Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of The Institute of Internet, Broadcasting and Communication
Journal Basic Information
Journal DOI :
The institute Of Webcasting, Internet And Telecommunication
Editor in Chief :
Volume & Issues
Volume 15, Issue 6 - Dec 2015
Volume 15, Issue 5 - Oct 2015
Volume 15, Issue 4 - Aug 2015
Volume 15, Issue 3 - Jun 2015
Volume 15, Issue 2 - Apr 2015
Volume 15, Issue 1 - Feb 2015
Selecting the target year
Design and Implementation of Hybrid Coaching System based on Web Service for College Career Guidance
JIN, Wen-Quan ; Koh, Eun-Hyeon ; Kim, Do-Hyeun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 1~7
DOI : 10.7236/JIIBC.2015.15.5.1
Recently, a coaching helps individual to lead and maximize performance. Generally there is a face to face coaching at the current spot of education, and the e-coaching is on the rise. And the face-to-face coaching means that coach and the coachee come face to face directly. And, the effective coaching method is required to supply the weakness and to maximize the strength of the e-coaching using the Internet. Accordingly, we are studying a hybrid coaching to overcome the difficulty and the limit of face-to-face coaching and online coaching. In this paper, we design and implement the career coaching system to provide the face-to-face coaching and the e-coaching for coachee based on the Web service on the Internet. We provide the hybrid coaching using Web service based on the Restful and connect with the database based on the Web to save and manage the profiles and the coaching history of the coach and the coachee. Proposed hybrid coaching system for coachee career improves remote accessibility between the coach and the coachee. This system provides the interaction without the limit of the time and the space, and overcomes the limit of the traditional face-to-face coaching on the online environment.
Group Key Generation and Exchange Scheme using a Trapdoor Collision Hash in M2M Communications Environment
Kim, Sung-Soo ; Jun, Moon-Seog ; Choi, Do-Hyeon ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 9~17
DOI : 10.7236/JIIBC.2015.15.5.9
The development of wireless communication technology and change in the ICT market has led to the development of the M2M service and technology. Under these circumstances, the M2M environment has been the focus of communication environment construction between machines without control or direct intervention of human being. With characteristics of wireless communication environment, the possibility of being exposed to numerous security threats and safe communication security technology have becoming an issue an important requirements for problems such as data exposure, forgery, modulation, deletion, and privacy. This research analyzes requirements of trapdoor collision hash, generates keys between groups under the M2M environment by using the specificity of trapdoor, and suggests technology to exchange keys with session keys. Further, it also suggests techniques to confirm authentication of device and gateway in accordance with group key generation. The techniques herein suggested are confirmed as safe methods in that they have attack resistance such as Masquerade Attack, Man-in-the-Middle Attack, and Replay Attack in the group communication block by using the speciality of collision message and collision hash.
A Study on Application Method of Ontologies for Efficient Semantic-based Search of Copyrighted Works
Yoo, Min-Kyu ; Kim, Yoon-Ho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 19~28
DOI : 10.7236/JIIBC.2015.15.5.19
Korea Digital Copyright Exchange of Korea Copyright Commission runs and manages copyrighted works and copyright license agreement, as well as assigns Integrated Copyright Number(ICN) to copyrighted works, also offers copyrighted works searching service. Keyword-based searching method based on ICN metadata provides results depending on the inclusion of metadata keyword. However, keyword-based searching method has limitations that cannot provide exact results that users need. Therefore, the essential method of offering exact result is needed. In this paper, we propose the semantic-based searching method about copyrighted works to increase the accuracy of searching results by extending ICN matadata to ontology, and implement the ontology of copyrighted works by defining relation and semantics about metadata elements. In order to compare semantic-based searching based on the ontology of copyrighted works with keyword-based searching method, the search results of each method according to 5 scenarios are presented and the accuracy of each method is compared.
The Relationship of Internet Game Addiction to Psycho-Emotional Variables
Kim, Jung-Ae ; Cho, Eui-Young ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 29~37
DOI : 10.7236/JIIBC.2015.15.5.29
The purpose of this study was to research on the relationship of Internet Game Addiction to Psycho-emotional Variables(self-identity, depression, meaning of life). The cross-sectional descriptive study design was used. We selected 275 adults through randomised sampling and analysis the result by chi-square test and hierarchial regression method. The result of this study was as follows; The effects of personal characteristics to Internet Game Addiction was sex, age, smoking and family including social characteristics were level of mother's education, father's education, and family economic status in a row. The relationship of Internet Game Addiction to Psycho-Emotional Variables were self-identity and depression. Therefore we suggest that the practical support system for 20's age adult to increase the self-identity and decrease the depression will be applied.
