2016 (331)
2015 (305)
2014 (138)
2013 (186)
2012 (52)
2011 (18)
2010 (18)
2009 (23)
2008 (28)
2007 (21)
Study on the OSMU (One-Source Multi-Use) Management for Smart Devices
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.1-8
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
There has been a surge in the intelligent content services in the broadcasting and communication sectors as the convergence between the contents of various industries and highly-advanced IT is gathering momentum. As a result, the users can conveniently save, distribute, and disseminate the converged contents using the smart devices that have independent platform. However, there is technical limit in achieving the continuous replay after freely converting the single content via the independent devices. Furthermore, children and adolescents are easily exposed to violent and explicit contents amid the growing distribution of smart devices. In this paper, we suggests the OSMU (One-Source Multi-Use) management framework that ensures the fast and convenient use of one single content via the heterogeneous device and the integrated content management that enables the distribution of contents by grade.
Two-party Authenticated Multiple-key Agreement Based on Elliptic Curve Discrete Logarithm Problem
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.9-18
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we propose a protocol to generate n2 keys in one session under the assumption of the intractability of the elliptic curve discrete logarithm problem and MQV protocol. Our protocol has the advantage of requiring less computing time compared with other protocols. Therefore, it is easy to apply in resource-constrained key agreement such as wireless sensor networks, mobile Ad-hoc networks, and cell phones which are severely constrained processor, battery, and memory.
Zigbee Based Home Appliances Controlling Through Spoken Commands Using Handheld Devices
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.19-26
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Home automation is a wide and varied field that involves devices as small as temperature, light and motion sensor, and as powerful as modern home appliances. In today’s world technology is available for home automation but these technologies are incompatible with each other and addresses only communication and physical media, the main objective of this work is to facilitate the user to control appliances by two ways one is remotely via voice command, second is using remote control to control the appliances which is also an override control.
Is the PMV Index an Indicator of Human Thermal Comfort Sensation?
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.27-34
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This research examined how indoor environmental variables affect the human thermal comfort sensation. To examine the effect, both subjective comfort and thermal sensation were measured by the comfort sensation vote (CSV) and the thermal sensation vote (TSV) in thermal environmental conditions during heating or cooling. CSV was used by Tanabe (1998) and TSV was defined in ASHRAE (1989). In addition, physical environmental variables such as the air temperature, relative humidity, mean radiant temperature, air velocity, and the predicted mean vote (PMV) were used as the indices of thermal comfort sensation, and then the relationships between physical environmental variables and subjective variables were examined. The results showed a significant relationship between the PMV and the TSV, whereas a significant relationship was not shown between the PMV and the CSV even if there was a significant relationship between the relative humidity from the components of the PMV and the CSV. These results imply that PMV does not reflect human thermal comfort sensation adequately, and humidity control may be important in reflecting human thermal comfort sensation in indoor environments.
A Circle-Based Data Dissemination Algorithm for Wireless Sensor Networks with Mobile Sink
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.35-46
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The topic of reducing energy dissipation and prolonging network lifetime in Wireless Sensor Networks (WSNs) has attracted much attention of researchers. A primary obstacle is the hot spot issue which means data forwarding load for nodes near sink is too much and they usually die early. In this paper, we propose circle-based data dissemination (CBDD) algorithm which utilizes mobile sink to relieve hot spot phenomenon. We assume sensor nodes are symmetrically deployed in a circle sensor field and sink moves around the circle. The sink sends a query message to a specific node for sensed data, which begins a data gathering process. All the nodes belong to different layers according to the distance to sink and the queried nodes communicate with sink layer by layer. Simulation results prove that our algorithm achieves better balance between energy dissipation and network lifetime compared with conventional approaches with static sink.
