Skip to main content

2011 | Buch

Advanced Computer Science and Information Technology

Third International Conference, AST 2011, Seoul, Korea, September 27-29, 2011. Proceedings

herausgegeben von: Tai-hoon Kim, Hojjat Adeli, Rosslin John Robles, Maricel Balitanas

Verlag: Springer Berlin Heidelberg

Buchreihe : Communications in Computer and Information Science

insite
SUCHEN

Über dieses Buch

This volume constitutes the refereed proceedings of the Third International Conference on Advanced Science and Technology, AST 2011, held in Seoul, South Korea, in September 2011. The 37 revised full papers presented in this volume were carefully reviewed and selected from numerous submissions. The papers feature ideas, problems and solutions relating to the multifaceted aspects of the Advanced Science and Technology, such as communication and networking; ubiquitous multimedia computing; security technology and information assurance; computer science, software engineering and applications thereof; bio-science and bio-technology; u- and e-service, science and technology; database theory and application; control and automation; signal processing, image processing and pattern recognition; as well as grid and distributed computing.

Inhaltsverzeichnis

Frontmatter
Design of Athlete Information Provision System Using Object Recognition

The suggested athlete information provision system obtains the image of an athlete who is playing a game, through the broadcast cameras installed at several places of the stadium. The server extracts the uniform information using uniform information extraction/recognition module, out of the athlete image transmitted from the broadcast cameras. The extracted information is used to identify athlete information and league information stored in the database. the identified athlete information is transmitted to the smart phone by which the user is watching a live broadcast of the game, so that the user watches the broadcast relayed more easily. This is the athlete information provision service system using the uniform information as an object.

Seoksoo Kim
Devising an Optimal Scheme for Distributed Wireless Sensors for Patient Monitoring in Preventive Ubiquitous Healthcare

This research studies the deployment of distributed wireless sensors for monitoring target patients. The wireless sensor network is used for monitoring of target patients, and report tracking to central database server containing the vital information. This study performs optimization scheme for optimal placement of sensors and movement coordination techniques within the monitored area. A movement tracking algorithm is proposed for better patient tracking techniques and aid in optimal deployment of wireless sensor networks. Results show that wireless sensors can be exploited to compensate for the lack of sensors and improved the network coverage of the patient being monitored.

Giovanni Cagalaban, Seoksoo Kim
Fault Tolerant Intelligent Transportation Systems with an Agent

The Intelligent Transportation Systems (ITS) consists of advanced communications, electronics, and information technologies to improve the efficiency, safety, and reliability of nationwide transportation systems. The core functions of the ITS are collection, management, and provision of real time transport information, and it can be deployed based on the Common Object Request Broker Architecture (CORBA) of the Object Management Group (OMG) because it consists of interconnected heterogeneous systems across national and local governments. Fault Tolerant CORBA (FT-CORBA) supports real time requirement of transport information through redundancy by replication of server objects. However, object replication, management, and related protocols of FT-CORBA require extra system CPU and memory resources, and can degrade the end-to-end predictability both locally and as a whole. This paper proposes an improved architecture to enhance fault tolerance, reliability, and ultimately predictability of FT-CORBA based ITS by generating and managing object replicas adaptively during system operation with an agent. The proposed architecture is expected to be applicable to other FT-CORBA based systems for an electronic government (e-government).

Woonsuk Suh, Saegue Park, Eunseok Lee
Semantic Analysis Processes in Advanced Pattern Understanding Systems

This publication presents the use of semantic data analysis in cognitive processes of data analysis, interpretation, recognition and understanding in advanced pattern understanding systems. These processes form a part of a field called cognitive informatics, which encompasses subjects related to the semantic analysis and interpretation of data leading to understanding the analysed data sets. These systems dedicated for cognitive analysis of image data called Understanding Based Image Analysis Systems. Examples of applications of this type of semantic analysis processes and methods will be shown using the case of an cognitive system for the semantic analysis of image data presenting X-ray images of foot bone lesions.

