Earticle

현재 위치 Home

International Journal of Smart Home

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSH) [Science & Engineering Research Support Center, Republic of Korea(IJSH)]
  • pISSN
    1975-4094
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.7 No.5 (37건)
No
1

A Smartphone Indoor Positioning Method

Jaegeol Yim

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.9-18

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Location based services are very useful to human beings. The vehicle navigation service that is used by almost all drivers in the world is an example location based service. As the man made constructions are getting bigger and bigger, indoor location based services are demanded. Matter of fact, researches for indoor location based service started in the early 1990s and developing techniques with which universally available efficient indoor location based service systems can be built is one of the hottest current research issues. Considering the features of smart phones, its computing power and the sensor devices equipped on it, moreover it is one of the most popular personal belongings, we conclude that a smart phone is the most ideal device on which indoor location based service systems should be executed. Therefore, we propose a method of indoor positioning that determines the user's current position with the smart phone's sensor values. Referring to the accelerometer values, our method counts steps. With the orientation values, our method estimates the direction. With the step count and the direction, our method determines the current location of the user. Referring to the floor map, our method adjusts the user's current location from time to time. We have implemented the proposed method on Android smart phones and our test results are discussed in this paper.

2

How to Maximize the Effectiveness of Prompts in Assistive Technologies According to the Particular Cognitive Profile of People with Alzheimer’s Disease?

Jessica Lapointe, Julie Bouchard, Alexandra Verreault, Audrey Potvin, Bruno Bouchard, Abdenour Bouzouane

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.19-38

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Assistive technologies represent a potential solution to allow people with Alzheimer’s disease (AD) to remain in their home for as long as possible. They involve the use of technological devices called prompts, which aim to provide adapted cognitive assistance when needed. However, a literature review of the field revealed a predominant use of verbal prompts with little knowledge of their real effectiveness. In order to help adapting assistive technologies to the particular cognitive profile of people with AD, this paper proposes comprehensive guidelines. First, we identify the main deficits of AD that influence the effectiveness of prompts. Second, we detail which prompting strategy to use accordingly. Third, we propose an experimental protocol based on a well-known test, and new prompting software, which allows for the validation of the proposed guidelines. Finally, we present the preliminary results of a first experiment conducted in our laboratory with participants ranging from mild to moderate AD. This paper is a revised and expanded version of a paper entitled Smart Homes for People with Alzheimer’s Disease: Adapting Prompting Strategies to the Patient’s Cognitive Profile presented at the 5th International Conference on Pervasive Technologies Related to Assistive Environments (PETRA 2012).

3

Design of Distributed Sensor Stream Data Input System

Seungwoo Jeon, Bonghee Hong, Joonho Kwon, Yoon-sik Kwak, Seok-il Song

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.39-48

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Sensor networks are widely used in various environment monitoring systems. For example, in storehouse, it is used for monitoring the temperature, humidity, and carbon dioxide level inside the storehouse. Those sensing values are packaged in relatively small data, only around 100 bytes. However, we want to get those sensing values periodically every a certain cycle; every several seconds or minutes depending on the system requirement. And since in a storehouse sensor network there might be hundreds of storehouse and thousands of sensor nodes, resulting in millions of sensor data over only one day (depending on the cycle length), we are facing tremendous number of data access into the file system; using the naïve one -data one-file storing mechanism. In this paper, we are trying to design a data input system which collect and combine those individuals of sensor data into a big chunk of file and store it in HDFS, while using MapReduce framework to access and process those chunks inside HDFS.

4

Development of Service Verification Methodology Based on Cloud Computing Interoperability Standard

Kangchan Lee, Chulwoo Park, Hee-Dong Yang

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.57-66

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Recently, cloud computing has become an important new technology for the dissemination of information and it has spread dramatically into the corporate field. In order to provide more stable and advanced services for the future, greater interoperability has become a target for developers. In this study, we focused on four key capabilities in the search for greater interoperability: scalability, universality, continuity, and specialty. Cloud computing can only be considered interoperable to the extent that it incorporates these four issues. Assessing these issues comprises the methodology we propose to verify the interoperability of cloud computing architecture. Also, in order to effectively assess and implement the methodology described in this paper, there must be a stringent and detailed process of preparation, with regards to full implementation and institutionalization.