Development of Energy Saving Smart Home Prototype
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.47-66
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this work, we are interested in developing a prototype of smart home for energy saving. The prototype uses a microcontroller PIC18F458 with various sensors such as a temperature sensor, infrared sensor as well as actuators to control the lights, air conditions, as well as the fans appropriately etc. It detects the number of people in a room, adjusts a proper temperature for the air condition, turns on the fan if needed, turns on and off the light appropriately. The simple measurement shows that using the sample prototype can save the electricity cost for every test case.
Structural Damage Detection using Wireless Intelligent Sensor Networks
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.67-76
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Structural health monitoring (SHM) is the science of assessing the integrity of structures such as buildings, bridges and aerospace structures. SHM systems strive to detect and locate damage in structures as early as possible. Today most automated SHM system has been suggested that wireless sensing can potentially bring about a dramatic reduction in cost by doing away with the cabling cost. Self-organizing dense wireless sensor networks that are cheap and easy to install can potentially bring significant benefits to SHM systems. This paper introduces a wireless sensor network system based SHM, the system includes the self-developed sensor node for SHM and the artificial intelligence routing for data transmission. Using offline processing and online processing methods in artificial intelligence routing, it can discovery backbone for wireless sensor networks with low average dissipated energy and average delay.
Context-Aware Middleware Architecture for Smart Home Environment
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.77-86
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
To realize smart home vision in an equipped domain, several types of context-aware applications should be deployed. Because of complex tasks of context gathering and processing, designing context-aware applications requires middleware support. Designing a context-aware middleware is a challenging issue because of specific characteristics of context and devices such as dynamic nature of context and resource limitation of devices. Furthermore, the middleware should provide a cooperative system in which application developers could easily exchange derived contextual information. To address these issues, in this paper architectural design of a smart-home context-aware middleware is proposed, which supports cooperation among application developers. The middleware is implemented as a Java package and validated through a case study.
CS-Mobile : A Cloud-based Distributed Storage Middleware for Mobile Devices
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.87-98
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
With the development of wireless communication technology, mobile devices have played more and more important roles in the people's daily lives. However, data storage and sharing are difficult for these devices due to the data inflation and natural limitations of mobile devices, such as limited storage space and computing capability. In this paper, we present a lightweight Cloud-based storage framework, which provides an easy-to-use file navigation service for attribute-based file querying or semantic-based data retrieving. Meanwhile, it incorporates an effective mechanism for users to verify their data integrity, which can relieve much burden from mobile devices. Experimental evaluations show that the proposed framework is effective to provide flexible and reliable data sharing in mobile computing environments.
Indoor Location Estimation Using Visible Light Communication and Image Sensors
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.99-114
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
High power white LEDs are expected to replace the existing lighting technologies in near future which are also suggested for visible light communication (VLC). We proposed an algorithm for high precision indoor positioning using lighting LEDs, VLC and image sensors. In the proposed algorithm, four LEDs transmitted their three-dimensional coordinate information which were received and demodulated by two image sensors near the unknown position. The unknown position was then calculated from the geometrical relations of the LED images created on the image sensors. We described the algorithm in details. Simulation of the proposed algorithm was done and presented in this paper. This technique did not require any angular measurement which was needed in contemporary positioning algorithms using LED and image sensor. Simulation results showed that the proposed system could estimate the unknown position within the accuracy of few centimeters. Positioning accuracy could be increased by using high resolution image sensors or by increasing the separation between the image sensors.