Lidia Ogiela, Marek R. Ogiela
Secure Information Management in Hierarchical Structures

Algorithms for information hiding and sharing are often used in intelligent data management. The great significance of information sharing may depend on its nature and importance for the institution concerned. In this paper we will present algorithms for multi-level information management and sharing. Such techniques will be based on the linguistic formalisms and sequential grammars. Presented approach may be treated as a secure enhancement of classical secret sharing procedures.

Marek R. Ogiela, Urszula Ogiela
TMDR-Based Query Conversion for Data Integration in a Distributed Network

Corporate data are divided vertically or horizontally in the network by their functions. In this study, we propose a TMDR-based query conversion method to access these data by means of integration. TMDR is a repository that combines MSO for schema integration and Topic Maps for semantic integration of data. In methodology, the global query is created for global processing using TMDR, and the resulting global query is broken down into local schema to access distributed systems in a network, enabling integrated access. We propose a method of converting global query and local query for this purpose.

Chigon Hwang, Seokjae Moon, Hyoyoung Shin, Gyedong Jung, Youngkeun Choi
Unaffected User Interface for CAVE Using Motion Templates Method

In this paper, we develop an unaffected interface for CAVE using the motion templates method. We develop background model for CAVE with real photos. The panoramic images are constructed using these photos from real environment and texture-mapped to virtual sphere surround CAVE. As a user interface for this background model, the motion templates method of computer vision technologies is used. The computer vision module recognizes predefined user’s gestures and sends commands to render module of CAVE system via internet using UDP protocols. Using this method, the users can manipulate the background model unaffectedly.

Hasup Lee, Yoshisuke Tateyama, Tetsuro Ogi
Determinants in Supply Chain Application Integration Strategy: Case-Based Comparison Study

Since early 90’s, many leading companies implemented enterprise resource planning (ERP) system in order to enhance their competitive advantage. In its early stage of ERP adoption, called core ERP, the focus was on integrating a firm’s internal processes; so that, increasing its internal efficiency. More recently, firms began to expand their system across their supply chain in order to enhance the supply chain capability by implementing inter-firm system integration. Previous research suggested two alternative approaches for the inter-firm integration: EDI and web-based integration. While many works mentioned pros and cons for the two alternatives, few of them explicitly identified determinants those influence the choice between the alternatives. In this study, we proposed four sets of determinants: downstream relationship, transaction characteristics, target process, contents characteristics and IT infrastructure. We selected two companies and tested the proposed framework and reported the results.

Sang-Chun Lee, Yong-Seok Seo, Woong Eun, Jong-Dae Kim
Design of Multilayered Grid Routing Structure for Efficient M2M Sensor Network

As heterogeneous sensor networking technology has recently emerged, researches on M2M network that consists of various sensor nodes have been actively carried out. In this research, a routing structure using the multi-level grid structure that could decrease multihop was designed in order to reduce energy consumption in the M2M network consisting of different types of sensor nodes.

Sungmo Jung, Jae Young Ahn, Dae-Joon Hwang, Seoksoo Kim
Design and Evaluation of a Hybrid Intelligent Broadcast Algorithm for Alert Message Dissemination in VANETs

Vehicular ad hoc network is an emerging new technology and a promising platform for the intelligent transportation system. The most important application of VANET is disseminating emergency messages to warn drivers in case of dangerous events. The core technique relies on the design of a broadcast scheme. In this paper, we propose a hybrid intelligent broadcast algorithm for alert message dissemination in VANETs that is called Hi-CAST. To deliver alert message effectively, the proposed Hi-CAST algorithm uses delay and probabilistic broadcast protocols together with token protocol. The performance of the Hi-CAST is evaluated through simulation and compared with that of other alert message dissemination algorithms.

Ihn-Han Bae
Development of a 3D Virtual Studio System for Experiential Learning

This paper proposes a three-dimensional (3D) virtual studio system that supports various types of experiential learning using chroma keying and real-time 3D virtual reality techniques. The objective of the proposed system is to maximize learning, especially self-directed learning, and to promote student motivation by improving several technical problems inherent to previously developed virtual education systems. The main improvements are the system speed, the quality of 3D virtual spaces, and the control technique of the user interface with the addition of a speech recognition function. The proposed system was applied and practically used in English classes at several elementary schools in Korea. The results indicated that the proposed system can provide a learning environment in which students can engage in more efficient self-directed learning by enhancing their engagement in the learning process.