5

A Study of New Room Equalizer using Non-electronic Matching Method

Seong-Geon Bae, Ji-Kyung Kim, Jae-Pyung Kim

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.67-74

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This study proposes a room equalizer which uses a movable and variable acoustic board and revises frequency response, and is also applicable to a variety of places. When equalizing frequency response, commonly used electric graphic equalizers or parametric equalizers have the same effect as the sound signals such as audio passing through electrical elements like condenser or coil, and phase shift of audio signal occurs at this time. Accordingly, they secure frequency response by adjusting and equalizing the characteristics of sound-absorbing materials without any distortion of the original sound. Therefore, this study proposes a room equalizer that does not use these electrical characteristics, but uses non-electronic spatial matching with an excellent sound persistency rate to enable its application to various changes in space and time.

6

Adaptive Power and Rate Transmission in hybrid DS/FH CDMA Communications over Fading Channels

Ye Hoon Lee, Dong Ho Kim

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.75-82

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

We consider a hybrid direct-sequence frequency-hopped (DS/FH) code division multiple access (CDMA) communication system, where the transmission power and data rate are adapted relative to the channel variation. Instead of random frequency hopping, hopping pattern is adap- tively adjusted to obtain the maximum channel gain among available fre- quency slots. Transmission power and/or data rate are also adapted such that a target transmission quality is maintained. It is shown that the pro- posed scheme provides a higher average data rate than pure DS/CDMA with power and rate adaptations, subject to the identical average trans- mission power and bandwidth constraints.

7

Defying Gravity : A Novel Method of Converting Screen Orientation

Jaeyeon Lee, Da Young Ju

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.83-90

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Current automatic screen rotation method used for most of the mobile devices is based only on the direction of the gravity rather than a user's pose. Therefore research have been performed to find a more human-centered approach based on users' viewing directions, gestures or hand grip patterns. Among these studies, the computational complexity and power consumption were main drawbacks. In this paper, a novel method considering users' hand grip pattern was proposed by utilizing sensors on the back of the mobile phone to convert the screen orientation between horizontal and vertical. The proposed method not only reflects both users' hand grip pattern and comfortableness but also has advantages in adaptability for other flat-back mobile devices, faster computational time and lower power load in comparison to conventional methods.

8

The Tangibility and Intangibility of e-Service Quality

Yun Ji Moon

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.91-102

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This research aims to explore the effect of e-service quality on customer satisfaction and loyalty. Especially, the current paper focuses on customer perceptions and reactions to the tangible factors of e-service quality in the Business-to-Customer (B2C) area. This tangible e-service quality includes web design esthetics, ease of use, virtual tour, and visualization. In addition, intangible e -service quality involves information content, reliability, security, and customization. In order to investigate the interrelations among tangible and intangible e-service quality, customer satisfaction, and customer loyalty, the survey is conducted. Data from 468 tourists, who have purchased hotel packages during the last three months from hotel Web sites, is used for testing the hypothesized model. The result shows that the significant effect of tangible e- e-service quality on the intangible e-service quality and the significant effectiveness of e-service quality in improving customer satisfaction and loyalty.

9

Design and Implementation of In-House Electronic Money Using Java Cards

Hyun Joo Kim, Soo Jong Lee, In Chul Shin

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.103-114

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Spread of the IT and Internet served as an important turning point for consolidating digital economy growth and for building national economy’s competitiveness worldwide. Among them, emergence of e-money grew into important issue of e- commerce, and it can be considered futuristic currency revolution that replaces traditional payment methods such as cash, check and others. Recently, e-money for supporting SNS(Social Network Service) service is very popular among the young generation members. Likewise, diverse e-currencies provide many conveniences as they consolidated as a culture in our everyday life. This research designed and implementation in-house e-money using Java Card technology. In-house e-money is e-money that is used in one organization, and charging, payment, adjustment and refund take place within the organization. We focused mostly on the e-money security since e-money is personal asset. In other words, we used by realizing Java Card based technology with superb security and by developing e-money Java applet to ensure safe e-money management. Moreover, algorithm for hash encryption was applied to transmit data safely within the organization when it comes to charging, authorization, adjustment and refund. Algorithm for hash encryption was applied to transmit data safely. E-money will now consolidate its position as a part of our everyday life. Furthermore, hopefully, e- money of the in-house method will be utilized to create profit and as a new business culture.

