. Accordingly studies have been continuously conducted on the possibility of coexistence among nodes using ISM band. In particular, the interference of IEEE 802.11b based Wi-Fi devices using overlapping channel during communication among IEEE 802.15.4 based wireless sensor nodes suitable for low-power, low-speed communication using ISM band. Because serious network performance deterioration of wireless sensor networks. In this paper, we will propose an algorithm that identifies the possibility of using more accurate channels by mixing utilization of interference signal and RSSI (Received Signal Strength Indicator) Min/Max/Activity of Interference signal by wireless sensor nodes. In addition, it will verify our algorithm by using OPNET Network verification simulator.
Using a Multi-Faced Technique SPFACS Video Object Design Analysis of The AAM Algorithm Applies Smile Detection
Choi, Byungkwan ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 3, 2015, Pages 99~112
DOI : 10.17662/ksdim.2015.11.3.099
Digital imaging technology has advanced beyond the limits of the multimedia industry IT convergence, and to develop a complex industry, particularly in the field of object recognition, face smart-phones associated with various Application technology are being actively researched. Recently, face recognition technology is evolving into an intelligent object recognition through image recognition technology, detection technology, the detection object recognition through image recognition processing techniques applied technology is applied to the IP camera through the 3D image object recognition technology Face Recognition been actively studied. In this paper, we first look at the essential human factor, technical factors and trends about the technology of the human object recognition based SPFACS(Smile Progress Facial Action Coding System)study measures the smile detection technology recognizes multi-faceted object recognition. Study Method: 1)Human cognitive skills necessary to analyze the 3D object imaging system was designed. 2)3D object recognition, face detection parameter identification and optimal measurement method using the AAM algorithm inside the proposals and 3)Face recognition objects (Face recognition Technology) to apply the result to the recognition of the person`s teeth area detecting expression recognition demonstrated by the effect of extracting the feature points.
A Comparative Study of the Usability differences in accordance with Information Architecture in the Social commerce app
Oh, Moonseok ; Won, Jongwook ; Lee, Boyong ; Han, Gyuhoon ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 3, 2015, Pages 113~124
DOI : 10.17662/ksdim.2015.11.3.113
As the development of new media and smart phone, more and more people are using social commerce application to shop on-line. Comfort and easiness of the UX design of the application directly affect the social commerce user`s searching and buying the merchandise. This study analyzes the effect of social commerce application, especially focusing on the lay-out of the GUI, on the consumer`s interest and we suggest an attractive application design of the UX. The material of this study is the lay-out of the GUI of 3 major social commerce - Wemakeprice, Coupan and Ticket monster. We asked questions to the university students who are skillful smart phone users to select frequent on-line shoppers and performed in-depth interview with them to draw a conclusion. As a result of study, differences of main screen layout and information architecture of each social commerce applications has confirmed that indicates a significant difference in usability.
U-complaints call center agents organization fairness impact on job performance through organizational commitment and job satisfaction
Nam, Sangmin ; Hwang, Changyu ; Kwon, Dosoon ; Hong, Soongeun ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 3, 2015, Pages 125~143
DOI : 10.17662/ksdim.2015.11.3.125
As improving the life quality of citizen because of development of Urbanization and Information, civil application service of public institutions has been changed. The government provides a 24-hour civil service of e-government, public institutions operate U-complaints call center to pursue a personalized service to customers. As customer service are diversified, the inconvenience of service is increased. Therefore, public institutions instituted U-complaints call center to solve increased complaints. In early days, public institutions operated simple call center. However, it became intelligent U-complaints call center by SNS. The more increase the importance of agents` contact customer service, the more increase Job Performance considered by Organizational Commitment & Job Satisfaction of call center agents. This study analyzed that applied to Fairness Theory with Organizational Commitment, Job Satisfaction and analyze U-complaints call center agents` role and job performance of public institutions. Proposed a research model applied to job satisfaction with key variables, organizational commitments, job satisfaction. It`s expected to impact on job performance of U-complaints call center agents in public institutions. For empirical study of research model, conducted a survey of the U-complaints call center agents of public institutions. 170 samples were collected from the survey and analyze relationship between the factors. Procedural justice, distribution fairness, fairness interaction are significant influence on organizational commitment of parameters by analysis U-complaints call center agents. Procedural justice and fairness of interaction was found not to effect on parameters of job satisfaction. Also, parameter, organizational commitment have significant influence on job satisfaction. However, have no influence on job performance. Therefore, the parameters of job satisfaction have significant influence on job performance. Public institutions should adopt to improve the quality of citizen services through U-complaints call center agents.
