Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of The Institute of Internet, Broadcasting and Communication
Journal Basic Information
Journal DOI :
The institute Of Webcasting, Internet And Telecommunication
Editor in Chief :
Volume & Issues
Volume 14, Issue 6 - Dec 2014
Volume 14, Issue 5 - Oct 2014
Volume 14, Issue 4 - Aug 2014
Volume 14, Issue 3 - Jun 2014
Volume 14, Issue 2 - Apr 2014
Volume 14, Issue 1 - Feb 2014
Selecting the target year
Design of Smart Service based on Reverse-proxy for the Internet of Things
Park, Jiye ; Kang, Namhi ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 1~6
DOI : 10.7236/JIIBC.2014.14.6.1
The IoT (Internet of Things) is considered as a core technology to realize interconnected world. At this, companies composing ICT industry and standard organizations make efforts to accelerate it. IETF CoRE(Constrained RESTful Environment) working group standardized CoAP (Constrained Application Protocol) for the constrained device. CoAP has RESTful architecture and CoAP option is provided to use forward-proxy. The forward-proxy is used to translate protocol and perform requests on behalf of the client. However, communication between Internet based client and LLN(Low-power and Lossy Network) based CoAP server architecture has limitations to deploy real IoT service. In this architecture, problems like response delay, URI assignment and DoS attack can be occurred. To solve these problems, we propose the reverse-proxy based system. We consider both of static IoT and mobility IoT environments. Finally, our proposed system is expected to provide efficient IoT service.
A Study on Clustering of SNS SPAM using Heuristic Method
Kwon, Young-Man ; Lee, In-Rak ; Kim, Myung-Gwan ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 7~12
DOI : 10.7236/JIIBC.2014.14.6.7
It has good features for social networking with friends SNS is maintained. However, various enterprises, individuals invading the inconvenience spammers have exposure to a number of users to tweet spam. The study was conducted in the existing research on these spam tweets. However, the results showed a more accurate classification and detection is difficult because of the lack of precision and different causes. In this paper, we describe how to classify the characteristics of spammers, classification criteria. Also has a link rate and difference between followers and following, these features were present classification criteria for spammers account. This experiment was performed according to the criteria. Randomized trial of spam and non-spam accounts were selected and account type was conducted according to the criteria 68% of the link ratio of spam accounts. Followers / Following ratio was 27581.5. Non-spam accounts was 6.12%. Followers / Following ratio was 1.26.
Development of Mobile Healthcare App for Mental Health Management -Focused on Anger Management-
Park, Jong-Jin ; Choi, Gyoo-Seok ; Kim, Jeong-Lae ; Park, In-Kyoo ; Kang, Jeong-Jin ; Son, Byeong-Ki ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 13~18
DOI : 10.7236/JIIBC.2014.14.6.13
In this paer, mobile healthcare App is developed for mental health management focused on anger management for modern people who are under constant stress and various inner conflicts. We describe mechanism of anger and relations between disease and anger, and constitute contents of App to provide information of anger management. And finally we implement Web App. We build menu of App to be convenient to users to use. Implemented App provides many useful functions like information of anger and body, various self-test including A-type test, hostility test, and KMPI etc., journaling, anger management and community.
A Study on the Development of Space Management System in Universities
Yang, Woo-Suk ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 19~23
DOI : 10.7236/JIIBC.2014.14.6.19
Universities in Korea are exerting every effort to make great strides through restructuring at the moment. Reconstruction accompanied by readjusting the quota and merging of academic departments inevitably require rearrangement of resources and assets of those universities. This paper presents a management method with respect to the spaces held by a university based on the public concept of space through which a system has been implemented as an example. Such attempt makes it possible for the university to adequately cope with changes in its business environment through its effective management with regards to the available spaces on campus. Spaces are all the members` shared public assets. If there is a demand for a space, the university should be able to meet the demand. If the use of a space expires, the university should be able to retrieve and reallocate it. The space classification system presented in this paper may play a huge role in fixating space chargeback system.
Reverse Baby-step 2
-ary Adult-step Method for 𝜙((n) Decryption of Asymmetric-key RSA
Lee, Sang-Un ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 25~31
DOI : 10.7236/JIIBC.2014.14.6.25
When the public key e and the composite number n
Practical and Legal Challenges of Cloud Investigations
James, Joshua I. ; Jang, Yunsik ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 33~39
DOI : 10.7236/JIIBC.2014.14.6.33
An area presenting new opportunities for both legitimate business, as well as criminal organizations, is Cloud computing. This work gives a strong background in current digital forensic science, as well as a basic understanding of the goal of Law Enforcement when conducting digital forensic investigations. These concepts are then applied to digital forensic investigation of cloud environments in both theory and practice, and supplemented with current literature on the subject. Finally, legal challenges with digital forensic investigations in cloud environments are discussed.
