Earticle

현재 위치 Home

International Journal of Internet, Broadcasting and Communication

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    국제인공지능학회(구 한국인터넷방송통신학회) [The International Association for Artificial Intelligence]
  • pISSN
    2288-4920
  • eISSN
    2288-4939
  • 간기
    계간
  • 수록기간
    2009 ~ 2025
  • 주제분류
    공학 > 전자/정보통신공학
  • 십진분류
    KDC 326 DDC 380
Vol.8 No.1 (21건)
No
1

Stereo Vision Based Balancing System Results

Tengis Tserendondog, Batmunkh Amar, Byambajav Ragchaa

국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.1 2016.02 pp.1-6

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Keeping a system in stable state is one of the important issues of control theory. The main goal of our basic research is stability of unmanned aerial vehicle (quadrotor) . This type of system uses a variety of sensors to stabilize. In control theory and automatic control system to stabilize any system it is need to apply feedback control based on information from sensors. Our aim is to provide balance based on the 3D spatial information in real time. We used PID control method for stabilization of a seesaw balancing system and the article presents our experimental results. This paper presents the possibility of balancing of seesaw system based on feedback information from stereo vision system only.

2

Several authentication methods have been developed to make use of tokens in the mobile networks and smart payment systems. Token used in smart payment system is genearated in place of Primary Account Number. The use of token in each payment transaction is advantageous because the token authentication prevents enemy from intercepting credit card number over the network. Existing token authentication methods work together with the cryptogram, which is computed using the shared key that is provisioned by the token service provider. Long lifetime and repeated use of shared key cause potential brawback related to its vulnerability against the brute-force attack. This paper proposes a per-transaction shared key mechanism, where the per-transaction key is agreed between the mobile device and token service provider for each smart payment transaction. From server viewpoint, per-transaction key list is easy to handle because the per-transaction key has short lifetime below a couple of seconds and the server does not need to maintain the state for the mobile device. We analyze the optimum size of the per-transaction shared key which satisfy the requirements for transaction latency and security strength for secure payment transactions.

3

The Design of mBodyCloud System for Sensor Information monitoring in the Mobile Cloud Environment

Sungbin Park, Seok-Jae Moon, Jong-Yong Lee, Kye-Dong Jung

국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.1 2016.02 pp.19-25

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Recently, introduced a cloud computing technology to the IT industry, smart phones, it has become possible connection between mobility terminal such as a tablet PC. For dissemination and popularization of movable wireless terminal, the same operation have focused on a viable mobile cloud in various terminal. Also, it evolved Wireless Sensor Network(WSN) technology, utilizing a Body Sensor Network(BSN), which research is underway to build large Ubiquitous Sensor Network(USN). BSN is based on large-scale sensor networks, it integrates the state information of the patient's body, it has been the need to build a managed system. Also, by transferring the acquired sensor information to HIS(Hospital Information System), there is a need to frequently monitor the condition of the patient. Therefore, In this paper, possible sensor information exchange between terminals in a mobile cloud environment, by integrating the data obtained by the body sensor HIS and interoperable data DBaaS(DataBase as a Service) it will provide a base of mBodyCloud System. Therefore, to provide an integrated protocol to include the sensor data to a standard HL7(Health Level7) medical information data.

4

The Comparison of Performance Hierarchical Routing Protocols in Wide Area Sensor Field

SeaYoung Park, KyeDong Jung, Jong-Yong Lee

국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.1 2016.02 pp.26-33

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Studies have been made for the wireless sensor network protocols by a number of researchers to date. In particular, the studies as to the hierarchical protocol LEACH algorithm was concentrated. Various studies have been derived for the performance of the protocol is based on the LEACH protocol have been made. Improved algorithms have been proposed continuously. On the other hand, The performance comparison and evaluation of the improved algorithm is insufficient. Therefore, we compared the performance for the ML-LEACH (Multi Hop-Layered) and DL-LEACH (Dual Hop-Layered) been derived mainly LEACH. scalability, energy consumption, CH elected, network lifetime were selected as a Performance evaluation items.

