Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of The Institute of Internet, Broadcasting and Communication
Journal Basic Information
Journal DOI :
The institute Of Webcasting, Internet And Telecommunication
Editor in Chief :
Volume & Issues
Volume 15, Issue 6 - Dec 2015
Volume 15, Issue 5 - Oct 2015
Volume 15, Issue 4 - Aug 2015
Volume 15, Issue 3 - Jun 2015
Volume 15, Issue 2 - Apr 2015
Volume 15, Issue 1 - Feb 2015
Selecting the target year
A Study on Security Technology using Mobile Virtualization TYPE-I
Kang, Yong-Ho ; Jang, Chang-Bok ; Kim, Joo-Man ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 1~9
DOI : 10.7236/JIIBC.2015.15.6.1
Recently, with smart device proliferation and providing the various services using this, they have interested in mobile and Smart TV security. Smartphone users are enjoying various service, such as cloud, game, banking. But today`s mobile security solutions and Study of Smart TV Security simply stays at the level of malicious code detection, mobile device management, security system itself. Accordingly, there is a need for technology for preventing hacking and leakage of sensitive information, such as certificates, legal documents, individual credit card number. To solve this problem, a variety of security technologies(mobile virtualization, ARM TrustZone, GlobalPlatform, MDM) in mobile devices have been studied. In this paper, we propose an efficient method to implement security technology based on TYPE-I virtualization using ARM TrustZone technology.
Development of Efficient Data Distribution Storage Algorithm for High Speed Data Backup in DRAM based SSD
Song, Han-chun ; Ahn, Hyuk-jong ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 11~15
DOI : 10.7236/JIIBC.2015.15.6.11
SSD(Solide State Disk) Memory is gradually replacing HDD(Hard Disk Drive) for high speed data input and output processing on Internet server system. In this paper, we proposed efficient data distribution storage algorithm in DRAM based SSD. And we did performance test for proposed algorithm and existing algorithm in the same server environment condition. The result of comparison of performance test is as fellows. Data backup processing time of proposed algorithm was reduced by half than that of existing algorithm.
Design of a Smart Application using Big Data
Oh, Sun-Jin ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 17~24
DOI : 10.7236/JIIBC.2015.15.6.17
With the rapid growth of Information technology and up-to-date wireless network application technologies, huge and various types of data are produced in every moment, the value and significance of the analysis techniques using big data are increased recently. Big data, which were useless since they were too huge to manage in the past, enables us to get new inspirations and values in various practical application areas through the development of big data computing devices and analytic tools. Nowadays, however, it is true that most of the big data are still wasted without properly analyzed and used. In the long run, the preliminary stipulations for finding inspirations and extracting new values from big data are securing big data analysis and application techniques to process big data efficiently. In this paper, we study accurate data analysis techniques and data process technologies those are able to extract needed inspirations and values from big data efficiently, then design the smart application that adopts these techniques practically.
Design and Implementation of Financial Security Automatic System for Privacy Information of Financial Institution
Lee, Jeong-Min ; Kim, In-Seok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 25~30
DOI : 10.7236/JIIBC.2015.15.6.25
One of the hottest issues of security is information leakage of financial institution. Financial institutions including commercial banks are frequently threatened by attempts of leakage through hacking and vulnerability, and this information is centered on personal information of their clients. Through this study, I found out that security managers of financial institutions are trying to prevent the leaking of private information, but in fact most of them barely know where their personal information is. Even if they know where it is and trace the data, it is often found in unexpected places. Because there is a lot of waste in time and human resources as search is done manually, we have understood that responding to IT Compliance requires a lot of effort. This study is to improve IT Compliance response and protect information leakage through monitoring PC and servers, the main storage of personal information by automated system, periodically.
IoE Service Process Research to Maximize Efficient Information Storage and Utilization
Chang, Young-Hyun ; Oh, Sang-Yeb ; Ko, Chang-Bae ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 31~35
DOI : 10.7236/JIIBC.2015.15.6.31
The IoE service process for maximizing efficiency of information storage and utilization classifies in step five which are interconnected, data collection, storage, organize, analyze, and share. Two key processing elements are store and forward. Keeping the useful knowledge in safe location is "store processing", and utilization of stored useful knowledge is defined as "forward processing" during the IoE service process. Where, past experience data can tell us how to prepare the future utilization. That is, past experience is organized store processing, and preparation for the future is shared forward processing through analysis. To maximize the utilization and storage of information effectively, the various methodologies for IoE service process propose and research in this paper.
