Earticle

현재 위치 Home

International Journal of Smart Home

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSH) [Science & Engineering Research Support Center, Republic of Korea(IJSH)]
  • pISSN
    1975-4094
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.9 No.10 (26건)
No
1

The coordinated development of industrialization, informatization, urbanization and agricultural modernization is one of the important concerns in today's China. This paper constructs a set of 4 categories and 16 indicators of evaluation system to measure the development level of industrialization, informatization, urbanization and agricultural modernization of 31 provinces, municipalities and autonomous regions in China. Based on this, provincial coupling level and coordinated development level of four modernizations are calculated by the coupling degree model and the coordinated development degree model. It discovers that the coupling degree and the coordinated development degree of the whole nation and east, central and west China have a significant rise between 2003 and 2012. In general, the coordinated development level of east China is high and that of central and west China is low. By dividing coordination level of all provinces, it discovers that the number of uncoordinated development provinces is decreasing and that of coordinated development provinces is increasing. And eastern provinces are in a leading position.

2

Middleware-based Cooperative Context Dissemination for Smart Home Application

M. Robiul Hoque, M. Humayun Kabir, Dong-Hyuk Lim, Sung-Hyun Yang

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.9-14

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A smart home service is provided by following several contexts of environment and user activities. Moreover, some contexts are common for different services. So, it is unwise to separately compute the same context for different services due to the processing time cost, here a context reusable mechanism can significantly reduce the context computing cost. For this purpose, middleware-based implementation is a good alternative. Middleware uses raw data through sensors and user profiles from database then generates context using these data, and finally conveys context to applications. In this paper, we propose a middleware architecture that shares context in a cooperative manner so that it can be reused among applications. Basically, this middleware generates a particular context at once for a time interval and disseminates among registered applications using a new mechanism. Measuring inequality of the context computing time over application-based implementation exposes the effectiveness of this middleware.

3

Study on the Dynamic of the Land Using Based on the RS and GIS Techniques

Hu Tianran, ShuliWang

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.15-26

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

4

A Two-Phase Hybrid Optimization Algorithm for Solving Complex Optimization Problems

Huiling Bao

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.27-36

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

For solving traveling salesman problem (TSP), the ant colony optimization (ACO) algorithm and simulated annealing (SA) algorithm are used to propose a two-phase hybrid optimization (TPASHO) algorithm in this paper. In proposed TPASHO algorithm, the advantages of parallel, collaborative and positive feedback of the ACO algorithm are used to implement the global search in the current temperature. And adaptive adjustment threshold strategy is used to improve the space exploration and balance the local exploitation. When the calculation process of the ACO algorithm falls into the stagnation, the SA algorithm is used to get a local optimal solution. And the obtained best solution of the ACO algorithm is regarded as the initial solution of the SA algorithm, and then a fine search is realized in the neighborhood. Finally, the probabilistic jumping property of the SA algorithm is used to effectively avoid falling into local optimal solution. In order to verify the effectiveness and efficiency of the proposed TPASHO algorithm, some typical TSP is selected to test. The simulation results show that the proposed TPASHO algorithm can effectively obtain the global optimal solution and avoid the stagnation phenomena. And it has the better search precision and the faster convergence speed.

5

A Study on the Interaction Envelop Design through Ned Khan's Works

Ri Ryu, Yongseong Kim, Janghoo Seo

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.37-46

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Since the problem of global warming has occurred in modern times, various countries in the world have implemented various policies for energy saving in buildings, and the building envelope in the aspect of eco-friendly subject called energy consumption and preservation in consideration of natural environment is being revitalized. Therefore, the purpose of this study is to analyze the concept and form of interaction envelope design applied with natural elements, which could change according to energy saving and surrounding environments, which have become issues currently. This study also aims to examine the envelope technical elements where interaction design is applied through the analysis of Ned Khan's interaction envelope cases using natural elements in this study. In the building envelope, aesthetic elements are no longer emphasized in the interaction aspect and the function to satisfy both the demands of people and energy saving at the same time is carried out in energy saving aspects. The type of building envelope applied with interaction is classified into 3 elements, including graphic element, media façade, and phenomenon element, and either artificial or natural elements of the phenomenon element. Natural elements were appropriate when the aspect of energy saving was emphasized in the modern times. The purpose of this study is to draw technology elements of applicable interaction design when carrying out the interaction design through such analysis.

