Skip to main content
main-content

Über dieses Buch

Security-enriched urban computing and smart grids are areas that attracted many a- demic and industry professionals to research and develop. The goal of this conference was to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of urban computing and the smart grid. This conference includes the following special sessions: Signal Processing, Image Processing, Pattern Recognition and Communications (SIPC 2010), Networking, Fault-tolerance and Security For Distributed Computing Systems (NFSDCS 2010), Security Technology Application (STA 2010), Electric Transportation (ElecTrans 2010), Techniques of Bi-directional Power Computing in High Voltage Power Supply (TBPC 2010), Low Power IT and Applications (LPITA 2010), Computational Intel- gence and Soft Computing (CISC 2010), Distributed Computing and Sensor Networks (DCSN 2010), Advanced Fusion IT (AFIT 2010), Social Media and Social Netwo- ing (SMSN 2010), Software Engineering and Medical Information Engineering (SEMIE 2010), Human-Centered Advanced Research/Education (HuCARE 2010), Database Integrity and Security (DIS 2010), Ubiquitous IT Application (UITA 2010) and Smart Grid Applications (SGA 2010). We would like to express our gratitude to all of the authors of the submitted papers and to all attendees, for their contributions and participation. We believe in the need for continuing this undertaking in the future.

Inhaltsverzeichnis

Frontmatter

Genetic-Annealing Algorithm in Grid Environment for Scheduling Problems

This paper presents a parallel hybrid evolutionary algorithm executed in a grid environment. The algorithm executes local searches using simulated annealing within a Genetic Algorithm to solve the job shop scheduling problem. Experimental results of the algorithm obtained in the “Tarantula MiniGrid” are shown. Tarantula was implemented by linking two clusters from different geographic locations in Mexico (Morelos-Veracruz). The technique used to link the two clusters and configure the Tarantula MiniGrid is described. The effects of latency in communication between the two clusters are discussed. It is shown that the evolutionary algorithm presented is more efficient working in Grid environments because it can carry out major exploration and exploitation of the solution space.

Marco Antonio Cruz-Chávez, Abelardo Rodríguez-León, Erika Yesenia Ávila-Melgar, Fredy Juárez-Pérez, Martín H. Cruz-Rosales, Rafael Rivera-López

Dynamic Increasing the Capacity of Transmission Line Based on the Kylin Operating System

Transmission of electric power has traditionally been limited by the conductor thermal capacity statically defined of a transmission line. However, based on real-time measurement and analysis of environmental data and transmission line characteristics, the capacity of transmission line can be greatly increased. Consequently, a monitoring system is designed and implemented to dynamic increase the transmission capacity. The system is executed on the Kylin operating system to promote its application in the electric power system. Based on the J2EE

TM

platform, the monitoring system realizes a series of functions, such as real-time data collection, calculating and analysis, automatic storage of relevant parameters, transmission capacity prediction, etc. The monitoring system provides a reliable hardware and software platform for supervising and scheduling the grid. The effectiveness of the system is evaluated by its successful application in a grid data supervision system.

Wei Li, Zhiwei Feng, Jing Zhou, Kehe Wu, Jing Teng

Projective Illumination Technique in Unprepared Environments for Augmented Reality Applications

Most augmented reality (AR) applications in prepared environments implement illumination mechanisms between real and synthetic objects to achieve best results. This approach is beneficial to tracking technologies since additional visual cues provide seamless real-synthetic world integration. This research focuses on providing a projective illumination technique to aid augmented reality tracking technologies that work in unprepared environments where users are not allowed to modify the real environment, such as in outdoor applications. Here, we address the specific aspects of the common illumination problems such as efficient update of illumination for moving objects and camera calibration, rendering, and modeling of the real scene. Our framework aims to lead AR applications in unprepared environments with projective illumination regardless of the movement of real objects, lights and cameras.

Giovanni Cagalaban, Seoksoo Kim

The Design of Modular Web-Based Collaboration

Online collaborative systems are popular communication channels as the systems allow people from various disciplines to interact and collaborate with ease. The systems provide communication tools and services that can be integrated on the web; consequently, the systems are more convenient to use and easier to install. Nevertheless, most of the currently available systems are designed according to some specific requirements and cannot be straightforwardly integrated into various applications. This paper provides the design of a new collaborative platform, which is component-based and re-configurable. The platform is called the Modular Web-based Collaboration (MWC). MWC shares the same concept as computer supported collaborative work (CSCW) and computer-supported collaborative learning (CSCL), but it provides configurable tools for online collaboration. Each tool module can be integrated into users’ web applications freely and easily. This makes collaborative system flexible, adaptable and suitable for online collaboration.