Pseudo Jacket Matrix and Its MIMO SVD Channel
Yang, Jae-Seung ; Kim, Jeong-Su ; Lee, Moon-Ho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 39~49
DOI : 10.7236/JIIBC.2015.15.5.39
Some characters and construction theorems of Pseudo Jacket Matrix which is generalized from Jacket Matrix introduced by Jacket Matrices: Construction and Its Application for Fast Cooperative Wireless signal Processing was announced. In this paper, we proposed some examples of Pseudo inverse Jacket matrix, such as
non-square matrix for the MIMO channel. Furthermore we derived MIMO singular value decomposition (SVD) pseudo inverse channel and developed application to utilize SVD based on channel estimation of partitioned antenna arrays. This can be also used in MIMO channel and eigen value decomposition (EVD).
Design of One-Time-Pad based on PKI Coordinates Technique for a Safe Key Transmission in E-Commerce Applications
Lee, Kil-Hun ; Jun, Moon-Seok ; Choi, Do-Hyeon ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 51~60
DOI : 10.7236/JIIBC.2015.15.5.51
As electronic commerce service became more popular, information equivalent to currency prevails in network. Accordingly, hacking into network often occurs and thus OTP (One-Time-Password) has emerged as an alternative secondary security system. However, weakness has been found in even existing One-Time Password that used to be considered 'perfect'. Therefore, it becomes very urgent to have an additional security countermeasure. As security recommendation is not considered as solution anymore, more specific plan becomes necessary. The present study proposes PKI coordinates technique-based OTP (One-Time-Pad) for a safe key transmission in E-commerce.
Proposal of Fast Counting Sort
Lee, Sang-Un ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 61~68
DOI : 10.7236/JIIBC.2015.15.5.61
Among comparison sorts, no algorithm excels a current set lower bound of O(nlogn) in operation. Quicksort, the fastest of its kind, has a complexity of O(nlogn) at its best and on average and
at worst. This paper thus presents two methods: first is an O(n+k) simple counting sort which operates much more speedily than an O(n+k), (k=maximum value) counting sort, and second is an O(ln) radix counting sort which counts the frequency of numbers in the digit l of a data and saves it in a corresponding virtual bucket in an array, only to virtually divide the array into radix digit numbers. For the 6 experimental data, the proposed algorithm makes O(nlogn) or
of Quicksort simple into O(n+k) or O(ln). After all, the proposed sorting algorithm has proved to be much faster than the counting sort and Quicksort.
Creation of Approximate Rules based on Posterior Probability
Park, In-Kyu ; Choi, Gyoo-Seok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 69~74
DOI : 10.7236/JIIBC.2015.15.5.69
In this paper the patterns of information system is reduced so that control rules can guarantee fast response of queries in database. Generally an information system includes many kinds of necessary and unnecessary attribute. In particular, inconsistent information system is less likely to acquire the accuracy of response. Hence we are interested in the simple and understandable rules that can represent useful patterns by means of rough entropy and Bayesian posterior probability. We propose an algorithm which can reduce control rules to a minimum without inadequate patterns such that the implication between condition attributes and decision attributes is measured through the framework of rough entropy. Subsequently the validation of the proposed algorithm is showed through test information system of new employees appointment.
An Interdependent Data Allocation Scheme Using Square Root Rule of Data Access Probability
Kwon, Hyeokmin ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 75~84
DOI : 10.7236/JIIBC.2015.15.5.75
A data allocation technique is essential to improve the performance of data broadcast systems. This paper explores the issues for allocating data items on broadcast channels to process multiple-data queries in the environment where query profiles and query request rates are given, and proposes a new data allocation scheme named IDAS. The proposed scheme employs the strategy that the broadcast frequency of each data is determined by the square root value of its relative access probability. IDAS could enhance the performance of query response time since it can process queries of high request rate fast and show a resonable degree of query data adjacency. Simulation is performed to evaluate the performance of the proposed scheme. The simulation results show that IDAS outperforms other schemes in terms of the average response time.
