2016 (331)
2015 (305)
2014 (138)
2013 (186)
2012 (52)
2011 (18)
2010 (18)
2009 (23)
2008 (28)
2007 (21)
Analysis of Impact on Internal Organs of Obscene Videos Watching by Face Image Processing
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.1-8
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The social problems caused by watching of obscene videos which is very easy to get from communication networks and infra are increasing seriously. Above all, act of watching of obscene videos, especially the stimulated sexual urges and desire by watching obscene videos happen to the health problem of the individual as well as harming of the health of society. In that time, the researches about bad effects or impact by obscene videos watching were accomplished by surveys or based on statistical data originated from social problems such as sexual violence. In this paper, stimulated sexual urges and desire when unmarried man saw the obscene videos had any impact on internal organs on the basis of ocular inspection of Korean Oriental Medicine were investigated. In addition, in order to apply the theory of ocular inspection of Korean Oriental Medicine, a facial image processing program was developed. Finally, the impact on human internal organ by stimulated sexual urges and desire caused after watching obscene videos were identified by quantitative method.
CRM Fit and Relationship Quality in Hotel Industry
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.11-22
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Organizations have realized the importance of CRM. Even though CRM is spelled out to Customer Relationship Management, it has been overlooked the fact that the focus of CRM should be on customers and the relationship with them. As well, since the Internet has been widely used as a very effective medium for interacting with people no matter where they are and when it is, it is a useful tool to interact with customers. Therefore this study examined CRM practice and the Internet usage based on relationship quality and relational benefits theories. This study attempts to examine the effect of the FIT between each stage of CRM process and Internet usage for each stage. CRM Fit and relationship quality variables have been identified from the aspect of customers who have membership of a certain hotel. The results showed that the Fit for the maintenance stage has a positive effect on Commitment, which leads to Loyalty. Customer Orientation was also found significant to influence Satisfaction and Commitment. Interestingly Termination stage has a positive effect on Commitment while it has a negative effect on Satisfaction.
Activity Recognition In Smart Home Using Weighted Dempster-Shafer Theory
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.23-34
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Smart homes are equipped with a variety of sensors to monitor the human activities. The information gathered from the heterogeneous sensors may not be always reliable and have different degrees of uncertainly. One of the most important techniques have been proposed to deal with uncertainty is Dempster-Shafer Theory (DST). In this paper, aims to define more precise sensor reliability and decrease uncertainty in sensor data in the activity recognition process within smart home. In the proposed method, in training step some models are built for per activity according extracted features from training samples and then in the prediction step when a new signal sensor is observed, the features extracted from that signal and applied to models and a weight is calculated for that sensor. These weights are considered as sensor reliability and uses in the decision making process.
Meta-Analysis on Relations between E-Learning Research Trends and Effectiveness of Learning
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.35-48
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This study seeks to investigate research trends on e-learning in Korea for the past 10 years and meta-analyze relations between e-learning and its effectiveness with an eye on confirming the effectiveness of e-learning. The analysis showed that there is a high correlation between changes in the society’s overall interest in e-learning and the number of published papers on related subjects(r=.672). Early on, researches focused on applicable areas for e-learning, but the focus gradually shifted towards design. In terms of research method, survey based on paper questionnaires or data analysis on research subjects showed a high percentage (49.3%), and research areas have been found to be meaningfully related to research methods (Fisher’s exact test: 42.019, p=.012). Overall effectiveness of learning through e-learning proved positive, but the mean effect size was somehow small (Mean ES=.301). When e-learning’s effectiveness was studied in consideration of learners’ background variables and e-learning environmental variables, the latter was found to have a greater effect.
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.49-58
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The purpose of this study is to verify the structural relationship among affective characteristics, cognitive characteristics, students’ participation, and course-retaking intention in e-learning environment. Web survey was conducted from one university in Korea and 210 students participated in this survey who already took e-learning courses. A hypothetical model was proposed, which was composed of affective characteristics, cognitive characteristics as a extraneous variable, and students’ participation, course-retaking intention as endogenous variables. Also, students’ participation has been suggested as a intervening endogenous variable. The results of this study through structural equation modeling analysis are as follows: First, affective characteristics affect students’ participation, course-retaking intention. Second, cognitive characteristics affect students’ participation but doesn’t course-retaking intention. Third, students’ participation mediated between affective characteristics and course-retaking intention. But it doesn’t mediate between cognitive characteristics and course-retaking intention. Implications based on research results are as follows: Affective characteristics of the learners should be considered for students’ participation and course-retaking intention.