10

Digital Watermarking for Image Tamper Detection using Block-Wise Technique

Chan-Il Woo, Seung-Dae Lee

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.115-124

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Fragile watermarking has the characteristics where the inserted watermark should be easily breakable for a trivial tampering of the image. So, fragile watermarking technique is proposed for the purpose of authentication or tamper detection. In this paper, we propose an efficient image tamper detection method using block-wise technique which is able to detect the tamper locations. In the proposed method, a digital signature is generated from the hash code of the blocks of the final level where the watermark is inserted and the blocks of the upper level where those blocks are included in the image division process and this signature is used as the watermark, which is randomly inserted into selected image blocks. As the result of experiment, the proposed method was confirmed to be able to detect the tampered parts of the image without testing the entire block of the watermarked image.

11

Effort Reduction of Unit Testing by Supporting CFG Generation and its Test Design

Hoijin Yoon

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.125-134

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The popularity of Agile Development has been increasing over the last several years. Many Agile techniques include unit testing as a basic activity. Unit testing has two characteristics: it is performed by programmers, and it is normally based on source code structures. However, the problem arises that programmers are unlikely to design structure-based tests. Test design process draws graphs that represent structures; and applies coverage criteria these graphs. The coverage criteria concept is very important in unit testing. Support tools are required, especially by programmers performing unit testing. However, the existing tools do not cover all the steps of the process. This study develops a method that fills the gap between the graph generation and the test design step. This paper We analyzes the extent to which the method decreases the effort required for unit testing, and show that the method effectively reduces the effort. The effort is measured in ManMonths.

12

Design and Analysis of Client Control System Using DNS Control Firewall

Bong-Hyun Kim, Young-Gil Park

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.135-144

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, the client control system designed for infringement blocking system development. In order words, infected with harmful files on your computer by using a user-centered information systems development and security through the design of a control system using DNS control firewall client access to the site randomly for acts that can block the under solving techniques. Design of the client control system was classified as Dynamic intrusion prevention system module design, Embedded domain name service system module design, Interlocking DNS service module design and Cert & Analysis module design. Finally, through simulation, an average of 14% was measured by abnormal packet ratio.

13

A Design of Advanced Authentication Method for Protection of Privacy in M2M Environment

Byung Wook Jin, Hyun Hahm

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.145-154

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

M2M (Machine-to-Machine Communication) refers to technologies that allow wired and wireless systems to communicate with other devices with similar capabilities. M2M has special features which consist of low electricity consumption, cheap expenses, WAN, WLAN and others. Therefore, it can communicate via a network. Also, it can handle itself without a person's management. However, it is difficult to manage and control each equipment because of the characteristics of M2M, and it succeeds the weaknesses and security threats of existing wired and wireless networks as it is still used. So In this Paper, It suggests the privacy protection technique planning among Device, Gateway and Network Domain in the M2M environment. The proposal protocol protects a privacy and it also assures a confidentiality and an integrity of the messages when it communicates through Device Domain and Network Domain by using the attribute based cryptography.

14

An Explorative Model for B2B Cloud Service Adoption in Korea - Focusing on IaaS Adoption

Kwang-Kyu Seo

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.155-164

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

As the global recession has made it more difficult for companies to invest in IT, cloud computing have emerged as a new paradigm in the business IT as green IT. Among several types of cloud services, the Infrastructure as a Service (IaaS) solution is used by many companies in Korea. The Technology Acceptance Model (TAM) and extended model have been popularly utilized for examining how users come to accept a new information technology, but have not yet been applied to IaaS adoption of B2B cloud services. This paper attempts to explore companies’ adoption behaviors toward the B2B cloud services that were recently deployed in the Korean market. Especially, we focus on IaaS among B2B cloud services provided in Korea. In order to achieve the goal, we identified key influencing factors that affect the companies’ adoption behaviors, based on an extension of the TAM. An explorative model is proposed and a number of hypotheses are tested and analyzed. The study results can not only help company users gain insights into IaaS adoption, but also help IaaS providers improve both new cloud service development and marketing strategy

15

Adapting a Novel Dual Authentication Method based on Smart Cards

Jeung-Seop Kim1, Jong-Il Kim, Chang-Jin Seo, Yong-Seok Jang

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.165-172

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, adapting a novel dual authentication method based on smart cards in public networks is proposed. This method uses the ElGamal public key cryptosystem and extend Chaum–van Antwerpen’s scheme to authenticate a signature between the signer and verifier using a dual protocol with a smart card that has tamper- resistant features. We propose the method to change the verification and disavowal protocol in Chaum–van Antwerpen’s scheme to authenticate both the signer and verifier. With these modifications, attempts to reject or deny a valid signature between the signer and verifier can be prevented or detected with high efficiency

