Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of The Institute of Internet, Broadcasting and Communication
Journal Basic Information
Journal DOI :
The institute Of Webcasting, Internet And Telecommunication
Editor in Chief :
Volume & Issues
Volume 15, Issue 6 - Dec 2015
Volume 15, Issue 5 - Oct 2015
Volume 15, Issue 4 - Aug 2015
Volume 15, Issue 3 - Jun 2015
Volume 15, Issue 2 - Apr 2015
Volume 15, Issue 1 - Feb 2015
Selecting the target year
An Access Control Method considering Semantic Context for Privacy-preserving
Kang, Woo-Jun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 1~14
DOI : 10.7236/JIIBC.2015.15.1.1
To conform to new emerging computing paradigm, various researches and challenges are being done. New information technologies make easy to access and acquire information in various ways. In other side, however, it also makes illegal access more powerful and various threat to system security. In this paper, we suggest a new extended access control method that make it possible to conform to security policies enforcement even with discrepancy between policy based constraints rules and query based constraints rules, based on their semantic information. New method is to derive security policy rules using context tree structure and to control the exceed granting of privileges through the degree of the semantic discrepancy. In addition, we illustrate prototype system architecture and make performance comparison with existing access control methods.
Security Analysis and Improvement of Integrated Security Management System
Kim, Kyung-Shin ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 15~23
DOI : 10.7236/JIIBC.2015.15.1.15
This thesis proposes how data security has changed since the emergence of 'Big Data' in 2012 and the type of Integrated Security Management System that needs to be built against security threats, based on an analysis of Big Data. Much research has been conducted in Big Data. I need to think about what an Integrated Security Management System requires in order to safeguard against security threats such as APT. I would like to draw a comparison between the current Integrated Security Management System and one that is based on Big Data, including its limitations and improvements, so that I can suggest a much improved version of Integrated Security Management System.
Proposal for Evacuee Guidance of Cloud-based Elevator System in Emergency Situation
Choi, Jun-Ho ; Shin, Seung-Jung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 25~28
DOI : 10.7236/JIIBC.2015.15.1.25
Lifts are used as an essential means of transportation within the building in an emergency situation, when used as a means of escape, so expect a lot of research has been conducted high effect. Number of stories in the Seoul-rise building guidelines underground 7th floor, 53 ground floor, floor area
, floor area
, use is cultural and convention facilities and sales facilities, business facilities and accommodation (hotel), the construction of public housing (apartments) hagieneun not efficient to install elevators for evacuation mothada was determined separately in designing the lift is designed according to the standards of passenger lifts installed under a judgment as to use for evacuation. However, this does not include detailed design guidelines so far. We propose the Evacuee Guidance of Elevator System that can be used as entering air equipment, sprinkler and smart phone evacuation system.
A Study of Performance Evaluation Standard for Scanned Cartoon Book Identification Technology
Yoon, Hee-Don ; Kim, Tae-Hyun ; Kang, Ho-Gab ; Cho, Seong-Hwan ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 29~35
DOI : 10.7236/JIIBC.2015.15.1.29
In order to identify scanned cartoon books which are illegally distributed, the copyright project granted from the Korea Copyright Commission (Project title: Identification and Copy Protection Technology of Scanned Text/Comic Books) secured basic solutions for scanned cartoon books. The purpose of this paper is to propose a performance evaluation standard with essential items required for developing technology to identify whether a comic book is illegally scanned and distributed. For this purpose, types of scanned comic books which are illegally distributed through webhard sites are analysed, the transformed factors are classified and major detail items of the factors are identified.
A Study on Copyright Protection Method of Web Image Contents
Yi, Yeong-Hun ; Cho, Man-Gi ; Cho, Seong-Hwan ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 37~43
DOI : 10.7236/JIIBC.2015.15.1.37
Technical treatments of image contents on the web include the copy protection method such as the image capture protection technology and the traitor tracing method to detect unauthorized duplications through watermarking insertion or feature information technology. However, these two methods have their own weaknesses. The image capture protection method is unable to protect illegal captures when the URLs of image sources are exposed. The traitor tracing method is fundamentally unable to protect illegal captures due to its post-treatment method. Besides, the weakness of using the copyright information display technology involves easy removal of copyright information from copyrighted contents. This paper suggests a model of the web image contents protection system which makes it hard to separate copyright information from web image contents and allows image contents to be shown only in the authorized websites.