Analysis of Radioactive Contamination Normal Level of Numerical Isotope using Clustering Methods
Jung, Yong-Gyu ; Choi, Jung-Ah ; Cha, Byung-Heun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 41~46
DOI : 10.7236/JIIBC.2014.14.6.41
As the radioactive-related incidents have been occurred frequently such as Fukushima nuclear exposure incident, it is always considered radioactivity normal levels in radiation exposure as a most risk components at several government agencies. In this paper, the data were analyzed by information in the data beyond range of the attributes. The clustering analysis method is used by EM and SimpleKMeans algorithm. The experimental results about US Radioactive associated data is depending on the method of data analysis. It can be seen that the method of the algorithm is different depending on local value of the normal range. The governments need to pay attention to increase the investigation frequency.
Uncertainty Improvement of Incomplete Decision System using Bayesian Conditional Information Entropy
Choi, Gyoo-Seok ; Park, In-Kyu ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 47~54
DOI : 10.7236/JIIBC.2014.14.6.47
Based on the indiscernible relation of rough set, the inevitability of superposition and inconsistency of data makes the reduction of attributes very important in information system. Rough set has difficulty in the difference of attribute reduction between consistent and inconsistent information system. In this paper, we propose the new uncertainty measure and attribute reduction algorithm by Bayesian posterior probability for correlation analysis between condition and decision attributes. We compare the proposed method and the conditional information entropy to address the uncertainty of inconsistent information system. As the result, our method has more accuracy than conditional information entropy in dealing with uncertainty via mutual information of condition and decision attributes of information system.
Adaptive Equalization Algorithm of Enhanced CMA using Minimum Disturbance Technique
Kang, Dae-Soo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 55~61
DOI : 10.7236/JIIBC.2014.14.6.55
This paper related with the ECMA (Enchanced CMA) algorithm performance which is possible to simultaneously compensation of the amplitude and phase by appling the minimum disturbance techniques in the CMA adatpve equalizer. The ECMA can improving the gradient noise amplification problem, stability and roburstness performance by the minimum disturbance technique that is the minimization of the equalizer tap weight variation in the point of squared euclidiean norm and the decision directed mode, and then the now cost function were proposed in order to simultaneouly compensation of amplitude and phase of the received signal with the minimum increment of computational operations. The performance of ECMA algorithm was compared to present MCMA by the computer simulation. For proving the performance, the recovered signal constellation that is the output of equalizer output signal and the residual isi and Maximum Distortion charateristic and MSE learning curve that are presents the convergence performance in the equalizer and the overall frequency transfer function of channel and equalizer were used. As a result of computer simulation, the ECMA has more better compensation capability of amplitude and phase in the recovered constellation, and the convergence time of adaptive equalization has improved compared to the MCMA.
A Solution of Binary Jamming Message to Source-Wiretapping and Disadvantage of Sharing the Jamming Signal in Physical-Layer Security
Kong, Hyung-Yun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 63~67
DOI : 10.7236/JIIBC.2014.14.6.63
A distributed zero-beamforming based cooperative jamming technique is useless when an eavesdropper detects the sharing seed. In addition, the currently alternatives are very limited when the eavesdropper is located nearby a source for wiretapping. This letter presents a solution to this extreme case. Relay randomly generates and transmits a binary jamming message to both source and destination in the first phase. When these two receivers securely and correctly decode the message, the source creates and transmits another message based on the use of exclusive-or for its information message and the decoded message. Consequently, the next transmission can avoid the eavesdropping.
Applied Method of Energy Harvesting for Multi-Relay Environment
Kim, Tae-Wook ; Kong, Hyung-Yun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 69~74
DOI : 10.7236/JIIBC.2014.14.6.69
In this paper, an energy harvesting scheme is investigated in the multi-relay cooperation communication. Our proposal is to maximize the diversity gain and overcome the disadvantages of the limited power wireless devices. The best relay is selected based on the maximizing channel gains from source to relays so that the harvested energy at selected relay is best. If an internal power of the best relay is lower than a defined target power, the best relay will harvest the energy from the source, and the help of the source-destination link is changed to the second best relay. By this operation method, the diversity gain is maintained and the performance of the network is improved. Finally, performance of the proposed protocol is analyzed in terms of bit error rate, utilization efficiency, power collection efficiency.