A Study on Removal Request of Exposed Personal Information
Jung, Bo-Reum ; Jang, Byeong-Wook ; Kim, In-Seok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 37~42
DOI : 10.7236/JIIBC.2015.15.6.37
Although online search engine service provide a convenient means to search for information on the World Wide Web, it also poses a risk of disclosing privacy. Regardless of such risk, most of users are neither aware of their personal information being exposed on search results nor how to redress the issue by requesting removal of information. According to the 2015 parliamentary inspection of government offices, many government agencies were criticized for mishandling of personal information and its leakage on online search engine such as Google. Considering the fact that the personal information leakage via online search engine has drawn the attention at the government level, the online search engine and privacy issue needs to be rectified. This paper, by examining current online search engines, studies the degree of personal information exposure on online search results and its underlying issues. Lastly, based on research result, the paper provides a sound policy and direction to the removal of exposed personal information with respect to search engine service provider and user respectively.
Research on Safe Application Program of Smart Phone for Auto Receiving and Answering during a Car Driving
Hong, YouSik ; Choi, Myeong-Bok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 43~49
DOI : 10.7236/JIIBC.2015.15.6.43
This paper designs and implements a smart phone safe application program for advanced preventing a danger during a car driving with doing a smart phone. The proposed smart phone safe application program has the aim to increase easily and naturally the concentration when the driver is using of the smart phone during a car driving. Especially when sudden situation occurs, If driver gives up driving conditions, and go to the restaurant, move to tourist resort. It will continue to send the text of driving even if another person is on the phone. In this paper a traffic safety simulation was performed using a fuzzy inference rules in order to solve these problem. The simulation is predicted greatly to decrease to send the auto sending message when the driver gives up suddenly the driving because catching up whether the car is driving or not.
Interference Analysis for DAB Service on the Advanced T-DMB System Environment
Ju, Sang-Lim ; Kim, Young-Jae ; Kim, Kyung-Seok ; Cho, Juphil ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 51~59
DOI : 10.7236/JIIBC.2015.15.6.51
The advanced T-DMB is the digital broadcasting technique upgrading the T-DMB which has low effective data rate compared with other things. Since it applies the hierarchical modulation, it has maximally twice as much the effective data rate of a T-DMB, so it can provides the video service of high quality and many stations more than a T-DMB. Therefore, the study for DAB service on the AT-DMB environment will be advantageous better than the previous studies for it on the T-DMB environment. So, this paper proposes the method of the channel allocation for DAB service on the Advance T-DMB system environment and presents the results of the interference analysis in order to verify that.
Comparative Study of Colour Recognition According to Background Lightness and Stimulus Size
Hong, Ji-Young ; Park, Yun-Sun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 61~70
DOI : 10.7236/JIIBC.2015.15.6.61
This study, under the assumption that there may be a difference in colours recognized depending on background lightness and colour stimulus size, applied background lightness in a differential way and conducted an experiment by comparing the sizes of stimuli equivalent to
. Based on the results, by reflecting the results of this experiment as a difference in colour recognition, which may occur when the input image is converted from a large-sized screen to a mobile-sized screen, power efficiency, one of the biggest issues, can be reflected in mobile devices and may contribute to effective three-dimensional image reproduction and image quality in 3-D or hologram as well as 2-D images.
Controller Scheduling and Performance Analysis for Multi-Motor Control
Kwon, Jae-Min ; Lee, Kyung-Jung ; Ahn, Hyun-Sik ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 71~77
DOI : 10.7236/JIIBC.2015.15.6.71
In this paper, we propose a scheduling method for signal measurement and control algorithm execution in a multi-motor drive controller. The multi-motor controller which is used for vehicle control receives position/velocity command and performs position/velocity control and current control. Internal resource allocation and control algorithm execution timing are very important when one microcontroller is used for multi-motor drives. The control performance of the velocity control system is verified by varying ADC(Analog to Digital Converter) conversion timing and algorithm execution timing using real experiments.
A Study on Application of Time-Triggered Ethernet for Vehicle Network
Park, Mi-Ryong ; Yoon, Mihee ; Na, Ke-Yeol ; Kim, Dongwon ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 79~88
DOI : 10.7236/JIIBC.2015.15.6.79
In this paper, we examine Ethernet based vehicle network which is recently emerging technology. Current MOST for entertainment will be soon replaced with the emerging Ethernet based vehicle network. Although legacy standard Ethernet has several advantages it is not suitable for vehicle backbone network without any modification. As a result, many researches are happening on extending and modification of the Ethernet function for realtime and reliability. Time-triggered Ethernet, one of many trials known as AS6802, is investigated on the architecture and functionalities. We design the traffic model on Time-triggered Ethernet and analyse the latency of the network. We also consider the QoS requirement and environment of operating configuration for vehicle network.