Performance Analysis of the Encryption Algorithms in a Satellite Communication Network based on H-ARQ
Jeong, Won Ho ; Yeo, Bong-Gu ; Kim, Ki-Hong ; Park, Sang-Hyun ; Yang, Sang-Woon ; Lim, Jeong-Seok ; Kim, Kyung-Seok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 45~52
DOI : 10.7236/JIIBC.2015.15.1.45
Since the broadcast message in satellite signals the security of the data is extremely poor compared to other communication technologies such as the broadcast signal. Thus, encryption of the communication satellite has become a very important issue, an analysis of the communication performance of a general service is always required. In this paper, In order to analyze the encrypted communication the turbo code in an IP-based satellite communication applies the code rate compatible punctured and The wireless channel in consideration of the actual satellite communication was constructed by placing a weight on the Rayleigh fading and the Rician fading two channels. Retransmission-based error control scheme were constructed in the best performance of H-ARQ Type-II, III scheme of a number of ways that are recently considered. we analyzed the effects of normal service against a satellite communication network The security services were configured with encryption algorithms AES, ARIA (CTR, CBC mode).
Performance Analysis of a Satellite Communication System based on IPsec VPN
Jeong, Won-Ho ; Hwang, Lan-Mi ; Kim, Ki-Hong ; Park, Sang-Hyun ; Yang, Sang-Woon ; Lim, Jeong-Seok ; Kim, Kyung-Seok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 53~60
DOI : 10.7236/JIIBC.2015.15.1.53
Satellite signal is excellent broadband, can provide the same information in a wide range, but there is a disadvantage that much less of the security level of the data. Therefore, supplementation of safety is a serious problem than anything in the satellite communication. In this paper, it was simulated by applying ARIA in encryption technique and by applying transport mode, tunnel mode in security header AH and ESP in order to examine the effect of IPsec VPN. In addition, we had compare with general services that do not apply encryption in order to analyze the impact of the encryption algorithm. Channel, by applying the Markov channel and adding AWGN, is constituted a satellite communication environment. In case of retransmission based error control scheme, we applied Type-II HARQ scheme and Type-III HARQ scheme which are performance is a good way in recently, and it is constituted by a turbo code and BPSK modulation scheme. we were analyzed performance in BER and Throughput in order to compare the simulation more effectively.
An Efficient Bot Detection Mechanism in Smartphones
Choe, Ujin ; Park, Jiyeon ; Jung, Jinman ; Heo, Junyoung ; Jeon, Gwangil ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 61~68
DOI : 10.7236/JIIBC.2015.15.1.61
Recently, with increasing use of smartphones, the security threats also have increased rapidly. Especially, the compromised smartphone is very dangerous because it could be exploited in a DDOS attacks such as cyberterrorism as well as in the leakage of personal information. However, most bot detection mechanisms are still unsuitable for smartphone with its lower computing capability and limited battery capacity because they incur additional computational overheads or require pre-defined signatures. In this paper, we present an efficient bot detection mechanism in smartphones. Our mechanism detects effectively bots in outgoing traffic by using a correlation between user events and network traffic. We have implemented its prototype in Android smartphone and measured its performance. The evaluation results show that our mechanism provides low overhead to detect bots in smartphones.
Design of Restaurant Advertisement and Order System using Bluetooth 4.0 Technology
Cho, Byungho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 69~76
DOI : 10.7236/JIIBC.2015.15.1.69
Bluetooth 4.0 is a low energy near communication technology. It is a suitable for Internet of Things(IoT), that is, all devices using small electric power consume are connected because power consumption is more lowing and brodening for application scope against bluetooh 3.0. Therefore in this paper, a present situation of beacon technologies are investigated and a design principle of restaurant advertisement and order system using beacon technology are presented. A beacon which is tranceiver based on bluetooth 4.0 technology and bluetooth 4.0 receiver device design is showed and design method of smart-phone interlocking these devices is presented. Also it shows that this design method is very useful for the Restaurant Advertisement & Order Commercial System production.