Implementation of FMC Controller to connect IMS Service Networks
Yoo, Seung-Sun ; Kim, Sam-Taek ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 85~90
DOI : 10.7236/JIIBC.2015.15.5.85
Work environments within the firm with a concept of mobile office is growing divided into two sections. It's Wi-Fi FMC(Fixed Mobile Convergence) field Which are implemented in a telephone service available from existing fixed-line service in the center of the smart phones and the EMS(Enterprise Mobility Service) field to make people will be able to handle PC the center of the information system within an enterprise using a smart phone instead of terminal facility connects to a system in the workplace and external. This paper developed FMC controller to allow execution IMS(IP Multi-Media Subsystem) services to complement the issues of the FMC corporation, telephony service associated. The controller includes FMC automatic enrollment services, voice quality enhancement of the mobile phone, anywhere within the firm on his mobile phone calls can provide mobility and is also implemented FMC LCR function that use status information from mobile soft-phone within the IP-PBX.
Jeju Jong-Nang Channel Code III
Park, Ju-Yong ; Kim, Jeong-Su ; Lee, Moon-Ho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 91~103
DOI : 10.7236/JIIBC.2015.15.5.91
This paper presents "The 3-User NOR switching channel based on interference decoding with receiver cooperation" in succession to "Jeju Jong Nang channel code I, II". The Jeju Jong Nang code is considered as one of the earliest human binary coded communication (HBCC) in the world with a definite "1" or "0" binary symbolic analysis of switching circuits. In this paper, we introduce a practical example of interference decoding with receiver cooperation based on the three user Jong Nang NOR switching channel. The proposed system models are the three user Jong Nang (TUJN) NOR logic switching on-off, three-user injective deterministic NOR switching channel and Gaussian interference channel (GIC) with receiver cooperation. Therefore, this model is well matched to Shannon binary symmetric and erasure channel capacity. We show the applications of three-user Gaussian interference decoding to obtain deterministic channels which means each receiver cooperation helps to adjacent others in order to increase degree of freedom. Thus, the optimal sum rate of interference mitigation through adjacent receiver cooperation achieves 7 bits.
Simultaneously Streaming Method of Multimedia Files
Kim, Jinyoung ; Lee, Eunsang ; Im, Sohee ; An, Beongku ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 105~112
DOI : 10.7236/JIIBC.2015.15.5.105
In this paper, we propose a simultaneously streaming method of multimedia files. The main features and contributions of the proposed method are as follows. First, to share and play at the same time one video playback in more than two devices to provide convenience for users. Second, to contribute communications and multimedia technologies by developing a streaming technology that can work on two or more devices. The results of implementation and performance evaluation show successful UDP data communication and the simultaneous transfer of streaming multimedia with data to the receiving sides.
Statistical Analysis for Path Break-Up Time of Mobile Wireless Networks
Ahn, Hong-Young ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 113~118
DOI : 10.7236/JIIBC.2015.15.5.113
Mobile wireless networks have received a lot of attention as a future wireless network due to its rapid deployment without communication infrastructure. In these networks communication path between two arbitrary nodes break down because some links in the path are beyond transmission range(
) due to the mobility of the nodes. The set of total path break down time(
), which is the union of path break down time of every node pair, can be a good measure of the connectivity of the dynamic mobile wireless network. In this paper we show that the distribution of the total path break down time can be approximated as a exponential probability density function and confirms it through experimental data. Statistical knowledge of break down time enables quantitative prediction of delay, packet loss between two nodes, thus provides confidence in the simulation results of mobile wireless networks.
A Study on Transmission Performance for Optical NRZ Transmitters
Lee, Dong-Soo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 119~123
DOI : 10.7236/JIIBC.2015.15.5.119
This paper presents a theoretical study of transmission performance for an optical NRZ (nonreturn-to-zero) transmitter employed a Mach-Zehnder modulator. Especially, we have investigated the effects of the
-parameters that represents the chirps and the driving voltage ratios(=driving voltage/switching voltage) of Mach-Zehnder modulators for transmitting 25Gbps optical NRZ signals at a wavelength of 1550nm without any dispersion compensation methods over single mode fiber. By optimizing the negative values of
-parameters for the dispersion tolerance with the change of driving voltage ratios, it has been tested whether the transmission performance has improved. We have verified the improvement by the BERs and the optical eye diagrams.
