Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of the Korea institute of electronic communication sciences
Journal Basic Information
Journal DOI :
The Korea Institute of Electronic Communication Science
Editor in Chief :
Volume & Issues
Volume 7, Issue 6 - Dec 2012
Volume 7, Issue 5 - Oct 2012
Volume 7, Issue 4 - Aug 2012
Volume 7, Issue 3 - Jun 2012
Volume 7, Issue 2 - Apr 2012
Volume 7, Issue 1 - Feb 2012
Selecting the target year
Korea's Global Science & Technology(S&T) Agenda -A study on Internationalization of Industrial R&D for Korean SME-
Lee, Sang-Yun ; Yoon, Hong-Joo ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 693~705
It is increasing the necessity of technology cooperation between nations, in the world, more and more. The international cooperation for the technology development have the dissipating effect of costs and risks and encourage efficient use of the knowledge and eventually help the firms better access overseas market easily. The S&T diplomacy of Korea is, at present, on international S&T cooperation to secure technologies to strengthen base of science, technology and innovation. This tendency is closely related with the governance issue in international S&T cooperation. And This international S&T cooperation is connected with the internationalization of firms. But it is getting more difficult for a firm, especially smaller firm like Korean SME to sustain the technological advantage over any significant period. The small and medium sized enterprises as Korean SME, internationalization of R&D is difficult just to think in terms of one framework with the limited accumulation of informations and experiences. So against that situation, this paper shows a new concept 'SME co-ordinator' as the role client(or player) reinforcing international S&T cooperation, sustaining the technological advantage for Korean SME. And 'SME co-ordinator' leads Korean SME to progress 'open innovation' not 'close innovation' as well as serving adequate information about appropriate partners and capable employer to help manage the international S&T cooperation for Internationalization of Industrial R&D for Korean SME.
A Simulation of Δ-Σ Modulators for Frequency Synthesizers of FMCW Radars
Hwang, In-Duk ; Kim, Chang-Hwan ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 707~714
After a single-stage, second-order, multiple-feedback
modulator and a two-stage, second-order MASH
modulator were analyzed and simulated using Simulink and Matlab and their characteristics were compared, the following result was obtained: 1) The two
modulators do not have group delay distortion. 2) The characteristics of the noise shaping are nearly identical. As a result of the noise shaping, the power spectral densities have slope of 40 dB/dec. 3) There was no spurious tone. 4) The input range of the two modulators is from -1 to +1 in common. 5) Because the output of the two-stage MASH modulator is 2-bits (4-levels), design of frequency dividers and charge pumps of PLL are more demanding.
Hybrid Balanced VCO Suitable for Sub-1V Supply Voltage Operation
Jeon, Man-Young ; Kim, Kwang-Tae ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 715~720
This study presents a hybrid balanced voltage controlled oscillator (VCO) circuit which is suitable for low phase noise operation at sub-1V supply voltages. Half circuits of the proposed VCO use the varactor-integrated feedback capacitors in their respective circuit. The varactor-integrated feedback capacitors further increase the negative resistance of the equivalent tank thereby ensuring stable start-up of oscillation even at the sub-1V supply voltage. In addition, this work theoretically analyses the phenomenon of the increase of the negative resistance. Simulation results using a
RF CMOS technology exhibit the phase noises of -122.4 to -125.5.8 dBc/Hz at 1 MHz offset from oscillation frequency of 4.87 GHz over the supply voltages of 0.6 through 0.9 V.
An improved Bellman-Ford algorithm based on SPFA
Chen, Hao ; Suh, Hee-Jong ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 721~726
In this paper, we proposed an efficient algorithm based on SPFA(shortest path faster algorithm), which is an improved the Bellman-Ford algorithm. The Bellman-Ford algorithm can be used on graphs with negative edge weights unlike Dijkstra's algorithm. And SPFA algorithm used a queue to store the nodes, to avoid redundancy, though the Bellman-Ford algorithm takes a long time to update the nodes table. In this improved algorithm, an adjacency list is also used to store each vertex of the graph, applying dynamic optimal approach. And a queue is used to store the data. The improved algorithm can find the optimal path by continuous relaxation operation to the new node. Simulations to compare the efficiencies for Dijkstra's algorithm, SPFA algorithm and improved Bellman-Ford were taken. The result shows that Dijkstra's algorithm, SPFA algorithm have almost same efficiency on the random graphs, the improved algorithm, although the improved algorithm is not desirable, on grid maps the proposed algorithm is very efficient. The proposed algorithm has reduced two-third times processing time than SPFA algorithm.