Network-Based Partially-Distributed Mobility Management Mechanism and Performance Evaluation
Ki, Jang-Geun ; Lee, Kyu-Tae ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 75~84
DOI : 10.7236/JIIBC.2014.14.6.75
In order to solve the problems such as overload, single point of failure, non-optimized data path, and network scalability in conventional central mobility management protocols, distributed mobility management schemes have been continually studied in and around the IETF. In this paper, a network-based partially-distributed mobility management mechanism, pDMMv6, is suggested and the performance comparison with traditional protocols such as PMIPv6 and MIPv6 is made through simulation under the various user traffic environment. The simulation results include UDP packet delivery ratio, end-to-end packet delay, binding delay for registration signaling, CPU utilization in each node, and response delays in several server-client TCP applications such as web browsing, e-mail, telnet remote login, FTP file up/down-load, and database access.
Distributed Dynamic Lighting Energy Management System based on Zigbee Mesh Network
Kim, Sam-Taek ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 85~91
DOI : 10.7236/JIIBC.2014.14.6.85
Nowadays, Dynamic lighting control and management skills are studied and used. If the system which is to manage multiple intelligent spot applied ubiquitous service technology is built with decision making and used in the complex intelligent space like a apartment then will improve energy efficiency and provide comfortability in optimal conditions. To solve this problem distributed autonomous control middleware and energy management system which process data gathering by zigbee mesh network and search proper services to save energy by the existing state of things is necessary. In paper we designed DDLEMS (Distributed Dynamic Lighting Energy Management System) that is to service duplex communication embedded by software based home server platform to provide mobile services in the smart place and support decision making about energy saving to the best use of wireless censor node and controled network, energy display devices.
Bicycle Accident Position Tracing and Alarm System
Kim, Jang-Won ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 93~98
DOI : 10.7236/JIIBC.2014.14.6.93
Bicycle accidents increase as the number of people riding bicycles increases following the trend try to enhance health and looking for alternative energy sources in the era of high oil price. In bicycle accident cases, physical risk is higher because the impact of the accident has a direct effect on the body of the rider. Therefore, the bicycle rider in an accident might unable to report the accident by themselves, thus, unable to quickly respond to the accident situation. This study developed a system for informing bicycle accidents upon bicycle accident by reporting and texting the accident location using a smart phone application after identifying the accident location using a GPS equipment based on the signal that senses the accident through the system installed in the bicycle for the purpose to improve bicycle riders` safety. This study confirmed the effectiveness of the system developed to quickly respond to the accident to prevent secondary damage through an experiment.
A Study on Fast Macroblock Partition Decision Method at H264
Song, Dae-Geon ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 99~105
DOI : 10.7236/JIIBC.2014.14.6.99
The performance improvement in MPEG-4 AVC is provided at the expense for higher computational complexity. Most of the complexity is caused by Inter prediction. To improve coding efficiency, some functions are added in H.264/MPEG-4 AVC, such as variable block size motion compensation, multi reference frame and quarter-pel motion compensation. A fast macroblock partition decision method is proposed in this paper. The macroblock size is efficiently determined by using the pixel value difference between encoding and the referred macroblock.
A Study on Target Direction and Rage Estimation using Radar Single Pulse
Lee, Kwan-Hyeong ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 107~112
DOI : 10.7236/JIIBC.2014.14.6.107
In this paper, we analysed a performance signal to noise ratio about pulse, integration coherent, and integration non coherent system in radar system. It compared existing with proposal method in order to estimation two target direction of arrival. Generally, radar system radiate pulse wave in order to decreasing distortion of return wave and transmission wave. We analysed the performance integration coherent and integration non coherent. Integration coherent is processing system before doing envelop detection, and integration non coherent is processing system after doing envelop detection. Through simulation, we analysed a performance signal to noise ratio to estimation two target range detection and estimated target direction of arrival. We showed that integration coherent system is the most good performance.