Ploypailin Intapong, Sittapong Settapat, Boonserm Kaewkamnerdpong, Tiranee Achalakul

Design of a Forecasting Service System for Monitoring of Vulnerabilities of Sensor Networks

This study aims to reduce security vulnerabilities of sensor networks which transmit data in an open environment by developing a forecasting service system. The system is to remove or monitor causes of breach incidents in advance. To that end, this research first examines general security vulnerabilities of sensor networks and analyzes characteristics of existing forecasting systems. Then, 5 steps of a forecasting service system are proposed in order to improve security responses.

Jae-gu Song, Jong hyun Kim, Dong il Seo, Seoksoo Kim

A Study on M2M-based System for Hygienic Meteorology Service

M2M proposes a standardized communications technology between network and devices. This study has designed an M2M-based system to smoothly deliver information between devices which were required to provide hygienic meteorology services. Especially, an efficient plan for service provision has been studied, by classifying the types of information at each stage of user, EM, SM, HSM and SPM.

Jae-gu Song, Jae Young Ahn, Seoksoo Kim

Knowledge Integration and Use-Case Analysis for a Customized Drug-Drug Interaction CDS Service

Clinical decision support systems (CDSSs) are thought to reduce adverse drug events (ADEs) by monitoring drug-drug interactions(DDIs). However, clinically improper or excessive alerts can result in high alert overrides. A tailored CDS service, which is appropriate for clinicians and their ordering situations, is required to increase alert acceptance. In this study, we conducted a 12-week pilot project adopting a tailed CDSS at an emergency department. The new CDSS was conducted via a stepwise integration of additional new rules. The alert status with changes in acceptance rate was analyzed. The most frequent DDI alerts were related to prescriptions of anti-inflammatory drugs. The percentages of alert overrides for each stage were 98.0%, 96.0%, 96.9%, and 98.1%, respectively. 91.5% of overridden alerts were related to discharge medications. To reduce the potential hazards of ADEs, the development of an effective customized DDI CDSS is required, via in-depth analysis on alert patterns and overridden reasons.

Hye Jin Kam, Man Young Park, Woojae Kim, Duk Yong Yoon, Eun Kyoung Ahn, Rae Woong Park

A Study on Markerless AR-Based Infant Education System Using CBIR

Block play is widely known to be effective to help a child develop emotionally and physically based on learning by a sense of sight and touch. But block play can not expect to have learning effects through a sense of hearing. Therefore, in this study, such limitations are overcome by a method that recognizes an object made up of blocks, not a marker-based method generally used for an AR environment, a matching technology enabling an object to be perceived in every direction, and a technology combining images of the real world with 2D/3D images/pictures/sounds of a similar object. Also, an education system for children aged 3~5 is designed to implement markerless AR with the CBIR method.

Ji-hoon Lim, Seoksoo Kim

A Study on Home Network User Authentication Using Token-Based OTP

The system proposed in this thesis offers authority or control over an approach to licensed users for diverse devices used in Home Network, preventing unlicensed users from inappropriate approach. In relation to communications of security certification for each device, reduction in added resources and high security can be both met through a security token generated using OTP, which is reasonably applicable to low-efficiency instruments that compose a home network.

Jung-Oh Park, Moon-Seog Jun, Sang-Geun Kim

Web-Based Media Contents Editor for UCC Websites

The purpose of this research is to “design web-based media contents editor for establishing UCC(User Created Contents)-based websites.” The web-based editor features user-oriented interfaces and increased convenience, significantly different from previous off-line editors. It allows users to edit media contents online and can be effectively used for online promotion activities of enterprises and organizations. In addition to development of the editor, the research aims to support the entry of enterprises and public agencies to the online market by combining the technology with various UCC items.

Seoksoo Kim

A Study on AR 3D Objects Shading Method Using Electronic Compass Sensor

More effective communications can be offered to users by applying NPR (Non-Photorealistic Rendering) methods to 3D graphics. Thus, there has been much research on how to apply NPR to mobile contents. However, previous studies only propose cartoon rendering for pre-treatment with no consideration for directions of light in the surrounding environment. In this study, therefore, ECS(Electronic Compass Sensor) is applied to AR 3D objects shading in order to define directions of light as per time slots for assimilation with the surrounding environment.