FMC Performance and Voice Quality of Enterprise Type connectable to IP-PBX
Kim, Sam-Taek ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 89~94
DOI : 10.7236/JIIBC.2015.15.6.89
FMS which has a concept that wireless terminal can replace wire terminal services is a technologies that is can provide service costs same as wire terminal in the special zone. Enterprise type of FMC that is developed making up for the weak point is must have to improve voice quality and FMC performance in the soft phone. This paper measure voice quality based on the one way of the total estimated delay time of FMC to carry out IMS services between IP-PBX and FMC soft-phone to operate it`s controller optimally and put forward evidence to be in 120ms and 150ms in the VoIP FMC voice quality. To measure FMC performances in four categories evaluated trials and prove its performances.
Virtual Radix Counting Bucket sort
Lee, Sang-Un ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 95~102
DOI : 10.7236/JIIBC.2015.15.6.95
Generally, there is no sorting algorithm much faster than O(nlogn). The quicksort has a best performance O(nlogn) in best and average-case, and
in worst-case. This paper suggests virtual radix counting bucket sort such that counting the frequency of numbers in each radix digit, and moves the arbitrary number to proper virtual bucket in the array, and divides the array into radix digit numbers virtually. Also, this algorithm moves the data to proper location within an array for using the minimum auxiliary memory. This algorithm performs k-times such that the number of k digits in given data and the time complexity is O(n). Therefore, this algorithm has a O(kn) time complexity.
A Study on Efficient Routing Method with Location-based Clustering in Wireless Sensor Networks
Lim, Naeun ; Joung, Jinoo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 103~108
DOI : 10.7236/JIIBC.2015.15.6.103
Maintaining efficient energy consumption and elongating network lifetime are the key issues in wireless sensor networks. Existing routing protocols usually select the cluster heads based on the proximity to the sensor nodes. In this case the cluster heads can be placed farther to the base station, than the distance between the sensor nodes and the base station, which yields inefficient energy consumption. In this work we propose a novel algorithm that select the nodes in a cluster and the cluster heads based on the locations of related nodes. We verify that the proposed algorithm gives better performance in terms of network life time than existing solutions.
Performance Evaluation of AV-MMA Adaptive Equalization Algorithm in high order QAM System
Lim, Seung-Gag ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 109~114
DOI : 10.7236/JIIBC.2015.15.6.109
This paper relates with the eualization performance of Adaptive Varying-MMA (AV-MMA) in order to the minimization of intersymbol interference that is occurs in the nonlinear communication channel. In order to obtain the error signal in the tap coefficient updating process of adaptive equalization algorithm, the present MMA uses the constant modulus. But in AV-MMA, the adaptively varying modulus are used according to the equalizer output, it is possible to reduce the error signal and possbile to improving the overall equalization performance. In order to improved equalization performance of the AV-MMA in the 64-QAM signal, the present MMA performance were compared. For this, the output signal constellation of equalizer, residual isi, maximum distortion, MSE and SER curves are applied. As a result of computer simulation, the AV-MMA has more better performance in the every performance index than MMA, and the SER performance shows that it has more robustness in high SNR environmnet compared to MMA.
An Iterative Data-Flow Optimal Scheduling Algorithm based on Genetic Algorithm for High-Performance Multiprocessor
Chang, Jeong-Uk ; Lin, Chi-Ho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 115~121
DOI : 10.7236/JIIBC.2015.15.6.115
In this paper, we proposed an iterative data-flow optimal scheduling algorithm based on genetic algorithm for high-performance multiprocessor. The basic hardware model can be extended to include detailed features of the multiprocessor architecture. This is illustrated by implementing a hardware model that requires routing the data transfers over a communication network with a limited capacity. The scheduling method consists of three layers. In the top layer a genetic algorithm takes care of the optimization. It generates different permutations of operations, that are passed on to the middle layer. The global scheduling makes the main scheduling decisions based on a permutation of operations. Details of the hardware model are not considered in this layer. This is done in the bottom layer by the black-box scheduling. It completes the scheduling of an operation and ensures that the detailed hardware model is obeyed. Both scheduling method can insert cycles in the schedule to ensure that a valid schedule is always found quickly. In order to test the performance of the scheduling method, the results of benchmark of the five filters show that the scheduling method is able to find good quality schedules in reasonable time.