16

An Offline Current-Mode PFM Controller for Low Power Residential LED Lighting with Primary-Side Constant Current Regulation Techniques

Yong-Rui Zhao, Xin-Quan Lai

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.173-186

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper presents an offline current-mode pulse frequency modulation (PFM) controller for low power residential LED lighting, which has a better performance and a simplified structure. A novel controller which contains Constant Current (CC) regulation technique based on auxiliary winding feedback and pulse frequency modulation (PFM) mode basing on the flyback structure is presented, which simplifies the application environment. Also, an input power adjusting technique is introduced which improves the working stability. These techniques are validated by using an integrated circuit designed in 0.5-μm 700V BCD process. In the constant area, when the input AC voltage is from 85V-220V and the load resistance is from 3Ω to 4.7Ω, the test results of actual application circuit show the constant current point is about 1A and the current ripple is about ±4%.

17

Inverter Power Monitoring System Based on VRML Virtual Reality Technology

Qing-yun Dai, Jin-dou Wang, Rui-Tao Liu, Jun-hong Cheng, Yi li, Wei-yang Wu

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.187-196

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A Inverter power monitoring system based on virtual reality is introduced. A good interactive 3D virtual scenes Based on the communication of VRML and java, can get real-time power state parameter of inverter from database. Based on the virtual scenes, a variety of monitoring functions is achieved.

18

A novel method using mode component inductance parameter of shunt reactors is presented in order to identify temporary faults and permanent faults for three-phase adaptive reclosure on transmission lines with shunt reactors at both ends. The method uses π-type equivalent model as the prototype to build parameter identification formula. When some single phase-to-ground fault occurs, the parameter identification formula of zero-mode component is built; when some phase-to-phase fault occurs, the parameter identification formula of line-mode component is built. The current of the shunt reactor is given and the inductance of the shunt reactor is taken as the unknown parameter to evaluate the difference between the calculated inductance and the actual one so as to distinguish permanent fault from transient fault. The inductance difference of the temporary fault is minute because the actual fault model is consistent with the prototype. But the inductance difference of the permanent fault is distinct because the actual fault model is inconsistent with the prototype. Results of EMTP simulation show that the proposed method is reliable and effective, and can be applied to the three-phase adaptive reclosure on transmission lines with shunt reactors.

19

Research on the Corresponding Relationship between Tool Wear Position and Chip Type in Cutting Process

Li Zhe, Li Yongfu, Zhai Quanpeng, Zheng Minli, Li Long

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.207-216

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, as workpiece lCrl8Ni9Ti for researching foundation, under turning experiments, with the high speed camera, piezoelectric dynamometer and FEM thermal imager, get relevant data from the cutting process, analyze the effect law of geometry shape and chip type from the cutting force, cutting heat, tool wear and breakage as well, in the removal process. By analyzing and summarizing the tool wear position, study the formation, curl, liquidity of chip and their influencing factors. In short, research on the corresponding relationship between tool wear position and chip type in cutting process, which provides a theoretical basis for the breakage and adhesive prediction of tool in the cutting process.

20

Using Stochastic Petri Nets for Reliability Evaluation of Subsea Annular BOP

Liu Zengkai, Liu Yonghong, Cai Baoping, Li Ju, Tian Xiaojie

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.217-224

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper performs reliability evaluation of the subsea annular blowout preventer (BOP) based on stochastic Petri nets. The presented model has been analyzed based on its isomorphic continuous time Markov chain. According to the derived equations, transient availability, reliability and MTTF of the annular BOP are obtained. Availability will reach a stable value very quickly while reliability decreases slowly over time. The effects of failure rates on MTTF are researched. The results demonstrate that in order to effectively improve MTTF, great efforts should be made to reduce the failure rates of blue pod or yellow pod.

21

A Study on the Realization of Mobile Homecare Nursing Service Based on Effective Security

Eun-Young Jung, Sung-Jong Eun, Byoung-Hui Jeong, Dong Kyun Park

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.225-238

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Demands on homecare nursing are on the rise due to increase of medical demand for the aged; however, as the homecare nursing should provide service by visiting home, there are limits in the IT infra that manages and inquires the medical information of patients in current situations. This paper developed an application for inquiring about the information of patients and homecare nursing patient clients in the middle of medical services thanks to the recent development of mobile service, and improved the safety of service by applying an effective security method suitable for mobile platform. As homecare nurses can confirm the details of homecare nursing requests, inquiries by reserved patients, progress records, etc. at home in real time, it is likely possible that a good quality of homecare nursing service that provides tailored information according to the patients’ status is realized.