System Implement to Identify Copyright Infringement Based on the Text Reference Point
Choi, Kyung-Ung ; Park, Soon-Cheol ; Yang, Seung-Won ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 77~84
DOI : 10.7236/JIIBC.2015.15.1.77
Most of the existing methods make the index key with every 6 words in every sentence in a document in order to identify copyright infringement between two documents. However, these methods has the disadvantage to take a long time to inspect the copyright infringement because of the long indexing time for the large-scale document. In this paper, we propose a method to select the longest word (called a feature bock) as an index key in the predetermined-sized window which scans a document character by character. This method can be characterized by removing duplicate blocks in the process of scanning a document, dramatically reducing the number of the index keys. The system with this method can find the copyright infringement positions of two documents very accurately and quickly since relatively small number of blocks are compared.
A Study on Construction of On & Off Marketplace for global distribution of broadcasting contents
Ahn, Jong-Bae ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 85~93
DOI : 10.7236/JIIBC.2015.15.1.85
This research try to find how to construct On & Off Marketplace to activate exporting of broadcasting contents by Delphi survey. This research is based on environment of broadcasting contents such as OTT and reinforcement for broadcasting contents marketplace of foreign countries. This research find that global marketplace of broadcasting contents should be constructed by convergence of online and offline, and should adopt new technology to make easy global distribution in new broadcasting environment, and also open global festival with offline marketplace of broadcasting contents. korea will be asia hub for global distribution of broadcasting contents through this task.
Channel Allocation Method of DAB System considering National SFN
Ju, Sang-Lim ; Yang, Kyu-Tae ; Lim, Hyoungsoo ; Kim, Kyung-Seok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 95~103
DOI : 10.7236/JIIBC.2015.15.1.95
The Korea terrestrial broadcasting has TV and Radio, DMB. The TV broadcasting was converted from the analogue method to the digital method at the end of 2012. However the radio broadcasting is still in analogue method. The introduction of digital radio technology will bring many benefits such as high-quality of sound, various additional services and increase of efficiency in frequency utilization. In many countries, the radio broadcasting is been servicing in digital method. The discussion was begun on this year for the introduction of digital radio technology in Korea. So, to prepare against introduction of DAB system among digital radio technology, this paper proposes channel allocation method for each local radio broadcasting and the composition of national SFN, and proves the proposed method through the interference analysis.
Method for Hybrid Cooperative Sharing applied Automatic Request Protocol
Kong, Hyung-Yun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 105~110
DOI : 10.7236/JIIBC.2015.15.1.105
In cognitive radio networks, when the signal-to-noise ratio (SNR) of the link between a primary transmitter and receiver is sufficiently high, the primary transmission does not frequently demand cooperation because direct transmission of the primary communication is usually successful. Therefore, there are few opportunities for a secondary transmitter to cooperate with the primary user system in exchange for an opportunity to share the spectrum. This article proposes a scheme in which the secondary system can deliberately degrade the SNR of the primary transmission, making it so that the primary system needs cooperation from the secondary nodes, and thereby increases opportunities for spectrum sharing.
New Method of Cooperative Spectrum Sharing for Interference Mitigation
Kong, Hyung-Yun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 111~116
DOI : 10.7236/JIIBC.2015.15.1.111
This article considers a model of cooperative spectrum sharing between primary and secondary systems in which transmission occurs in two phases. In this scheme, we introduce that a single secondary transmitter, ST, employs a quadrature-phase-based signal to present the secondary message, while the primary message is presented by an in-phase-based signal. This allows simultaneous spectrum sharing without mutual interference. Therefore, an interference constraint is not necessary to protect primary operating performance from being degraded by the secondary user operations. Theoretical analysis and Simulations are then provided to confirm the superiority of the proposed scheme over the the current conventional methods.
