Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Digital Industry and Information Management
Journal Basic Information
Journal DOI :
The Korea Society of Digital Industry & Information Management
Editor in Chief :
Volume & Issues
Volume 12, Issue 2 - Jun 2016
Volume 12, Issue 1 - Mar 2016
Selecting the target year
Design and Implementation of an ESS for Efficient Power Management of Stand-Alone Type Street Lights
Kang, Jingu ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 2, 2016, Pages 1~6
DOI : 10.17662/ksdim.2016.12.2.001
Several efforts to replace the use of existing fossil energy resources have already been made around the world. As a result, a new industry of renewable energy has been created, and efficient energy distribution and storage has been promoted intensively. Among the newly explored renewable energy sources, the most widely used one is solar energy generation, which has a high market potential. An energy storage system (ESS) is a system as required. In this paper, the design and implementation of an ESS for the efficient use of power in stand-alone street lights is presented. In current ESS applied to stand-alone street lights, either 12V~24V DC (from solar power) or 110V~220V AC (from commercial power) is used to recharge power in systems with lithium batteries. In this study, an ESS that can support both solar power and commercial power was designed and implemented; it can also perform emergency recharge of portable devices from solar powered street lights. This system can maximize the scalability of ESSes using lithium batteries with efficient energy conversion, with the advantage of being an eco-friendly technology. In a ripple effect, it can also be applied to smart grids, electric vehicles, and new, renewable storage markets where energy storage technology is required.
The Low Power Algorithm using a Feasible Clustert Generation Method considered Glitch
Kim, Jaejin ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 2, 2016, Pages 7~14
DOI : 10.17662/ksdim.2016.12.2.007
In this paper presents a low power algorithm using a feasible cluster generation method considered glitch. The proposed algorithm is a method for reducing power consumption of a given circuit. The algorithm consists of a feasible cluster generation process and glitches removal process. So that glitches are not generated for the node to which the switching operation occurs most frequently in order to reduce the power consumption is a method for generating a feasible cluster. A feasible cluster generation process consisted of a node value set, dividing the node, the node aligned with the feasible cluster generation. A feasible cluster generation procedure is produced from the highest number of nodes in the output. When exceeding the number of OR-terms of the inputs of the selected node CLB prevents the signal path is varied by the evenly divided. If there are nodes with the same number of outputs selected by the first highest number of nodes in the input produces a feasible cluster. Glitch removal process removes glitches through the path balancing in the same manner as . Experimental results were compared with the proposed algorithm . Number of blocks has been increased by 5%, the power consumption was reduced by 3%.
The Design and Implementation of a Method for Identifying RCP in the Vehicle Tracking System
Lee, Yongkwon ; Jang, Chungryong ; Lee, Daesik ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 2, 2016, Pages 15~24
DOI : 10.17662/ksdim.2016.12.2.015
GPS(Global Positioning System) location tracking is a method for taking the precise coordinates after the coordinates are obtained by a GPS receiver, and displaying them on the map. In this paper with WAVE(Wireless Access for Vehicular Environment) simulation, we show that various services such as vehicle tracking service, real-time road conditions service and logistics can go tracking service, control and operation services according to the vehicle position and the traveling direction by using the GPS position data. A vehicle tracking system using GPS is automatically able to manage multiple RCP when exchanging data between RMA and the RCP, and it provides rapid requests and responses. To verify that multiple sessions between RMA and RM, as well as multiple sessions between RMA and RCP are able to be implemented, we take RMA as a RCP application on an OBU, until the RMA is receiving data response from corresponding RM. As a result of this experiment, we show that the response speeds of single session between RMA and RM using 1, 2, 3, and 4 kbyte unit data are similar, 62.32ms, 62.65ms, 63.02ms, and 63.48ms, respectively. Likewise, those of 128 muliple sessions using 1, 2, 3, and 4 kbyte unit data are not much more time difference, 298.08ms, 302.21ms, 322.85ms, and 329.62ms, respectively.
A Study on the Security Technology of the Location based Tourism Information Service
Kim, Taekyung ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 2, 2016, Pages 25~29
DOI : 10.17662/ksdim.2016.12.2.025
Owing to the change of economic trends, the importance of the tourism industry is growing more and more. In particular, the number of foreign tourists continues to increase and the type of tourists is being changed into FIT (Foreign Independent Traveler). Therefore it is an important issue to provide the effective information to foreign tourists. To solve these problems, a variety of IT technology is being used in the tourism information systems. Especially the location based tour information service is being emerged. This kinds of tourism information service is a type of LBS (Location Based Services). But if the security of the location based tourism information service is not guaranteed, it can lead to many dangers. In this paper, the trends of location based tourism information service are surveyed. Also the security threats and countermeasures for the location based tourism information service are analyzed. This paper suggests secret considerations for the location based tourism information service.
VR User Interface using Multipurpose Visual Language System
Kim, Youngjong ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 2, 2016, Pages 31~39
DOI : 10.17662/ksdim.2016.12.2.031
In this paper planed Virtual Reality user interface that recently hot issue using MVLS(Multipurpose Visual Language System). Proposed system is planed for more with ease approach new type environment system. The point of this system is for more few the number of time of act to get want to result. That is easy build for Virtual Reality environment system that user so far, who did not experience. Also too, application to the environment through Multipurpose Visual Language System based, can be required to increase the case of user of existing applications, not only a simple application infrastructure Virtual Reality. This has the advantage of being able to under Virtual Reality condition the environment for the use of a wide range of applications such as view TV, video and other contents. By using the proposed system, the experience in virtual realities that have not felt during the general public to be able to easily and quickly, virtual reality or 3D Expected to can one step closer to the needs of general and industry.