Study on Communication of Characteristics Smart Learning from UX Perspective
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.59-72
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Researches on smart learning have so far focused on e-learning contents, infrastructure, and the quality of teaching and learning method. This thesis based on the stance that, as smart learning is mainly practiced through smart devices people carry with them every day, its platform evaluation should go beyond just simple evaluation of content effectiveness but to more diversified aspects such as users’ feeling, association, and difference. And such smart learning analysis and evaluation should be connected to subsequent emotional UX management and brand asset management that serve as strategic guidelines for mobile telecommunication op erators’ platform business and e-learning content production. This study examined more customized functions of mobile telecommunication operators’ smart learning platform services currently available in the market by considering the perspective of the emotional UX. By doing so, this thesis sought to make some strategic approaches to create values. We, for the purpose of this study, selected T-smart learning of SK Telecom, the first South Korean mobile telecommunication carrier to launch a smart learning platform. For case analysis, we employed Yin’s theory, adopted the explanation research method to interview involved officials and users and recorded interview details and resulting reports by using the case study method. In addition, based on previous studies and in the perspective of emotional communication rather than technological perspective of Smart Learning, it drew four categories: (1) interdisciplinary, (2) customized management, (3) motivation, and (4) knowledge network. The characteristics of SK T-learning UX factor was interpreted on the basis of Oral- Formulaic Theory by Ong, Walter J (1995). As a result, it was revealed that oral-formulaic characteristics were found in the Smart Learning factor in the smart environment. Also, it was found that the oral-formulaic characteristics were in the same context with the smart characteristic of smart learning.
PC & ARM-based Design of Remote Control System for Intelligent Home
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.73-80
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The core processor of this system is S3C44B0X, the kernel of which is ARMTTDMI. External extension Flash, SDRAM and an Ethernet interface are used to provide remote PC Internet access. Self-made Humidity & wind speed sensor is used to collect environmental data, with stepper motors and relays as the executing agency to control the plant object. With regard to software, vectoring procedure boot loader and operating system uClinux are transplanted to development platform. Meanwhile, an embedded web server is built by way of Boa and CGI to uclinux. Website programs based on embedded web server are written to receive user requests, return to the page and call the relevant subprograms (collection and control) and ultimately meet intelligent home system requirements for remote network control.
Smart Learning System using Contents Adaption Method
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.81-90
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The rapid progress of IT technologies promoted the foundation to offer users 'Any Time, Any Where, Any Service', and mobile wireless internet services. Cellular phone is evolving to the form of smart phone. In the future visual telephone service or DMB service use is on the rise. Furthermore, it can become representative terminal of smart learning. Increasing content is available on the Internet, and there is a growing need for mobile access. Users can access Internet contents through various devices and networks. Today’s mobile world is composed of various networks and devices with different characteristics. Progressive learners want to access and utilize services and information content using all available devices. This smart learning environment can help to increase interest in learning English and develop one’s ability. To solve these problems and produce a superior system, we propose an Intelligent Tutoring System (ITS) for learning English that uses multi-modal technology. By overcoming mobile environment limitations and using appropriate mobile contents and content negotiation; and adaptation strategies, the proposed system provides an effective learning method based on ITS-supported teacher’s role.
Implementation of Privacy Policy-based Protection System in BEMS based Smart Grid Service
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.91-100
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The fact that the information can be collected not only by the government and power companies but also individual users adds seriousness to the problem. In this paper examined this issue by focusing on the load management system based on BEMS that uses the privacy policy-based protection system in the smart grid environment. The structure of the privacy policy-based protection system using load management system in the smart grid environment is the structure that serves data in the load management system to the web through the application service network. For this, the privacy policy-based protection system suggested and developed the smart grid privacy policy-based protection system which controls service access by protecting items related to the personal information of the user and setting the privacy protection level for each item.
