Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Digital Industry and Information Management
Journal Basic Information
Journal DOI :
The Korea Society of Digital Industry & Information Management
Editor in Chief :
Volume & Issues
Volume 11, Issue 4 - Dec 2015
Volume 11, Issue 3 - Sep 2015
Volume 11, Issue 2 - Jun 2015
Volume 11, Issue 1 - Mar 2015
Selecting the target year
A Foresight Study on Strategy of Semiconductor Memory Industry by Performance Analysis of Semiconductor Industry
Chung, Euiyoung ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 4, 2015, Pages 1~12
DOI : 10.17662/ksdim.2015.11.4.001
This research analyzes the current state of the semiconductor industry delivering the prediction for the future development of the semiconductor industry along with some semiconductor memory`s responsive strategies. In the 2014, top 10 semiconductor companies were targeted and studied its growth based on its profitability and growth indications in perspective during three years. The system semiconductor industry with the increase in Hyper-scale customers, proactive actions in the technology consortium, is polarizing caused by increased R&D expense to ensure process scaling limits and high performance, and some results have shown: PC and Mobile slowdown and growth recession phenomenon due to IoT`s unclear direction. The leading company is to secure new growth engines through `Acquiring`. While as the subordinated companies following this consecutive survival through the `Acquired`, the future of system semiconductor industry is to strengthen the market dominance and its techniques by concentrating on the reorganization of the market by few large companies. Accordingly, the semiconductor memory industry is expected to reach the limit of its expansion to domain of system semiconductor, and it is highly suggesting the need of the `Memory Life Extension` growth strategy.
Fault Prediction of a Telecommunications Network using Association Rules Mining based on Voice of the Customer
Na, Gijoo ; Han, Insup ; Cho, Namwook ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 4, 2015, Pages 13~24
DOI : 10.17662/ksdim.2015.11.4.013
Customer complaints handling helps organizations to retain existing customers and attract new customers, as well. As Voice of the Customer (VOC) is one of the main sources of customer complaints, many organizations utilize VOC to enhance customer satisfaction. Effective management of VOC has been proved as one of the best ways to maintain organization`s brand image and reputation. In spite of its importance, little has been reported on the utilization of VOC to detect faults in a telecommunication industry. In this paper, association rule mining based on VOC is used to identify root fault causes of a telecommunications network. To do that, VOC of a Communication Service Provider has been collected first. Then, association rule mining has also been conducted with various support and confidence levels. As a result, root fault causes of the telecommunications network can be identified. It is expected that this study can be used as a basis for decisions about customer satisfaction management such as preventive maintenances or reduction of the customer maintenance cost.
Design of Interworking Technology for Heterogeneous Medical Device Networks in Smart Healthcare Environments
Kim, Minjin ; Lee, Seunghan ; Kim, Jaesoo ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 4, 2015, Pages 25~31
DOI : 10.17662/ksdim.2015.11.4.025
Smart healthcare environments which merge medical and IT technology are getting ready for the third generation centering EHR from current second generation. As a basic technology for the introduction and activation of EHR systems it requires heterogeneous network interworking techniques between various wired and wireless medical devices. Interworking technology for heterogeneous network among various medical devices is needed to introduce EHR system. The heterogeneous network interworking technology is needed for construction of a reliable data system to convert each of unstructured data into structured data. Therefore, in this paper, we identify the domestic and international trends of smart medical field and analyze the characteristics of wired and wireless communication technology that is used in a heterogeneous network. and also suggest requirements needed for interworking technology and provide interworking technology based on them. we expect that proposed method which is designed for smart healthcare environments would provide a basic architecture needed for third smart medical technology generation.
A Comparative Study on the Performance of Intrusion Detection using Decision Tree and Artificial Neural Network Models
Jo, Seongrae ; Sung, Haengnam ; Ahn, Byunghyuk ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 4, 2015, Pages 33~45
DOI : 10.17662/ksdim.2015.11.4.033
Currently, Internet is used an essential tool in the business area. Despite this importance, there is a risk of network attacks attempting collection of fraudulence, private information, and cyber terrorism. Firewalls and IDS(Intrusion Detection System) are tools against those attacks. IDS is used to determine whether a network data is a network attack. IDS analyzes the network data using various techniques including expert system, data mining, and state transition analysis. This paper tries to compare the performance of two data mining models in detecting network attacks. They are decision tree (C4.5), and neural network (FANN model). I trained and tested these models with data and measured the effectiveness in terms of detection accuracy, detection rate, and false alarm rate. This paper tries to find out which model is effective in intrusion detection. In the analysis, I used KDD Cup 99 data which is a benchmark data in intrusion detection research. I used an open source Weka software for C4.5 model, and C++ code available for FANN model.