A Study on the Effects of Functional Reusable Packing Containers for Marine Products on Logistics Rationalization
Kim, Byeongchan ; Yang, Daeyong ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 3, 2015, Pages 145~158
DOI : 10.17662/ksdim.2015.11.3.145
Disposable marine product packaging materials such as wooden, Styrofoam, and corrugated cardboard boxes have a very low reuse rate, thus causing the logistics costs to rise and making it difficult to establish a unit load system for marine products. Disposable packing containers to be discarded are accompanied by resource and environmental issues home and abroad. Transportation vehicles for marine products have to return empty without loading different kinds of products after delivery due to the smell and properties of marine products, thus posing as an obstacle to logistics rationalization. In an effort to overcome those limitations, this study examined the stages of transportation including "producer-wholesale market in the producing area-commission merchant-wholesale market in the consumption area-commission merchant-quasi-wholesale market-consumer" and also analyzed the utilization and distribution of disposable packaging materials currently used in the circulation of marine products including wooden, Styrofoam, and corrugated cardboard boxes. Based on the analysis results, the investigator developed a logistics rationalization model capable of promoting semi-permanent reuse and lowering empty vehicle rate on return routes as an alternative to address environmental issues caused by disposable packaging materials, which have been an obstacle to the logistics rationalization of marine products, packaging costs in the process of repeating packing and unpacking at each stage of marine products circulation, and empty vehicle rates on return routes after marine products delivery.
On the Effect of Perceived Security, Perceived Privacy, Perceived Enjoyment, Perceived Interactivity on Continual Usage Intention through Perceived Usefulness in Mobile Instant Messenger for business
Lee, Jieun ; Hwang, Changyu ; Kwon, Dosoon ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 3, 2015, Pages 159~177
DOI : 10.17662/ksdim.2015.11.3.159
As smart phones become more common nowadays, mobile instant messengers such as kakao talk and line are used as essential communication tools exchanging information between individuals. Also, the mobile instant messengers extend their use to business area beyond communication between individuals. This study is on how factors of mobile instant messenger such as perceived security, perceived privacy, perceived enjoyment and perceived interactivity affect business continual usage intention through perceived usefulness. The proposed model is based on Expectation-Confirmation Theory of Oliver and Technology Acceptance Mode of Bhattacherjee. For an analysis, 159 survey responses were collected from the office workers in Seoul and nearby cities, having experiences of mobile instant messengers. To validate the proposed research model, PLS analysis is performed with the valid 154 questionnaires. The path analysis results are as follows. First, perceived security has a positive effect on expectation-confirmation. Second, perceived enjoyment has a positive effect on perceived usefulness. Third, perceived interactivity has a positive effect on both perceived usefulness and expectation-confirmation. Fourth, perceived usefulness has a positive usefulness on satisfaction and continual usage intention of mobile instant messenger. Last, expectation-confirmation has a positive effect on perceived usefulness, and satisfaction has a positive effect on continual usage intention of mobile instant messenger. Since the mobile instant messenger may bring a pressure of work and a violation of privacy, it is necessary that the company provide a guideline for use of the mobile instant messenger and establish the in-house mobile instant messenger system.