Kindergarten Teachers’ Understanding on Multimedia Application
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.101-110
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The study conducted a survey targeting a total of 161 currently in-service teachers in early childhood education institutes in Daejeon and Chungnam area in order to understand the teachers’ recognition and present status on multimedia activity that would be frequently performed in the early childhood education institutes. For the data analysis, frequency analysis was carried out with SPSS 17.0. First, the teachers’ interest level in multimedia educational activity in the early childhood education institutes was examined. According to the results, most of the teachers answered that they would have average interest in such activity which proved that the teachers are willing to know about multimedia educational activity in some degree. Second, how the multimedia is being actually used in the real field was observed. The findings reported that in a classroom, no multimedia region as an interest region was discovered, and as a result, more than half of the institutes were reported to possess computers. In addition, when multimedia activity is conducted, the teachers would basically choose a large group type the most while most of the activities for those preschoolers are instructed by homeroom teachers. When it comes to give instructions during multimedia activity, the teachers were observed to mostly use references and data from the Ministry of Education and the Internet. Third, the teachers understand that three, four and five-old preschoolers would benefit the most from the multimedia education. They added that they are adopting the multimedia activity into teaching because such activity feels convenient to conduct as the preschoolers would take a great interest in the activity. Moreover, the teachers understand that those multimedia activities in current practice are proving their necessity to be used in teaching and learning to some degree saying that the preschoolers would have certain experiences that would be available only through multimedia activity. Fourth, regarding benefits that the preschoolers would receive during multimedia activity, the teachers mentioned that the preschoolers would have various experiences even if they are indirect ones. The teachers also understand that the preschoolers would not feel distant from multimedia as they get to have an interest in learning with multimedia provide them with chances to learn with various learning materials.
Research on Regression Testing Methods for Industry Applications
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.111-122
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This research discusses the problems about scope accuracy and quality control in application of regression testing in the engineering practice, and proposes a practical regression method, combing with change-impact-analysis, business rules model, cost risk assessment and test case management. This approach has already been applied to functionality testing of some core systems in our domestic financial institutions, and made great achievement.
A Study on Smart Phone Use Condition of Infants and Toddlers
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.123-132
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This study investigated the smart phone use condition of infants and toddlers, and mothers’ perception of their children’s smart phone use, including the role of a mother’s parental efficacy in making difference in the smart phone use condition of infants and toddlers. Parents whose children go to childhood education institutes in D and I cities were selected as research subjects. The total number of the children was 500, and with collected data, frequency analysis and difference verification were carried out by using SPSS program. The results of study showed that infants and toddlers most frequently used smart phones at home with their mothers, and toddlers used smart phones more than infants did, and infants and toddlers used smart phones ‘less than 5 times a week’ , with average 1hours a day. Secondly, analysis of mothers’ perception of infants and toddlers’ smart phone use indicated that the need of their children was the most influential factor. And mothers who said their kids needed a smart phone considered it a useful learning tool, but others opposed smart phone use because of its negative effects on children’s physical and cognitive development. Among many programs, cartoon animation was most frequently used with smart phones, contrary to the infrequent use of educational contents. Thirdly, the difference in smart phone use condition according to parental efficacy of mother showed that there was a significant difference between the number of use and average use hours.
Incremental Weighted Mining based on RFM Analysis for Recommending Prediction in u-Commerce
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.133-144
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper proposes a new incremental weighted mining based on RFM((Recency, Frequency, Monetary) analysis for recommending prediction in u-commerce. Association rules search for the associated item set on large database. Association rules are frequently used by the marketing pattern analysis in e-commerce, recommendation to promote for selling a product in marketing. The proposing method can extract frequent items and create weighted association rules using incremental weighted mining based on RFM analysis rapidly when new data are added persistently in order to predict frequently changing trends by emphasizing the important items with high purchasability according to the threshold for creative weighted association rules in u-commerce. To verify improved better performance of proposing system than the previous systems, we carry out the experiments in the same dataset collected in a cosmetic internet shopping mall.
Design Study of the U-city Home Network Architecture of Cloud Computing
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.145-156
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
According to the recent advancement of wired and wireless communication network technology such as mobile communication and high-speed Internet, home network service based on Internet information appliance makes great strides. Particularly, the UPnP based technology that guarantees QoS for heterogeneous devices is now applied to the development of various home network services, on the other hand, is very difficult for individual user to find any service of appliance they need and it would take a lot of time. Hence, this paper defines a new paradigm as Electronic as a Service using cloud computing for next-generation ubiquitous network environments and propose new U-City home network architecture. The system shows that ubiquitous services can be provided to users effectively in a Home network environment. The performance of the developed proposed system is observed by measuring the data processing time. The system shows that ubiquitous services can be provided to users effectively in a Home network environment.