Design and Implementation of IoT Middleware Using Data Refinement Scheme based on IETF CoAP
Wang, Jian ; SaKong, June ; Kwak, Ho-Young ; Kim, DoHyun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 123~128
DOI : 10.7236/JIIBC.2015.15.6.123
Recently, a communication protocol for connectivity between various sensors and actuators is issue the key technology in IoT(Internet of Things). IETF(Internet Engineering Task Force) CoAP(Constrained Application Protocol) protocol supports the communication between things like sensors and actuator nodes in a limited environment. Smart-phone will work for the data processing of the sensors and the management of IoT nodes at the next generation communication environment. In this paper, we design the connection for smart-phone and IoT node based using IETF CoAP protocol, and implement the middleware with the proposed data refinement on smart-phone. The middleware detects and eliminates a error data and duplicated data using the proposed data refinement. The proposed data refinement scheme supports to transfer a reliability information in the constrained environment.
Buffer Cache Management of Smartphones Exploiting Write-Only-Once Characteristics
Kim, Dohee ; Bahn, Hyokyung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 129~134
DOI : 10.7236/JIIBC.2015.15.6.129
This paper analyzes file access characteristics of smartphone apps and finds that a large portion of file writes are performed only once. Based on this observation, we present a new buffer cache management scheme that considers this characteristics. Buffer cache improves storage performance by maintaining hot file data in memory thereby servicing subsequent requests without storage accesses. However, it should flush modified data to storage in order to resist system crashes. The proposed scheme evicts cache data that has been written only once upon flushes, thus improving cache space utilization. Simulation experiments show that the proposed scheme improves cache hit ratio by 5-33% and power consumption by 27-92%.
A Transformation Method of Polygon Data for Visualization of Height Map in SEDRIS
Son, Hyun-Seung ; Kim, Young-Chul ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 135~140
DOI : 10.7236/JIIBC.2015.15.6.135
The Cyber-Physical Systems (CPS) complexly perform modeling and simulation (M&S) for the various embedded systems. In this case, due to use diverse formatted models, we suggest to apply with the SEDRIS to systematically manage the different formatted data on M&S. The SEDRIS can reduce time and cost with reusing and interoperating environment data developed in the specific domain. To do this, we should input the data transformed the height map for terrain representation in a simulator into raster data of SEDRIS for which interoperate between the existed simulator and the SEDRIS. To solve the problem, we propose the transformation method to transfer the polygon data from RAW file used in terrain representation. With the proposed method, we can provide two advantages. First, it can possibly express the environment data into SEDRIS. Second, we can see the terrain like an image file through a viewer. Therefore, even non-expert easily constructs the terrain environment data.
Development of Voice Signal Detection System using FPGA
Kim, Jang-Won ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 141~146
DOI : 10.7236/JIIBC.2015.15.6.141
In order to classify and analyze variously compounded sound and voice signal from FPGA microphone, there are numerous systems to detect abnormality signal, however, they have a lot of problems to implement the abnormality signal detection efficiently and effectively. Therefore, we proposed a method that implements classifying the signal effectively and outputting the detection efficiently based on the algorithm applied FIFO structure (First-in First-out) by using microphone sensor which able to input the sound signal, and statistical variance and coefficient of variation (CV). The result showed 96.3% detection when the experiment was performed more than 100 times with the proposed algorithm applied system.
Measurement of S/W Development Processes and Maturity using Agile Methodologies
Kim, Tai-Dal ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 147~154
DOI : 10.7236/JIIBC.2015.15.6.147
Recently agile development process became increasing effectiveness, quality, attention to experts in customer satisfaction, as evidenced in this methodology when selecting projects promoting productive efficiency. With regard to contemporary needs and user requirements on the methodology selected to meet this paper is the product based Cross functional team suggested methodology Feature Team model to solve problems of this model, and organizing the Cross functional team, this team but this outcome (product) basis, were examined for the model that points to progress the development across multiple product as a functional unit, value-driven agile project through the Skills-based model and proposed a difference. And it examined the Agile Maturity metrics. PRINCE2 Agile Health-check entries future development direction of Agile techniques is a requirement of the project outset has studied the subject objective evaluation by the assumption that they can be changed at any time, not fixed this way and for the project team through research The proposed.
A Study on Dynamic Trigger Threshold in Indoor Positioning System
Oh, Jongtaek ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 155~161
DOI : 10.7236/JIIBC.2015.15.6.155
As the popularity of the smartphone becomes increase, indoor smartphone positioning technology has been actively studied. The acoustic signal generated from the smartphone is received from the several microphones at the relative positioning system, and the trigger signal is proposed to mitigate the multipath effect and the effect is verified. But for the simple trigger method, there would be error occurred according to the variation of the distance or surrounding noise. In this paper, in order to resolve the problems, the dynamic trigger threshold technology is proposed and its effect is verified by the experiment.