Classification of ECG arrhythmia using Discrete Cosine Transform, Discrete Wavelet Transform and Neural Network
Yoon, Seok-Joo ; Kim, Gwang-Jun ; Jang, Chang-Soo ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 727~732
This paper presents an approach to classify normal and arrhythmia from the MIT-BIH Arrhythmia Database using Discrete Cosine Transform(DCT), Discrete Wavelet Transform(DWT) and neural network. In the first step, Discrete Cosine Transform is used to obtain the representative 15 coefficients for input features of neural network. In the second step, Discrete Wavelet Transform are used to extract maximum value, minimum value, mean value, variance, and standard deviation of detail coefficients. Neural network classifies normal and arrhythmia beats using 55 numbers of input features, and then the accuracy rate is 98.8%.
Gaussian Mixture Model Based Smoke Detection Algorithm Robust to Lights Variations
Park, Jang-Sik ; Song, Jong-Kwan ; Yoon, Byung-Woo ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 733~739
In this paper, a smoke detection algorithm robust to brightness and color variations depending on time and weather is proposed. The proposed smoke detection algorithm specifies the candidate region using difference images of input and background images, determines smoke by comparing feature coefficients of Gaussian mixture model of difference images. Thresholds for specifying candidate region is divided by four levels according to average brightness and chrominance of input images. Clusters of Gaussian mixture models of difference images are aligned according to average brightness. Smoke is determined by comparing distance of Gaussian mixture model parameters. The proposed algorithm is implemented by media dedicated DSP. As results of experiments, it is shown that the proposed algorithm is effective to detect smoke with camera installed outdoor.
Implementation of TCP Retransmitted Packet Loss Recovery using ns-2 Simulator
Kim, Beom-Joon ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 741~746
Transmission control protocol(TCP) widely used as a transport protocol in the Internet includes a loss recovery function that detects and recovers packet losses by retransmissions. The loss recovery function consists of the two algorithms; fast retransmit and fast recovery. There have been researches to avoid nonnecessary retransmission timeouts (RTOs), which leads to selective acknowledgement (SACK) option and limited transmit scheme that are standardized by IETF (Internet Engineering Task Force). Recently, a method that covers the case in which a retransmitted packet is lost again has been propsed. The method, however, is not proved in terms of the additive increase multiplicative decrease (AIMD) principle of TCP congestion control. In this paper, therefore, we analyzed the method in terms of the principle by ns-simulations.
Evaluation of VoIP Service Quality under the Roaming of Mobile Terminals
Choi, Dae-Woo ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 747~752
In this paper we evaluated by simulation the effect of VoIP roaming and data traffic roaming on other VoIP calls. Regardless of MIPv4 or MIPv6, the quality of voice of all VoIP calls falls down quickly to the bottom level after the start of roaming by one voice terminal. That was caused by the excessive retransmission on downlink. Thus it seems that we need a kind of call admission control when we adopt the roaming service on VoIP calls. Data traffic degrades also the voice quality especially at the foreign agent side.
Composition Rule of Character Codes to efficiently transmit the Character Code in HDLC(High-level Data Link Control) Protocol
Hong, Wan-Pyo ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 753~760
This paper is to show the character coding rule in computer and information equipment etc to improve the transmission efficiency in telecommunications. In the transmission system, the transmission efficiency can be increased by applying the proper character coding method. In datalink layer, HDSL ptotocol use FLAG byte to identify the frame to frame which consists of data bit stream and other control bytes. FLAG byte constits of "01111110". When data bit stream consist of the consecutive 5-bit "1" after "0", the decoder can not distinguish whether the data bit sequence is flag bit stream or data bit stream. To solve the problem, when the line coder in transmitter detects the consecutive 5-bits "1" after "0" in the input data stream, inserts violently the "0" after 5th "1" of the consecutive 5-bit "1" after "0". As a result, when the characters are decoded with the above procedure, the efficiency of system should be decreased. This paper shows the character code rule to minimize the consecutive 5-bits "1" after "0" when the code is given to each characters.