6

Face Recognition in Complex Background: Developmental Network and Synapse Maintenance

Dongshu Wang, Lei Liu

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.47-62

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

As an important sub-field in computer vision and pattern recognition, face recognition has important theoretical and practical application. It is a very complicated problem which is often affected by variations in illumination condition, head pose, facial emotions, glasses, beards, and so on. 108 face images of 27 learned objects (appearances) from complex backgrounds in BioID face database are efficiently recognized with the developmental network (DN) - a biologically inspired framework with the emergent representation. But the DN has no adaptive receptive field for an object with a curved contour. Leaked-in background pixels can lead to problems when different objects look similar. This paper introduces another biologically inspired mechanism - synapse maintenance to achieve the object recognition. Synapse maintenance can automatically decide which synapse should be removed, kept or partial removed, thus it can weaken the complex background, strengthen the face features, reduce the bad influence of the complex background on the face recognition. Experimental results show that DN with the synapse maintenance can effectively recognize faces with complicated backgrounds and the recognition rate is over 95%.

7

Study on the Vulnerability Level of Physical Security And Application of the IP-Based Devices

Kwang-Hyuk Park, Il-Kyeun Ra, Chang-Soo Kim

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.63-68

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The various IP-based devices (Sensor network devices, CCTV, etc.) are provided with a specific purpose, recently, IP-based IoT (Internet of Things) devices of collecting information were studied intensively. However, these IoT devices have vulnerability of security because of CPU processing power and small storage capacity. In this paper, we analyze vulnerability of security with the classification of IoT devices and investigate the practice. And we look at the issues of vulnerability of physical security based on results of analysis. Based on this, it provides a baseline about standards of the security level of IP-based devices. Also, looking for the target and studying the ways to take advantage of this standard.

8

Research and Design on Auxiliary System for Citation Certificate of Academic Papers

Bin Lu, Changyu Liu, Weifeng Gao, Zhenbang Rong

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.69-76

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, considering the special situation of great demand for citation of academic papers in China, we design and implement a special auxiliary system of citation certificate of academic papers. At the beginning, we analyze the primary system requirements and divide the system into four functional modules, which are the EI retrieving and certificating module, the ISI retrieving and certificating module, the query as well as report module, and the original settings restoring module. Next, for the system design, we present details about these modules. Furthermore, we also illustrate the implement of the final system. The system speeds up the relevant staffs’ work and improves their efficiency.

9

Energy Efficient Traffic Allocation for Resource-constrained Multi-homed WSN Gateway

Wenhao Fan, Bihua Tang, Yuan’an Liu

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.77-86

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

WSN (Wireless Sensor Network) gateway acts as a bridge between WSN and external networks. Currently, rapid growing demands from various IoTs (Internet of Things) applications are posing critical challenges to the data transmission capability of such gateway. As a promising solution, multi-homed WSN gateway, which is equipped with multiple network interfaces, can obtain enhanced parallel data transmission by jointly utilizing multiple RATs (Radio Access Technologies). However, the multi-homed gateway is a resource-constrained device, so it’s crucial to guarantee the efficiency for both data throughput and resource consumption. Delay and buffer size, simulation results validate that the proposed algorithm can allocate To this end, an energy efficient traffic allocation algorithm for resource-constrained multi-homed WSN gateway is proposed in this paper, which aims at minimizing the gateway's power consumption while guaranteeing the transmission the traffic optimally for the gateway with different constraints and configurations, and it can significantly promote the gateway's energy efficiency in comparison to the traditional method.