Capacity of Opportunistic Incremental Relaying System Controlled by Truncated Power in Rayleigh Fading Channels
Kim, Nam-Soo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 117~124
DOI : 10.7236/JIIBC.2015.15.1.117
Recently an opportunistic incremental relaying (OIR) system has been studied for improving the performance degradation in fading channel. However there are few studies on power control in the system, and the studies are assumed perfect knowledge of the all channels at transmitters. The assumption that the source know all channel information is difficult in practical channels. Therefore, in this paper we assume that the source knows partial channel information and propose a modified truncated channel inversion (TCI) power control scheme for the OIR system. We derive the channel capacity of the proposed system and perform Monte Carlo simulation. It is noticed that the proposed OIR system has better capacity than that of the power controlled system with direct path only, and the capacity increases with the number of relays. The power controlled OIR system gained more capacity of 29.7%, 32.7%, and 33.5% than that of the system with direct path only for the number of relays of 1, 3, and 5, respectively. The results from this paper can be applied to the estimation of a theoretical capacity for the currently operating cellular systems when they adopt the IOR system.
Energy Improvement of WSN Using The Stochastic Cluster Head Selection
Lee, Jong-Yong ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 125~129
DOI : 10.7236/JIIBC.2015.15.1.125
The most important factor within the wireless sensor network is to have effective network usage and increase the lifetime of the individual nodes in order to operate the wireless network more efficiently. Therefore, many routing protocols have been developed. The LEACH protocol presented by Wendi Heinzelman, especially well known as a simple and efficient clustering based routing protocol. However, because LEACH protocol in an irregular network is the total data throughput efficiency dropped, the stability of the cluster is declined. Therefore, to increase the stability of the cluster head, in this paper, it proposes a stochastic cluster head selection method for improving the LEACH protocol. To this end, it proposes a SH-LEACH(Stochastic Cluster Head Selection Method-LEACH) that it is combined to the HEED and LEACH protocol and the proposed algorithm is verified through the simulation.
A Performance Evaluation of VSS-MMA Adaptive Equalization Algorithm using the Non-Linear Fuction of Error Signal for QAM System
Lim, Seung-Gag ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 131~137
DOI : 10.7236/JIIBC.2015.15.1.131
This paper relates with the VSS-MMA (Variable Step Size-Multiple Modulus Algorithm) adaptive equalization algorithm which is possible to improving the equalization performance by use the nonlinear fuction of error signal in the MMA adaptive equalization algorithm that are used for the minimization of the intersymbol interference due to the distortion which occurs in the time dispersive channel for the transmission of QAM signal in the system.. In the conventional MMA, we obtains the tap coefficient of adaptive equalizer using the fixed step size, but in the VSS-MMA, we obtains the tap coefficient of adaptive equalizer using the variable step size based on a nonlinear function of error signal. By adapting the variable step size, it was confirmed that the improved equalization performance were obtained by computer simulation. For this, the equalizer output signal constellation, residual isi, maximum distortion, MSE and SER were used in the performace index.
A Performance Comparison of VSCA and VSDA Adaptive Equalization Algorithm using Distance Adjusted Approach in QAM Signal
Lim, Seung Gag ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 139~145
DOI : 10.7236/JIIBC.2015.15.1.139
This paper compare the VSCA (Variable stepsize Square Contour Algorithm) and VSDA (Variable stepsize Square contour Decision directed Algorithm) adaptive equalization algorithm that is used for the minimization of the intersymbol interference which occurs in the time dispersive channel for the transmission of 16-QAM signal.. In the SCA, it is possible to compensates the amplitude and phase in the received signal that are mixed with the intersymbol interference by the constellatin dependent constant by using the 2nd order statistics of the transmitted signal. But in the VSCA and VSDA, it is possible to the improving the equalization performance by varing the stepsize using the concept of distance adjusted approach for constellation matching. We compare the performance of the VSCA and VSDA algorithm by the computer simulation. For this, the equalizer output signal constellation, residual isi, maximum distortion and MSE were used in the performace index. As a result of computer simulation, the VSCA algorithm has better than the VSDA in every performance index.