Ji-Seong Jeong, Chan Park, Jae-Jong Han, Myeong-Sook Im, Rae-Hyun Jang, Mihye Kim, Kwan-Hee Yoo
Design and Implementation of OSEK/VDX System Generation for Automotive Domain Software Development Platform

This paper introduces software development platform and system generation tool based on OSEK/VDX standard which is established for automotive electric/electronic software development. It explains components of the platform and the structure of system generation tool we developed as a part of the platform in further detail. The OSEK/VDX operating system configuration of an application is described by writing a text script file of which the syntax and semantics given by the OSEK/VDX OIL specification. And the configuration is converted into lines of C codes using the system generator rather than loaded on startup. Also we present the design aspects of the tool related to development cycle of the platform and the tool itself.

Jung Wook Lee, Jang Woon Baek, Jae Young Kim, Kee Koo Kwon, Gwang Su Kim
Traffic Rerouting Strategy against Jamming Attacks for Islanded Microgrid

In this paper, we design a communication framework using wireless paradigm for multiagent-based islanded microgrid operation and control. The vulnerability against radio interference attacks is fatal in the microgrid as an energy infrastructure. Thus, the ability to deal with radio interference attacks and maintain an acceptable level of service degradation in presence of the attacks is needed in the design of the communication framework. To solve the problem, we propose a traffic rerouting scheme in the design infrastructure.

Yujin Lim, Hak-Man Kim, Tetsuo Kinoshita, Tai-hoon Kim
Dynamic Touch-Screen UI Generation of Mobile Application Using Probe Key Test

As touch-screen mobile phones pour into the market, demands for reusing existing mobile applications by adding a touch-screen UI are increasing. Up until this point, the method of defining a single screen keyboard and redirecting touch inputs to key inputs was used. However, this method diminishes the efficiency of touch-screens because a fixed-layout is applied to every application even though different keys are used for different UI states of an application. This study proposes a method that investigates the type of keys used in an application during run-time using the probe key and dynamically configures the layout of screen keyboards. Test results of the proposed method showed that an optimized touch-screen UI was generated every time the UI state of an application changed.

Yunsik Son
A Dynamically Reconstructible SW Function Layer for Evolutionary Robots

In the classical robot motion paradigm, robots make it difficult to respond efficiently to the dynamically variable environment such as disaster area. In order to handle such a situation that may be changed dynamically, a technology that allows a dynamic execution of data transmission and physical/logical connection between multiple robots based on scenarios is required. In this paper, we introduce evolutionary robots and its dynamically reconstructible software function layer. Proposed software function layer can be added new software functions or updated and enhance the performance on existed functions, through the robot communications.

Yunsik Son
A Study on Software Vulnerability of Programming Languages Interoperability

In internet computing environments, security is a very important issue. And, Recently, There are many researches on developing secure software, and it is another method from researches on the existing security system. In particular, researches on coding rules and vulnerability analysis tools for developing secure software are active in the field of programming languages. However, existing researches for the development of secure software, the target was an individual language. In this study, we were present a methodology to define and analyze for software vulnerability on the case of language interoperability.

Yunsik Son
Effect of In-Vehicle Parameters on the Vehicle Fuel Economy

This Paper proposed the prediction method of fuel consumption from vehicle information through OBD-II. We assumed RPM, TPS had a relationship with fuel consumption. We got the output as fuel-consumption from a vehicle RPM, TPS as input by using polynomial equation. We had modeling as quadric function with OBD-II data and fuel consumption data supported by automotive company in real. In order to verify the effectiveness of proposed method, 5 km real road-test was performed. The results showed that the proposed method can estimate precisely the fuel consumption from vehicle multi-data. It was observed that the proposed models using instantaneous engine RPM and TPS can predict the fuel consumption quite well with correlation coefficient were 76% and 88% respectively.

Min Goo Lee, Kyung Kwon Jung, Yong Kuk Park, Jun Jae Yoo
The Study of Low Power Consumption for Single Hop Wireless Sensor Network

This paper proposed the Low power configuration of Single hop WSN(Wireless Sensor Network) system. When the RF communication is done each tag node during the WSN systems operating, power consumption is greatest. There for, if you configure the Network with the RF communication module turn on/off periodically, power consumption less then operating the module all the time without it toggles. However, some data omissions may occur in which transmission and receipt is done. So this paper proposed the algorithm for low power system without data omissions.