5

Map Reduce-based P2P DBaaS Hub system

Yean-Woo Jung, Jong-Yong Lee, Kye-Dong Jung

국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.1 2016.02 pp.34-40

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The database integration is being emphasized to one way of the companies collaboration. To database integration, companies are use like one database what their own, it can be provided more efficient service to customer. However, there exist some difficulty to database integration. that is the database security and database heterogeneity problems. In this paper, we proposed the MapReduce based p2p DBaaS hub system to solve database heterogeneity problem. The proposed system provides an environment for companies in the P2P cloud to integrate a database of each other. The proposed system uses DBaaS Hub for a collection of data in the P2P cloud, and use MapReduce for integrating the collected data.

6

Japanese students who study Korean as a foreign language have an advantage in learning Korean compared to other students because of their similarities of Korean and Japanese. But even Japanese students have difficulties in learning Korean passive form.Korean passive form and Japanese passive form have differences in meaning and usages as well as similarities. Both Korean and Japanese have passive form as a counterpart of active form. But there are differences in usages of Korean passive form and Japanese passive form in some ways. In meanings, Korean passive form represents the actions completed and the actions done by someone. And Japanese passive form represents receiving the actions and the actions done by someone. Some of Japanese passive forms expresses the meanings of possibilities and respects according to the meanings of verbs. Korean passive form mainly represents the actions completed and Japanese passive form mainly explains the performers and the action done by them. So Korean passive forms connects with ‘-아/어 있다’ frequently and Japanese passive forms connects with ‘-てしまう’ frequently. In usages, there are some Japanese intransitive verbs which are expressed in passive way in Korean. In the other way, there are some Korean transitive verbs which are expressed in passive way in Japanese also. Therefore some of Korean passive forms could be translated into intransitive verbs of Japanese to present same meaning. In the other way, some of Japanese passive forms could be translated into transitive verbs of Korean to present same meaning. For the effective teaching of Korean passive form, we should approach the method of teaching the passive forms with the understanding of differences of Korean and Japanese passive forms.

7

Performance Comparison of Decision Trees of J48 and Reduced-Error Pruning

Yong Gyu Jung, Hoon Jin, Byung Heun Cha

국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.1 2016.02 pp.48-51

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Data mining reveals the recent prominence of Machine Learning. It means to acquire the skills and knowledge that can be acquired information efficiently. It is machine learning of new information it may be due to him from the new data to predict the outcome. This paper attempts to compare the classification performance of an exemplary algorithm J48 and REPTree of ML algorithms. Confirm that provide more accurate classification algorithm by which the performance comparison results in finding a more accurate prediction is possible algorithm that is the goal of this paper. This classification was carried out in the data collected for the experiment. As a result classification success rate of J48 is about 96%, classification success rate was found to be about 94% of REPTree. Fine, but it was confirmed that the classification performance is better than the J48 REPTree. In other words, J48 algorithm showed that slightly more accurate forecasts as possible.

8

Adaptive Time Delay Compensation Process in Networked Control System

Yong-Gil Kim, Kyung-Il Moon

국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.1 2016.02 pp.52-64

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Networked Control System (NCS) has evolved in the past decade through the advances in communication technology. The problems involved in NCS are broadly classified into two categories namely network issues due to network and control performance due to system network. The network problems are related to bandwidth allocation, scheduling and network security, and the control problems deal with stability analysis and delay compensation. Various delays with variable length occur due to sharing a common network medium. Though most delays are very less and mostly neglected, the network induced delay is significant. It occurs when sensors, actuators, and controllers exchange data packet across the communication network. Networked induced delay arises from sensor to controller and controller to actuator. This paper presents an adaptive delay compensation process for efficient control. Though Smith predictor has been commonly used as dead time compensators, it is not adaptive to match with the stochastic behavior of network characteristics. Time delay adaptive compensation gives an effective control to solve dead time, and creates a virtual environment using the plant model and computed delay which is used to compensate the effect of delay. This approach is simulated using TrueTime simulator that is a Matlab Simulink based simulator facilitates co-simulation of controller task execution in real-time kernels, network transmissions and continuous plant dynamics for NCS. The simulation result is analyzed, and it is confirmed that this control provides good performance.