An Indoor Hybrid Localization Approach Based on Signal Propagation Model and Fingerprinting
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.157-170
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
RFID-based location awareness is becoming the most important issue in many fields in recent years, such as ubiquitous computing, mobile computing. In indoor localization systems RSSI-based methods are usually used in office buildings. However, RSSI is susceptible to external influences, and performances unstably due to the environmental factors affecting signal propagation. In this paper, we propose a new hybrid localization method for tracking moving object using the two typical methods which are signal propagation model and fingerprinting. According to a threshold which is defined as an effective working distance of signal propagation model between target tag and RFID reader, we choose the different localization algorithm to estimate the location of moving object. The threshold is obtained by calculating the slop of signal attenuation curve. If the distance is within the effective reading range of RFID reader, we revise signal propagation model by maximum likelihood estimation and use it to calculate the object position by minimum cumulative error. Otherwise, the fingerprinting location method is used in the external area, and the particle filter is also used as the core algorithm. The experimental results show that our method not only reduces the computation complexity but also ensures the accuracy in large indoor area.
Product Line Pricing Effect Modeling for Shipment Timing Support System for Stored Apple
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.171-180
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The purpose of the study aims to develop comprehensive modeling alternatives for intra- product line pricing effect and compare the explanation power among them. The researchers want to include the highest explanation power model for Shipment Timing Support System for stored apple. Five intra-apple pricing models were developed and applied to the wholesale price data with four graded Fuji apple announced by SAMPC in Korea. Five intra-apple pricing model divided into three dichotomies: the first model for price level effect with proportional response, the second and third models for price gap effect with proportional response, and the fourth and fifth models for price gap effect with non-proportional response. The result showed that the modeling of the price gap between excellent grade and three lower grade apples with proportional response showed the highest adjusted R2 among five models. This result implies that the interdependency among apple grades has the proportional response to price difference instead of non-proportional response to price difference among apple grade.
Programmable RF Built-In Self-Test Circuit for 5GHz Wireless LAN
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.181-190
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper proposes a new programmable RF Built-In Self-Test (BIST) circuit for 5GHz Wireless LAN. It is fabricated using 0.18-μm SiGe technology. This circuit is useful for testability of GHz-band RF IC devices in a complete RF transceiver environment. The proposed circuit helps it to provide DC output voltages and accurate phase difference. It contains two peak detectors and a phase detector. The proposed circuit showed excellent performance.
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.191-200
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper provides a framework for evaluating the error rate performance of decode and forward (DF) relay cooperative transmission in the presence of channel estimation (CE) error caused by pilot symbol assisted-channel estimation (PSA-CE) schemes over Rayleigh fading channels. Average bit error rate (BER) and average symbol error rate (SER) are expressed as the well-known closed-forms by using error-events at relay nodes and moment generating function (MGF) of the received signal-to-noise ratio (SNR), which quantifies the SNR penalty arising from CE errors. Moreover, the effects of erroneous detection and transmission at relay nodes are verified in terms of both the combined SNR and the average error rate, and cooperative diversity is observed from closed-form error rate expressions. Simulation results are finally presented to validate derived analytical performance ma-trices.
Design and Implementation of Security Systems for Smart Home based on GSM technology
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.201-208
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Security has becoming an important issue everywhere. Home security is becoming necessary nowadays as the possibilities of intrusion are increasing day by day. Safety from theft, leaking of raw gas and fire are the most important requirements of home security system for people. A traditional home security system gives the signals in terms of alarm. However, the GSM (Global System for Mobile communications) based security systems provides enhanced security as whenever a signal from sensor occurs, a text message is sent to a desired number to take necessary actions. This paper suggests two methods for home security system. The first system uses web camera. Whenever there is a motion in front of the camera, it gives security alert in terms of sound and a mail is delivered to the owner. The second method sends SMS which uses GSM-GPS Module (sim548c) and Atmega644p microcontroller, sensors, relays and buzzers.
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.209-216
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Mobile devices are very popular electronic tools in modern life. Therefore researchers develop new services based on mobile device. The many fields of these services support 3-dimensional environment to enhance the feeling of reality. However input facilities equipped in mobile device have constraints to control the location of objects in space simulated by 2-dimensional screen. In this paper, we propose new input techniques to control the location of object in 3-dimensional space. Our method traces user’s touch and move action on touch screen, decodes actions, and translates into 3-dimensional coordinates. To trace user’s touch and move action, we use one or two fingers gestures. We implement sample Android application adopting our techniques. From our experience of using sample implementations, we can know that our input method can be effectively used to control the location of object in 3-dimensional space.