A Study on Security Weakness and Threats in Personal Health Record Services
Yi, Myung-Kyu ; Hwang, Hee-Joung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 163~171
DOI : 10.7236/JIIBC.2015.15.6.163
Personal Health Records(PHR) service offers patients a convenient and easy-to-use solution for managing their personal health records, crucial medical files, and emergency contacts. In spite of the indispensable advantages, PHR service brings critical challenges that cannot be avoided from consumer side if the security of the data is concerned. The problem of user`s privacy infringement and leaking user`s sensitive medical information is increasing with the fusion of PHR technology and healthcare. In this paper, therefore, we analyze the various security aspects that are vulnerable to the PHR service and needed to be resolved. Moreover, we analyze the security requirements from the point of view of the PHR users and application service providers and provides the PHR security mechanism for addressing PHR security threats and satisfying PHR security requirements.
A Security Labeling Scheme for Privacy Protection in Personal Health Record System
Yi, Myung-Kyu ; Yoo, Done-sik ; Whangbo, Taeg-Keun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 173~180
DOI : 10.7236/JIIBC.2015.15.6.173
The advent of personal healthcare record(PHR) technology has been changing the uses as well as the paradigm of internet services, and emphasizing the importance of services being personalization. But the problem of user`s privacy infringement and leaking user`s sensitive medical information is increasing with the fusion of PHR technology and healthcare. In this paper, we propose a security labeling scheme for privacy protection in PHR system. In the proposed scheme, PHR data can be labeled also manually based on patient`s request or the security labelling rules. The proposed scheme can be used to control access, specify protective measures, and determine additional handling restrictions required by a communications security policy.
Performance Evaluation and Analysis of NVM Storage for Ultra-Light Internet of Things
Lee, Eunji ; Yoo, Seunghoon ; Bahn, Hyokyung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 181~186
DOI : 10.7236/JIIBC.2015.15.6.181
With the rapid growth of semiconductor technologies, small-sized devices with powerful computing abilities are becoming a reality. As this environment has a limit on power supply, NVM storage that has a high density and low power consumption is preferred to HDD or SSD. However, legacy software layers optimized for HDDs should be revisited. Specifically, as storage performance approaches DRAM performance, existing I/O mechanisms and software configurations should be reassessed. This paper explores the challenges and implications of using NVM storage with a broad range of experiments. We measure the performance of a system with NVM storage emulated by DRAM with proper timing parameters and compare it with that of HDD storage environments under various configurations. Our experimental results show that even with storage as fast as DRAM, the performance gain is not large for read operations as current I/O mechanisms do a good job hiding the slow performance of HDD. To assess the potential benefit of fast storage media, we change various I/O configurations and perform experiments to quantify the effects of existing I/O mechanisms such as buffer caching, read-ahead, synchronous I/O, direct I/O, block I/O, and byte-addressable I/O on systems with NVM storage.
Design of Dynamic Buffer Assignment and Message model for Large-scale Process Monitoring of Personalized Health Data
Jeon, Young-Jun ; Hwang, Hee-Joung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 187~193
DOI : 10.7236/JIIBC.2015.15.6.187
The ICT healing platform sets a couple of goals including preventing chronic diseases and sending out early disease warnings based on personal information such as bio-signals and life habits. The 2-step open system(TOS) had a relay designed between the healing platform and the storage of personal health data. It also took into account a publish/subscribe(pub/sub) service based on large-scale connections to transmit(monitor) the data processing process in real time. In the early design of TOS pub/sub, however, the same buffers were allocated regardless of connection idling and type of message in order to encode connection messages into a deflate algorithm. Proposed in this study, the dynamic buffer allocation was performed as follows: the message transmission type of each connection was first put to queuing; each queue was extracted for its feature, computed, and converted into vector through tf-idf, then being entered into a k-means cluster and forming a cluster; connections categorized under a certain cluster would re-allocate the resources according to the resource table of the cluster; the centroid of each cluster would select a queuing pattern to represent the cluster in advance and present it as a resource reference table(encoding efficiency by the buffer sizes); and the proposed design would perform trade-off between the calculation resources and the network bandwidth for cluster and feature calculations to efficiently allocate the encoding buffer resources of TOS to the network connections, thus contributing to the increased tps(number of real-time data processing and monitoring connections per unit hour) of TOS.