Network Attacks Visualization using a Port Role in Network Sessions
Chang, Beomhwan ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 4, 2015, Pages 47~60
DOI : 10.17662/ksdim.2015.11.4.047
In this paper, we propose a simple and useful method using a port role to visualize the network attacks. The port role defines the behavior of the port from the source and destination port number of network session. Based on the port role, the port provides the brief security features of each node as an attacker, a victim, a server, and a normal host. We have automatically classified and identified the type of node based on the port role and security features. We detected and visualized the network attacks using these features of the node by the port role. In addition, we are intended to solve the problems with existing visualization technologies which are the reflection problem caused an undirected network session and the problem caused decreasing of distinct appearance when occurs a large amount of the sessions. The proposed method monitors anomalies occurring in an entire network and displays detailed information of the attacker, victim, server, and hosts. In addition, by providing a categorized analysis of network attacks, this method can more precisely detect and distinguish them from normal sessions.
A Study on Trust Improvement of Packets Transmission using ZCN and N2N Authentication Technique
Yang, Hwanseok ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 4, 2015, Pages 61~68
DOI : 10.17662/ksdim.2015.11.4.061
MANET has various vulnerability in wireless network and is more vulnerable in security because central management is not performed. In particular, routing attack may decrease performance of the overall network because the mobile node acts as a router. In this paper, we proposed authentication technique for improving the reliability of the network by increasing the integrity of the routing control packet and blocking effectively attacks that occur frequently in the inside. The proposed technique is consisted of two authentication methods of ZCN and N2N. ZCN authentication method is to elect CA nodes and monitor the role of the CA nodes. N2N authentication method is for an integrity check on the routing packets between nodes. Index key is determined by combining the hop count value to shared key table issued from CA in order to increase the robustness of the internal attack. Also, the overhead of key distribution was reduced by distributing a shared key to nodes certificated from CA. The excellent performance of the proposed method was confirmed through the comparison experiments.
A Problem Solving Method for Non-Admittable Characters of a Windows File Name in a Directory Index Anti-Forensic Technique
Cho, Gyusang ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 4, 2015, Pages 69~79
DOI : 10.17662/ksdim.2015.11.4.069
This research proposes a modified data hiding method to hide data in a slack space of an NTFS index record. The existing data hiding method is for anti-forensics, which uses traces of file names of an index entry in an index record when files are deleted in a direcotry. The proposed method in this paper modifies the existing method to make non-admittable ASCII characters for a file name applicable. By improving the existing method, problems of a file creation error due to non-admittable characters are remedied; including the non-admittable 9 characters (i. e. slash /, colon :, greater than >, less than <, question mark ?, back slash
, vertical bar |, semi-colon ;, esterisk * ), reserved file names(i. e. CON, PRN, AUX, NUL, COM1~COM9, LPT1~LPT9) and two non-admittable characters for an ending character of the file name(i. e. space and dot). Two results of the two message with non-admittable ASCII characters by keyboard inputs show the applicability of the proposed method.
A Design of Inter-Working System between Secure Coding Tools and Web Shell Detection Tools for Secure Web Server Environments
Kim, Bumryong ; Choi, Keunchang ; Kim, Joonho ; Suk, Sangkee ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 4, 2015, Pages 81~87
DOI : 10.17662/ksdim.2015.11.4.081
Recently, with the development of the ICT environment, the use of the software is growing rapidly. And the number of the web server software used with a variety of users is also growing. However, There are also various damage cases increased due to a software security vulnerability as software usage is increasing. Especially web shell hacking which abuses software vulnerabilities accounts for a very high percentage. These web server environment damage can induce primary damage such like homepage modification for malware spreading and secondary damage such like privacy. Source code weaknesses checking system is needed during software development stage and operation stage in real-time to prevent software vulnerabilities. Also the system which can detect and determine web shell from checked code in real time is needed. Therefore, in this paper, we propose the system improving security for web server by detecting web shell attacks which are invisible to existing detection method such as Firewall, IDS/IPS, Web Firewall, Anti-Virus, etc. while satisfying existing secure coding guidelines from development stage to operation stage.