A study on Code System of Latin Character to Improve Transmission Efficiency in Data Communications
Hong, Wan-Pyo ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 761~776
This paper proposes the revised Roman character code system using Unicode 3.0. The background of the paper is whether the Latin character code system th using in the world in Unicode V.3 is proper or not in the side of the transmission efficiency in data communications. In data communications, when the consecutive 4 bits or 8 bits of "0" bit from the information devices input into the line coder, its consecutive "0" bits are scrambled to the predetermined bit patterns to avoid the syncronization loss. The paper was based on the statistical data for the using frequency of the alphabet letter and the proposed rule for characters coding in . The paper was focused to improve of Unicode itself and UTF-8 code system. As a result of the paper, when the proposed coding systems for Latin character in Unicode 3.0 itself and UTF-8 code system, the scrambler efficiency using HDB-3 in the line coder of the data transmission system could be improved about 3645 ~ 31400% and 480 ~ 1700% respectively.
A Keyword Search Model based on the Collected Information of Web Users
Yoon, Sung-Hee ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 777~782
This paper proposes a technique for improving performance using word senses and user feedback in web information retrieval, compared with the retrieval based on ambiguous user query and index. Disambiguation using query word senses can eliminating the irrelevant pages from the search result. According to semantic categories of nouns which are used as index for retrieval, we build the word sense knowledge-base and categorize the web pages. It can improve the precision of retrieval system with user feedback deciding the query sense and information seeking behavior to pages.
A Study on Lexical Ambiguity Resolution of Korean Morphological Analyzer
Park, Yong-Uk ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 783~787
It is not easy to find out syntactic error in a spelling checker systems of Korean, because the spelling checker is generally to correct each phrase and it cannot check the errors of contextual ill-matched words. Spelling checker system tests errors based on a words. Disambiguation of lexical ambiguities is important in natural language processing. Its outputs is used in syntactic analysis. For accurate analysis of a sentence, syntactic analysis system must find out the ambiguity of morphemes in a word. In this paper, we suggest several rules to resolve the ambiguities of morphemes in a word. Using these methods, we can reduce many lexical ambiguities in Korean.
The analysis of Korean Spelling Corrector using Hill-Climbing Method
Yun, Keun-Soo ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 789~796
To find the module sequence that makes correction rate optimal is the goal of this paper. The Hill-climbing algorithm was used in the experiment to analyze the performance of Korean Spelling Corrector. Given the wrong eojul set, We found the module sequence that shows correction rate of 96.41%. Because of the quite high correction rate, Hill-climbing is a practical method for our Spelling Corrector.
A Study on MD5 Security Routing based on MANET
Lee, Cheol-Seung ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 797~803
Recently demands in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on and much attention has been paid to the application of MANET as a Ubiquitous network which is growing fast. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing, but have vulnerable points, such as lack of network scalability and dynamic network topology due to mobility, passive attacks, active attacks, which make continuous security service impossible. In this study, hashed AODV routing is used to protect from counterfeiting messages by malicious nodes in the course of path finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.
A Study on Authentication Algorithm for NFC Security Channel
Lee, Seon-Keun ; Jeong, Woo-Yeol ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 805~810
Recently, applications range of NFC is widening by popularization of smartphone. Expansion of NFC means generalization of electronic payments systems. So security of NFC is very important. AES-128 is safe cryptographic technique for NFC now in use. But, the more range of applications increases, the more safe cryptographic techniques are necessary. In this paper, we propose the safe method is unaffected by the development of NFC. Proposed A-NFC scheme, adding the authentication of asymmetric cryptographic, is easy to apply for NFC and NFC-USIM chipsets, and it can adapt to the general NFC environment.