Automatic Billing System of Public Transport using Beacon
Park, Hyun-Hwa ; Lee, Jae-Hyun ; Han, Hyun-Mi ; Lee, Hyun-Jung ; Jee, Innho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 195~200
DOI : 10.7236/JIIBC.2015.15.6.195
As mobile equipments have been developed while we use public transport, several applications for knowing arrival informations of public transport have happened. But these only provide public traffic informations simply, these solving applications for problems and inconvenience that we ride/get off public transport do not exist. These inconveniences are occurred mainly on tagging card, when tag error or without advanced preparation are happened, these caused for delay while we use ride/get off. Also, these caused for traffic congestion. In this paper, in order to solve these problems, we use Beacon and we overcome narrow range of NFC and we implemented for Android application for decreasing delay while several people could ride/get off simultaneously.
A Study on the Generation and Processing of Depth Map for Multi-resolution Image Using Belief Propagation Algorithm
Jee, Innho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 201~208
DOI : 10.7236/JIIBC.2015.15.6.201
3D image must have depth image for depth information in order for 3D realistic media broadcasting. We used generally belief propagation algorithm to solve probability model. Belief propagation algorithm is operated by message passing between nodes corresponding to each pixel. The high resolution image will be able to precisely represent but that required much computational complexity for 3D representation. We proposed fast stereo matching algorithm using belief propagation with multi-resolution based wavelet or lifting. This method can be shown efficiently computational time at much iterations for accurate disparity map.
A study on importance of MSDS education
Choi, Sung-Jai ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 209~215
DOI : 10.7236/JIIBC.2015.15.6.209
Following the semiconductor industry`s growing, various types of toxic gases and caustic chemicals, HF(Hydrofluoric acid), HCI (Hydochloric acid),
(Sulfuric acid), and Piranha, were using on the semiconductor manufacturing process. Therefore many gas leakage accidents that produce huge losses of lives were caused by the processes. This research deeply considers two basic solutions that the necessity of MSDS education on university for reducing damage of lives and protecting life from chemical leak accidents such as a HF accident in Gumi, Korea and the use of GHS, REACH and the comprehension of propriety about using MSDS for keeping safety from conflagrations by released poison chemical materials.
Android Remote Monitoring System of Ballast Water Treatment System
Choi, Hwi-Min ; Seo, Ji-No ; Lee, Kwang-Seob ; Kim, Seon-Jong ; Kim, Joo-Man ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 217~224
DOI : 10.7236/JIIBC.2015.15.6.217
In this paper, I describe a system for remote monitoring of devices Android-based sensor data recorded during the operation of the ballast water treatment system. The proposed remote monitoring system is Designed and implemented when a problem occurs in the ballast water treatment system installed in the vessel, provide information if you are unable to determine the cause in the field or engineer dispatch request of external. System developed is composed of a server holding the sensor data information collected from the vessel and a mobile device that is not bound to time and place. The transmission of sensor data between mobile devices and server, and is implemented by TCP/IP to transmit information securely. System is composed of request to the server from the mobile device after the user inputs the input values, to transmit the sensor data. The device provides the information of the sensor with a high level of importance to the user. Through the remote monitoring sensor information of the ballast water treatment system, the system is made to predict the failure of the sensor.
Traffic Generation Method of Sampled Values for Smart Grid
Hwang, Sung-Ho ; Park, Kyung-Won ; Park, Jeong-Do ; Song, Han-Chun ; Park, Jae-Do ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 225~230
DOI : 10.7236/JIIBC.2015.15.6.225
This study presents a method for generating IEC 61850 Sampled Values(SV) traffic by combining the emulation function of network simulator ns-3 with the actual communication equipment. For the SV traffic generation and reception, the emulation function of the network simulator ns-3 is used, while as a communication network, the actual communication equipment, switches are used. In addition, the SV traffic frames generated are analyzed, using Wireshark, and it is confirmed that the SV traffic frames are generated accurately. The method for the SV traffic generation proposed in the present study will be very useful when various SV traffics are generated under the environment of an actual substation.
A Study on Impurity Deposition using of ITO Substrate
Park, Jung-Cheul ; Chu, Soon-Nam ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 231~238
DOI : 10.7236/JIIBC.2015.15.6.231
In this paper, we have studied a sheet resistance property of N- and P-type thin films deposited on ITO glass by use of RF magnetron sputtering. The N-type samples which has the deposition condition of 150W RF power, shows the highest current value, and the samples deposited for 15 minutes shows a better Ohmic contact property. As the substrate temperature, RF power and deposition time are increased, the sheet resistance of the samples is increased, and the low sheet resistance sample shows a better I-V property. The P-type samples shows the highest current value by 150W RF power condition as similar as N-type samples. and the samples deposited for 20 minutes shows a better ohmic contact property. The sheet resistance of the both types samples is increased as increasing RF power and deposition time.
