Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Digital Industry and Information Management
Journal Basic Information
Journal DOI :
The Korea Society of Digital Industry & Information Management
Editor in Chief :
Volume & Issues
Volume 12, Issue 2 - Jun 2016
Volume 12, Issue 1 - Mar 2016
Selecting the target year
Research about the IoT based on Korean style Smart Factory Decision Support System Platform - based on Daegu/Kyeongsangbuk-do region component manufacture companies
Sagong, Woon ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 1, 2016, Pages 1~12
DOI : 10.17662/ksdim.2016.12.1.001
The current economic crisis is making new demands on manufacturing industry, in particular, in terms of the flexibility and efficiency of production processes. This requires production and administrative processes to be meshed with each other by means of IT systems to optimise the use and capacity utilisation of machines and lines but also to be able to respond rapidly to wrong developments in production and thus to minimise adverse impacts on the business. The future scenario of the "smart factory" represents the zenith of this development. The factory can be modified and expanded at will, combines all components from different manufacturers and enables them to take on context-related tasks autonomously. Integrated user interfaces will still be required at most for basic functionalities. The complex control operations will run wirelessly and ad hoc via mobile terminals such as PDAs or smartphones. The comnination of IoT, and Big Data optimisation is bringing about huge opportunities. these processes are not just limited to manufacturing, anywhere a supply chain environment exists can benefit from information provided by linked devices and access to big data to inform their decision support. Building a smart factory with smart assets at its core means reaching those desired new levels of productivity and efficiency. It means smart products that leverage advanced traceability, connectivity and intelligence. For businesses, it means being able to address the talent crunch through more autonomous. In a Smart Factory, machinery and equipment will have the ability to improve processes through self-optimization and autonomous decision-making.
Study on key standardization Work Item derivation and strategies for IoT services
Kim, Jungsook ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 1, 2016, Pages 13~26
DOI : 10.17662/ksdim.2016.12.1.013
Service and technology for the future hyper-connected society, which is every information receive through the mobile internet, will be an Internet of Things. Thus, it is mandatory to derive key standardization work item and establish strategy for the global business with the standardization of device and service platform by the application service. In this study, by analyzing the domestic and international market trends, state of technical development, and standardization of technology, we identified the open platform is the stepping stone for achieving the goal which is establishing the virtuous circulation of IoT ecosystem. Also, we defined emphasized key standardization work item for achieving the open platform are network, server, access authentication, billing system, and software platform. After that, we proposed future strategy direction of standardization. This research could be contribute to the IoT service diffusion by realizing IP communication among low power wireless terminals and implementing light-weight standard internet protocol.
A Method for Generation of Contour lines and 3D Modeling using Depth Sensor
Jung, Hunjo ; Lee, Dongeun ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 1, 2016, Pages 27~33
DOI : 10.17662/ksdim.2016.12.1.027
In this study we propose a method for 3D landform reconstruction and object modeling method by generating contour lines on the map using a depth sensor which abstracts characteristics of geological layers from the depth map. Unlike the common visual camera, the depth-sensor is not affected by the intensity of illumination, and therefore a more robust contour and object can be extracted. The algorithm suggested in this paper first abstracts the characteristics of each geological layer from the depth map image and rearranges it into the proper order, then creates contour lines using the Bezier curve. Using the created contour lines, 3D images are reconstructed through rendering by mapping RGB images of the visual camera. Experimental results show that the proposed method using depth sensor can reconstruct contour map and 3D modeling in real-time. The generation of the contours with depth data is more efficient and economical in terms of the quality and accuracy.
Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments
Jin, Byungwook ; Jung, Dongwoog ; Cha, Siho ; Jun, Moonseog ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 1, 2016, Pages 35~41
DOI : 10.17662/ksdim.2016.12.1.035
Internet of Things (IoT) services are widely used in appliances of daily life and industries. IoT services also provide various conveniences to users and are expected to affect value added of all industries and national competitiveness. However, a variety of security threats are increased in IoT environments and lowers reliability of IoT devices and services that make some obstacles for commercialization. The attacks arising in IoT environments are making industrial and normal life accidents unlike existing information leak and monetary damages, and can expand damage scale of leakage of personal information and privacy more than existing them. To solve these problems, we design a session key based access control scheme for secure communications in IoT environments. The proposed scheme reinforces message security by generating session key between device and access control network system. We analyzed the stability of the proposed access scheme in terms of data forgery and corruption, unauthorized access, information disclosure, privacy violations, and denial of service attacks. And we also evaluated the proposed scheme in terms of permission settings, privacy indemnity, data confidentiality and integrity, authentication, and access control.
Double Talk Processing using Blind Signal Separation in Acoustic Echo Canceller
Lee, Haengwoo ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 1, 2016, Pages 43~50
DOI : 10.17662/ksdim.2016.12.1.043
This paper is on an acoustic echo canceller solving the double-talk problem by using the blind signal separation technology. The acoustic echo canceller may be deteriorated or diverged during the double-talk period. So we use the blind signal separation to detect the double talking by separating the near-end speech signal from the mixed microphone signal. The blind signal separation extracts the near-end signal from dual microphones by the iterative computations using the 2nd order statistical character in the closed reverberation environment. By this method, the acoustic echo canceller operates irrespective of the double-talking. We verified performances of the proposed acoustic echo canceller in the computer simulations. The results show that the acoustic echo canceller with this algorithm detects the double-talk periods well, and then operates stably without diverging of the coefficients after ending the double-talking. The merits are in the simplicity and stability.