22

Ontology Model-based Situation and Socially-Aware Health Care Service in a Smart Home Environment

Haesung Lee, Joonhee Kwon

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.239-250

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With the brilliant advance of ubiquitous technologies, it is possible to provide more smart and pervasive healthcare services in a smart home environment. Despite of these remarkable advances of technologies, there are few smart home-based personalized healthcare services which fully consider not only user’s current situation but also user’s social relationship. In this paper, we try to model contexts which are generally distributed in smart home environment using the ontology technology. The set of modeled contexts includes home domain-based contexts and social relationship-based contexts. Based on these context models, we can provide fully personalized healthcare service to a specific user in a smart home environment. For verifying the usefulness of the proposed smart home service, we implemented a prototype of healthcare services. Through the demonstration of the developed prototype, we know that using ontology-based context awareness model can provide situation and social-aware health care services in much pervasive way.

23

Hybrid Contents Recommendation Service Using LBS and NFC Tagging

Yoondeuk Seo, Jinho Ahn

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.251-262

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Near Field Communication (NFC) as a promising short range wireless communication technology facilitates mobile phone usage of billions of people throughout the world that offers diverse services ranging from payment and loyalty applications to access keys for offices and houses. And smartphone positioning is an enabling technology used to create new business in the navigation and mobile location-based services (LBS) industries. In this paper, we propose a hybrid contents recommendation service using LBS and NFC technology. The proposed service recommends contents using viewing path information through LBS and viewing exhibits information through NFC. It might recommend the contents which user likes among the tagged information. Furthermore, it can recommend contents related with exhibits which are the user`s favorite, but not tagged by the user. So, it recommends appropriately the contents which is right for the user`s taste.

24

FDS Simulation High Rise Building Model for Unity 3D Game Engine

Yongzhe Xu, Eunju Kim, Kyunjoo Lee, Jaesug Ki, Byungsoo Lee

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.263-274

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Smoke simulation is an interesting topic in simulation fluid dynamics and graphics area. Stack Effect Fire model was happened in fire of High Rise building. Simulation this fire model and smoke scene is one of the most challenging tasks in fluid dynamics of computer graphics area. In this paper proposed Smoke simulation rendering is based on game engine of particle system. But common game engine don’t have stack effect model and compute coordinate position algorithm. Recently proposed method based on FDS’s (Fire Dynamic Simulation) result Excel file which improves Unity 3D game engine for stake effective fire model and smoke boundaries. Using Excel file coordinates to improve Unity 3D game engine particle system, and changes the original game engine particle system, over the coordinates of particles moving location, boundary and fire model stake effect look like real world fire model. Recently game engine computer graphic researcher usually control computing resources focused on smoke visualization skip fire effect and physically problem. In this paper, need focused on smoke location boundary and fire model stake effect. The proposed method can change smoke and fire model of stack effect and particles more accurately and efficiently than other, rendering is implemented by making smoke particles and physically effect. After putting the coordinate form FDS into Unity3D game engine Experiment performance result shows particles more look like reality, and gives neutrality and reality to user's view. This algorithm problem is from simulation high rise building mesh with loading time need more computer resource, and need to change some effect in Unity 3D game asset.

25

Precise Attitude Control System Design for the Tracking of Parabolic Satellite Antenna

Myeongkyun Kim, Jinsoo Kim, Oh Yang

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.275-290

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper parabolic satellite antenna aims to track the precise location of a moving ship or, in the car that can be used to design the system. That was previously used with the reaction rate of a stepping motor, BLDC motor, in order to suppress the noise two-axis control and a separate encoder to the six degrees of freedom motion system was implemented in a precise location. In order to overcome various disturbances gyro sensor Yaw, Pitch, Roll 3 axes were used. To respond immediately to the disturbance at the same time, two-axis motor by controlling the precise location of the system was designed to compensate instantaneously. In addition, the circle tracking algorithm has applied for our system. We designed that the AGC signal of digital tuner quickly had gone to up to the maximum point. In order to solve the various communication errors such as moving the antenna or ground, we had designed the control system