Design of Searchable Image Encryption System of Streaming Media based on Cloud Computing
Cha, Byung-Rae ; Kim, Dae-Kyu ; Kim, Nam-Ho ; Choi, Se-Ill ; Kim, Jong-Won ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 811~819
In this paper, we design searchable image encryption system to provide the privacy and authentication on streaming media based on cloud computing. The searchable encryption system is the matrix of searchable image encryption system by extending the streaming search from text search, the search of the streaming service is available, and supports personal privacy and authentication using encryption/decryption and CBIR technique. In simple simulation of post-cut and image keyword creation, we can verify the possibilities of the searchable image encryption system based on streaming service.
Analysis of Cross-Correlation of m-sequences and Equation on Finite Fields
Choi, Un-Sook ; Cho, Sung-Jin ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 821~826
p-ary sequences of period
are widely used in many areas of engineering and sciences. Some well-known applications include coding theory, code-division multiple-access (CDMA) communications, and stream cipher systems. The analysis of cross-correlations of these sequences is a very important problem in p-ary sequences research. In this paper, we analyze cross-correlations of p-ary sequences which is associated with the equation
over finite fields.
New Decimations with 4-Valued Cross-Correlations
Kwon, Min-Jeong ; Cho, Sung-Jin ; Kwon, Sook-Hee ; Kim, Jin-Gyoung ; Kim, Han-Doo ; Choi, Un-Sook ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 827~832
In this paper, we present a new decimated Gold-like m-sequence with a binary m-sequence of period
. And we show that the cross-correlation function of the proposed sequence is four-valued.
Enhancement of Data Retention Time in DRAM through Optimization of Sidewall Oxidation Precleaning
Chai, Yong-Yoong ; Yoon, Kwang-Yeol ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 833~837
This paper proposes a DRAM data retention time enhancement method that minimizes silicon loss and undercut at STI sidewall by reducing the SC1 (Standard Cleaning) time. SC1 time optimization debilitates the parasitic electric field in STI's top corner, which reduces an inverse narrow width effect to result in reduction of channel doping density without increasing the subthreshold leakage of cell Tr. Moreover, it minimizes the electric field in depletion area from cell junction to P-well, increasing yield or data retention time.
Robust Disturbance Suppression Control for AC Servo Motors
Kim, Chang-Hwan ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 839~848
In this paper, we propose a robust control scheme of AC servo motors to suppress disturbance torques effectively. The proposed controller consists of both a model based feed-forward controller and a stabilizing feedback controller. The feed-forward controller is designed such that the output of the nominal plant tracks perfectly the reference velocity command with desired dynamic characteristics. The feedback controller stabilizes the overall closed loop system. Furthermore, the feedback controller contains a free function that can be chosen arbitrarily. The free function can be designed so as to achieve both suppression of disturbances and robustness to model uncertainties. In order to illuminate the superior performance of the proposed control scheme to the conventional ones, we present some simulation results.
A Study on Guitar Fingering using LED
Park, Yong-Wook ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 849~853
Generally, it is not easy to learn guitar fingering for beginner. In this paper, therefore, we attach LED to flat board of guitar to more easily teach the beginner and also implement LED control system that can connect ATmega 128 in order to drive LED attached to guitar. The guitar's flat board is connected with ATmega 128 as communication method of Zigbee. We also develop UI that easily can be learned code and playing for guitar, programmed by guitar fingering and perform the research for guitar fingering using LED.
Analytical Proof of Conservation of Power in the LTV Phase Noise Theory for Noisy Oscillators
Jeon, Man-Young ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 855~859
This study derives a generalized PSD formula in the LTV phase noise theory for noisy oscillators. The derived formula analytically proves that the LTV phase noise theory can predict the conservation of the power in the noisy oscillation signals. Additionally, the derived formula allows the theory to account for the behavior of the power spectrum over the entire frequency range including the regions around higher harmonics as well as fundamental frequency.