Development of UWB Sinuous Antenna with Dielectric Lens for 3~6 GHz Band Application
Lee, Dong Real ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 239~244
DOI : 10.7236/JIIBC.2015.15.6.239
Recently, Impulse radars using UWB technologies are widely use for measuring distance, or for transmitting uncompressed high resolution videos. However, since the UWB band spans over octave bands, it is not easy to design such a system. Wide band impedance matching is required for antennas and other RF area. In this study, we designed and fabricated sinuous antenna for 3~6 GHz octave band application. We also designed and attached a dielectric lens to improved the directional gain of the antenna. The gain of the antenna was 6~10 dBi. The dielectric lens attached sinuous antenna was used to transmit HD video data. The maximum reach distance was 90 meter with 10mW power.
Development of Optical Video Device for HD-SDI Video Signal Transmission
Lee, Dong-Real ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 245~250
DOI : 10.7236/JIIBC.2015.15.6.245
We have developed an optical video transmission device for HD-SDI signal transmission. The optical transmitter/receiver unit operates at DC 5 volt and small enough to be attaced near surveillance camera. They have internal voltage regulating circuits to supply 3.3V to other circuits inside the unit. The optical transmitter is composed of cable driver, laser diode driver, and laser diode. The optical receiver is composed of photodiode, limiting amp, and cable equalizer. The wavelength of the trasmitter was 1.3 um, and optical power was -5dBm, and the speed was 1.485Gbps. The receiver sensitivity was -23 dBm. We confirmed that the optical device can transmit HD-SDI video through 30 km optical fiber without any interruption.
Implementation and design of fuse controller using single wire serial communication
Park, Sang-bong ; Heo, Jeong-hwa ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 251~255
DOI : 10.7236/JIIBC.2015.15.6.251
In this paper, we propose a fuse controller which is used for storing the optimal value or the correction value for the surrounding product of the IoT applications and it is implemented serial communication circuit using a single pin. Because of the proposed single pin protocol is simpler in the hardware than the conventional
and SPI using two or more pins, it is suitable for the area of small amount of data transmission. The function of the one pin protocol is verified by logic simulation and the FPGA test board and it is fabricated using CMOS 0.35um technology. It is expected to use the IoT product that require the low power consumption and simple hardware.
Improved Valve-Point Optimization Algorithm for Economic Load Dispatch Problem with Non-convex Fuel Cost Function
Lee, Sang-Un ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 257~266
DOI : 10.7236/JIIBC.2015.15.6.257
There is no polynomial-time algorithm that can be obtain the optimal solution for economic load dispatch problem with non-convex fuel cost functions. Therefore, electrical field uses quadratic fuel cost function unavoidably. This paper proposes a valve-point optimization (VPO) algorithm for economic load dispatch problem with non-convex fuel cost functions. This algorithm sets the initial values to maximum powers
for each generator. It then reduces the generation power of generator i with an average power cost of
to a valve point power
. The proposed algorithm has been found to perform better than the extant heuristic methods when applied to 13 and 40-generator benchmark data. This paper consequently proves that the optimal solution to economic load dispatch problem with non-convex fuel cost functions converges to the valve-point power of each generator.
A Study on Analysis of Personal Information Risk Using Importance-Performance Analysis
Jeong, Su-Jin ; Kim, In-Seok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 267~273
DOI : 10.7236/JIIBC.2015.15.6.267
For newly incoming technologies owing to the advancements in information and communications technology, the new form of information occurs due to the combination form of personal information. In turn, personal information which is combination with existing personal information is on the increase. It is difficult to equalize the method in order to analysis the degree of risk for personal information because it is qualitative method which is defined on the current Personal Information Protection Law. This dissertation presents the model to assess the degree of risk by using the IPA(Importance-Performance Analysis) after measuring the importance and the weighted value for the personal information based on the existing the method of risk assessment. Through the model suggested in this dissertation, the subjective judgement can be excluded, the combination of personal information can be assessed and the standard criteria which is used as the objective indicators from the quantitative degree of risk can be suggested.
A Study on National ICT Competency Model
Kim, Jee-Hyun ; Cho, Young-Im ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 275~281
DOI : 10.7236/JIIBC.2015.15.6.275
Korea`s e-government is the world best system and the open government data field is also ranking number 1 by UN evaluation. Therefore Korea`s ICT level is ranking number 1 in the world especially in ICT (Information Communication Technology). However, in terms of national ICT capabilities, national ICT competency education is tend to perform by the simple list of courses rather than detail definition of the specific skills or training. In this paper, we define the national ICT capabilities through research and analysis of the national ICT competency model and define the relevant curriculum. This is very important to develop national ICT competency as well as ICT technologies because other countries will develop their information by learning from Korea`s ICT and e-government as a model. Therefore, we firstly study about the national ICT competency model and will be drawn from the courses required for national ICT competency model.
