Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Industrial Information Systems Research
Journal Basic Information
Journal DOI :
The Korea Society for Industrial Systems
Editor in Chief :
Volume & Issues
Volume 15, Issue 5 - Dec 2010
Volume 15, Issue 4 - Dec 2010
Volume 15, Issue 3 - Sep 2010
Volume 15, Issue 2 - Jun 2010
Volume 15, Issue 1 - Mar 2010
Selecting the target year
An Efficient Tag Identification Algorithm Using Improved Time Slot Method
Kim, Tae-Hee ; Kim, Sun-Kyung ;
Journal of the Korea Industrial Information Systems Research, volume 15, issue 3, 2010, Pages 1~9
In recent year, the cores of ubiquitous environment are sensor networks and RFID systems. RFID system transmits the electronic information of the tag to the reader by using RF signal. Collision happens in RFID system when there are many matched tags, and it degrades the tag identification performance. Such a system needs algorithm which is able to arbitrate tag collision. This paper suggests a hybrid method which reduces collision between the tags, and can quickly identify the tag. The proposed method operates based on certainty, which takes an advantage of tree based algorithm, and to reduce collision it selects transmission time slot by using tag ID. The simulation results show the suggested method has higher performance in the number of queries and collision compared to other tree based and hybrid algorithms.
A Method of Hierarchical Address Autoconfiguration base on Hop-count in 6LoWPAN
Kim, Dong-Kyu ; Kim, Jung-Gyu ;
Journal of the Korea Industrial Information Systems Research, volume 15, issue 3, 2010, Pages 11~21
Increase in the number of sensor nodes in sensor networks and sensor node to automatically assign addresses are needed. The method developed to address existing severe wasting, coordinators have all address information, each sensor node when addressing the shortcomings are a lot of traffic. In this paper, 6LoWPAN automatically from the sensor nodes capable of efficiently addressing Hop-Count based hierarchical address allocation algorithm is proposed. How to propose a hop-count of divided areas are separated, with no overlap and can be assigned a unique address, DAD(Duplicate Address Detection) reduced area. Perform DAD to reduce traffic, packet transmission in the IP header destination address, respectively, with a minimum 32-bit compression and packet transmission over a non-compression method to reduce the number of 11.1%.
Study on the direction of serious contents design for training skills in U-healthcare: Focused on elderly learners
Ha, Dong-One ; Lee, Chang-Jo ;
Journal of the Korea Industrial Information Systems Research, volume 15, issue 3, 2010, Pages 23~32
U-healthcare provides people with many conveniences and keeps their health. As facility centered medical environment is being changed to patient centered one, however, various problems are emerging. These problems range from institutional problems to technological, producer related, and user related ones. The researcher took interested in problems originating from users, in particular, elderly patients and guardians taking care of an elderly patient. The main focus of this study is the direction of serious contents design for training skills in HMI of U-healthcare equipment and developing emergency coping abilities. In this study, I started from research on elderly cognitive psychology and elders' motor reactions and interconnected the characteristics of various digital content forms. The results of this study are expected to be useful for the rapidly expanding elderly population and in the U-healthcare industry.
An Improved User Authentication Scheme Based on Random Nonce
Joo, Young-Do ; An, Young-Hwa ;
Journal of the Korea Industrial Information Systems Research, volume 15, issue 3, 2010, Pages 33~40
Recently Yoon et al. proposed the remote user authentication scheme using smart cards. But their scheme has not satisfied security requirements which should be considered in the user authentication scheme using the password based smart card. In this paper, we prove that Yoon et al.'s scheme is vulnerable to a password guessing attack in case that the attacker steals the user's smart card and extracts the information from the smart card. Accordingly, we propose the improved user authentication scheme based on the hash function and random nonce that can withstand various possible attacks including a password guessing attack. The result of comparative analysis demonstrates that the our proposed scheme is much more secure and efficient than the Yoon et al.'s scheme, with a trivial trade-off to require just a few more exclusive-OR operations.