10

A Web-based System for Shelter and Evacuation Path Selection Using Spatial Models in Disaster Situations

Hyun-Suk Hwang, Il-Kyeun Ra, Chang-Soo Kim

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.87-96

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Evacuation to disaster shelters can be optimized by giving instructions to evacuees to help them find the most suitable shelters and evacuation paths from their location. To generate such information in real-time, construction of spatial databases and complex spatial analysis models through Web Map Services (WMS) and Web Feature Services (WFS) based on Open Geospatial Consortium Web Services (OWS) is required. Focusing on the implementation of distributed OWS resources to provide more immediate information in the case of an emergency, we propose a Web-based system that identifies suitable shelters and provides the shortest evacuation path to each shelter for civilians who are within the danger zone. Specifically, (1) a search framework based on the OWS architecture is proposed and utilized to develop both Web-based and smartphone applications connected with WMS types of spatial data on the Web; (2) the spatial analysis models proposed include three sub-models, namely, data construction, shelter selection using scores by natural breaks, and an evacuation path model using network analysis. We identify candidate shelters by considering proximity to health care facilities and to major road, and coverage of each shelter in danger zone.

11

Fast Response Research of Magnetically Controlled Reactor

Chen Feng, Wang Jun, Zheng Hao, Lu Wenhua, Tian Cuihua, Yuan Jian, Chen Baichao, Yuan jiaxin

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.97-106

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

As a kind of reactive power compensation equipment with control flexibility and high reliability, magnetically controlled reactor (MCR) is widely used in reactive power compensation, over-voltage limitation and other aspects. However, low responding speed has severely limited the application of MCR. Especially when applied to suppress voltage flicker and arc suppression coil, the slow response of MCR will decrease the stability of control system, even causing the system shock. To improve the response performance of MCR, in this paper, the working principle of MCR has been analyzed, and a fast response structure of MCR has been designed with the novel fast response structure, fast excitation and rapid demagnetization can be achieved. According to the simulation and experiment results, the effectiveness of the proposed structure is verified by limiting the response time in 30ms.

12

Analysis of Impact of Terrain Factors on Landscape-scale Solar Radiation

Xiaodan Mei, Wenyi Fan, Xuegang Mao

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.107-116

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Incident solar radiation is one of the major sources of energy for driving biological and physical processes on earth. In this paper, simple conversion factors are designed to determine how the four landforms (i.e. plain, plateau, hill and mountain) will affect incident solar radiation at one month intervals using the ArcGIS tool appropriate for regional solar radiation analysis. A comparison is made between simulation results and those measurements taken in actual radiation stations, providing a correlation R2 of 0.9063. Results indicate first, that if the ratio of the monthly mean of the DEM-based regional solar radiation to the monthly mean of the hypothesis DEM-based regional solar radiation is defined as the conversion factor (R) of the solar radiation and the ArcGIS tool for regional solar radiation analysis is employed, then the computation can be simplified and the impact of terrain factors on incident solar radiation can be correctly represented. Secondly, with each of the four landforms, R varies according to the season, slope gradient and aspect; the season induces more impacts than the terrain factors; R increases first and then decreases when the aspect changes clockwise, but decreases continuously with an increase in slope grade; R varies in a complex way in the case of mountains, especially for grade-five slopes. Thirdly, R increases initially and then decreases in a sinusoidal manner with an increase in aspect under the influence of slope gradient during the winter; R varies in a linear and somewhat symmetric manner (monotone increasing, monotone decreasing and stable) with the increase in slope gradient and under the influence of the aspect. These results are helpful in studying the impact of terrain factors of different landforms on incident solar radiation on the landscape scale using the simple conversion factors.

13

Layered Execution Event Detection System of Harmful Streaming Contents Activated from Android-based Smart Devices

Han Seong Lee, Hyung-Woo Lee

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.117-124

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The recent increase in the proliferation of Android-based smart devices has resulted in easy access to harmful content, such as pornographic videos, becoming a major problem. Thus, the need has also arisen for software that can automatically block pornographic videos harmful to teenagers. In this paper, we analyze the mechanism by which streaming content is executed in Android-based smart devices and, consequently, propose a mechanism that automatically detects when harmful content such as a pornographic video is being viewed on a smart device. On the basis of the results of analysis of the mechanism by which harmful streaming content such as a pornographic video is executed on Android-based smart device, we developed and implemented a mechanism that extracts and analyzes the characteristics of internal events that occur at the time a harmful streaming content is executed. The mechanism developed is able to differentiate such content from safe streaming content.