A Study on Threat Analysis of PC Security and Countermeasures in Financial Sector
Han, Kyung-Hee ; Kim, In-Seok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 283~290
DOI : 10.7236/JIIBC.2015.15.6.283
As society has evolved to the knowledge and information society, the importance of internal information of the company has increased gradually. Especially in financial institutions which must maintain the trust of customers, the disclosure of inside information is a big problem beyond the a company`s business information disclosure level to break down sales-based businesses because it contains personal or financial transaction information. Recently, since massive outflow of internal information are occurring in several enterprises, many companies including financial companies have been working a lot in order to prevent the leakage of customer information. This paper describes the internal information leakage incidents occurred in the finance companies, the PC security vulnerabilities exists despite the main security system and internal information leakage prevention and suggests countermeasures against increasing cyber infringement threats.
Damage Classification by Time Density Function of Ultrasonic Pulse Signal occurred at Tire
Kang, Dae-Soo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 291~296
DOI : 10.7236/JIIBC.2015.15.6.291
The tire damage classification method is researched on the periodicity detection of ramdomness ultrasonic signals to occur at the driving vehicle tire. Setting method of adaptive threshold is proposed in order to valid pulse detection by tire damage in ultrasonic noise on the road and used low pass filter for decrease signal ramdomness as preprocessing. Time interval of detected pulse is setted the density function depend on the vehicle`s speed and the method of tire damage detection is proposed that measuring the first peak`s time of time density function.The result of time density function in case of one damage material, the first peak`s time is measured within the error limit of tire`s rotation period, 169.8ms and 97.9ms and 81.8ms, about the speed of 50km/h and 80km/h and 100km/h. In case of more than one damage material, the sum of each peak`s time is measured within the error limit of tire`s rotation period about the speed.
Proposal of safe fire escape system for the day-care center and the kindergarten
Choi, Jun-Ho ; Kwon, Mee-Rhan ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 297~301
DOI : 10.7236/JIIBC.2015.15.6.297
Day-care centers and kindergartens are increasing along with the damage caused by fire year after year. Infants and toddlers have a low response capability than adults to fire situations such as heavy smoke which causes less or zero visibility thus it is difficult in evacuation route during dangerous fire situations. Because of these circumstances, teachers need to build a safe pathway signage system along with the usual fire safety training needs of infants and children. In this paper, we propose a system for fire escape which marks the escape routes and are automatically implemented through the push function that smartphone recognizes during the real-time fire situation, and establish a system that verifies its authenticity.
A component-based construction process control system for increasing modifiability
Kim, Eui-Ryong ; Kim, Sin-Ryeong ; Kim, Young-Gon ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 303~309
DOI : 10.7236/JIIBC.2015.15.6.303
The construction process and safety management are an important means of the total projects for the decision-making. As an important management tool of cost, resources and risks of the project, the analysis and evaluations are recorded as an important asset of company. Also, it has become a safety device that could reduce risk factors repeatedly by the decision-making methods for the future similar projects. Component-based software, by reusing the useful part, which was prepared without newly developing all that, by building a new software product, the long-term continuous/steady through the provision of a component-based software, by securing a sales base, it should be the development and supply a wide range of applications. In this paper, we propose the construction process control systems for increasing modifiability of process creation and modification for business efficiency in accordance with the diverse trends in the construction process as a low-cost niche through a component-based software supplier to solve these problems.
Decision-making system for the resource forecasting and risk management using regression algorithms
Han, Hyung-Chul ; Jung, Jae-Hun ; Kim, Sin-Ryeong ; Kim, Young-Gon ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 15, issue 6, 2015, Pages 311~319
DOI : 10.7236/JIIBC.2015.15.6.311
In this paper, in order to increase the production efficiency of the industrial plant, and predicts the resources of the manufacturing process, we have proposed a decision-making system for resource implementing the risk management effectively forecasting and risk management. A variety of information that occurs at each step efficiently difficult the creation of detailed process steps in the scenario you want to manage, is a frequent condition change of manufacturing facilities for the production of various products even within the same process. The data that is not contiguous products production cycle also not constant occurs, there is a problem that needs to check the variation in the small amount of data. In order to solve these problems, data centralized manufacturing processes, process resource prediction, risk prediction, through a process current status monitoring, must allow action immediately when a problem occurs. In this paper, the range of change in the design drawing, resource prediction, a process completion date using a regression algorithm to derive the formula, classification tree technique was proposed decision system in three stages through the boundary value analysis.