Min Chul Kim, Seung Joon Lee, Yeo Sun Kyung, Hyun Kwan Lee, Sung Boo Jung, Kyung Kwon Jung, Ki Hwan Eom
The Group Management System Based on Wireless Sensor Network and Application on Android Platform

This paper presents a group management system with WSN(Wireless Sensor Network) and smart phone devices. The proposed system was comprised of personal device based on WSN, smart phone device which is used by group manager and web server. The sensor node called as personal device which is used by group members sends a data packet every 2 seconds to the manager device. The manager can check their group member’s distance from him within a 30-meter radius and battery residual quantity with the manager device. Manager device sends its latitude and longitude data from GPS(Global Positioning System) and information of personal devices to web server. Therefore, other person such as group member’s parents can assure their children’s safety and security through the web page. The RSSI value from sensor node was converted into distance data by computed log-normal path loss model.

Seung Joon Lee, Min Chul Kim, Yeo Sun Kyung, Kyung Kwon Jung, Joo Woong Kim, Yong Gu Lee, Ki Hwan Eom
Design of Strip-Line Isolator Using the Resonator with Filter

In this paper, the detailed design of the Y-junction stripline circulator with the low pass filter circuit in the center conductor in order to higher attenuations below value of -30 dB at 3rd order harmonics is presented. The HFSS is used to simulate 1.8GHz band circulator and the results are compared with the experiment data. These results confirm that the designed Y-junction stripline circulator is effective in achieving high attenuation below -30 dB at 3rd order harmonics.

Young Cheol Yoo, Ki Hwan Eom
Noise Reducing of Multi-sensor RFID System by Improved Kalman Filter

For reducing noise in multi-sensor RFID (Radio Frequency Identification) system, we proposed the GA-Kalman Filter method in this paper. The proposed method is that membership functions of the fuzzy logic system are optimized by genetic algorithm (GA) under off-line, and then fuzzy logic system is constructed by the optimization parameters under on-line. Multi-sensors, humidity, oxygen and temperature, are used to our experiments, and are impacted by correlated noises. One of the most important factors of RFID sensor network system is accuracy in sensor data measurement. However, correlated noises are occurred in multi-sensor system. Kalman Filter has been widely applied to solve the noise problem which is occurred sensor data measurement. In this paper, the proposed GA-Fuzzy Kalman Filter method has the noise reducing compared to the general Kalman Filter method.

Yeosun Kyung, Seung Joon Lee, Minchul Kim, Chang Won Lee, Kyung Kwon Jung, Ki-Hwan Eom
Capacitive Humidity Sensor Tag Monitoring System Using the Capacitive to Voltage Converter (CVC)

Recently, interesting in RFID sensor tag technology which can read information on smart card is increasing worldwide. Most of sensor tag has been developed as resistive type sensor tags. Resistive type humidity sensor requires temperature revision as the influence of temperature and there are special environment to detect low humidity of 15% or less. To solve this problem, circuit was composed that capacitive sensor is interlocked to resistive type sensor tag. The composed circuit is a capacitive humidity sensor which is connected to resistive sensor tags. Using the CVC circuit, capacitive humidity sensor change is output voltage. The output voltage connects with resistive sensor tag. Implemented system’s sensor value storage or real time monitoring experiment result was able to determine the usefulness.

Chang Won Lee, Seung Joon Lee, Minchul Kim, Yeosun Kyung, Kihwan Eom
Oxygen and Carbon Dioxide Concentration Monitoring System for Freshness Management Based on RFID

This paper proposed the oxygen and carbon dioxide concentration monitoring system for freshness management based on RFID(Radio frequency identity). The freshness can be checked by various factors that are humidity, temperature, oxygen, carbon dioxide, and so on. This paper especially focuses oxygen and carbon dioxide. These two gases concentration is changed by freshness and affect the food too. So we use sensor for monitoring these gases and combine sensor with RFID. RFID system is easy to manage of application system. Through this combined system, we are easier to run freshness of food.