14

Analysis on Modeling and Motion Simulation Based on Manipulator End Executor of Small Satellite during the Grasping Process

Zhang Yuan, Shao Junpeng, Zhang Liyuan, Dai Ye, Lai Yinan

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.125-132

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper introduces the components and functions of institution aiming at docking capture link of the small satellite manipulator end executor. Putting forward to Euler method and quaternion as the theoretical basis, kinetics of grasping institution the relative position and attitude are modeling and analyzed. The axial tilt grab conditions of the simulation analysis are finished by the ADAMS software. The results of the simulation analysis for the relative position and velocity and the hand-grasp collision force are concluded.

15

Energy Efficient Traffic Light Controller Design on 28nm FGPA

Arpit Gupta, Aarushi Sapra, Alisha Nagpal, Sanchit Sharma

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.133-144

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this work, our focus is on study and analysis of power and junction temperature at different temperatures and at different capacitance values. Kintex7 is 28-nm FPGA on which we implement our circuit to re-assure power reduction and reduction in junction temperature in sequential circuit. Varying the values of capacitance and temperature enhance the efficiency of the Energy Efficient Traffic Light Controller design. This paper basically deals with FSM (Finite State Machine) and is implemented on FPGA. FGPA is preferred because of its high speed and is inexpensive. Traffic lights are beneficial in managing the traffic, reducing accidents rate, relaxing traffic cop’s job, minimizing fuel consumption and emission and save time. The performance of our energy efficient traffic lights is evaluated and tested through simulations on Xilinx software development kit. For 2.4GHz operating frequency, there is 47.71% reduction in total power dissipation, 69.94% reduction in IOs power dissipation, and 0.78% reduction in junction temperature when we use 28nm FPGA and temperature is 25 degree Celsius and capacitance is scaled down from 100pF to 20pF. For 10GHz operating frequency, there is 54.81% reduction in total power dissipation, 70.11% reduction in IOs power dissipation, 3.52% reduction in leakage power dissipation and 1.92% reduction in junction temperature when we use 28nm FPGA and temperature is 50 degree Celsius and capacitance is scaled down from 100pF to 20pF.

16

The Study of Synchronous Belt Transmission Stability with the Influence of Rotation Speed and Tension

Yaochen Shi, Zhanguo Li, Yan Li

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.145-152

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The vibration of belt affects the transmission stability, products noise and the life of automotive synchronous belt. The mathematical model of longitudinal vibration was established through analyzing the longitudinal vibration of automotive synchronous belt. The vibration dynamic measurement device was developed based on the laser displacement triangulation measurement principle, aiming at RU style arc teethed synchronous belt transmission process, measured the variety of amplitude over time at the middle of the belt span when rotation speed was 600r/min, 1200r/min, 1800r/min and tensile force was 320N, 480N, 640N, obtained the rules of amplitude and frequency change along with the variation of rotation speed and tensile force. It has significance on improving the transmission stability of arc teeth synchronous belt, reducing the transmission noise and prolonging the service life of belt.

17

A New Fuzzy Neural Network Algorithm for Rural Public Service Performance Evaluation

Hui Zhang

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.153-160

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The defects of BP neural network, such as low convergence speed, falling into local minimum easily, bad generalization ability, can depress the calculation accuracy of BP neural network and damage its practical effect. So the research of improving BP neural network has great theoretical and practical significance. The paper advances a new fuzzy neural network algorithm to overcome the defects of original BP neural network algorithm and evaluate rural public service performance. First, the paper designs a new calculation structure based on fuzzy and BP neural network theory, and selects new self-training methods for the improved fuzzy neural network algorithm; Second, the performance of the advanced algorithm is also analyzed form four aspects in theory; Finally, based on analyzing and constructing the evaluation indicator system, the improved fuzzy neural network algorithm is applied to evaluate rural public service performance and the experimental results show that the superiorities of the improved algorithm include high evaluation accuracy, fast convergence speed, small oscillation, simple algorithm process.