On Analysis Performance for Target Rage Detection Estimation of Radar Cross Section using Swerling Case
Lee, Kwan-Hyeong ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 113~117
DOI : 10.7236/JIIBC.2014.14.6.113
This paper comparatively analyze to integration case to have a influence detection range estimation about radar cross section in radar system. This paper estimate detection range used to probability of detection in radar equation that used to swerling case 1 in case of radar cross section is small and used to swerling case 3 in case of radar cross section is large. Through simulation, coherent integration and non-coherent integration about swerling case difference were comparatively analyzed. In the result of comparative analysis, non-coherent integration case is outstanding detection range and we known that coherent integration don`t suitable for detection range estimation.
Building Energy Management System with Next Day Demand Forecasting of Building Load
Choi, Sang-Yule ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 119~123
DOI : 10.7236/JIIBC.2014.14.6.119
The main purpose of reactive power compensation monitoring system is to manage factory electrical installation efficiently by On-Off switching reactive power compensation equipment. The existing reactive power compensation monitoring system is only able to be managed by operator whenever electrical installation needed reactive power. Therefore, it may be possible for propagating the installation`s faults when operator make the unexpected mistakes. To overcome the unexpected mistakes, in this paper, the author presents a reactive power compensation monitoring system for factory electrical installation using active database. by using active database production rule, stated system can minimize unexpected mistake and can operate centralized monitoring system efficiently. Test results on the five factory electrical installations show that performance is efficient and robust.
A Study on the Sports Coaching System for Child Population
Yoon, Soo-Young ; Kwon, Mee-Rhan ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 125~130
DOI : 10.7236/JIIBC.2014.14.6.125
In recent years, the IT conversions have rapidly developed along the development of the information technologies and devices. The overuse of IT devices caused by this trend has weakened the physical condition of children these days, compared to the past, therefore a study for this problem is necessary. This study intends to improve the health of children, easy to lack physical activities caused by the addiction to PC and smart phones, by proposing a health care application for them using Kinect. This application will introduce some simple aerobic/anaerobic exercises that could be done in home and will help children to forget the boredom by exercising alone and to coach them by using it.
Design and Implementation of Lightweight ESBus Engine for Service Oriented Architecture
Kim, Yoon-Ho ; Cho, Seong-Hwan ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 131~137
DOI : 10.7236/JIIBC.2014.14.6.131
Service Oriented Architecture(SOA) is a flexible structure which does not affect other services even when a specific service is changed. It provides the platform with neutral interfaces independent of any others, where services are loosely coupled in a standard way. While ESB (Enterprise Service Bus) is a key technology for service-oriented architecture, few research and development for ESB has been done. In this paper, we designed and implemented the key components of ESB such as mediation service, message oriented middleware service, operation service, monitoring service, application connection service, and database connection service. The performance evaluation was done by measuring the message processing time for the number of messages with various sizes.
Remote Communication of sensor data in Ballast Water Treatment System
Kim, Chin-Hoon ; Kim, Joo-Man ; Kim, Byoung-Chul ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 139~147
DOI : 10.7236/JIIBC.2014.14.6.139
The ballast water may be discharged into another sea area with marine organisms, it caused problems to disturb the marine ecosystem. So, in order to remove these environmental risk factors, the IMO has mandated the installation of BWTS to the all ships. Our monitoring system diagnose and predict a failure of BWTS by analyzing the sensor information of BWTS collected from which the ships scattered in the ocean of several. This paper presents the design and implementation of communication modules for BWTS remote monitoring considering the satellite communication charge fee. In the our study, we implemented the safety and cost-saving communication modules by LabVIEW program. The collected sensor informations is encrypted and compressed by LabVIEW modules running on RIO. Then they will be transfer to the land server and will be decrypt to enable monitoring in the land server. For the verification, we build the test modules which can verify from collecting the sensor data to consuming them in the monitoring server. We carried out 20 times for the data pattern in all of case. So, we verified the excellent functionality and reliability through the experimental result.