The Proposal of Direction for Introduction of Pin-Tech Services Based on Research of Cases
Choi, Heesik ; Cho, Yanghyun ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 1, 2016, Pages 51~61
DOI : 10.17662/ksdim.2016.12.1.051
Because the Apple Pay which created by U.S's Apple Inc. and launch of Samsung pay in last August in domestic, people have high interest in Pin-Tech industries and new method of easy payment. In this paper, it will study newly introduced Pin-Tech industries and marketability of Pin-Tech industries. Also it will propose safe use of Pin-Tech services based on cases in domestic and overseas. This paper is organized as follows. In Chapter 2, it will study concept of Pin-Tech services and status of Pin-Tech services in domestic and overseas. In Chapter 3, it will look technical trends of Pin-Tech services. In Chapter 4, it will propose direction based on analysis of cases of Pin-Tech services. This paper will finish with conclusion in Chapter 5. Given the global trends, Korea is now just took the first steps in new Pin-Tech era. The Pin-Tech services are in situations that it is not yet activated in domestic due to the various financial regulations and procedures. In this paper, it will shows cases of concerns of Pin-Tech services and domestic authentication which relates to easy payment certification. If Pin-Tech services are develop with easy payment certification and adapt to domestic environment and develop based on stability and security as mentioned in this paper, domestic Pin-Tech services and security technology will grow to the world level. Also it requires unceasing research and efforts from relevant government officials, security companies and Pin-Tech ICT companies.
A Study on Data Gata Gateway for Indoor Location Detection and Its Upload
Cho, Youngseok ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 1, 2016, Pages 63~69
DOI : 10.17662/ksdim.2016.12.1.063
Although the previous information technologies had been used for the quick and accurate processing of work, At present, however, as the combination with the Internet, the IOT(Internet-of-Things) era in which the diverse pieces of information are collected and handled through the sensor networks is in progress. Among these application fields of the IoT, the indoors position identification technology has been developing in the direction of providing the position information in the buildings of which the lengths and the interiors are complicated and in the direction of providing the various pieces of information and others of the like to the nearby customers. In this paper, we proposed an indoors position identification system that detects the patrol positions of the prison officers in the correctional facilities and in the prisons by using the ultrasonic waves, that transmits these to the control system and the data gateway, and that transmits the detected data. The Indoors Positioning identification System is organized with the tags for recognizing the positions that transmit the ultrasonic signal, ultrasonic receiver and data gateway. And the indoors position information data were transmitted to the management system through the data gateway. We evaluated the transmission error, by changing the distance of the proposed system for location recognition tag and the receiver, As a result, we found out that, when the transmission distance was 10 cm or less, the errors occurred in the form of the distortions. And when it was 110 cm or more, the transmission errors occurred due to the propagation diminutions of the ultrasonic wave signals. And when the transmission distance was from 10 cm to 100 cm, it was shown that the proposed system was possible without any errors.
A Study on Routing Performance Improvement through Cooperation Authentication Technique
Yang, Hwanseok ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 1, 2016, Pages 71~79
DOI : 10.17662/ksdim.2016.12.1.071
The main security threats in MANET are integrity and non-repudiation. In the meantime, a lot of secure routing protocols have been designed in order to block these security threats. In this paper, partnership-based authentication technique is proposed in order to provide participation exclusion of network and non-repudiation for the nodes. The proposed technique is a technique that participates in data communication for only the nodes receiving the authentication through the authentication process for the nodes. For this, the proposed technique is largely consists of two steps. The first step is the process that issued the certificate after the reliability for the nodes participating in the network is evaluated. And in the second step, the key exchange agreement with the neighbor nodes is performed and data communication is made after setting security path with responding nodes. The level of security in data transmission is improved because the process of path setting is performed through cooperation with a neighboring nodes having high reliability during the course of these two steps. The superiority of proposed technique in this paper was confirmed through the comparative experiment.
Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments
Jin, Byungwook ; Kim, Jonghwa ; Cha, Siho ; Jun, Moonseog ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 1, 2016, Pages 81~87
DOI : 10.17662/ksdim.2016.12.1.081
Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.