26

Voice of Customer Analysis for Internet Shopping Malls

Chi-Hwan Choi, Jeong-Eun Lee, Gyeong-Su Park, Jonghwa Na, Wan-Sup Cho

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.291-304

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Advances in Internet and Smartphones are generating huge amount of customers’ opinion (or VOC: voice of customer) in the online world. VOC is very useful for marketing or product design departments to see the customers’ opinion for the products. In this paper, VOC in online review sites has been collected, stored and analyzed in order to find out what kind of factors can affect the customer preference for the electronics products. We have implemented a VOC analysis system that includes ETL (extract, transformation, and loading), natural language processing, positive/negative analysis, and result visualization. Sensitivity adjectives and synonyms are collected and stored as a database for more correct sentiment analysis. Real experiment for VOC data with 39 Giga bytes from well-known review sites in Korea shows that the correctness for the classification of the positive/negative sentences and the causes of the positive/negative are 73% and 70%, respectively. The evaluation has been done based on the manual inspection for the analysis result

27

The Development of Mobile Movie Tracking System and App in China

Dandy Koo, Youngsik Kwak, Yoonjung Nam, Yoonsik Kwak

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.305-314

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This case study is to introduce a Mobile Movie Tracking System (MMTS) and its internal system developed by a theater company which operates 17 theaters in China. Through this case study, from a business perspective, components within the MMTS can be identified. Further, reservation information by individual and segment level can be collected through the MMTS and put into a database. Then, through mixture modeling, a list, time, and theater of recommended film contents that a mobile phone user would most likely to reserve is shown on the application screen. From an academic point of view, post-hoc segmentation such as mixture modeling has been reported frequently, but in the film industry, mixture modeling is rarely used in practice. Especially, the output example in fuzzy clustering algorithm by mixture modeling in MMTS shows the probability of when, where, and which movie a potential moviegoer choosing movies.

28

The Development of Location Decision Making Support System for Chinese Shopping Malls from the Developers’ Perspective

Youngsik Kwak, Yoonjung Nam, Yoonsik Kwak, Yongsik Nam

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.315-326

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This study aims to explore the factors that determine the attractiveness of shopping mall locations for developers, from the perspective of those who want to select site to open shopping malls in China, and to evaluate the relative importance of these factors. Through a literature review, shopping mall location, store attractiveness in the shopping mall, fit between target market customers and prices, and shopping mall image were identified as the four components in shopping mall attractiveness. The measurement variables under these constructs were also identified: size of the population within the catchment area, proximity, anchor store, tenant mix, number of stores, the shopping mall size, products, properties, and visual presentation. The preference among the four competing shopping malls in Beijing was measured after identifying the relative importance between the criteria for the four constructs and nine measurement variables through pairwise comparison using the AHP of the five experts. The researchers applied this model to four shopping malls in Beijing. Through the AHP analysis, the researchers found that the relative importance of the variables was in the following descending order: store attractiveness > fit between target market customers and prices > shopping mall image > location. Using the results, the researchers can establish a Location Decision Making Support System for shopping mall in China.

29

A Density Control Scheme Based on Disjoint Wakeup Scheduling in Wireless Sensor Networks

EunHwa Kim

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.327-336

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Since sensor nodes have limited battery power, it is desirable to select a minimum set of working sensor nodes which should be involved in sensing and forwarding data to the sink. In this paper, we propose a disjoint scheduling for density control in wireless sensor network to achieve the desired robust coverage as well as satisfactory connectivity to the sink with a small set of working nodes. Simulations showed that our scheme works well in an energy efficient fashion by turning off too many redundant nodes.

30

Miniaturized Dual-band RFID Antenna Applied for Smart Home

Yang Guohui, Wang Erchao, Tang Henghe, Ma shuang, Gu Xuemai

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.5 2013.09 pp.337-344

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

As one of the most important components in wireless communication system, antenna’s size is a limit to its further development. Two kinds of novel Radio Frequency Identification (RFID) antenna is proposed, which is base on conventional dipole antenna. Through arms carried by bending or simply fractal, its size and electrical length can be decreased compared with the same frequency of the antenna. These two kinds of symmetric antennas can realize miniaturization and dual band. Because of its small size, it could be employed by smart home. And we make change and optimization to symmetric model of the existing antennas through a large number of simulation analyses. The experiment on the processing objects shows the antennas have a good performance.

 
1 2
페이지 저장