Biometric Image Cryptographic Algorithm Based on the Property of Wavelet Transform Coefficient
Shin, Jonghong ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 2, 2016, Pages 41~49
DOI : 10.17662/ksdim.2016.12.2.041
Lossless encryption methods are more applicable than lossy encryption methods when marginal distortion is not tolerable. In this research, the author propose a novel lossless symmetric key encryption/decryption technique. In the proposed algorithm, the image is transformed into the frequency domain using the lifting wavelet transform, then the image sub-bands are encrypted in a such way that guarantees a secure, reliable, and an unbreakable form. The encryption involves scattering the distinguishable frequency data in the image using a reversible weighting factor amongst the rest of the frequencies. The algorithm is designed to shuffle and reverse the sign of each frequency in the transformed image before the image frequencies are transformed back to the pixel domain. The results show a total deviation in pixel values between the original and encrypted image. The decryption algorithm reverses the encryption process and restores the image to its original form. The proposed algorithm is evaluated using standard security and statistical methods; results show that the proposed work is resistant to most known attacks and more secure than other algorithms in the cryptography domain.
Affecting factors of learner's attitude and intention to use of SNS in college education
Jun, Byoungho ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 2, 2016, Pages 51~59
DOI : 10.17662/ksdim.2016.12.2.051
SNS has been emerging as an educational tool, because of its features such as discussion on course topics, feedback from peers and group collaboration. The purpose of this study is to investigate the affecting factors of learner's attitude and intention to use of SNS in college education. Based on prior studies self-efficacy, educational expectancy, subjective norm, habit and enjoyment were identified as affecting factors. According to the results of multiple regression analysis, all factors(self-efficacy, educational expectancy, subjective norm, habit and enjoyment) were found to be significantly related to the learner's attitude and intention to use. Result shows that educational expectancy and enjoyment are much more significantly related to the learner's attitude and intention to use of SNS in college education. It can provide a guideline of effective strategy for SNS utilization in college education.
Examining the Determinants of the Intention of Continued Instagram Usage: Focused on the Moderating Effect of the Gender
Lee, Seoungho ; Kim, Changsik ; Kwahk, Keeyoung ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 2, 2016, Pages 61~72
DOI : 10.17662/ksdim.2016.12.2.061
The objective of this study is to investigate the determinants of the intention of continued Instagram usage. For this study, we used a self-administered survey questionnaire in which all of the scales were adapted from the previous literature. In this paper, we introduce a research model that consists of three antecedents (perceived usefulness, perceived playfulness, and customer satisfaction) that were thought to cause the intention of continued Instagram usage. The data were collected from 150 Instagram users. In order to validate the proposed research model, we used the SmartPLS 2.0. We used a two-step approach, recommended by Anderson and Gerbing(1988), that comprises a measurement model and structural model. The results showed that two antecedent factors (perceived usefulness and perceived playfulness) had a significant impact on customer satisfaction, which then causes the intention of continued usage. This study highlights the importance of the moderating effect of gender. Based on the results, this study proposes useful implications for Instagram stakeholders.
The Correspondence Competence of Information Accident by Firms Experienced in Confidential Information Leak
Jung, Byoungho ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 2, 2016, Pages 73~86
DOI : 10.17662/ksdim.2016.12.2.073
The purpose of this study is to examine a security investment for firms experienced in confidential information leak. Information security is an apparatus for protection of secret information. The competence of information security is a competitiveness to avoid information leakage in changing business environment. The type of information security is divided into administrative security, technical security and physical security. It is necessary to improve the incident correspondence competence through information security investment of the three types. Therefore, the investment of information security is to enhance information-asset protection of firms. To reinforce accident response competence, an organization discussed an establishment, security technology development, expand investment and legal system of the security system. I have studied empirically targeting the only information leak of firms. This data is a technical security competence and technology leakage situation of firms happened in 2010. During recovery of the DDos virus damage on countries, company and individual, the collected data signify a reality of information security. The data also identify a security competence of firms worrying information security management. According to the study, the continuous investment of information security has a high competence of accident correspondence. In addition, the most of security accidents showed a copy and stealing of paper and computer files. Firm on appropriate security investment is an accident correspondence competence higher than no security investment regardless of a large, small and medium-sized, and venture firm. Furthermore, the rational security investment should choose the three security type consideration for firm size.
Developing evaluation criteria for quality management systems adoption by using delphi technique
Choi, Jaewoong ; Jun, Byoungho ; Choi, Jaeyoung ;
Journal of the Korea Society of Digital Industry and Information Management , volume 12, issue 2, 2016, Pages 87~102
DOI : 10.17662/ksdim.2016.12.2.087
The customer requirements are constantly changing in the hyper-competition and competition is becoming increasingly intensified. In order to ensure the competitive advantage in the industry should focus on the management activities to enhance customer satisfaction. High quality means pleasing customers, not just protecting them from annoyances. It is due to continuous and requires the establishment of a quality management system that meets the characteristics and systematization need to manage a stable quality and productivity, which should be done in a company-wide quality management activities. The purpose of this study is to identify a suitable organizational diagnostic model for considering to adopt ISO 9001 quality management systems. We used the three-round delphi techniques on a panel of 30 experts. A total of 26 assessment indicators were developed through this panel. First, it is important to evaluate the strategy about quality. Second, it is important to evaluate the systems about periodically communicating quality agenda. Third, it is important to evaluate the responsibility of overall business process. In conclusion, this study empirically shows how firms can develop an organizational diagnostic model to increase their quality management systems.