A Web-based Open API Framework for RCS-e Session Establishment
Lee, Dongcheul ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 125~131
DOI : 10.7236/JIIBC.2015.15.5.125
In order to vitalize the Rich Communication Service-e(RCS-e) service, RCS-e users need various ways to use RCS including RCS-e apps. A RCS standards organization has suggested Application Program Interface(API). Since it only dealt with functional requirements, it was not enough to implement the API. This paper suggests an open API framework that can utilize RCS-e through a web interface. By using the framework, web developers can implement various RCS-e-enabled web applications. A system architecture is defined for the framework. Call flows for establishing a RCS-e session between the framework and other nodes are defined. Also, rules and examples for translating protocols between them are provided. Finally, performance evaluation proves that the proposed framework does not add loads to the existing network infrastructure.
Lifetime Improvement of Wireless Sensor Network using the Distribution of a Transmission Distance in the SEP
Lee, Chang-Hee ; Lee, Jong-Yong ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 133~138
DOI : 10.7236/JIIBC.2015.15.5.133
In this paper, we propose a method for improving the lifetime of the sensor network SEP through the wireless sensor network divided into two spaces by reducing the transmission distance of the cluster head in the layer in the distance. With reference to the position information of the node, the base station divides the layer based on the midpoint of the nearest node and the furthest distance away from the base station node. And the cluster head in the outer layer far from the base station is transmitted the data to the base station via the cluster head in the inner layer base station to transmit data. That is, we are proposed the layered SEP by reducing the transmission distance of the cluster head in the outer layer for the energy consumption to a minimum. The proposed algorithm is verified by comparison with the existing SEP.
DL-LEACH: Hierarchical Dual-Hop Routing Protocol for Wireless Sensor Network
Lee, Chang-Hee ; Lee, Jong-Yong ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 139~145
DOI : 10.7236/JIIBC.2015.15.5.139
This paper proposes to increase the node energy effienciecy, which rapidly drops during the transmission of LEACH (Low Energy Adaptive Clustering Hierachy), using the method of DL-LEACH (Dual-hop Layered LEACH). By introducing dual-hop method in the data transmission, the proposed single-hop method for short-range transmission and multi-hop transmission method between the cluster heads for remote transmission was introduce. By introducing a partial multi-hop method in the data transmission, a single-hop method for short range transmission method between the cluster heads for remote transmission was introduces. In the proposed DL-LEACH, the energy consumption of cluster head for remote transmission reduces and increases the energy efficiency of sensor node by reducing the transmission distance and simplifying the transmission routine for short-range transmission. As compared the general LEACH, it was adapted to a wider sensor field.
Effect Analysis of a Authentication Algorithm in IPsec VPN Satellite Communication
Jeong, Won Ho ; Hwang, Lan-Mi ; Yeo, Bong-Gu ; Kim, Ki-Hong ; Park, Sang-Hyun ; Yang, Sang-Woon ; Lim, Jeong-Seok ; Kim, Kyung-Seok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 147~154
DOI : 10.7236/JIIBC.2015.15.5.147
Satellite broadcasting networks, like if you have if you have just received information that everyone must bring the required security attributes this earth should be done as encryption. In this paper, a satellite communication network AH additional security header in transport mode IPsec VPN by applying the SHA-256 and MD-5 authentication algorithm to authenticate the data portion Error rate and analyze the BER and Throughput. First, to generate a normal IP packet added to IPsec transport mode security header AH were constructed internal authentication data by applying the SHA-256 and MD-5 algorithm. Channel coder was applied to the Rate Compatible Punctured Turbo Codes, packet retransmission scheme Hybrid-ARQ Type-II and Type-III were used. Modulation method was applied to the BPSK, the wireless channel Markov channel (Rician 80%, Rayleigh 20% and Rician 90%, Rayleigh 10%) as an authentication algorithm according to the satellite channel state analyzed how they affect the error rate and Throughput.
Optimization of Economic Load Dispatch Problem for Quadratic Fuel Cost Function with Prohibited Operating Zones
Lee, Sang-Un ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 155~162
DOI : 10.7236/JIIBC.2015.15.5.155
This paper proposes a deterministic optimization algorithm to solve economic load dispatch problem with quadratic convex fuel cost function. The proposed algorithm primarily partitions a generator with prohibited zones into multiple generators so as to place them afield the prohibited zone. It then sets initial values to
and reduces power generation costs of those incurring the maximum unit power cost. It finally employs a swap optimization process of
. When applied to 3 different 15-generator cases, the proposed algorithm has consistently yielded optimized results compared to those of heuristic algorithms.