A Hazardous Substance Monitoring Sensor Network Using Multiple Robot Vehicle
Chun, Jeongmyong ; Kim, Samok ; Lee, Sanghu ; Yoon, Seokhoon ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 147~155
DOI : 10.7236/JIIBC.2015.15.1.147
In this paper, we consider a mobile sensor network for monitoring a polluted area where human beings cannot access. Due to the limited sensing range of individual unmanned vehicles, they need to cooperate to achieve an effective sensing coverage and move to a more polluted region. In order to address the limitations of sensing and communication ranges, we propose a hazardous substance monitoring network based on virtual force algorithms, and develop a testbed. In the considered monitoring network, each unmanned vehicle achieves an optimal coverage and move to the highest interest area based on neighboring nodes sensing values and locations. By using experiments based on the developed testbed, we show that the proposed monitoring network can autonomously move toward a more polluted area and obtain a high weighted coverage.
Extended Entity-Relationship Model for Conceptual Modeling of XML Schema
Jung, In-Hwan ; Kim, Young-Ung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 157~163
DOI : 10.7236/JIIBC.2015.15.1.157
XML has become one of the most influential standard language for representing and exchanging data on internet. However, XML itself has a ability to represent a logical structure for storing and managing data, it is inadequate to use as a conceptual modeling tool because of its complexity for representing the document structures. In this paper, we propose the graphical form of conceptual modeling techniques for representing the structure of the XML schema documents using an extended entity relationship diagram. For this, extended entity relationship model is presented for representing the XML schema structure, transformation rules are presented for transforming extended entity relationship model into XML schema document to show the completeness of the proposed model.
Enhanced image detail control using Multi Channel Unsharp Mask Technique
Cho, Hyun-Ji ; Nam, Doohee ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 165~170
DOI : 10.7236/JIIBC.2015.15.1.165
The unsharp mask technique emphasize the boundary of the image by adding the boundary of the original image. This technique improves quality by emphasize its boundaries but produce rough image from image noise. The multi channel unsharp mask is possible to enhance entire contrast of the image by applying at least two channels of unsharp mask. However, There is limitations to strengthen boundaries even if the scale strongly applies the multi channel unsharp mask technique. To solve this problem, linear scaling to nonlinear scaling by applying exponential function to existing multi channel unsharp mask technique. Experimental results show enhanced contrast for desired area because of control scaling in details compared with existing unsharp mask technique.
A Study on Sizing and Operational Policies for Building the Cloud Training Portal System of Cyber Universities
Park, Jung-Ho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 171~178
DOI : 10.7236/JIIBC.2015.15.1.171
In these days, the practical training education is getting highlighted in IT curriculum. This study is for the Cloud computing based Virtual Desktop Service Plan of IT education and its efficient operation and management plan. With the implementation of a virtual lab environment system, the training environment which is customized by the curriculum is able to be provided. Also in the case of the limited system, the curriculum is able to be provided for each subject in advance. Therefore if the Cloud Training (or Practicing) Portal system for the multiple cyber universities is implemented according to this study's estimated scale and operation managing policies, the virtual training education service system could be provided in more efficient and more effective ways.
Target Path Detection Algorithm Using Activation Time Lag of PDR Sensors Based on USN
Lee, Jaeil ; Lee, Chong Hyun ; Bae, Jinho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 179~186
DOI : 10.7236/JIIBC.2015.15.1.179
This paper proposes the target path detection algorithm using statistical characteristics of an activated time lag along a moving path of target from a neighboring sensor in PDR(Pulse Doppler Radar) sensor node environment based on USN(Ubiquitous Sensor Network) with a limitation detecting only an existence of moving target. In the proposed algorithm, detection and non-detection time lag obtained from the experimental data are used. The experimental data are through repetitive action of each 500 times about three path scenarios such as passing in between two sensors, moving parallel to two sensors, and turning through two sensors. From this experiments, error detection percentages of three path scenarios are 5.67%, 5.83%, and 7.17%, respectively. They show that the proposed algorithm can exactly detect a target path using the limited PDR sensor nodes.