A Study of Fabrication of RF Control System for Building Sunshade
Park, Jung-Cheul ; Chu, Soon-Nam ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 149~157
DOI : 10.7236/JIIBC.2014.14.6.149
This paper is based on the fabrication of wireless control system for the building shading device. RF Module was controlled by UHF wireless CC1020 chip which has low electrical power and low electrical voltage. Also 447.8625~447.9875 frequency, 4800Baud data rate and 12.5 kHz channel spacing was controlled by the use of SPDT switch and with Microcontroller program. Furthermore, the helical antenna was used. The starting production of 447.8625~447.9875 kHz wireless electrical power was used. As the result, it did not exceed 10dBm which is the standard of low power wireless system. Shading efficiency was measured at 25%, 50%, 75% direction with controlling the interior temperature and the intensity of illumination at the rate of 1 hour. As the result, the intensity of illumination was lowered to 82~87% at 25% direction with
lowered temperature. At 50% direction, the intensity of illumination was lowered to 60~68% with
lowered temperature. And at 75% direction, the intensity of illumination was lowered to 41~47% with
The Comparative Study on Safety Factors at Elevator Management System Operation
Park, Joo-Bong ; Shin, Seung-Jung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 159~162
DOI : 10.7236/JIIBC.2014.14.6.159
Recently, from 2008 to 2012, there are many of elevator safety patents from patent office survey. In this paper, we analyzed the elevator safety patent from 2009 to 2013, found out safety factor is safety control, emergency stop equipment and door opening equipment. Through reliability statistics, we defined the most important things for safety elevator factor is this three things, studied the reason about many patents. Finally, we propose the Kinect Scada elevator system for prevention safety accident.
Propose of Elevator System for Effective Management based on IOT
Park, Joo-Bong ; Shin, Seung-Jung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 163~167
DOI : 10.7236/JIIBC.2014.14.6.163
From Korea Elevator Safety Institute`s report, the major accident factor of elevator is user`s mistake, 60%. It means that the necessity of simple monitoring system. In this paper, we explain the standard of elevator safety check and the rate of accidents, then compare with old elevator managing system and new elevator managing system based on IOT technology. Also, we explain the reliability statistics of smart managing system based on expert`s decision. Finally, we propose the smart managing system as the alternative method for decreasing the accident factor of elevator.
Design and Fabrication of Filter Banks for Implementation of Cavity Tunable Filter
Shin, Yeonho ; Kang, Sanggee ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 169~173
DOI : 10.7236/JIIBC.2014.14.6.169
In order to satisfy user`s requirements of needs for various services and to efficiently use of frequency, a communication system using one platform can support many communication services. Tunable filters must be used in the front end of broadband communication systems which provide and support various communication methods. In this paper we design and implement a filter bank to verify the feasibility of cavity tunable filter with the operation frequency of 800 MHz ~ 1600 MHz. The filter bank is composed of five bandpass filters and each bandpass filter has the same operation frequency band of the tunable filter. The implemented filter bank has the maximum insertion loss of 0.326 dB, the bandwidth of 37 MHz ~ 84 MHz, and the attenuation of minimum 19.974dB and mximum 37.812dB at the band edge
over the operating frequency band.
A Big Data Application for Anomaly Detection in VANETs
Kim, Sik ; Oh, Sun-Jin ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 175~181
DOI : 10.7236/JIIBC.2014.14.6.175
With rapid growth of the wireless mobile computing network technologies, various mobile ad hoc network applications converged with other related technologies are rapidly disseminated nowadays. Vehicular Ad Hoc Networks are self-organizing mobile ad hoc networks that typically have moving vehicle nodes with high speeds and maintaining its topology very short with unstable communication links. Therefore, VANETs are very vulnerable for the malicious noise of sensors and anomalies of the nodes in the network system. In this paper, we propose an anomaly detection method by using big data techniques that efficiently identify malicious behaviors or noises of sensors and anomalies of vehicle node activities in these VANETs, and the performance of the proposed scheme is evaluated by a simulation study in terms of anomaly detection rate and false alarm rate for the threshold
Design of Central Control System based on Fuzzy-Logic in USN
Oh, Sun-Jin ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 183~188
DOI : 10.7236/JIIBC.2014.14.6.183
With the rapid growth of the mobile computing and sensor technologies, various application techniques related to USN converged with other related technologies are actively disseminated recently. Most of these applications are aimed at the proper control and system monitoring using context information gathered through various sensors. But it is not easy to control and monitor the system precisely and flexibly since data generated by sensors are huge and variety. In this paper, we design and implement the fuzzy-logic based central control system in USN to provide the flexibility and preciseness with sensed data. The performance of the proposed system is evaluated by a simulation study in terms of consumed electric power on the test bed of USN based streetlight control system.