An Encryption Algorithm Based on Light-Weight SEED for Accessing Multiple Objects in RFID System
Kim, Ji-Yeon ; Jung, Jong-Jin ;
Journal of the Korea Industrial Information Systems Research, volume 15, issue 3, 2010, Pages 41~49
Recently, RFID systems are spreading in various industrial areas faster but cause some serious problems of information security because of its unstable wireless communication. Moreover, traditional RFID systems have a restriction that one tag per each application object. This restriction deteriorates their usability because it is difficult to distinguish many tags without some kind of effort. Therefore, efficient information sharing of objects based on information security has to be studied for more spreading of RFID technologies. In this paper, we design a new RFID tag structure for supporting multiple objects which can be shared by many different RFID applications. We also design an encryption/decryption algorithm to protect the identifying information of objects stored in our tag structure. This algorithm is a light revision of the existing SEED algorithm which can be operated in RFID tag environment. To evaluate the performance of our algorithm, we measure the encryption and decryption times of this algorithm and compare the results with those of the original SEED algorithm.
Detecting Hidden Messages Using CUSUM Steganalysis based on SPRT
Ji, Seon-Su ;
Journal of the Korea Industrial Information Systems Research, volume 15, issue 3, 2010, Pages 51~57
Steganography techniques can be used to hide data within digital images with little or no visible change in the perceived appearance of the image. I propose a steganalysis to detecting hidden message in sequential steganography. This paper presents adjusted technique for detecting abrupt jumps in the statistics of the stego signal during steganalysis. The repeated statistical test based on CUSUM-SPRT runs constantly until it reaches decision. In this paper, I deal with a new and improved statistic
A Modified Heuristic Algorithm for the Mixed Model Assembly Line Balancing
Lee, Sung-Youl ;
Journal of the Korea Industrial Information Systems Research, volume 15, issue 3, 2010, Pages 59~65
This paper proposes a modified heuristic mixed model assembly line (MMAL) balancing algorithm that provides consistent station assignments on a model by model basis as well as on a station by station. Basically, some of single model line balancing techniques are modified and incorporated to be fit into the MMAL. The proposed algorithm is based on N.T. Thomopoulos'  method and supplemented with several well proven single model line balancing techniques proposed in the literature until recently. Hoffman's precedence matrix  is used to indicate the ordering relations among tasks. Arcus' Rule IX  is applied to generate rapidly a fairly large number of feasible solutions. Consequently, this proposed algorithm reduces the fluctuations in operation times among the models as well as the stations and the balance delays. A numerical example shows that the proposed algorithm can provide a good feasible solution in a relatively short time and generate relatively better solutions comparing to other three existing methods.
Design of resource efficient network reprogramming protocol
Choi, Rock-Hyun ; Hong, Won-Kee ;
Journal of the Korea Industrial Information Systems Research, volume 15, issue 3, 2010, Pages 67~75
Network reprogramming is a technology that allows several sensor nodes deployed in sensor field to be repaired remotely. Unlike general communication in sensor network where small amount of data is transferred, network reprogramming requires reliable transfer of large amount of data. The existing network reprogramming techniques suffers high cost and large energy consumption to recover data loss in node communication. In this paper, a cluster based network reporgramming scheme is proposed for sensor network. It divides sensor field into several clusters and chooses a cluster header in charge of data relay to minimize duplicated transmission and unnecessary competition. It increases reliability by effective error recovery through status table.
An Impact of IT Routines on Firm Performance
Kim, Gi-Mun ; Kim, Ki-Joo ;
Journal of the Korea Industrial Information Systems Research, volume 15, issue 3, 2010, Pages 77~92
The purpose of this study is to explore how IT routines influence firm performances. To do this, a research model are proposed which includes 5 constructs: firm performance, business process performance, IT infrastructure flexibility, IT personnel knowledge, and IT routines. It is presumed that the IT routines enhance other IT capabilities (IT infrastructure flexibility and IT personnel knowledge) and subsequently business process performance which in turn influence firm performance. Then, with 243 firm level data, the proposed dynamics were empirically validated and tested using PLS. The study result revealed that all the routes proposed in the model are statistically significant.