Proposition on Five Sense Smart Screen Elevator System based on Laser Display
Park, Joo-Bong ; Shin, Seung-Jung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 187~190
DOI : 10.7236/JIIBC.2015.15.1.187
Recently, most of people wants to have smart life for themselves like smart phones. In this paper, we propose the smart elevator based on the laser screen, speakers and air fresheners. Using this elevator, we could enjoy the various screen inside, and we could keep contacting with manager for wifi in the emergency situation. Also, the elevator could be operated with user's motion for Kinect. Finally, we did the survey for understanding preference of smart elevator. The grops are elevator manufacturing company, elevator distribution corporation and consumers, each group have 200 people.
Gaze Recognition System using Random Forests in Vehicular Environment based on Smart-Phone
Oh, Byung-Hun ; Chung, Kwang-Woo ; Hong, Kwang-Seok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 191~197
DOI : 10.7236/JIIBC.2015.15.1.191
In this paper, we propose the system which recognize the gaze using Random Forests in vehicular environment based on smart-phone. Proposed system is mainly composed of the following: face detection using Adaboost, face component estimation using Histograms, and gaze recognition based on Random Forests. We detect a driver based on the image information with a smart-phone camera, and the face component of driver is estimated. Next, we extract the feature vectors from the estimated face component and recognize gaze direction using Random Forest recognition algorithm. Also, we collected gaze database including a variety gaze direction in real environments for the experiment. In the experiment result, the face detection rate and the gaze recognition rate showed 82.02% and 84.77% average accuracies, respectively.
A Study on PDOP due to the Position Error of Acoustic Sensors in the 3D TDOA Positioning System
Oh, Jongtaek ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 199~205
DOI : 10.7236/JIIBC.2015.15.1.199
Indoor positioning technology has been developed very actively for the smart phone handheld by most users. Especially, many TDOA positioning systems using acoustic signal have been studied, and it estimates the smart phone position by measuring the distance between the smart phone speaker and the microphones which is installed to receive the acoustic signal from the smart phone, and by calculating the hyperbolic equations. But there are always errors for the distance measurements, and furthermore the microphone installation error produces huge position estimation error. In this paper, the position estimation error due to the position error of acoustic sensor in the 3 dimensional TDOA positioning system, is analyzed by PDOP simulation and experiment.
Lee, Sang-Un ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 207~215
DOI : 10.7236/JIIBC.2015.15.1.207
This paper proposes a solution-yielding linear time algorithm to NP-complete Sudoku, to which no polynomial time algorithm has been proposed. The proposed algorithm is performed on blocks in the descending order of the number of clues they contain. It firstly determines all numbers that could possibly occur in the blank rows and columns of each block. By deriving an intersecting value of corresponding rows and columns, it assigns the final number for each blank. When tested on the traditional
Sudoku, the proposed algorithm has succeeded in obtaining the solution through performance of 9 times, the exact number of the blocks. Test results on modified Jigsaw Sudoku (9 blocks) and Hypersudoku (13 blocks) also show its success in deriving the solutions by execuring 9 and 13 times respectively. Accordingly, this paper proves that the Sudoku problem is in fact P-problem.
A Study on Generation and Types of Mandelbrot Fractal Images
Lim, Mi-Jeong ; Cho, Hyong-Je ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 217~222
DOI : 10.7236/JIIBC.2015.15.1.217
As a Creative Director one is always looking forward to formative elements of new design. The fractal image that is generated by a computer program instead of by hand suggests a geometric pattern that can grafted into a new design for each field. In this paper we look for information about the creation of a Mandelbrot fractal image that is being utilized in the design of various sectors like textile design, architectural design, exhibition design from pure painting by convergence of both technology and art composites. And it analyses about forms based on the formative principle of creation images.
Design and Development of Framework for Local Heavy Rainfall Forecasting Service using Wireless Data Broadcasting
Im, Seokjin ; Choi, JinTak ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 223~228
DOI : 10.7236/JIIBC.2015.15.1.223
Korean climate becoming increasingly subtropical by climate warming makes local heavy rainfall frequently. To avoid damages from the local heavy rainfall, we need a forecasting service for a great number of clients. However, there is not the framework for the service based on wireless data broadcasting yet. In this paper, we design and implement a service framework for local heavy rainfall forecasting using wireless data broadcast. The developed service framework has scalability that can adopt various data scheduling and indexing schemes. We show the efficiency of the proposed framework to forecast local heavy rainfall through a simulation study.