Min Chul Kim, Trung Pham Quoc, Seung Joon Lee, Yeo Sun Kyung, Chang won Lee, Ki Hwan Eom
A Virtual Machine Migration Management for Multiple Datacenters-Based Cloud Environments

In multiple datacenters-based cloud environments, virtual machines migrates across nodes located in the same or different datacenter to provide users with efficient resource provisioning services. Especially, migration between nodes located in different datacenter usually works on a wide area network. However, it takes a longer time than a local area network-based migration to transfer virtual devices’ state. In addition, it might change IP address of the migrated virtual machine on the target node. Therefore, in the wide area network-based migration, it is necessary to carefully consider migration transparency. This paper proposes a virtual machine location management and a reliable message delivery protocol for wide area network-based multiple datacenters cloud environments to guarantee message delivery to the migrated virtual machine. In addition, this paper also presents a smart-copy migration method for virtual machines to adaptively migrate according to network status.

JongHyuk Lee, HeonChang Yu, JoonMin Gil
Retracted Chapter: Design and Evaluation of a Hybrid Intelligent Broadcast Algorithm for Alert Message Dissemination in VANETs

Vehicular ad hoc network is an emerging new technology and a promising platform for the intelligent transportation system. The most important application of VANET is disseminating emergency messages to warn drivers in case of dangerous events. The core technique relies on the design of a broadcast scheme. In this paper, we propose a hybrid intelligent broadcast algorithm for alert message dissemination in VANETs that is called Hi-CAST. To deliver alert message effectively, the proposed Hi-CAST algorithm uses delay and probabilistic broadcast protocols together with token protocol. The performance of the Hi-CAST is evaluated through simulation and compared with that of other alert message dissemination algorithms.

Ihn-Han Bae
Korean Grapheme to Phoneme Conversion Using Phonological Phrasing Information – Focused on Tensification

This paper proposes a grapheme to phoneme conversion method for Korean Text-to-Speech system where the phonological phrasing information is incorporated. To verify the validity of the proposing method, a hybrid approach based grapheme to phoneme conversion system, which combines hand-written morphophonemic rules and maximum entropy models, is implemented. The experimental results show that the prediction accuracy of tensification on the

eojeol

(a space-delimited orthographic word) boundaries improve from 93.20% to 95.45%, which leads to better overall grapheme to phoneme conversion performance.

Byeongchang Kim, Jinsik Lee, Gary Geunbae Lee
EEDBR: Energy-Efficient Depth-Based Routing Protocol for Underwater Wireless Sensor Networks

Recently, Underwater Wireless Sensor Networks (UWSNs) have attracted much research attention from both academia and industry, in order to explore the vast underwater environment. However, designing network protocols is challenging in UWSNs since UWSNs have peculiar characteristics of large propagation delay, high error rate, low bandwidth and limited energy. In UWSNs, improving the energy efficiency is one of the most important issues since the replacement of the batteries of such nodes is very expensive due to harsh underwater environment. Hence, in this paper, we propose an energy efficient routing protocol, named EEDBR (Energy-Efficient Depth Based Routing protocol) for UWSNs. Our proposed protocol utilizes the depth of the sensor nodes for forwarding the data packets. Furthermore, the residual energy of the sensor nodes is also taken into account in order to improve the network life-time. Based on the comprehensive simulation using NS2, we observe that our proposed routing protocol contributes to the performance improvements in terms of the network lifetime, energy consumption and end-to-end delay.

Abdul Wahid, Sungwon Lee, Hong-Jong Jeong, Dongkyun Kim
A New Algorithm to Estimate Sensing Information for M2M Platform

In this paper, a new algorithm for reusing the collected information in Machine-to-Machine (M2M) platform is proposed. The proposed algorithm learns the pattern of the events monitored by the deployed devices, and decides the valid functions for time and geographical space. By adopting this algorithm, M2M communication networks are expected to use less transmission power and less computational resources.