A Method of Color Image Segmentation Based on DBSCAN(Density Based Spatial Clustering of Applications with Noise) Using Compactness of Superpixels and Texture Information
Lee, Jeonghwan ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 4, 2015, Pages 89~97
DOI : 10.17662/ksdim.2015.11.4.089
In this paper, a method of color image segmentation based on DBSCAN(Density Based Spatial Clustering of Applications with Noise) using compactness of superpixels and texture information is presented. The DBSCAN algorithm can generate clusters in large data sets by looking at the local density of data samples, using only two input parameters which called minimum number of data and distance of neighborhood data. Superpixel algorithms group pixels into perceptually meaningful atomic regions, which can be used to replace the rigid structure of the pixel grid. Each superpixel is consist of pixels with similar features such as luminance, color, textures etc. Superpixels are more efficient than pixels in case of large scale image processing. In this paper, superpixels are generated by SLIC(simple linear iterative clustering) as known popular. Superpixel characteristics are described by compactness, uniformity, boundary precision and recall. The compactness is important features to depict superpixel characteristics. Each superpixel is represented by Lab color spaces, compactness and texture information. DBSCAN clustering method applied to these feature spaces to segment a color image. To evaluate the performance of the proposed method, computer simulation is carried out to several outdoor images. The experimental results show that the proposed algorithm can provide good segmentation results on various images.
Use of Drones in the cultural industries
Yoon, Hongkeun ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 4, 2015, Pages 99~112
DOI : 10.17662/ksdim.2015.11.4.099
Drones are more formally known as unmanned aerial vehicles without a human pilot aboard. Its flight is controlled either autonomously by onboard computers or by the remote control of a pilot on the ground. This research aims to analyze market trends and technological developments of drones, use cases and constraints of drones in the cultural industries take advantage of the possibility of future drones. Drones are looking for broadcasting, movie, theater, games, toys drones and racing games in a variety of cultural industry. The biggest problem of drone shall provide penalties for breaches of privacy and security issues in the debate. Drones performances are required such as battery capacity and compactness because of the technical limitations. The drones are expected to be used in various fields such as journalism drone, performance tools, augmented reality games, kidult culture. The drones can create a new cultural industry market such as the combination of robotics and drone journalism, drone crowded theater, utilizing drones character games, racing games etc. In conclusion, drones help reduce manpower, time and costs dramatically and will contribute to creating added value in the cultural industries.
A study on user satisfaction in TUI environment
Choi, heungyeorl ; Yang, seungyong ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 4, 2015, Pages 113~127
DOI : 10.17662/ksdim.2015.11.4.113
An interface in smart device environment is changing to TUI(touch user interface) environment where a system is being controlled by physical touch, differently from a system controlled through conventional mouse and keyboard. What is more important than anything else in this TUI environment is to implement interface in consideration of learn ability and cognitive constructivism according to user`s experience. Therefore, now is the time when it is necessary to carry out various studies on smart content design process going a step farther together with discussing the details of user`s experience factor. Hence, this study was intended to look into what effect a user`s experiential traits had on the production of contents for the purpose of measures for improving TUI user satisfaction in order to effectively realize contents in smart environment. Results were yielded by using a statistical empirical analysis such as cross-tabulation analysis according to important variable and user, paired t-test, multiple response analysis, and preference frequency analysis of user preference on the basis of a survey. As a result, a system was presented for implementing DFSS(Design For Six Sigma) process. TUI experience factor can be divided into direct habitual experience, direct learning experience, indirect habitual experience, and indirect learning experience. And in the results of study, it was possible to find that the important variables of this study had a positive effect on the improvement of use satisfaction with contents on the whole according to the user convenience of smart contents. This study is expected to have a positive effect on efficient smart device-based contents production by providing objective information according to empirical analysis to smart media-based developer and designer and presenting a model for improving the changed TUI usability.
Streaming Stick Usability Comparison Test
Lee, Hyejin ; Chung, Donghun ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 4, 2015, Pages 129~141
DOI : 10.17662/ksdim.2015.11.4.129
This study evaluates user experience of streaming stick service through usability testing. Streaming stick services such as Roku, Chromecast, and Everoncast were tested in ten levels belonging to five usability variables that are composed of efficiency of use, accuracy, meaningfulness, flexibility, and consistency. Each variable has two levels respectively that are responsiveness, minimal action, error prevention, error detection, error recovery, understandability, learnability, substitutivity, predictability, and familiarity in order. Twenty five participants volunteerly joined this research, and the results showed that Roku is superior to another two OTTs in most levels and variables. It implies that participants prefer to remote control, many channels, and personalized service during experiencing the service.