Design of the Current Segment Coil for Accelerating the Magnetic Materials
Chung, Byung-Tae ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 861~866
The distance optimizing between coil and magnetic materials never be specified in the magnetic materials acceleration using the coil till now. We can know to be the distance which optimizes when being in the half position about the distance of intercoil by the result of the max point on the Differential calculus. Whether several top and bottom current segment coil structures were made and the steel ball in which the current segment coil structure is the magnetic materials could be accelerated in the optimizing distance or not confirmed. When the coil valley current about the mass of the steel ball was known as the experiment and it was but to be the nose consequently it applied to the magnetic materials and magnetic fluid, the optimal distance was solved between the coil and material.
Low Loss Plastic Optical Fiber Coupler Incorporating a Polymer Tapering Waveguide Region
Kim, Kwang-Taek ; Min, Seong-Hwan ; Yun, Jung-Hyun ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 867~871
In this paper, we proposed and demonstrated a low loss
type plastic optical fiber(POF) coupler incorporating a polymer tapering waveguide region. To avoid leakage loss at the interfaces between the POF and the polymer waveguide, we employed two POF transition regions, in which the cross section of the POF is adiabatically converted from a circular to a rectangular shape without change of its cross-section area. The device was fabricated based on a injection mold made of a silicon rubber. The fabricated POF coupler showed 1.33 dB of excess loss and 2.2 dB of flatness.
A Study for Transaction Processing Supporting Scalability in the Cloud
Kim, Chi-Yeon ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 873~879
Recently the cloud computing paradigm has been widely accepting in various applications. Data management system of cloud computing requires ability to manage tremendous data and supporting scalability. The former can be achieved by weaken consistency and limitation of transactions, and the latter needs expand or shrink of components. In this paper, we propose a transaction processing model and a scalable module management algorithm when transaction is executed in the cloud. Transaction processing model consists of a transaction management module and a data management module. Scalable module management algorithm has no redistribution of components and may alleviates loads of existed modules. With simulation results, we can see the improvement of response time and decrease abort ratio of transactions.
The Study of SWOT(Strength-Weakness-Opportunity-Threat) Analysis for Micro-robot Technology Development and Trend of S. Korea
Lee, Sang-Yun ; Yoon, Hong-Joo ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 881~895
Micro-robots are utilized as useful tools in diagnosis and treatment of various human diseases. At present, lots of countries are developing and making many micro-robots. Government of S. Korea are trying to push ahead with the plan as technology policy, for the same reason. So this study examined about micro-robot technology development and trend of S. Korea, by using the method of SWOT(Strength-Weakness-Opportunity-Threat) analysis. As a result, the future policy for micro-robot of S. Korea is to further spur the development of new micro-robot technology and more improvement of the technology level of micro-robots registered by patent as 'micro-robot of bacterium base for lesion treatment' and 'micro-robot moved by compressive fluid'. Finally, It was already confirmed as high level, technology of 'micro-robot of bacterium base for lesion treatment' and 'micro-robot moved by compressive fluid' invented at S. Korea.
A Road-map for an e-Commerce Development
Choi, Se-Ill ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 897~904
This paper proposes a road-map from entering into the cyber spaces to getting to the success of cyber businesses. In order to succeed in cyber businesses, the nature of cyber space, attributes of the businesses and circumstances of the business owner have to be integrated and resolved. This road-map consists of integrated stepwise phases of understanding cyber spaces and developing cyber businesses.
Online Identification for Normal and Abnormal Status of Water Quality on Ocean USN
Jeoung, Sin-Chul ; Ceong, Hee-Taek ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 905~915
This paper suggests the online method to identify normal and abnormal state of water quality on the ocean USN. To define normal of the ocean water quality, we utilize the negative selection algorithm of artificial immunity system which has self and nonself identification characteristics. To distinguish abnormal status, normal state set of the ocean water quality needs to be defined. For this purpose, we generate normal state set base on mutations of each data and mutation of the data as logical product. This mutated normal (or self) sets used to identify abnormal status of the water quality. We represent the experimental result about mutated self set with the Gaussian function. Through setting the method on the ocean sensor logger, we can monitor whether the ocean water quality is normal or abnormal state by online.