Synchronizing Adaptive LPI Control Mechanism for Improving Energy Efficiency in Ethernet Switch
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.217-226
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Ethernet is one of the most widely-deployed and utilized local-loop networking technology across the world, and IEEE 802.3az working group has confirmed EEE(Energy Efficient Ethernet) standard proposal based on LPI (Low Power Idle) mode. This paper suggests Synchronizing Adaptive LPI Control Mechanism in a bid to improve the energy efficiency between interfacing terminals on Ethernet network and the Ethernet switches. This mechanism determines ON and OFF durations of consecutive cycles based on the measured incoming traffic quantities from the terminals. It keeps transferring cycle information which is the most proximate to the traffic bursting cycles while resting in idle is left to LPI mode by conveying the corresponding information to the switch. This paper conducts the performance evaluations with simulations on Poisson distribution traffic and burst traffic. The result has shown that the suggested mechanism in this paper improves the overall performance by reducing the energy consumption rate compared to the existing mechanism, keeping the average packet delay to the similar state as before.
Security Measures of Personal Information of Smart Home PC
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.227-236
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
DB servers for managing personal information have security systems for enhancing security, but security systems do not fully operate in user’s smart home PC, and it is thus necessary to analyze vulnerabilities for protecting personal information, and to study self- diagnosis of security. This study aims to search and encrypt information related to protecting personal information in a smart home PC to enhance security and to delete files so that they cannot be recovered. The analysis of vulnerabilities detected in a smart home PC aims to check user account, shared folders, service firewall, screen savers, and automatic patch updates. A quantitative analysis and expression about vulnerabilities after checking them is carried out to make and show a check list for enhancing security. Smart home PC security management is then managed and operated by a server semi- automatically. It is expected that this study will contribute to reducing financial damages and people’s distress by further protecting personal information in a smart home PC, and enhancing national cyber security.
Activity Recognition in Smart Homes Based on Second-Order Hidden Markov Model
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.237-244
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Hidden Markov Model is an important approach applied to activity recognition. In the first- order Hidden Markov Model, there is the hypothesis that the transition probability of state and the output probability of observation are only dependent on the current state of the model, which debases the precision of information extraction comparatively. In second- order Hidden Markov Model, the relevance between the current state and its previous two states is considered. Also, the relevance between the current observation and its previous state is considered. So second-order Hidden Markov Model has stronger performance of recognition of incorrect information. In my paper, second-order Hidden Markov Model is applied to activity recognition. The experiments show that our approach has higher precision than those approaches based on first-order Hidden Markov Model and based on Conditional Random Fields.
Quality Measurement for Mobile M-ERP Applications
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.245-254
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Mobile business boosting the popularization of the M-ERP(Mobile ERP) in the enterprise: The high penetration of mobile phones enables each employee to become an effective information carrier of the enterprise. The information application of the enterprise becomes more clear-cut. The mobile M-ERP pivots on the frequently changing key indexes of the enterprise operation, and takes the personalized and format-based data collection, analysis and processing platform as tool. It consolidates and unifies quickly diverse people, internal data, and external applications of the enterprise into an integrated whole, and provides real-time, key, and overall data reports to the management personnel. The recent wave of enterprise resource planning (M-ERP) systems adoption is a significant commitment of resource and may affect almost all business processes. M-ERP systems are integrated systems in that they promote cooperation among groups, teamwork, and process expertise and business knowledge. Firm that successfully implements an M-ERP system should raise revenues or decrease costs. The main purpose of this paper is to investigate the relationship among M-ERP system internal control, quality and performance in Korean firms. To investigate the relationship, the questionnaires were collected from 131 M-ERP – adopting Korean manufacturing companies. The following results were determined by verifying six hypotheses using LISREL. Internal control support perceived quality and quality support perceived performance. We expect that the results of the research can be used as the guidance of the implementation strategy of M-ERP systems. And these results provide important insights that complement extant research findings and also raise future research issues.
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.255-264
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
As the utilization range of smart devices for infrastructure has widen its application owing to flourishing of smart devices, studies on the technologies to graft IT onto underground utilities are actively carried out. In particular, as underground utilities have a characteristic of invisibility, studies on a management system converged with augmented reality are demanded for the efficient management in underground utilities. Accordingly, in this paper, we build a database of underground utilities in order to produce accurate locations and information about underground utilities in a visualized form, and by analyzing the data, build a system which automatically generates cross section of the underground utility at the location where the user requires. Also, we provide the user with efficiency in identifying accurate locations of the underground utility and in information management by producing the exact location of the underground utility as data on the basis of augmented reality and by visualizing it in realistic data.