A Comparative Study on Performance of Open Source IDS/IPS Snort and Suricata
Seok, Jinug ; Choi, Moonseok ; Kim, Jimyung ; Park, Jonsung ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 1, 2016, Pages 89~95
DOI : 10.17662/ksdim.2016.12.1.089
Recent growth of hacking threats and development in software and technology put Network security under threat, In addition, intrusion, malware and worm virus have been increased due to the existence of variety of sophisticated hacking methods. The goal of this study is to compare Snort Alpha version with Suricata 2.0.11 version whereas previous study focuses on comparison between snort 2. x version under thread environment and Suricata under multi-threading environment. This thesis' experiment environment is set as followed. Intel (R) Core (TM) i5-4690 3. 50GHz (4threads) of CPU, 16GB of RAM, 3TB of Seagate HDD, Ubuntu 14.04 are used. According to the result, Snort Alpha version is superior to Suricata in performance, but Snort Alpha had some glitches when executing pcap files which created core dump errors. Therefore this experiment seeks to analyze which performs better between Snort Alpha version that supports multi packet processing threads and Suricata that supports multi-threading. Through this experiment, one can expect the better performance of beta and formal version of Snort in the future.
Implementation of Developement System of Education Contents Utilizing 3D VR
Bae, Sungsill ; Lee, Jeongmin ; Ahn, Sungsoo ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 1, 2016, Pages 97~106
DOI : 10.17662/ksdim.2016.12.1.097
3D virual reality technique develop rapidly such as parts of education, health, national defense, etc. This paper implements an education contents utilizing 3D virtual reality based on HMD. In this paper, contents make up Changdeokgung Palace using to 3Dmax and Unity program, it shows on implemented Helmet Mounted Display. HMD obtain dynamic image from the target source of smart phone. Also, contents consist of service senerio through divided palace position and King's a day's journey especially. Above all, this paper indicate improving performance according to reduced cybersickness and immersion enlargement. And memory capacity reduced by various technique such that file type, compressed file, minimized resource. Proposed technique can obtain dynamic 3D image by HMD implementation at real time basis so that it is possible to use simultaneously multi-source. From the various and practical experiment, it is confirm that proposed 3D VR education system is useful for experience of virtual reality practically.
Multimedia Contents Design for Early Childhood Education to Traditional Education Theory
Lee, Bumsuk ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 1, 2016, Pages 107~117
DOI : 10.17662/ksdim.2016.12.1.107
This study investigates design strategies for improving the educational quality of multimedia contents for early childhood education. It emphasizes both traditional education theory and developmental aspects in its exploration of interactive and educational qualitative multimedia contents for early children. Accordingly, for an effective early childhood education, it is necessary to experience of the playful learning for the conception of ideas and the understanding of the social life. Because this study 1) possibility of multimedia contents for early childhood education, 2) computer application method for early childhood education, 3) examines used in the designing of multimedia contents for early childhood education according to traditional education theory. Multimedia early childhood education system is possible to organize information such as test, image, sound and video based on hyperlink system. I use Microsoft's Ms-office and Asymetrix's ToolBook software that are useful for hyperlink and parameter. Multimedia contents and other pages are used by Dynamic Data Exchange(DDE). Therefore multimedia contents for early childhood education is a useful tool for students of early childhood education department, parents, and children.
A Study on Analysis of User Behavior and Needs for Efficient Use of a Home Smart Mirror
Oh, Moonseok ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 1, 2016, Pages 119~129
DOI : 10.17662/ksdim.2016.12.1.119
Rapid changes to the paradigm of smart media have created a communication environment through merging with various media such as IoT technology, which is internet of things. Among them, user' need for a start home, which is one of people living conditions, has been growing and values of the communication environment in a living space using a smart mirror have been growing. However, studies on figuring out behavior and analyzing needs of family members who actually use the living space are insufficient. This study is to draw the service system of the home smart mirror by analysis of behavior and needs of users of the living space. For a research method for analysis of behavior of family members, I wrote two kinds of user's experience maps, which are frequency of use of a quantitative space of a living space and space's important value scales by persona study and depth interview. Through this, applied spaces of the home smart mirror (living room, bathroom, powder room, dress room, porch, kitchen, room) and the types of user needs (type of providing information, entertainment type, control type, service type) have been drawn and statistical analysis methodology has been utilized for a research of user preferences in regard to correlation between living spaces and types of user needs based on a survey. As a result of analysis of ages and gender, types of user needs by space have been drawn and the service system of the home smart mirror has been drawn. It would be utilized as a basic material for various contents development and design using the smart mirror in the future.
A Study of the Perceived Attractiveness of Wearable Devices - Focused on the Smartwatch -
Lim, Yangwhan ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 1, 2016, Pages 131~141
DOI : 10.17662/ksdim.2016.12.1.131
This study explores the conditions under which consumers adopt wearable devices. The study focuses on the attractiveness of the product that consumers can perceive. This study was implemented to find out what factors influenced the consumers to perceive the attractiveness and value of the product. The factors include the benefits and costs of the product. The consumers' wants for the product was included under personal factor. The synergy effect of related product was classified circumstantial factor. The outcomes derived from the postulating and verifying hypothesis are as follows. First, the attractiveness of the product that the consumers perceive has a positive effect on perceiving the attractiveness of the product. Second, the benefits of the product that the consumers feel have a positive effect on the value of the product in a meaningful way. Third, the consumers' perception of the wants for the product have a significant effect on perceiving the value and attractiveness of the product. Fourth, the consumers' perception of the synergy effect between the wearable device and the smartphone did not affect the value of the product in a significant way, but did have a significant effect on the attractiveness of the products.