A study on Interactive-type Exhibition Using Fractal Images
Lim, Mi-Jeong ; Cho, Hyong-Je ; Choi, Gyoo-Seok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 163~168
DOI : 10.7236/JIIBC.2015.15.5.163
Recent exhibition's paradigm is changing from the existing unidirectional oriented exhibition form to a form of interactive hands-on exhibits that viewers can get and realistically feel a variety of information. Hands-on exhibit embodies the human interface by utilizing light, sound, pressure, etc. in time and space. In this paper, we have studied the creation of fractal image by the Mandelbrot technique and proposed the interaction method for it to be converted into a variety of forms. By using the proposed method, a variety of image transformation such as printmaking effect, sketch effect, Pop Art effect can be performed, according to clicking a certain fraction on the created fractal image screen by a user mouse. Interactive image generated in this study are expected to be used for trade shows, promotional products, media art design.
Design and Development of Framework for Wireless Data Broadcast of XML-based CCR Documents
Im, Seokjin ; Hwang, Hee-Joung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 169~175
DOI : 10.7236/JIIBC.2015.15.5.169
In the field of health informatics converging ICT technology and medicine technology, XML-based CCR document make sure the continuity and mobility of the information of patients. When a number of clients access CCR documents, wireless data broadcast that supports any number of clients can be an alternative for the scalability. In this paper, we propose a framework for wireless data broadcast of XML-based CCR documents. We design and implement the framework that can adopt various data scheduling algorithms and indexing schemes for the optimized performances of clients. The implemented framework shows the efficiency with simulations adopting various data scheduling algorithms and indexing schemes.
Analysis/Design and Implementation of 3D Print Remote Control and Printing Mobile Software
Cho, Byung-Ho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 177~182
DOI : 10.7236/JIIBC.2015.15.5.177
Nevertheless 3D printer is propagated fast, it is difficult for us of using 3D printer at the same time because of 3D printer's slow velocity. Existing solution is to print using SD card which moves files and on PC but this method is spend too much time and can not be showed status of printing. Yet we have no 3D printer software solution which is controlled and printed remotely. Therefore, this 3D printer software solution makes 3D printer be connected on internet networks and selected to use it on smart App. And it is controlled and printed remotely. In my paper, to build an Android App. which can execute these functions, an effective analysis & design using UML and implementation method will be presented.
Auto Detection System of Personal Information based on Images and Document Analysis
Cho, Jeong-Hyun ; Ahn, Cheol-Woong ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 183~192
DOI : 10.7236/JIIBC.2015.15.5.183
This paper proposes Personal Information Auto Detection(PIAD) System to prevent leakage of Personal informations in document and image files that can be used by mobile service provider. The proposed system is to automatically detect the images and documents that contain personal informations and shows the result to the user. The PIAD is divided into the selection step for fast and accurate retrieval images and analysis which is composed of SURF, erosion and dilation, FindContours algorithm. The result of proposed PIAD system showed more than 98% accuracy by selection and analysis steps, 267 images detection of 272 images.
Smart Plants Management System based on Internet
Park, Hyunsook ; Park, Chun-Kwan ; Hong, You-Sik ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 193~199
DOI : 10.7236/JIIBC.2015.15.5.193
Recently the artificial intelligence green house system, which collects automatically the informations of plants cultivation circumstances and controls the growing circumstances, is studied using temperature, humidity and illuminance sensors. In this paper, the inference for plants cultivation of optimum circumstance conditions is simulated on the internet bases by predicting the temperature, humidity and illuminance. On the IOT circumstances, the plant cultivation conditions of temperature, humidity and illuminance, using Arduino sensor, are transmitted to the manager on realtime and if the optimum condition of temperature and humidity for plant cultivation is not equal to the values, the system transmits automatically the SMS warning messages on realtime. Although the sudden climite conditions(snow, rain, hot weather) are occurred, the optimum condition of plant cultivation can be controlled. In this paper, using Fuzzy rules and WEKA TOOL, although the same flora temperature zone is used, the simulation is produced for the optimum value of temperature, humidity and illuminance for the zone.