A Novel Model for Home Media Streaming Service in Cloud Computing Environment
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.265-274
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Many people now receive various multimedia services through their personal devices via a home network. The rapid growth in multimedia content and smart devices means that multimedia services can encounter many problems in home networks. High volumes of storage capacity and processing resources are required manage these large amounts of media content. In addition, users may find it difficult to receive smooth streaming services in remote places because of limited remote access functions. To address these problems, we propose a model that uses cloud computing technology to store and manage large volumes of multimedia content. The proposed model provides remote access functions for receiving multimedia services in home networks and in wireless local area networks (WLANs). The model has four components, i.e., the Assistant Gateway, cloud server, remote controller, and media device renderer. The Assistant Gateway is an important component in the proposed model. It can access a cloud server to obtain multimedia content information before sending it to users in a home network. Thus, users can receive home media streaming services via the Assistant Gateway using a media device renderer. Based on this model, we implemented each component to support streaming service for users in remote areas.
State of the Art : Embedded Middleware Platform for A Smart Home
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.275-294
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Paradigms and techniques that have bloomed in the area of the pervasive computing are general and pertinent. Environments with loosely coupled computational hosts, running heterogeneous hardware and software, associating one another in a just-in-time manner are characteristic of pervasive computing. Pervasive computational environments, such as our future homes are a prominent example of this tendency. In this paper, we present a review of the state of the art of pervasive middleware platforms for enabling a smart home. There are numerous projects carried out by industry and academic research groups to examine embedded middleware platforms for smart homes. There are projects that consider problems ranging from software to hardware issues of smart home technology and associated issues of privacy, security, and social concerns. These projects emphasize numerous functional and non-functional requirements of a smart house. We discuss stimulating and valuable projects in the literature that addressed some of the concerns that are at the basis of the middleware platform proposal. We consider two aspects during the overview of the state of the art. First, we review a number of existing and recently funded research projects that focus on pervasive embedded middleware platforms. Second, we look at pervasive methodologies and technologies that are relevant to the middleware platform.
Implementation of a Smart VOD System Prototype
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.295-304
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Video On Demand (VOD) service that allows users to select and watch video content is the most popular IPTV service and it is known that most of Internet traffic is for VOD service. It would be very attractive if a VOD service correctly recognizes the situation where the user wants to watch a video, finds out what video the user wants to watch, and actively plays the video for the user. Our VOD system does those things and is called Smart VOD. Smart VOD is a client-server system. The client is an Android app that collects sensor values, displays a floor map, and plays a video. The main components of the server are the floor maps repository system and the VOD server. The repository system allows users to upload electronic floor maps, draws maps, retrieves the requested floor map, downloads a graphical floor map, and manages information of points of interest. The VOD manages information of users, determines user's current location, and recognizes the object that the user is watching. This paper describes implementation detail of the whole system.
Design and Implementation of Android-based Livestock Disease Forecasting System using Thermal Image
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.305-312
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In recent, domestic livestock farms are receiving enormous damages through various livestock diseases that are highly contagious such as foot-and-mouth disease and avian influenza (AI). Additionally, they are experiencing difficulties also financially as a result of decrease in income from production cost increase. This paper will propose a livestock disease forecasting system for diagnosing in advance livestock disease status in real-time through image information of livestock by using thermal image camera. The proposed system can extract livestock temperature information through images collected from thermal image camera to diagnose in advance livestock disease status through Android-based smart phone. Based on this, it is expected to contribute to the enhancement of the productivity of livestock farms and their competitiveness by minimizing damages from livestock disease by preventing disease damages in advance.
Cloud Computing based Livestock Monitoring and Disease Forecasting System
보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.7 No.6 2013.11 pp.313-320
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Cloud computing, an internet-based computing technology, is a web-based software service of calling and using programs placed in the internet utility data server via computer or mobile phone according to user's need. In this thesis, web-based cloud computing technology will be applied to livestock farms to develop livestock monitoring and disease forecasting system at existing livestock or apply to system that has already been developed. The proposed system uses column-oriented database Hadoop HBase to store and manage livestock environment & livestock database and implements livestock environment monitoring and facilities control through the parallel processing via MapReduce model. Since the proposed system is web-based, there is no server development cost when internet is connected, and livestock data is managed at the main server to efficiently and convenient manage livestock.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.