Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Industrial Information Systems Research
Journal Basic Information
Journal DOI :
The Korea Society for Industrial Systems
Editor in Chief :
Volume & Issues
Volume 17, Issue 7 - Dec 2012
Volume 17, Issue 6 - Dec 2012
Volume 17, Issue 5 - Oct 2012
Volume 17, Issue 4 - Aug 2012
Volume 17, Issue 3 - Jun 2012
Volume 17, Issue 2 - Apr 2012
Volume 17, Issue 1 - Feb 2012
Selecting the target year
Face Recognition System for Unattended reception interface
Park, Se-Hyun ; Ryu, Jeong-Tak ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 3, 2012, Pages 1~7
DOI : 10.9723/jksiis.2012.17.3.001
As personal information is utilized as an important user authentication means, a trustable certification means is being required. Recently, a research on the biometrics system using a part of the human body like a password is being attempted a lot. The face recognition technology using characteristics of the personal face among several biometrics technologies is easy in extracting features. In this paper, we implement a face recognition system for unattended reception interface. Our method is performed by two steps. Firstly the face is extracted using Haar-like feature method. Secondly the method combining PCA and LDA for face recognition was used. To assess the effectiveness of the proposed system, it was tested and experimental results show that the proposed method is applicable for unattended reception interface.
256 bit Symmetric SPN Block cipher XSB
Cho, Gyeong-Yeon ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 3, 2012, Pages 9~17
DOI : 10.9723/jksiis.2012.17.3.009
In this paper, we propose a SPN 256 bit block cipher so called XSB(eXtended SPN Block cipher) which has a symmetric structure in encryption and decryption. The proposed XSB is composed of the even numbers of N rounds where the first half of them, 1 to N/2-1 round, applies a pre-function and the last half of them, N/2+1 to N round, employs a post-function. Each round consists of a round key addition layer, a substiution layer, a byte exchange layer and a diffusion layer. And a symmetry layer is located in between the pre-function layer and the post-function layer. The symmetric layer is composed with a multiple simple bit slice involution S-Boxes. The bit slice involution S-Box symmetric layer increases difficult to attack cipher by Square attack, Boomerang attack, Impossible differentials cryptanalysis etc.
RFID Distance Bounding Protocol Using Multiple Bits Challenge and Response
Jeon, Il-Soo ; Yoon, Eun-Jun ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 3, 2012, Pages 19~26
DOI : 10.9723/jksiis.2012.17.3.019
To resist the relay attacks in RFID system, it is commonly used RFID distance bounding protocols using the round trip time measurement for 1 bit challenge and response between a reader and a tag. If the success probability of relay attacks for the 1 bit challenge and response can be reduced in these protocols, it is possible to make an efficient distance bounding protocol. In this paper, we propose an efficient RFID distance bounding protocol based on 2 bit challenge and response which is modified the RFID distance bounding protocol proposed by Hancke and Khun based on 1 bit challenge and response. The success probability of relay attack for the proposed protocol is (7/16)n for the n times of challenge and response, which is much lower than (3/4)n given by Hancke and Khun`s protocol.
The Impact of TDDB Failure on Nanoscale CMOS Digital Circuits
Kim, Yeon-Bo ; Kim, Kyung-Ki ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 3, 2012, Pages 27~34
DOI : 10.9723/jksiis.2012.17.3.027
This paper presents the impact of time dependent dielectric breakdown (TDDB, also called as gate oxide breakdown) failure on nanoscale digital CMOS Circuits. Recently, TDDB for ultra-thin gate oxides has been considered as one of the critical reliability issues which can lead to performance degradation or logic failures in nanoscale CMOS devices. Also, leakage power in the standby mode can be increased significantly. In this paper, TDDB aging effects on large CMOS digital circuits in the 45nm technology are analyzed. Simulation results show that TDDB effect on MOSFET circuits can result in more significant increase of power consumption compared to delay increase.
Driving Pattern Recognition System Using Smartphone sensor stream
Song, Chung-Won ; Nam, Kwang-Woo ; Lee, Chang-Woo ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 3, 2012, Pages 35~42
DOI : 10.9723/jksiis.2012.17.3.035
The database for driving patterns can be utilized in various system such as automatic driving system, driver safety system, and it can be helpful to monitor driving style. Therefore, we propose a driving pattern recognition system in which the sensor streams from a smartphone are recorded and used for recognizing driving events. In this paper we focus on the driving pattern recognition that is an essential and preliminary step of driving style recognition. We divide input sensor streams into 7 driving patterns such as, Left-turn(L), U-turn(U), Right-turn(R), Rapid-Braking(RB), Quick-Start(QS), Rapid-Acceleration (RA), Speed-Bump(SB). To classify driving patterns, first, a preprocessing step for data smoothing is followed by an event detection step. Last the detected events are classified by DTW(Dynamic Time Warping) algorithm. For assisting drivers we provide the classified pattern with the corresponding video stream which is recorded with its sensor stream. The proposed system will play an essential role in the safety driving system or driving monitoring system.
Design & Implementation of Extractor for Design Sequence of DB tables using Data Flow Diagrams
Lim, Eun-Ki ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 3, 2012, Pages 43~49
DOI : 10.9723/jksiis.2012.17.3.043
Information obtained from DFD(Data Flow Diagram) are very important in system maintenance, because most legacy systems are analyzed using DFD in structured analysis. In our thesis, we design and implement an extractor for design sequence of database tables using DFD. Our extractor gets DFDs as input data, transform them into a directed graph, and extract design sequence of DB tables. We show practicality of our extractor by applying it to a s/w system in operation.