Analysis of Multiple Intelligences and Academic Adjustment Level for Undergraduate Students of IT Major -Focused on C Programming-
Yoo, Sang-Mi ; Choi, Byongsu ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 189~197
DOI : 10.7236/JIIBC.2014.14.6.189
This study analyzed the characteristics of multiple intelligence and the levels of academic adjustment for the department and the major among undergraduate students majoring in IT. Seventy freshmen majoring in IT at the department of M, H University participated in this study and the basic major subject required for the department was Computer Language: I-C Language. Eight intelligence areas less controversial in Gardner`s multiple intelligence theory were used; academic adjustment was manipulatively defined as the degree of adjustment for the department and the major among undergraduate students; and pleasure, flow, familiarity and relevance to the major, academic achievement, and major satisfaction were selected as variables through literature review. The undergraduate students majoring in IT showed high levels of interpersonal intelligence and intrapersonal intelligence, with insignificant gender differences. Significant correlations were found between multiple intelligence and academic adjustment. In particular, while pleasure and flow in C programming were found to be at low levels in academic adjustment, the significant correlation between linguistic intelligence in multiple intelligence and flow in C language was a very interesting finding. While significant correlation was not found between multiple intelligence and academic achievement, students who were more highly aware of the relevance to the major and who were more familiar with C language showed higher academic achievement. Lastly, limitations of this study were discussed; on the basis of the results, suggestions were made about prescriptive strategies to improve academic achievement for undergraduate students majoring in IT.
A study on Deployment of the Optimized WBS and Effective Small and Medium Enterprise Informatization System using Standardized PSDM
Yoon, KyungBae ; Kwon, HeeChoul ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 199~205
DOI : 10.7236/JIIBC.2014.14.6.199
We would like to study and develop the optimized WBS(Work Breakdown Structure) considering project`s range, schedule, cost and human resources management with defining phased work in main task and preceding and escorting relationships for effective small and medium enterprises` informatization through standardized PSDM(Production System Development Methodology). For more systemic and effective system built-up, it introduces production information with WBS study which is appropriate for the small and medium enterprises with setting up management items for enhancing system`s reliability, quality, productivity, smooth communication among the participated enterprises such as the small and medium enterprises, IT enterprises, and supervision enterprises, and operational support including maintenance of the built system. This study is purpose of helping a lot of the small and medium enterprises and IT enterprises to build up the systems more effective and reliable within planned schedule using the standardized methodology.
Implementation of Efficient Indoor Emotion Lighting Control System based on Bluetooth
Jo, Eun-Ja ; Lin, Chi-Ho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 207~213
DOI : 10.7236/JIIBC.2014.14.6.207
In this paper, we propose Bluetooth based on efficient indoor-emotion-lighting control system. The proposed Bluetooth based on indoor-emotion-lighting control system was designed to be automatically controlled by the motion sensor light and using a Bluetooth module may be controlled to light up or mobile PC, wall pad. In addition, It was designed the LED lighting On/Off control the environment according to Humidity, the temperature, illumination, motion sensors. System based on the bluetooth is automatic control possible using the illumination sensor, and by selecting the desired lighting partial control can be designed. The experimental efficiency results of the proposed indoor-emotion-lighting control system were designed to provide an internal environment adapted to a resident, were able to maximize the energy savings, have reduced power consumption than the traditional simple On/Off control system.
A Study on Improvement of Wave Height Algorithm using Accelerometer
Chung, Dong-Keun ; Lim, Myung-Jae ; Lee, Joon-Taik ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 215~220
DOI : 10.7236/JIIBC.2014.14.6.215
Most of studies on wave height algorithms that are using at buoys describe algorithms using double integral to determine the position data from the acceleration data measured from the accelerometer. but sometimes, it can involve some cumulative error in that process, and result in misjudgment or unstabe system. On the other hand, It is widely known that the motion of fluid particles on or underneath a linear progressive wave is periodic and elliptic. This fact is considered in this article and leads a improved algorithms with no integral processing.
Design and Implementation of Prototype Anti-disaster Remote Control Robot Model using Smart Phone
Choi, Sung-Jai ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 221~227
DOI : 10.7236/JIIBC.2014.14.6.221
This paper presented a design which was a minimized remote control robot. This remote control robot was created for preventing life damage from conflagrations, nuclear events and HF gas accidents. This robot`s system based smart phone that had camera and GPS systems. When fire came out, The robot figured out that how big fire was, where the fire was started and various aspects of situations. And The robot broadcasted the informations to smart phone using mobile application and wi-fi camera. By doing these, the fire mans could more accurate and be easier to plan a strategy for saving life. The body of robot are 2 parts. One is a car and the other one is a remote controller. By the power, 1step to 10steps, of grabbing remote controller could change the car`s speed to move. Also, The prototype robot was already confirmed its utility itself.