Minsu Kim, Kijun Son, Tae-Young Byun
A Novel Algorithm for Selecting M2M Gateway Using Geographical Region-Based Query in M2M Platform

In this paper, effective Machine-to-Machine (M2M) gateway selection algorithms for geographical region-based query are considered. Four feasible algorithms which can be used to select the M2M gateway list are proposed. The performance evaluation results of proposed algorithms are also provided. By adopting this algorithm, M2M communication networks are expected to use less transmission power and less computational resources. The performance evaluation results of proposed algorithms are also provided.

Minsu Kim, Kijun Son, Tae-Young Byun
Tag Recognition Distance for a Medical Service Robot Using RFID

In this paper, the RFID tag recognition distance is measured for medical robot using RFID. The medical robot has the ability to recognize the face of the patients. The patients’ vital information such as, body temperature, blood pressure, can be measured by the robot. The robot recognizes its location by detecting RFID tags on the floor. The robot also has the ability to navigate the shortest path to the destination. Two kinds of RFID tags are used for the experiment, namely, 13.56MHz and 900MHz bands. The tests were performed by changing the distance and angle between antenna and the tags. Also, the RF power of antenna is varied for the tag recognition. Required antenna RF power and the angle between the read antenna and tag is measured for tag recognition.

Byung H. Moon, Seong R. Kim, Jeong T. Ryu
A Relay Vehicle Selection Scheme for Delivery of Emergency Message Considering Density and Trajectory of Moving Vehicles for VANET

Dissemination of safety alert messages through the broadcast is one of the most important applications for VANET. Excessive channel contention due to the simultaneous transmission of packets leads to the broadcast storm. To reduce the contention and redundant messages, it requires an effective multihop relay vehicle selection scheme. Therefore, we propose a relay vehicle selection scheme for delivery of emergency message considering the density of moving vehicles for VANET. In this paper, the most far vehicle from the previous relay vehicle while it belongs to the tolerant angle considering density is selected as a relay vehicle for next hop in distributed manner. To analyze its performance, we evaluate the number of hops for delivery of emergency messages and the number of candidate relay vehicles participating in competition for accessing the wireless channel. Simulation results show that the numbers of competition vehicles and hops can be reduced by application of an adequate tolerant angle considering with density of vehicle and location window size.

Hyun-Sook Kim, Seong-Sik Jang, Hyun-Cheol Cha, Tae-Young Byun
A Density-Based Clustering Scheme for Wireless Sensor Networks

In this paper, we propose a new energy efficient clustering scheme to prolong the network lifetime by reducing energy consumption at the sensor node. Every node will determine whether to participate in clustering with a certain probability, based on the local sensor density. This scheme is useful under the assumption that sensor nodes are deployed unevenly within the sensing area. By adjusting dynamically the probability of participating in clustering, the energy consumption of the network is reduced and the lifetime of the network is extended. The major improvement in power consumption happens in densely populated areas, where the probabilities of a node skipping a round of clustering are higher. Through computer simulation, we verified that the proposed scheme is more energy efficient than the LEACH clustering scheme in densely populated areas, while maintaining similar performance otherwise.

Jeong-Sam Kim, Tae-Young Byun
An Energy Efficient On-Demand Routing Scheme Based on Link Quality for Wireless Sensor Networks

Most of legacy routing schemes for wireless sensor networks do not consider the retransmission energy consumption when they predict the transmission energy consumption. They usually select the path based on hop by hop routing technology. Therefore these routing schemes have a problem in that they may exclude the path even though the path has better energy efficiency. In this paper, we proposed an energy aware routing scheme which transmits the accumulated predicted transmission energy value considering retransmission and minimum residual energy of node of whole candidate paths. A destination node selects the best energy efficient path within received candidate paths using energy related information. To evaluate the performance of our proposed scheme, the performance simulation has been compared to that of legacy on-demand routing scheme.

Bo-Gyoung Kim, Won Yeoul Lee, Seok-Yeol Heo, Wan-Jik Lee
Team Creativity Evolution Based on Exploitation and Exploration with Network Structure Perspectives

Even though several researches have been conducted on team creativity and organizational adaptation by the process of exploitation and exploration, few have attempted to address to analyze the direct structure of exploitation and exploration related to the network structure of organizations. This research addresses how team creativity can be revealed through knowledge creation of exploitation and exploration processes with an emphasis on network structure. Several network structures are considered like relational strength, heterogeneity, and knowledge diversity in order to analyze directly knowledge creation structure. We propose logical model defined by the knowledge creation functions of exploitation and exploration and time-dependent simulations were conducted.