An Interplatform Service-Oriented Middleware for the Smart Home
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.115-142
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In domotic scenarios, where ubiquitous computing pervades housing, the capability to effectually discover, integrate and coordinate different devices with diverse implementation details, communication protocols, and functionalities is a central aspect. Basing on a layered domotic architecture for smart embedded devices which builds on the paradigm of Service Oriented Computing, in this paper we focus on the pervasive layer and the requirements it has to fulfill, so as to realize a high degree of automation and serve the needs of the higher application levels of the architecture. We show how a discovery framework can take care of new devices independently of their protocols through the use of proxies. Because with the development of home network and service applications, different protocols and transmission modes are proposed. There are more digital devices and home appliances which compliance to the protocols. The proposed protocols are different and they are typically unable to interconnect with each other. We design and implement a middleware framework for smart homes to integrate protocols which are popular such as UPnP on OSGi framework and collaborating Zigbee and Bluetooth to converge various service oriented applications. Additionally, with the well-developed Zigbee and Bluetooth technology, majority of devices has been developed to support these technologies, we propose two new base drivers to integrate diverse devices communication protocol on our platform. The availability of standardized service type descriptions can further assist towards automating the tasks of integration and coordination through intelligent algorithms. From the technical point of view, the implementation builds on the OSGi/UPnP standards. An experimental setup for testing the discovery plugins for Bluetooth and ZigBee devices, along with an evaluation of the performance of the Bluetooth proxy verify that the proposed solution is a viable and effective one.
An Energy-Efficient Routing Protocol for CCN-based MANETs
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.143-152
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The content-centric network (CCN) paradigm is well suited to mobile ad-hoc networks (MANETs), because MANET scenarios are data-centric in nature. CCN-based MANETs implement named-data routing, in-network caching, and receiver-driven data dissemination. However, because resources such as energy are limited, this network faces many challenges, such as reduced lifetime of the entire network. Therefore controlling energy consumption is important for effective communication in MANETs. If popular contents are transferred repeatedly in the same routing path, each node is down by short of energy. Then node carrying data packet may fail and energy imbalance occurs in entire network. To solve these problems, using added residual energy and frequency of node usage as routing parameters, we propose an energy-efficient routing protocol for CCN-based MANETs and evaluate the energy consumption of routing protocols.
A Three Dimensional Model for Dual Polarized MIMO Channel of the Planar Array Antennas
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.153-162
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Geometry-based stochastic model (GBSM) that describes the excess delay, direction of arrival, and direction of departure of multipath has been used extensively in multiple-input and multiple-output (MIMO) channel modeling. Many two dimensional and very few three dimensional (3D) GBSMs with linear array antennas have appeared in the literature. The models lack properties of the 3D channel for dual polarized planar array antennas, which are practically used in MIMO systems due to its applicability to space division multiple access (SDMA) or beamforming in three spatial dimensions. In this paper, we propose the 3D channel model for dual polarized planar array antennas where the departure and arrival angles are modeled in both azimuth and elevation. We derive the closed form expression of the channel coefficients. Using the proposed channel coefficient, we investigate the effect of azimuth and elevation angular spread on channel capacity.
Frequency-Domain Packet Scheduling for Low PAPR in 3GPP LTE Uplink
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.163-172
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Single carrier frequency domain multiple access (SC-FDMA) has been adopted for the 3GPP long-term evolution (LTE) uplink multiple access scheme due to the power consumption issue of mobile handsets. Like OFDMA in the downlink, SC-FDMA enables multiple users to be served simultaneously in the uplink. However, all subcarriers allocated to a single user must be contiguous in the frequency domain at each time slot due to its single carrier property. This contiguous allocation constraint makes scheduling difficult. A scheduling scheme in such systems needs to keep this constraint whilst trying to satisfy its own objectives. Therefore, we propose a frequency-domain packet scheduling algorithm to lower the PAPR of the mobile handset under this constraint. In this paper, we perform system level simulation on the 3GPP LTE system model. We compare the proposed scheme and previous one in terms of system throughput, fairness, and PAPR.