A Clustering Scheme Considering the Structural Similarity of Metadata in Smartphone Sensing System
Min, Hong ; Heo, Junyoung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 229~234
DOI : 10.7236/JIIBC.2014.14.6.229
As association between sensor networks that collect environmental information by using numberous sensor nodes and smartphones that are equipped with various sensors, many applications understanding users` context have been developed to interact users and their environments. Collected data should be stored with XML formatted metadata containing semantic information to share the collected data. In case of distance based clustering schemes, the efficiency of data collection decreases because metadata files are extended and changed as the purpose of each system developer. In this paper, we proposed a clustering scheme considering the structural similarity of metadata to reduce clustering construction time and improve the similarity of metadata among member nodes in a cluster.
An Efficient Control Sy7stem for Intelligent LED Indoor Lighting
Hong, Sung-Il ; Yoon, Su-Jeong ; Lin, Chi-Ho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 235~243
DOI : 10.7236/JIIBC.2014.14.6.235
In this paper, we propose an efficient control system for intelligent LED indoor lighting. The proposed an efficient control system for intelligent LED indoor lighting were included to elements such as daylight intensity measured through the PIR sensor and illuminance sensor at lighting style by the schedule defined and the occupancy detection. And it was controlled lighting through to the wireless sensor network, and was designed for the energy savings. Also, the lighting control of indoor lighting based on occupancy detection detect fine movements using a PIR sensor. And an unnecessary lighting intensity control of the window-side and the inside were controlled according to daylight level measurement result using the light sensor. In daylight inflow many case, the window-side lighting was to automatically darker, and in daylight inflow less case, was designed to be automatically bright. The efficiency validate results of an efficient control system for intelligent LED indoor lighting, the brightness of the indoor light were to maximize the energy saving by controlling in real time when entering as indoor a little that external lighting or daylight.
Implementation of Broadband Printed Sleeve Monopole Antenna
Choe, Gwang-Je ; Kang, Sang-Won ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 245~250
DOI : 10.7236/JIIBC.2014.14.6.245
This paper presents the broadband printed sleeve-monopole antenna implementing the sleeve monopole structure in the form of PCB. In the proposed antenna, the antenna performance was improved by the diameter variation of the radiator, the length variation of the sleeve, and the variation of the diameter of the sleeve conductor. HFSS simulator of ANSYS corp. was used in order to confirm the antenna parameter characteristic. According to the simulation results, the VSWR was less than 2 for the range of 2.12GHz~3.18GHz. The frequency bandwidth is 1.08GHz. The frequency range of the actual fabricated antenna was 2.0GHz~3.55GHz, the frequency bandwidth is 1.55GHz. The maximum gain was 1.64dBi. The proposed antenna was
in size. The utilization possibility of the broadband printed sleeve-monopole antenna could be confirmed according to compare and analyze the simulation and measurement data.
Development of Power Supply for Voltage-Adaptable Converter to Drive Linear Amplifiers with Variable Loads
Um, Kee-Hong ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 251~257
DOI : 10.7236/JIIBC.2014.14.6.251
An actuator system is a type of motor designed to control a mechanism operated by a source of energy, in the form of an electric current by converting energy into some kind of motion. As audio actuators, transforming electric voltage signal into audio signal, speakers and amplifiers are commonly used. In applications of industry, high output power systems are required. For these systems to generate high-quality output, it is essential to control output impedance of audio systems. We have developed an adaptable power supply for driving active amplifier systems with variable loads. Depending on the changing values of resistance of the speaker which produces audible sound by transforming electric voltage signal, the power supply source of the active amplifier can generate the maximum power delivered to the speaker by an adaptable change of loads. The amplifier is well protected from the abrupt increment of peak current and an excess of current flow.
A Study on Statistical Simulation of Multicore Processor Architectures
Lee, Jongbok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 259~265
DOI : 10.7236/JIIBC.2014.14.6.259
When the trace-driven simulation is used for the performance analysis of widely used multicore processors in the initial design stage, much time and disk space is necessary. In this paper, statistical simulations are performed for a high performance multicore processor with various hardware configurations. For the experiment, SPEC2000 benchmarks programs are used for profiling and synthesizing new instruction traces. As a result, the performance obtained by our statistical simulation is comparable to that of the trace-driven simulation with the benefit of tremendous reduction in the simulation time.