NCS academic achievement and learning transfer ARCS motivation theory in ICT in the field of environmental education through interactive and immersive learning
Park, Dongcheul ; Kwon, Dosoon ; Hwang, Changyu ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 3, 2015, Pages 179~200
DOI : 10.17662/ksdim.2015.11.3.179
Recent national policies National Competency Standards(NCS) to develop teaching-oriented education in the field of industry and learning is taking place. Plan to take advantage of the Internet and multimedia classes, information and communication technology (ICT) for ways to leverage the integration appearing in various forms. The purpose of this study is causal influence on the ARCS motivation theory can determine the basic psychology of human motivation factors and the desires of a typical human nature theory dealing with the psychological needs of interactivity and immersion is learning achievement and learning transfer and to validate the demonstration. By applying information and communication technology sector in the development of learning in information and communication equipment training program modules from a field study conducted at the NCS with a clear empirical and empirical research through the synchronization to the learner and to explore the possibility of generalization.
Effect on Acceptance Intentions to Service Quality factors of Social TV : Focus on Technology Acceptance Model
Kwon, Dosoon ; Hwang, Changyu ; Hong, Soongeun ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 3, 2015, Pages 201~218
DOI : 10.17662/ksdim.2015.11.3.201
The purpose of this study is to verify a causal relationship between social tv services and intended acceptance of social tv service through the SERVQUAL five dimensions which mean generally assessment of superior user. Also I am going to analyze that how factors of intended acceptance of social tv service effect on intended acceptance through perceived usefulness and perceived ease of use based on Technology Acceptance Model which provides theoretical basis for behavior response of information technology. This study is significant that social tv combine the five dimensions of service quality that mean assessment of overall excellent or superior user and Technology Acceptance Model that provides theoretical basis for describing an behavior response of information technology.
A Study on the Effects of Advance and Discount Sales of Seasonal Products by Subscription on Logistics Costs
Kim, Byeongchan ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 3, 2015, Pages 219~230
DOI : 10.17662/ksdim.2015.11.3.219
It is difficult to make plans about the production schedule and volume of seasonal products due to the huge uncertainty in the prediction of their demands, which is why the amounts of carryover seasonal products increase after the peak season. Traditional models fail to meet the important requirements of production and stock plans related to the enhanced efficiency of logistics system due to the reduced value of carryover products by the disposal based on large discounts and deterioration, which poses considerable difficulties with actual problem solving. This study examined the stages of product storage from the specialized factory warehouses during a low season through the stores and the warehouses of local distribution centers during a high season to stock disposal and carryover product warehouses after a high season. The study developed a model for logistics rationalization plans to minimize carryover products by advance selling new products by subscription during a low season in anticipation of high season demands, increasing the accuracy of demands prediction, and making stable production plans, as well as demonstrated its excellence through numerical analysis.
A Study on the Influence of Franchise PC Game Rooms Store Attributes on Store Selection Behavior
Seong, Baiksoon ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 3, 2015, Pages 231~240
DOI : 10.17662/ksdim.2015.11.3.231
This study empirically analyzed the relationship between the franchise pc game rooms selection behavior and revisit, recommendations. Select Properties from the franchise pc game rooms store is ease of access, computer specifications, pleasant environment, brand power and pricing strategy. Korean franchise industry is in spite of the short history of just over 30 years growing very fast. Especially pc game rooms store is 14,782 in 2012 years, pc game rooms store is operated by franchise form 10.6%, 87.9% operated by private, co-operation was confirmed at 1.5%. Conclusions are as follows. First, factors that significantly affect the degree of revisit has been identified as computer specifications, pleasant environment, brand power. Second, the recommendation is an important factor of the computer specifications, brand power, pricing strategy. Finally, franchise pc game rooms successful strategy has excellent computer`s specifications, it needs a promotion strategy to attract pc game tournaments to be notified of brand power. We can also see that running is an important factor in a pleasant environment and a flexible pricing strategy.