Design of Open Gateway Framework for Personalized Healing Data Access
Jeon, YoungJun ; Im, SeokJin ; Hwang, HeeJoung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 229~235
DOI : 10.7236/JIIBC.2015.15.1.229
ICT healing platform is based on bio-signal and life habit information target to alarm early sickness concept prevention chronic pain. ICT(Information & Communication Technology) healing platform target on personal lead health management care of several health agencies and open of the (hospital, fitness center, health examination center, personal health device) personal health information together to personal device. Support Analysis Platform and Open API to vitalization optional services. In this paper proposal to access personality healing data Open Gateway Framework of Healing Platform Adaptor (HPAdaptor) ICT healing platform means Data relaying link to EMR(Electronic health record), korean medicine, life log, wellness, chronic pain, and fineness several personal health data provider and service provider personal healing data with software engine. After Design HPAdaptor can use for data and service provider record storage, mobile platform and analytics platform need data service or platform relying reference model.
Implementation of Multi-Motor Controller Based on a Single Microcontroller
Kwon, Jae-Min ; Lee, Kyung-Jung ; Ahn, Hyun-Sik ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 237~243
DOI : 10.7236/JIIBC.2015.15.1.237
In this paper, we consider a cascaded type of control architecture for a multi motor-based feedback control system and propose an ADC (Analog to Digital Converter) resource allocation method to efficiently utilize the limited ADC resources. The purpose of the resource allocation method is to minimize both the motor position measurement error and the d-q current measurement error. The cascaded type of control architecture is applied in parallel to each motor to independently control the speed of a motor in the multi motor control system. All the control algorithms are implemented by software using a single microcontroller without using additional microcontrollers. It is illustrated by experiments that the speed and the torque of each motor are controlled precisely by the proposed control architecture with the efficient ADC allocation method.
Design of a PWM-Controlled Driving Device for Backlightsof LED Systems
Um, Kee-Hong ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 245~251
DOI : 10.7236/JIIBC.2015.15.1.245
In this paper, we present a design of PWM-controlled driving device for backlights in LED systems. The system can control either the brightness of the entire screen of backlights of LCD driven by LED or illumination or contrast of each partial segment of the entire screen. The PWM-controlled driving device includes the shift register that shifts the series data according to the clock signal prior to the generation of parallel data. It is also is comprised of a number of registers, a number of counters, a number of comparators, and a number of synchronizing gates (producing the PWM-controlled signals). The proposed device for backlights in LED systems can generate the PWM-controlled signal with a high degree of resolution without the increase of clock frequency. It also contains the PWM-controlled circuit that disperses and restrains the quantized noise.
Design of Semiconductor-Operated Bidirectional Transformers Driven by Polarities of Alternating Voltage Sources
Um, Kee-Hong ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 253~259
DOI : 10.7236/JIIBC.2015.15.1.253
In this paper, we propose a transformer of alternating voltage source utilizing a semiconductor, operating in bidirectional fashion. Transformer is a device transferring energy by inductive coupling between its winding circuits. Conventional transformer is a device, composed of a primary coil and a secondary coil, transforming an alternating voltage. The system we propose is designed with a single circuit transforming the level of voltage signal in two ways; from the source to the load, and vice versa. For semiconductor switches, the NPN transistor is connected to the alternating voltage source terminal, and emitter terminal is connected to the inductor in the system as an energy storage element. The control signal is applied to the base terminal of the semiconductors. We have shown that the system we propose, by adopting only one circuit, drives an alternating voltage transformer that changes the amplitudes of voltage signal in reciprocal way.
Diffraction Analysis of Multi-layered Grating Structures using Rigorous Equivalent Transmission-Line Theory
Ho, Kwang-Chun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 261~267
DOI : 10.7236/JIIBC.2015.15.1.261
The eigenvalue problems involving the diffraction of waves by multi-layered grating configurations can be explained by rigorous modal expansion terms. Such a modal solution can be represented by equivalent transmission-line networks, which are generalized forms of simple conventional circuits. This approach brings considerable physical insight into the grating diffraction process of the fields everywhere. In particular, the transmission-line representation can serve as a template for computational algorithms that systematically evaluate dispersion properties, radiation effects and other optical characteristics that are not readily obtained by other methods. To illustrate the validity of the present rigorous approach, the previous research works are numerically confirmed and the results agree well each other.