Hey Home, Open Your Door, I'm Back! Authentication System using Ear Biometrics for Smart Home
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.173-182
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Conventional authentication systems use secret knowledge like password either from alphanumeric PIN to graphical click-based or pattern password that impose memory burden to users. Biometrics appears to answer the problem related to conventional system. We propose an ear biometrics as an alternative to popular facial biometrics. One of the ways to implement biometrics authentication system is by authenticating them via image or video captured using a dedicated terminal as biometrics enrolment module. This biometrics module is pricey thus adding cost to overall cost of having smart properties for people. In addition, it can be destroyed by thieves to bypass biometrics authentication after alarm system being turned off. We perceive that smartphone camera can be used as replacement of dedicated enrolment module instead. The replacement will result a biometrics enrolment terminal that is firstly mobile and automatically practical unlocking home while user is within home proximity. With location-based service (LBS) support, it can enable convenient and implicit owner authentication system when accessing the protected smart premise and property (like smart home). In a situation that user calls to home then LBS could detect user's location within close range of proximity thus authenticating a user via its front camera that faces to ear while being used on calling home. Furthermore, it is cost-efficient because eliminating the necessity to install dedicated enrolment terminal in a property like smart home. In this paper, we present a novel approach to ear biometrics which considers both shape and texture information to represent ear image during ear recognition computation for authentication. We use local invariant patterns as ear image descriptor during recognition to have lightweight but accurate ear biometrics system on securing smart homes. We improve the original local invariant against noise that may reduce accuracy in potential deterrent conditions like over noise and illumination changes.
Design of Network Adaptation Proxy for DASH Services in Wireless Networks
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.183-192
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
At present, streaming is a very popular technology by which multimedia content is delivered continuously from a server to end-users. New streaming approaches have been developed. Among of them, Dynamic Adaptive Streaming over HTTP (DASH) is aimed at providing video streaming services over HTTP (Hyper Text Transfer Protocol) in wired and wireless networks. DASH, which consists of a DASH server and client, operates mainly with the client. DASH server encodes and splits media content into segments with several bit rates. It represents encoded information as a metadata. Meantime, DASH client parses transmitted metadata from DASH server and then decides proper segments according to the current network condition. Even if DASH services are available in both wired and wireless environments, few client devices (non-DASH client in this paper) cannot support kinds of them. Therefore, we introduce and implement the design of a Network Adaptation Proxy(NAP) server for non-DASH clients by considering various network conditions with information of the data link layer in this paper. It provides stable DASH services and also guarantees the quality of the media contents to non-DASH clients.
XFS File System and File Recovery Tools
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.193-198
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
XFS file system is a designed to suppot very large system and parallelism efficiently. This is feature attracks different organizations which handle big data. Even there consumers electronic devices which use XFS file systems. But there are very few file explorer and recover tools that can work on XFS file system. In this paper we discuss major features of XFS file system and two file explore and recovey tools.
The Role of Human Capital in Entrepreneurial Process of IT Ventures in Korea
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.199-208
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This study examined public companies by comparing the effect of human capitals of entrepreneurs on each stage of entrepreneurial process in Korean venture industry. In our sample of 260 KOSDAQ-listed firms, we then sought to find what characteristics of human capitals influence each stage of entrepreneurial process. Our primary objective was to help close a research gap regarding human capital. We examined the comparative importance of various types, such as age, school prestige, educational level, related industry experience and functional background, on the each stage of entrepreneurial process. Our findings supported that the role of the youth, related industry experience and functional background in predicting who among the entrepreneurs of the sample companies would develop opportunities in IT industry. However, other human capital measure, such as school prestige and educational level, did not appear to be factors.
Detecting Trend and Bursty Keywords Using Characteristics of Twitter Stream Data
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.209-220
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Twitter is a very popular online social networking and micro-blogging service that enables its users to post and share text-based messages called tweets. The numbers of active users and tweets generated daily are enormous and hence they, collectively, can give crucial clues to several interesting problems such as public opinion analysis and hot trend detection. Especially, to find out hot issues and trends from tweets, detection of popular keywords is very important. In this paper, we propose a new scheme for detecting trend and bursty keywords from Twitter stream data. Our scheme is very robust in that it can handle typical usages such as various abbreviations, minor typing errors and spacing errors that occur very frequently when writing tweets on various mobile devices. We implemented a prototype system and performed various experiments to show the effectiveness of our scheme.