Smartphone racing game controller UX testing
Chung, Donghun ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 4, 2015, Pages 143~154
DOI : 10.17662/ksdim.2015.11.4.143
This study aims to evaluate smartphone gaming controllers. Diffusion of smartphone makes its users to play smartphone games in ease and comfort and its built-in sensors deliver new gaming experience to the users. Based on the concept how the controller system is important, the current research also implies the importance of customizing service which gives users a selection to deploy a controller. To explore the interaction effect of controllers and customizing on interactivity, flow, usability, attitude, and intention, the research constructs 3(gyroscope, wheel, and button controllers) by 2(default and customizing setting) experimental design and forty college students played Gameloft`s Asphalt 8: Airborne in a within subject design. The results showed that interaction effect and customizing main effect were not found, but controller main effect was statistically significant. Button controller is superior to those other two in more detail. It implies that it is still not useful to play new types of gaming controller, and a customizing service. It suggests that smartphone games should more focus on improving optimal user experience with built-in sensor controllers.
A new demosaicing method based on trilateral filter approach
Kim, Taekwon ; Kim, Kiyun ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 4, 2015, Pages 155~164
DOI : 10.17662/ksdim.2015.11.4.155
In this paper, we propose a new color interpolation method based on trilateral filter approach, which not only preserve the high-frequency components(image edge) while interpolating the missing raw data of color image(bayer data pattern), but also immune to the image noise components and better preserve the detail of the low-frequency components. The method is the trilateral filter approach applying a gradient to the low frequency components of the image signal in order to preserve the high-frequency components and the detail of the low-frequency components through the measure of the freedom of similarity among adjacent pixels. And also we perform Gaussian smoothing to the interpolated image data in order to robust to the noise. In this paper, we compare the conventional demosaicing algorithm and the proposed algorithm using 10 test images in terms of hue MAD, saturation MAD and CPSNR for the objective evaluation, and verify the performance of the proposed algorithm.
A Study on Trend Analysis and Issues of Industry 4.0 - Employment Issues -
Lee, Kiho ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 4, 2015, Pages 165~175
DOI : 10.17662/ksdim.2015.11.4.165
Based on reviewing the literature and statistical year books on current projects that are targeting Industry 4.0 and Smart Factory, this paper aims to show concepts of Industry 4.0, and Smart Factory. Also it shows 5 projects for Industry 4.0 led by governments that worry over their low employment and productivity in main industrialized countries: Germany, China, Japan, the USA, and Korea. In addition it presents some problems which are very important but easy to be overlooked, especially on employment, and it makes three suggestions to solve employment problems. First, government should tax the profit which a company makes on reducing workers in spite of a high rate of profit through technology innovation. Second, to help small businesses to last longer, government should link major companies and small companies. Third, government, academic circles and the industrial world should take part in configuring consortia like American "Industry talent Consortium" to cultivate IT Talent.
A Study on the Factors for IT Investment Justification
Choi, Jaeyoung ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 4, 2015, Pages 177~187
DOI : 10.17662/ksdim.2015.11.4.177
Although actual business environment is getting difficult and hard, IT companies tend to shy away from of annual investment. Many firms have already reached the 25 percent level. However, the profit and the result of their annual investment needs to be evaluated objectively. IT investment analysis usually proceeds by comparing benefits and costs of an IT investment. Much of the problem derives from the historical treatment of IT as an overhead expense rather than a capital asset. What is most worrying about the current situation is the pressure to take a very short-term view of IT. Therefore, this research aims to analyses and justify the necessity of Visionary IT Investment. For this, it is crucial to identify the factors, which affect positively Visionary IT Investment and understand the role of CIO and explain the result of Visionary IT Investment, which is differed to related business and by different business environment. As a result of this study, the legitimacy of IT Investment is proved through analyzing the business value of not investing and cost-avoidance strategies.
A Study of on the influence of techno-stress, flow and smartphone addiction on the Satisfaction of Smart-phones use
Park, Jongsoon ; Lee, Jongman ;
Journal of the Korea Society of Digital Industry and Information Management , volume 11, issue 4, 2015, Pages 189~202
DOI : 10.17662/ksdim.2015.11.4.189
This paper is focused on the investigation of the negative factors from smart-phone as internal affecting the use of smartphone and found their relationship. For the validation of this study model, 300 university students randomly selected in Seoul and Gyeongnam province. The measurement model was evaluated by using SPSS 18.0, and the evaluated result was summarized as follows. First, it was found that the techno-stress of smartphone user significantly associated with the fun and pleasure felt from using smatphone. It was assumed that a higher techno-stress negatively affects fun and pleasure from using smartphone. Second, the techno-stress of smartphone users was found to affect smartphone addiction. This means that more techno-stress users feel as they use smartphone, the more tendency to smartphone addiction. Third, flow was significantly associated with the smartphone addiction. Forth, Flow was significantly associated with satisfaction of the smartphones use. Fifth, it was indicated that when users had more flow and addiction from using smartphone, their satisfaction level was also higher.