9

In this paper, the existing domestic HVAC systems, devices TCP / IP does not support the most, thereby, not performed remote management, it is necessary to regularly field service, inefficiency and cost bring a burden. This is through a comparison of the IoT-based primary, real-time protocol of what has become a hot topic recently, to be able to control and real-time monitoring through the CCU device in the HVAC system. Compare for this Internet of Things device for real-time monitoring and control of the XMPP, CoAP, MQTT main real-time protocol is used on. Finally, flexibility, light weight, based on MQTT a two-way messaging protocols with reliable message delivery, implements the protocol on the real-time HVAC system in the cloud platform.

10

The global positioning system (GPS)-enabled mobile phones provide location- based applications such as car and pedestrian navigation services. The pedestrian navigation services provide safe and comfortable route and path guidance for pedestrians and handicapped or elderly people. One of the essential components for a navigation system is a spatial database used to perform navigation and routing functions. In this paper, we develop modeling and categorization of pedestrian path components for smart tour guide services using the mobile pedestrian navigation application. We create pedestrian networks using 2D base map and sky view map in urban area. We also construct pedestrian networks and attributes of node, link, and POI using on-site GPS data and photos for smart pedestrian tour guide in the major walking tourist spots in Jeju.

11

Big data management is becoming an increasingly important issue in both industry and academia of information science community today. One of the important categories of big data generated from software systems is log data. Log data is generally used for better services in various service providers and can also be used to improve system reliability. In this paper, we propose a novel big data management architecture specialized for log data. The proposed architecture provides a scalable log management system that consists of client and server side modules for efficient handling of log data. To support large and simultaneous log data from multiple clients, we adopt the Hadoop infrastructure in the server-side file system for storing and managing log data efficiently. We implement the proposed architecture to support various client environments and validate the efficiency through measurement studies. The results show that the proposed architecture performs better than the existing logging architecture by 42.8% on average. All components of the proposed architecture are implemented based on open source software and the developed prototypes are now publicly available.

12

In this paper, we propose the 16-bits optimization design of the ARIA block-cipher algorithm for embedded systems with 16-bits processors. The proposed design adopts 16-bits XOR operations and rotated shift operations as many as possible. Also, the proposed design extends 8-bits array variables into 16-bits array variables for faster chained matrix multiplication. In evaluation experiments, our design is compared to the previous 32-bits optimized design and 8-bits optimized design. Our 16-bits optimized design yields about 20% faster execution speed and about 28% smaller footprint than 32-bits optimized code. Also, our design yields about 91% faster execution speed with larger footprint than 8-bits optimized code.

13

This paper applies WiMedia UWB network into a wireless ship area network (WSAN) so as to support high-quality multimedia services on board and reliable instrument control information as well, since the need for mixed high-quality video traffic and shipboard control data traffic is essential for a high-cost valued digital ship. Thus, in this paper, prioritized contention access (PCA) and distributed reservation protocol (DRP) based on WiMedia UWB (ECMA-368) MAC protocols are combined and proposed to such mixed traffic environment, by varying the portions of superframe according to traffic type. It is shown that the proposed WiMedia UWB MAC protocol can provide reliable mixed video and shipboard control data traffic as well.

14

Sensors Network and Security and Multimedia Enhancement

Seon-mi Woo, Malrey Lee

국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.1 2016.02 pp.110-114

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

These fields are integrated to visualize and finalize the proposed development, in simulation environment. SCADA (supervisory control and data acquisition) systems and distributed control systems (DCSs) are widely deployed in all over the world, which are designed to control the industrial infrastructures, in real ways. To supervise and control the various parts of designed systems; trends to require a deep knowledge to understand the overall functional needs of industries, which could be a big challenge. Industrial field devices (or network sensors) are usually distributed in many locations and are controlled from centralized site (or main control center); the communication provides various signs of security issues. To handle these issues, the research contribution will twofold: a method using cryptography is deployed in critical systems for security purposes and overall transmission is controlled from main controller site. At controller site, multimedia components are employed to control the overall transmission graphically, such as system communication, bytes flows, security embedded parameters and others, by the means of multimedia technology.