Relationship between Adults' Smoking Realities and Periodontal Disease - 2009 Korea National Health and Nutrition Examination Survey Data -
Ji, Min-Gyeong ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 917~924
This study was attempted in order to grasp the influence of smoking upon periodontal disease by analyzing relationship between the smoking realities and the periodontal disease risk in adults aged over 19 in our country. In the findings, the mean in CPI of the whole subjects was 1.92. Among 6989 whole subjects, the group whose CPI is 0-2 included 4707 people(67.3%). The group whose CPI is 3-4 included 2282 people(32.7%). As for the group whose CPI is more than 3 when confounder wasn't corrected, the risk on incidence of periodontal disease in the group with smoking in the past increased by 1.78 times(95% CI:1.56-2.02), compared to the group with no smoking. In the group with the current smoking, it increased by 1.75 times(95% CI:1.55-1.82). Even with correcting gender, age, educational level, and diabetes appearance, the risk on incidence of periodontal disease was higher by 1.28 times(95% CI:1.08-1.53) in the group with smoking in the past and by 1.82 times(95% CI:1.54-2.16) in the group with the current smoking than the group without smoking at all. Accordingly, smoking was indicated to be related to periodontal disease. Thus, the positive publicity needs to allow patients themselves to establish firm consciousness. In addition, dental hygienists need to perform systematic non-smoking educational guidance within doctor's office. Thus, it is thought to necessarily contribute to improving periodontal health.
A Study of Health Care System Housing and Environment of the Elderly
Kim, Jeong-Ja ; Kim, Jin ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 925~930
In the current legal system, establishing aging friendly house based on health-care for the senior people over 65 seems hard to be achieved. For these reasons, this study is intended to explore the improvements in the legal system using the comparative analysis in the domestic legal systems. The related legal system is divided into two sections - healthcare system house and senior house. It is very limited only th exchange the information with medical teams. Thus, we need to investigate th concept and all the matters of health-care on the basis of cases. From these results, we are aware of the necessity of the improvements of the health-care system, and suggest plans for these problems. That is to organize the legal system, and make a new law through revising the current specific identification.
Development of the ubiquitous health care module for a bidet
Han, Young-Oh ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 931~936
In this paper, the module which can measure body fat, heart rate and
has been developed for being mounted on widespread bidets in the home. This moudule was manufactured by a structure that can be mounted on a bidet, users such as elderly, patients with chronic fatigue, heart disease and overworked workers checking their health status in every life through monitoring their body fat, heart rate and
and preventing of sudden death.
Relationship between smoking experience and internet addiction in adolescence
Kim, Dong-Soon ; Kim, Yu-Suk ; Kim, So-Hui ; Jang, Young-Hee ; Jang, Mi-Sun ; Park, Jong ;
The Journal of the Korea institute of electronic communication sciences, volume 7, issue 4, 2012, Pages 937~944
Smoking in adolescence can cause other health risks such as drinking and abusing drugs. Besides, it goes on adulthood so it can threaten their health all days. This study want to know the relationship between smoking and internet addiction in mid- and highschool students in Korea. It conducted for 38,409 middle school students and 36,657 highschool student in Korea. Smoking and internet addiction was investigated by chi-squared test and the relation between them was done by a Logistic Regression Analysis. The statistical significance is under 0.05. The percentage of smoking is 34.2% in male student and 19.7% in female student. The percentage of internet addiction is 17.6% in male student and 11.4% in female student and it is higher in students who smoked by 1.06 times for male student and 1.62 times for female student. This result shows that smoking which is non-healthy habit is related with internet addiction significantly. Smoking can cause high stress and this stress is shown to be developed in internet addiction. In conclusion, smoking and internet addiction in adolescence are bad habits and they are affect each other. Therefore we have to consider a measure by looking as smoking, stress and internet addiction are complex health risks rather than trying to prevent and treat them individually.