Privacy Situation and Countermeasures of Financial Apps based on the Android operating system
Kim, Bo ; Lim, Jong-In ; Jo, Yong-Hyun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 267~272
DOI : 10.7236/JIIBC.2014.14.6.267
Customers who register at mobile banking service through startphone has 40Mil in first quarter of 2014, which was increased 8.5%(3.6Mil) compare to figure from end of year 2013. Average 1 trillion 627.6billion won is dealing through smartphone banking in daily and three for increased psychological bullying caused by malignant code which change normality to malignant. The results of the analysis current state of affairs of personal information collection management authority required in finance smartphone app service and also recommend solution for protecting finance consumers plans to minimized collecting personal information in smartphone finance app service.
Needs and considerrations of corporate security assessment (Focusing on financial companies)
Kim, Bo ; Lim, Jong-In ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 273~279
DOI : 10.7236/JIIBC.2014.14.6.273
Recently, it was occurred in the nation`s largest Information spill about 140 million cases of credit card customers` personal and credit information. As such, it was rapidly to increase in consumer complaints about the privacy of personal information in accordance with outflow of financial companies increased accident. But it is still not clear precaution. Therefore, in financial customer position, it is possible to confirm and determine in advance whether or not superior to the security company. In addition, It is time to be required institutional device that can be a real effort to equip a good security company. This report is considered a model of "Disclosure of corporate security assessment " of these devices institutional study. And We study in realistic and objective stance about why do we need this policy.
Reversible Data Hiding based on QR Code for Binary Image
Kim, Cheonshik ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 281~288
DOI : 10.7236/JIIBC.2014.14.6.281
QR code (abbreviated from Quick Response Code) is code system that is strong in against to apply image processing techniques (skew, warp, blur, and rotate) as QR codes can store several hundred times the amount of information carried by ordinary bar codes. For this reason, QR code is used in various fields, e.g., air ticket (boarding control system), food(vegetables, meat etc.) tracking system, contact lenses management, prescription management, patient wrist band (patient management) etc. In this paper, we proposed reversible data hiding for binary images. A reversible data hiding algorithm, which can recover the original image without any distortion from the marked (stego) image after the hidden data have been extracted, because it is possible to use various kinds of purposes. QR code can be used to generate by anyone so it can be easily used for crime. In order to prevent crimes related QR code, reversible data hiding can confirm if QR code is counterfeit or not as including authentication information. In this paper, we proved proposed method as experiments.
Design and Implementation of Mobile CRM Utilizing Big Data Analysis Techniques
Kim, Young-Il ; Yang, Seung-Su ; Lee, Sang-Soon ; Park, Seok-Cheon ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 289~294
DOI : 10.7236/JIIBC.2014.14.6.289
In the recent enterprises and are utilizing the CRM using data mining techniques and new marketing plan. However, data mining techniques are necessary expertise, general public access is difficult, it will be subject to constraints of time and space. in this paper, in order to solve this problem, we have proposed a Mobile CRM applying the data mining method. Thus, to analyze the structure of an existing CRM system, and defines the data flow and format. Also, define the process of the system, was designed sales trend analysis algorithm and customer sales recommendation algorithm using data mining techniques. Evaluation of the proposed system, through the test scenario to ensure proper operation, it was carried out the comparison and verification with the existing system. Results of the test, the value of existing programs and data matches to verify the reliability and use queries the proposed statistical tables to reduce the analysis time of data, it was verified rapidity.
3-Points Average Pivot Quicksort
Lee, Sang-Un ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 295~301
DOI : 10.7236/JIIBC.2014.14.6.295
In the absence of a sorting algorithm faster than O(n log n), Quicksort remains the best and fastest of its kind in practice. For given n data, Quicksort records running in O(n log n) at best and
at its worst. In this paper, I propose an algorithm by which 3-points average P
A Survey on User Interface Design of University Webzines
Lee, Joo-Hee ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 6, 2014, Pages 303~308
DOI : 10.7236/JIIBC.2014.14.6.303
This paper deals with interface design of a university webzines that to search through an internet portal site Naver. It was obtained the following conclusions. First, university webzines are using a hypertext link to such images, text, movie. Second, it could be seen that mainly been using block grid, the module grid, and a transformed layout of 2 tier grid. Third, Seoul woman`s University, Kyungpook National University, and Korea Maritime University`s webzines found that layout, color, user-friendly access the structure. Fourth, webzine was used the text or image a link, search function, site map, icon, favorites, quick menus, navigation bars, and rollover menu. Last, university webzines were shown to contribute mere to the enhancement of its value as a promotional medium.