Proof Algorithm of Erdös-Faber-Lovász Conjecture
Lee, Sang-Un ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 269~276
DOI : 10.7236/JIIBC.2015.15.1.269
This paper proves the Erd
sz conjecture of the vertex coloring problem, which is so far unresolved. The Erd
sz conjecture states that "the union of k copies of k-cliques intersecting in at most one vertex pairwise is k-chromatic." i.e., x(G)=k. In a bid to prove this conjecture, this paper employs a method in which it determines the number of intersecting vertices and that of cliques that intersect at one vertex so as to count a vertex of the minimum degree
in the Minimum Independent Set (MIS) if both the numbers are even and to count a vertex of the maximum degree
in otherwise. As a result of this algorithm, the number of MIS obtained is x(G)=k. When applied to
-clique sum intersecting graphs wherein
, the proposed method has proved to be successful in obtaining x(G)=k in all of them. To conclude, the Erd
sz conjecture implying that "the k-number of
-clique sum intersecting graph is k-chromatic" is proven.
UI Design Survey of Mobile App for the Activation of Traditional Market
Lee, Joo-Hee ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 277~282
DOI : 10.7236/JIIBC.2015.15.1.277
According to International Data Corporation(IDC) showed that PC sales for the first time ahead of the global smart phone sales in the fourth quarter of 2010. This opportunity as a smart phone application and mobile web-sites has been launched to accelerate the development of mobile services in a variety of fields. In addition to the support plan for the activation of the local traditional market from the second half of 2012 to make it easier to find information on the traditional markets of the country expanded and reorganized the traditional market-related web-site, trying to catch the foot of the youth in the online. This study is to increase the number of tourists visiting the traditional market or local residents and young people and to provide a basis for the development of mobile UI design for mobile application to investigate the local traditional market apps that are currently available.
Feasibility Study of Product Information Design at Internet shopping sites
Lee, Joo-Hee ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 283~289
DOI : 10.7236/JIIBC.2015.15.1.283
This study examines what information is that affects factors of purchase from product detail page of internet shopping malls. For this purpose, the first, the classification of Internet shopping malls and product information and purchasing factors were determined through previous studies, the second, by constructing a questionnaire based on this, verify the validity of each factor and, the finally, the biggest influence what information was performed to examine. What consumers really wants the information, what information to make purchases, the Internet shopping site will be to assist in the design. The results using the Internet shopping site that users reviews, site reliability, Information Architecture, reserve, 3D images and product images available, has been identified as factors affecting the use of reviews and product images available on the factors affecting the revealed. In the site design layout, color systems, text and many design factors are important, but will have to be designed to be purchased by providing sufficient information for the product.
Activation Plan for Online Shopping Mall of Kids' Furniture
Jang, Eun-Young ; Lee, Sang-Joon ; Lee, Kyeong-Rak ; Lee, Sang-Hyun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 1, 2015, Pages 291~298
DOI : 10.7236/JIIBC.2015.15.1.291
It is pretty hard to sell the kids' furniture online because of the characteristics of the consumers that they will like to make purchases after looking at the actual objects and then considering purchasing them. In this paper, we made the scheme to boost the on-line malls of the kids' furniture market by collecting the consumers' intention to buy before purchasing with questionnaire survey, comparing it with the real data of purchasing, and analyzing the differences. We analyzed the visit number of shopping mall, the page number of views, page duration time per visit, and customer's shopping path by using log data from the children's furniture online shopping mall server. In addition, we analyzed where the customer's influx route is among online advertising. We found that there are requirements for the designs, prices, brand names, and practicalities by the consumers purchasing the kids' furniture online. To strengthen competitiveness of the online kids' furniture malls, we proposed that reinforcing the on-line experiences of furniture, the differential strategies for the products, ensuring the fixed customers are needed.