18

A Study on the Communication Agent Model for One-way Data Transfer System

Young-Chul Oh, Mi-Ran Han, Yongtae Shin, Jong-Bae Kim

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.161-168

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In order to protect an internal system from malicious attacks outside, a trial of separating a network logically and physically is made these days. Still, physical network separation is vulnerable to social engineering hacking. For the reason, main organizations in charge of national infrastructure facilities need to establish a safer network. The control system of the organizations is separated from business network and is being operated in a closed environment, however, their hacking accidents, such as data leakage by security USB loss and virus infection over the internet, occurred. In the circumstance, it is hard to ensure that the control system being separated from business network is safe. If control information in a business network is sent to a control system without any control, it is possible to cause massive damage to the national system. Accordingly, this thesis proposes a one-way data transmission system. The proposed system receives and processes information which is sent to a business network from a control system, but does not transmit control information of a business network. In this way, under any circumstances, it is impossible to access an infrastructure system via an internal control network from an outside network, and thus it is possible to protect national infrastructure facilities safely.

19

Research on the Inquiry Teaching Model of Men's Basketball Teaching in College Physical Education based on Network Information Technology

Li Aimin, Long Jianjun, Tao Ganchen, Chen Yuanping, Wan Shaoyong

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.169-178

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Network education is a new concept of modern information technology applied to education, which is the education of the use of network technology, according to a series of outstanding problems in the traditional basketball teaching, we discussed the application value and effect of inquiry teaching in college basketball education. The data was collected from Jiangxi Normal University; experiment object is 36 students, and we put them in the experimental group (18) and the control group (18).By using interview method and empirical analysis, the result shows that in 50 meters (F=4.227, P=0.048<0.05); standing long jump (F=5.495, P=0.025<0.05); 1000 meters (F=4.702, P=0.037<0.05); Run-up to touch high( F=6.398 P=0.016<0.05); 1 minute shot (F=9.396 P=0.004<0.01); basketball technology F=9.116 P=0.005<0.01; basketball interest (F=16.279, P=0.000<0.01); basketball theory results (F=12.066 P=0.001<0.01). Inquiry teaching method can effectively improve the normal teaching, not only promote students to actively take the basketball class, but also strengthen comprehensive physical education, as the effect is significant, so this education model is worth to promote.

20

A Novel Task Communication and Scheduling Algorithm for NoC-based MPSoC

Weihua Zhang, Gengxin Sun, Sheng Bin

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.179-188

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With the high performance demand, recent embedded systems are mostly based on NoC (Network-on-Chip) architectures, which would bring complex on-chip communication and scheduling problems. In this paper, a novel task scheduling algorithm which statically schedules both communication transactions and computation tasks onto heterogeneous NoC architectures under real-time constraints is presented. Our algorithm is capable of assigning tasks onto different processing elements (PE) automatically and scheduling their execution. We map tasks onto an 8× 8 NoC-based MPSoC to show that our scheduling algorithm leads to reduction in the total execution time, energy consumption. Experimental results show that for a multimedia application, more than 40% energy savings have been observed compared to the schedules generated by a standard scheduler.

21

Home Electricity Consumption Monitoring Enhancement Using Smart Device Status Information

Sung-Yong Son

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.189-196

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Electricity consumption monitoring to understand energy consumption status and patterns is the first step in reducing the electric cost for a house. Conventional electricity consumption monitoring systems usually rely on specially designed power measuring equipment such as a smart meter or sub-metering device. However, it is not easy to obtain enough information for energy monitoring because the limited number of measuring equipment can be installed due to their costs and privacy issues. Therefore, the status of devices could be usually inferred from limited information using the technology called non-intrusive appliance load monitoring. However, the limited information causes inaccuracy in estimating operation status of the devices. Many efforts have been performed to improve the estimation accuracy. Smart devices including smart appliances have been deployed recently to provide more advanced services at home. Network connectivity is one of the essential functions for the smart devices. When the operation information of those smart devices can be shared with energy monitoring devices, it can improve the energy consumption monitoring. In this paper, a hybrid approach is proposed to improve energy consumption status estimation. Devices' status information is shared via ubiquitous home networks in addition to the conventional energy consumption monitoring. This approach makes the energy consumption inference more simple and accurate for the rest of unknown devices.