Do Young Choi, Kun Chang Lee
Physiological Experiment Approach to Explore the Revelation Process for Individual Creativity Based on Exploitation and Exploration

The purpose of this study is aimed at understanding how task difficulty and emotion as a source of stress affect such creativity manifestation activities as exploration and exploitation in the decision support system environment. The study presented a situation where the subjects need to exert creativity to resolve a task, and the result was analyzed through the measurement of physiological signal data in the process of resolving a task. Empirical results reveal that exploration activity would be facilitated under less stressful environment, while exploitation in the stress situation.

Seong Wook Chae, Kun Chang Lee
Empirical Analysis of the Effect of Knowledge Network Structure on Individual Creativity through Exploitation and Exploration

This study proposes a type of individual creativity model that is comprised of knowledge network structure and creative process. Knowledge network structure represents degree centrality and structural holes that are driven by interactions among members in organization. In this model, we assume that individuals would yield different performances by complicated network structures. On the other hand, creative process includes exploration and exploitation. While exploitation is regarded as the existing solution, exploration is the development of new solutions. To validate our proposed model, we contacted the seven largest system integration companies in South Korea. Then, we collected the questionnaires of 73 members and their recently organized 7 teams, and analyzed the data by structural equation model. Our study found that degree centrality and structural holes significantly influence exploitation and exploration. Moreover, our results show that exploitation significantly has an effect on exploration, and both exploitation and exploration influence individual creativity positively.

Min Hee Hahn, Kun Chang Lee, Dae Sung Lee
A Study on Governing Law Arising from Cyber Intellectual Property Disputes in Korea

With rapid IT technology development in the world, many users can enjoy the benefit of some body’s intellectual property easily in the cyber space. But when it comes to use of business, there might be disputes over the intellectual property right (IPR) in various respects. This means that infringement on IPRs may happen in the several countries simultaneously. If the disputes contain foreign matters, a problem rises as to which country or which rule shall be applied as a governing law. In this respect Korea set a provision but it was not clarified as to the scope and intention. But this has been cleared through several court cases. The court shall, however, be cautious in applying lex loci protectionis in IPR disputes as IPR is being much complicated with involvements of number of foreign factors simultaneously

Ki-Moon Han
A Novel Predictive Binding Update Scheme for Fast Handover over IP-Based Wireless/Mobile Networks

These days, mobile device users are demanding a higher service due to technical development of mobile device. Because of the mobile communication traffic is magnified such as the wireless internet, SMS/MMS data services for various forms. Also, traditional wired environment has been transformed into a wireless environment. That is, wireless internet users increase, has become important in MIPv6, many services developed though 3G and WIBRO. Since 2004, MIPv6, Fast MIPv6, Hierarchical MIPv6, Proxy MIPv6 have been proposed due to improved performance by developing more protocols and related technologies, many studies currently underway. Has been the hottest issue in MIPv6 the mobile device other issues that occur when moving between Base Stations handover latency and packet loss and packet accordingly phenomenon is reversed. In this paper, we used beacon Messages, Look-Up and Reverse Binding. So, we are proposed to solve these problems by using the proposed method.

Sung-Gyu Kim, Dami Kim, Jihey Kim, Dayoung Han, Byungjoo Park
Retraction Note to: Design and Evaluation of a Hybrid Intelligent Broadcast Algorithm for Alert Message Dissemination in VANETs

The paper starting on page 206 of this volume has been retracted because it is a duplicate of the paper starting on page 68 of the same volume.

Ihn-Han Bae
Backmatter
Metadaten
Titel
Advanced Computer Science and Information Technology
herausgegeben von
Tai-hoon Kim
Hojjat Adeli
Rosslin John Robles
Maricel Balitanas
Copyright-Jahr
2011
Verlag
Springer Berlin Heidelberg
Electronic ISBN
978-3-642-24267-0
Print ISBN
978-3-642-24266-3
DOI
https://doi.org/10.1007/978-3-642-24267-0