Stopband Tunable Multifunctional Gm-C Filter based on OTA with Three-Input/Single-Output
Basnet, Barun ; Bang, Jun-Ho ; Song, Je-ho ; Ryu, In-Ho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 201~206
DOI : 10.7236/JIIBC.2015.15.5.201
A new electronically stopband tunable filter is proposed with three-input single-output using Operational Transconductance Amplifier (OTA) in this paper. The proposed filter provides band pass, low pass and high pass multifunctional responses. Centre frequency (
) and quality factor (Q) of the realized filters could independently tuned without disturbing each other. Various network sensitivity and non-ideal characteristic analysis are done to check the sensitivity and parasitic effect of different circuit parameters. The CMOS realization of filter is done with 1.8V-0.18um process parameters and HSPICE simulation results are presented to assert the presented theory.
Identification of Normally Operating High-Voltage Cables beyond Expected Life time
Um, Kee-Hong ; Lee, Kwan-Woo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 207~212
DOI : 10.7236/JIIBC.2015.15.5.207
Continuous, high-quality supply of electrical energy is the backbone of any modern economy. Any equipment operating at a power station must be reliable and safe. All major power supply components such as transformers, cables, generators, and switchgear need to be kept in perfect operating condition. The lifetime of power cables, used as the main means of transferring electric power, is understood to be about 30 years, from the time of manufacturing. The dielectrics between two conductors of a cable must be able to withstand electrical stresses from high-voltage input. This condition should be verified throughout the lifetime of the cable system. Several techniques, such as VLF-tan
, partial discharge, and insulation resistance are used in order to determine the operating conditions of cables. In this paper, we present our work on insulation resistance to diagnose cables in operation at the Western Power station in Taean, Chungcheong Namdo Province, South Korea. As a result we have found cables the life time of which is 38 years.
A Study on Energy Savings When replacing Performing Halogen Lights with LED Lights in Seoul Community Hall
Lee, Jang-Weon ; Kwon, Hyeok-Hwan ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 213~217
DOI : 10.7236/JIIBC.2015.15.5.213
Seoul has 25 areas of City Hall, the ward office has been operating theater at least 1 in maximum 4-5 locations to various sized places. The purpose of theater has been used for a variety of purposes to typical performances of Drama and Musicals, School play, Lecture. This points to a Variety of ideas for use, when replacing an exsting halogen luminaires, appropriate LED luminaires, Learn more if there is any advantage in terms of the energy saving part. it will be applied to the value for the energy saving to ward office hall of the actual targets. In case replacement in existing halogen luminaires to LED luminaires, to energy savings of about 80% appear around. Get the advantages of the various functional properties a device chip of the LED itself, Forward will be referred to as easy to replace the halogen luminaires and LED luminaires.
A Performance Study of Asymmetric Multi-core Digital Signal Processor Architectures
Lee, Jongbok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 219~224
DOI : 10.7236/JIIBC.2015.15.5.219
Recently, the multi-core processor architecture is widely used in the digital signal processors for enhancing its performance. Multi-core processors are classified either as symmetric or asymmetric. Asymmetric multi-core processors are known to have higher performance and more efficient than symmetric multi-core processors. In order to study the performance enhancement of asymmetric multi-core digital signal processors over the symmetric ones, the trace-driven simulation has been executed for various asymmetric quad-core, octa-core and hexadeca-core digital signal processors and compared with the symmetric ones of similar hardware budget using UTDSP benchmarks as input.
A Study on Satisfaction and Dissatisfaction Coexistence of Social Network Service
Lee, Jae-Beom ; Lee, Jae-Beom ; Park, Chanuk ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 5, 2015, Pages 225~236
DOI : 10.7236/JIIBC.2015.15.5.225
Social network services, it has attracted a lot of popularity that it us to allow the formation of past human network has been thought possible only in the main offline also on-line and mobile. However, by a variety of SNS with a recent other features it appeared a lot, the user, rather than stick to one SNS use only, if necessary, to join simultaneously two or more kinds of SNS status it is. By problem of invasion of privacy in recent SNS is a problem of, the user, in many cases that I have to worry about whether or not to leave the mainly use SNS. This study focused on these aspects and trying to figure out whether changing the SNS people to why use. Therefore, it is possible to obtain two factor theory is trying to figure out the psychology of users feel satisfaction SNS use and unsatisfactory at the same time as the significant result.