22

An Improved DV-Hop Localization Algorithm Based on the Node Deployment in Wireless Sensor Networks

Jianmin Zhang, Ning Guo, Jian Li

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.197-204

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Localization algorithm is an important and challenging topic in Wireless Sensor Networks (WSNs), especially for the applications requiring the accurate position of the sensed information. In this paper, an improved DV-Hop algorithm based on the node deployment was proposed. The proposed algorithm improves the localization accuracy by taking the advantage of the node deployment when computing the distance between the unknown node and the anchor. Simulation results prove that the improved DV-Hop algorithm offers the better performance compared to the original DV-Hop algorithm in localization accuracy without requiring additional hardware.

23

Model-Based Design Methodology for Blind Image Restoration

Yongqiang Ma, Yang Nie

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.205-214

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Blind image restoration is a kind method of image processing by estimating both the original image and the point spread function from degraded images, when there is unknown or not completely know the prior knowledge of the original image and point spread function of imaging. However, blind image restoration is a complex and intensive computing process, and increasing processing speed has been a hot research topic. In this paper, blind image restoration using Self-Deconvolution Data Reconstruction Algorithm (SeDDaRA) is realized by Model-Based Design Methodology. The simulation results show that the proposed algorithm is not only simple in structure and easy to implement, and can improve the processing speed with good scalability.

24

Message Aggregation in VANETs for Delay Sensitive Applications

Sanket Desai, Rabee Elhdad, Naveen Chilamkurti

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.215-222

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A Vehicular Ad-Hoc Network (VANET) is categorized as a Mobile Ad-Hoc Network (MANET) which delivers wireless network servies with an aim to improve road safety and enhance driving comfort. Diverse applications of Vehicular Ad-Hoc Networks such as infotainment, road safety and public safety have made VANETs as a notable and emerging area of research and development. As of now, numerous vehicular ad-hoc network research projects have been mainly aimed at data security and routing. This has raised a critical problem of data congestion and loss of data accuracy in VANETs. A major challenge in VANETs is to provide efficient data communication and propogation for precise and valuable information. This paper presents a generalized framework for message aggregation. Message Aggregation can be used to transmit minimal data and to enhance the communication efficiency thus reducing the communication overhead in VANETs. This will help in reducing the redundancy in VANETs resulting in dissemination of precise information

25

Online Marketing Strategy and Service Quality Evaluation System : An E-commerce Perspective

Xiong Hu

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.223-232

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Electronic commerce is an important industry in modern service industry; it has changed the way of production and consumption patterns. In this paper, we have constructed the evaluation system of e-commerce service quality. In the empirical section, we identified five indicators in the evaluation system as tangibles, reliability, responsiveness, assurance and empathy. At the same time, using the analytic hierarchy process to quantify the evaluation index system of service quality, and then analyze the weight of each index. The result shows that evaluation system will effectively promote the enterprise to control the customer's perception and needs, so as to continuously improve the service quality and competitiveness of enterprises.

26

Distributed Localization Algorithm for Large-Scale Wireless Sensor Network

Hong Zhang

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.9 No.10 2015.10 pp.233-242

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Aiming at the inherent deficiencies of large-scale wireless sensor network for distributed positioning algorithm, the DV-hop algorithm is mainly studied and improved, and two kinds of improved algorithms DV-hop and DV-hop+Lastdist DV- hop-MinMax are proposed. The DV- hop+Lastdist improves the positioning accuracy of the node by only adding a message variable, while the DV-hop-MinMax effectively reduces the costs of floating-point operations and power consumption, and can select the appropriate algorithm according to actual application environment. Finally, the paper gives the method to realize OMNeT++ in the simulation environment, and carries out the simulation analysis.

 
페이지 저장