Pacman Game Using Recognition of Hand Movement from Game Industry
Shin, Seong-Yoon ; Rhee, Yang-Won ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 3, 2012, Pages 51~57
DOI : 10.9723/jksiis.2012.17.3.051
Pacman is known as the terminator of the loved classic game in the world. In this paper, classic pacman game without using a keyboard or a mouse we should be able to play the game with simple hand gestures. In other words, It use motion game to be a substitute for the hand direction key using the center coordinates. Also, movements of the monster is to be replaced depending on your hand movements by extracting a pointer of hand taking pictures in the MFC dialog using Cam. In this paper, YCbCbr image is convert to RGB images to extract skin color, and multiplication operations and hybrid median filtering was used in order to obtain better images. And it is used to obtain movement of the hand area based on obtain the center of gravity of the hand region.
Cloud storage-based intelligent archiving system applying automatic document summarization
Yoo, Kee-Dong ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 3, 2012, Pages 59~68
DOI : 10.9723/jksiis.2012.17.3.059
Zero client-based cloud storage technology is gaining much interest as a tool to centralized management of organizational documents nowadays. Besides the well-known cloud storage`s defects such as security and privacy protection, users of the zero client-based cloud storage point out the difficulty in browsing and selecting the storage category because of its diversity and complexity. To resolve this problem, this study proposes a method of intelligent document archiving by applying an algorithm-based automatic topic identification technology. Without user`s direct definition of category to store the working document, the proposed methodology and prototype enable the working documents to be automatically archived into the predefined categories according to the extracted topic. Based on the proposed ideas, more effective and efficient centralized management of electronic documents can be achieved.
A Study of ERP Construction Strategies by System Factors: Based on Case Studies of Korea and China Firms
Jin, Chang-Hai ; Kwon, Young-Jik ; Cui, Jun ; Lee, Sang-Hoon ; Kim, Su-Yeon ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 3, 2012, Pages 69~81
DOI : 10.9723/jksiis.2012.17.3.069
In this paper we analyze ERP systems performance by ERP system factors in two Korea firms and two China firms and propose strategies for successful ERP systems construction. To achieve these goals we conduct a literature review in ERP success factors and implementation strategy and then conduct an empirical analysis focus on three ERP system factors, Ease of Use, Flexibility, and Utilizability of ERP systems, and comparability analysis between Korea and China firms by ERP system factors. Based on these results, we present practical guidelines to construct ERP systems successfully by three ERP system factors in this research.
A Development of Tentative Measuring items of Korean Corporate Symbolic Image using brand personality
Oh, Ju-Yeon ; Kim, Young-Kyun ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 3, 2012, Pages 83~94
DOI : 10.9723/jksiis.2012.17.3.083
This study was designed to identify and develop the measurement items of symbolic image (personality) of most preferred Korean companies in adaptation of prior research of brand personality. From the common factor analysis, factors were extracted to five dimensions: Sincerity, Competence, Affection, Excitement, and Sophistication. In this survey, we collected data from the 558 respondents and performed a structural equation model using AMOS 16.0. The result of the confirmatory factor analysis indicated that the measurement model of Korean corporate symbolic image could be effectively used to envision the personality of Korean companies with similar context of brand personality research. Furthermore, this empirical study showed interesting results. One of unique Korean emotions, affection factor, was derived from this research as well and it is also proven that the Korean-corporate symbolic image could be used to measure the corporate personality and it should be continuously reinterpreted with deviation of socio-cultural changes rather than adhering to standardized paradigm.
The Conceptual Model of a SNS Platform for Co-creation
Hong, Soon-Goo ; Kim, Hyun-Jong ; Choi, Hyung-Rim ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 3, 2012, Pages 95~104
DOI : 10.9723/jksiis.2012.17.3.095
The companies have employed SNS for marketing, promotion, and customer relationship management. The SNS is a good tool to collect customers` opinions and to collaborate with internal and external employees, however, the function of SNS are limited in implementing a co-creation. Therefore, the purpose of this research is to suggest a SNS platform for co-creation that creates a corporate`s values with customers. For this purpose, the limitations of SNS are defined and the new platform of the SNS is suggested. The proposed platform has 3 modules including integration of applications, cloud services, and integration to applications operated by companies. With a scenario method the suggested platform was validated. This is one of pioneer studies in co-creation.
An Optimization Technique for Smart-Walk Systems Using Big Stream Log Data
Cho, Wan-Sup ; Yang, Kyung-Eun ; Lee, Joong-Yeub ;
Journal of the Korea Industrial Information Systems Research, volume 17, issue 3, 2012, Pages 105~114
DOI : 10.9723/jksiis.2012.17.3.105
Various RFID-based smart-walk systems have been developed for guiding disabled people. The system sends appropriate message whenever the disabled people arrived at a specific point. We propose universal design concept and optimization techniques for the smart-walk systems. Universal design concept can be adopted for supporting various kinds of disabled such as a blind person, a hearing-impaired person, or a foreigner in a system. It can be supported by storing appropriate messages set in the message database table depending on the kinds of the disabled. System optimization can be done by analyzing operational log(stream) data accumulated in the system. Useful information can be extracted by analyzing or mining the accumulated operational log data. We show various analysis results from the operational log data.