15

Big data Analysis using Python in Agriculture Forestry and Fisheries

So hee, Kim, Min Soo Kang, Yong Gyu Jung

국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.1 2016.02 pp.115-118

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Big Data is coming rapidly in recent times and keep the vast amount of data was utilized them. These data are utilized in many fields in particular, based on the patient data in the medical field to increase the therapeutic effect, as well as re-incidence to better treatment, lowering the readmission rates increased the quality of life. In this paper it is practiced to report basis of the analysis and verification of data using python. And it can be analyzed the data through a simple formula, from Select reason of Python to how it used; by Press analysis of Agriculture, Forestry and Fisheries research. In this process, a simple formula can be used that expression for analyzing the actual data so it taking advantage of the use of functions in real life

16

One of the representative side effects in current information and knowledge society is internet addiction. Nowadays single-parent families become popular due to various reasons such as increasing divorce ratio and government supports for single-parent family. National research works showed that internet addiction ratio of single-parent family children is higher than that of children of intact families. The research purpose of this paper is to investigate correlation between internet addiction and parent types. For this purpose, extensive and national survey works of NIA(National Information Society Agency of Korea) are collected and analyzed. Based on statistical analysis work, it is concluded that there is no meaningful correlation between internet addiction and parent types

17

Regarding the role of infrastructure in the university and education sector, which is the most important factor for securing future competitiveness of a country, timely application from qualified applicants is an important factor. Thus, this study is to propose creative value regarding education and certification for smart IT sector, which will be a major topic in continuous technology development over the next 10 more years, and to bring out ripple effects by policy research regarding education and certification for smart IT sector in the software-oriented society. This research on policy regarding education and certification for smart IT sector in the software oriented society can be used as a guideline in education and certification for smart IT sector at colleges and can be also used for establishing groundwork for completing practical education required in smart ICT field at colleges and for cultivating mobile app program developers required by enterprises.

18

The computational thinking refers to the ability to solve the complex and a variety of problems by utilizing a computer in core of the software education. It create a model through data collection and analysis and realize that the computer can understand to solve problems. Recently, the educational application of 3D printer appears in importance, which is one method to improve the computing thinking. In this paper, we propose the data analysis framework to stretch the computing thinking of learner that can incorporate 3D printing technology to the current elementary school curriculum and apply in a case study.

19

The Improved Efficiency Network Life-time in TEEN

WooSuk LEE, Seong Ro Lee, Jong-Yong Lee

국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.1 2016.02 pp.141-147

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we’re compared network protocol which is network lifetime longer when using LEACH Protocol, SEP, and TEEN in a heterogeneous Wireless Sensor Network with a Large Sensor Area. Also, we propose a method of divided layer the wide-area sensor filed and transmitting a multi-hop to improve the network lifetime. And we’re compared network protocol which is network lifetime more improved apply the proposed method to LEACH Protocol, SEP, and TEEN. We tried to compare results, TEEN showed the best network lifetime. Apply the proposed method to divided the sensor field, L-TEEN (Layered TEEN)’s network lifetime rates of improvement is highest.

20

A Study of Cluster Head Election of TEEN applying the Fuzzy Inference System

Young-il Song, Kye-Dong Jung, Seong Ro Lee, Jong-Yong Lee

국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.1 2016.02 pp.148-154

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we proposed the clustering algorithm using fuzzy inference system for improving adaptability the cluster head selection of TEEN. The stochastic selection method cannot guarantee available of cluster head. Furthermore, because the formation of clusters is not optimized, the network lifetime is impeded. To improve this problem, we propose the algorithm that gathers attributes of sensor node to evaluate probability to be cluster head

21

A Design of the Cloud Aggregator on the MapReduce in the Multi Cloud

Chigon Hwang, Hyoyoung Shin, Jong-Yong Lee, Kye-Dong Jung

국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.1 2016.02 pp.155-162

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The emergence of cloud has been able to provide a variety of IT service to the user. As organizations and companies are increased that provide these cloud service, many problems arises on integration. However, with the advent of latest technologies such as big data, document-oriented database, and MapReduce, this problem can be easily solved. This paper is intended to design the Cloud Aggregator to provide them as a service to collect information of the cloud system providing each service. To do this, we use the DBaaS(DataBase as a Service) and MapReduce techniques. This makes it possible to maintain the functionality of existing system and correct the problem that may occur depending on the combination.

 
페이지 저장