A Study on Performance Evaluation of the Human Resources Training Program
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.221-230
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
To grow a nation sustainably, it is very important to secure key talented persons taking the lead in R&D of the nation in respect of the policy. In addition, discovery of key R&D talented persons suitable for local industrial systems is needed for balanced advancement of the nation. In these circumstances, every nation and department has been implementing the R&D human resources training project to secure key R&D talented persons in the region. The exclusive organization dealing with local R&D human resources training projects could be changed according to the period and purposes. Whenever the exclusive organization is changed, the necessity has been posed to objectively analyze and evaluate the project performance and to reflect the result into a design of new project plans for checking whether the purposes and means of the project are compliant. However, the local R&D human resources training projects have applied different performance analysis models according to characteristics of the exclusive organizations and the projects, and there is no objective performance analysis framework. Therefore, this paper understood characteristics of the human resources training project to design a performance analysis model that could be used for objective analysis and evaluation. The performance analysis model was designed after considering utilization of human resources and R&D performance for the region in detail, and an empirical analysis was carried out for some projects. This could be used as an objective evaluation index for the local R&D human resources training projects, which are currently in operation or to be implemented in the future, of every nation and department.
A Study on Tachograph based Security Network
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.231-238
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Tachographs are used in vehicles for keeping track of driver’s hours and for other purposes of fraud detection, overspeeding and accident investigation.Their usage and benefits are in danger beacuse of increasing levels of frauds and manipulation.Tachograph fraud and tampering has become very common due to which the driver‘s hours and speed regulation are spurned on a large level.Most of these frauds are stimulated by economic pressure on vehicle operators and can be reduced if improved tachograph systems are introduced.Tachographs are used in vehicular environments.Vehicular communication networking is a promising approach to facilitate traffic mangement, road safety and infotainment dissemination for drivers and passengers.With the advancements in vehicular ad hoc networks, transporation safety and efficiency are at stake. Due to this fact, the security, privacy and protection of a private user have became rudimental part of the deployment of technology.The flaws in security of vehicular ad hoc networks can be exploited by even common users, who can interrupt or disable it if some strong and practical security enhancing features are not applied.In this paper we are proposing a new network for vehicular communications based on improved tachographs.The advance features in the tachographs can be helpful in the security and wireless communication vehicular Ad hoc networks.
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.1 2013.01 pp.239-252
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Previous studies on social enterprises reported that unlike private enterprise consumers, social enterprise consumers appreciate the social value of the enterprise products and that social value affects customer satisfaction and repurchase intention. However, previous literature also pointed out that focusing only on social value as the factor affecting purchase behavior does not reflect the change in the situation of social enterprises. We expect that not only social but also a variety of other value consumers perceive from the products of social enterprises influence consumer satisfaction and repurchase intention. The purpose of this study is as follows. First, we intend to find the customer value for the products and services of social enterprises. Second, we intend to examine whether the positive relationships between quality and value of products/services reported in numerous previous studies applies to social enterprises. Third, we would like to find out whether satisfaction from social enterprise products and services affect the actual repurchase intention. Finally, in order to find dynamic interaction among the variables, this study models the key flow of the factors influencing the social enterprise consumers’ repurchase intention: perceived quality → perceived value → customer satisfaction → repurchase intention. The results show that there are positive relationships between the consumer perception of quality and that of functional, emotional and social value. We also find positive relationships between the perception of functional, emotional and social value and customer satisfaction. Our findings show that the consumers of social enterprises perceive social value, along with the functional and emotional value, through the quality of products and services. The perceived value has positive effects on customer satisfaction and repurchase intention in the future. This study shows that the positive relationships between quality and value and customer satisfaction and repurchase intention found in numerous previous studies also exist in the context of social enterprises. In the last section, we discuss the practical implications for social enterprises based on the findings of our study and present the directions for future studies.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.