Sungmo Jung, Seoksoo Kim

A New Approach for Semantic Web Matching

In this work we propose a new approach for semantic web matching to improve the performance of Web Service replacement. Because in automatic systems we should ensure the self-healing, self-configuration, self-optimization and self-management, all services should be always available and if one of them crashes, it should be replaced with the most similar one. Candidate services are advertised in Universal Description, Discovery and Integration (UDDI) all in Web Ontology Language (OWL). By the help of bipartite graph, we did the matching between the crashed service and a Candidate one. Then we chose the best service, which had the maximum rate of matching. In fact we compare two services‘ functionalities and capabilities to see how much they match. We found that the best way for matching two web services, is comparing the functionalities of them.

Kamran Zamanifar, Golsa Heidary, Naser Nematbakhsh, Farhad Mardukhi

Security Enhancement for Authentication of Nodes in MANET by Checking the CRL Status of Servers

MANET security is becoming a challenge for researchers with the time. The lack of infrastructure gives rise to authentication problems in these networks. Most of the TTP and non-TTP based schemes seem to be impractical for being adopted in MANETs. A hybrid key-management scheme addressed these issues effectively by pre-assigned logins on offline basis and issuing certificates on its basis using 4G services. However, the scheme did not taken into account the CRL status of servers; if it is embedded the nodes need to check frequently the server’s CRL status for authenticating any node and place external messages outside MANET which leads to overheads. We have tried to reduce them by introducing an online MANET Authority responsible for issuing certificates by considering the CRL status of servers, renewing them and key verification within MANET that has greatly reduced the external messages.

Azeem Irshad, Wajahat Noshairwan, Muhammad Shafiq, Shahzada Khurram, Ehtsham Irshad, Muhammad Usman

Performance Evaluation Analysis of Group Mobility in Mobile Ad Hoc Networks

Mobility of nodes is an important issue in mobile adhoc networks (MANET). Nodes in MANET move from one network to another individually and in the form of group. In single node mobility scheme every node performs registration individually in new MANET whereas in group mobility scheme only one node in a group i.e group representative (GR) performs registration on behalf of all other nodes in the group and is assigned Care of Address (CoA). Internet protocol (IP) of all other nodes in the group remains same. Our simulated results prove that group mobility scheme reduces number of messages and consumes less time for registration of nodes as compared to single node mobility scheme. Thus network load is reduced in group mobility scheme. This research paper evaluates the performance of group mobility with single node mobility scheme. Test bed for this evaluation is based on Network Simulator 2 (NS-2) environment.

Ehtsham Irshad, Wajahat Noshairwan, Muhammad Shafiq, Shahzada Khurram, Azeem Irshad, Muhammad Usman

Procedure of Partitioning Data Into Number of Data Sets or Data Group – A Review

The goal of clustering is to decompose a dataset into similar groups based on a objective function. Some already well established clustering algorithms are there for data clustering. Objective of these data clustering algorithms are to divide the data points of the feature space into a number of groups (or classes) so that a predefined set of criteria are satisfied. The article considers the comparative study about the effectiveness and efficiency of traditional data clustering algorithms. For evaluating the performance of the clustering algorithms, Minkowski score is used here for different data sets.

Tai-hoon Kim

Processing of Handwritten Signature Image for Authentication

Since last few years, Handwritten Signature Authentication is a classical research work area in the line of Computer Science. Various new techniques of Image Analysis also attracting the Computer Scientists as well. Firstly, Pixel clustering is used to transform the signature image into bi-color image. Then secondly, instead of considering the whole image, only signature area is extracted. Thirdly, by using Image scaling technique the signature image resized along the coordinate directions. As different techniques are used to subsample (image after transformation) which will be discussed in turn. Fourthly, a different technique is used for thinning to reduce the threshold output of an edge detector algorithm is used to lines of a single pixel thickness. In this paper we propose the above mentioned series of techniques as the preprocessing analysis part of Handwritten Signature Recognition.

Tai-hoon Kim

Retracted: Access Requirement Analysis of E-Governance Systems

The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user’s access requirement for the stakeholders and then according to the models of Nath’s approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

Tai-hoon Kim

Cognitive Informatics in Medical Image Semantic Content Understanding

This publication presents the idea of cognitive categorisation systems as used in the cognitive informatics field using the example of image analysis systems – UBIAS. Cognitive categorisation systems execute semantically-oriented data analysis processes, i.e. analyse meaning based on the semantic contents of analysed data sets. Cognitive data analysis processes lead to the in-depth interpretation and understanding of various types of data. This publication presents a selected class of cognitive categorisation systems called the UBIAS (Understanding Based Image Analysis Systems), also referred to as image analysis systems.

Marek R. Ogiela, Lidia Ogiela

An Attack on Wavelet Tree Shuffling Encryption Schemes

With the ubiquity of the internet and advances in technology, especially digital consumer electronics, demand for online multimedia services is ever increasing. While it’s possible to achieve a great reduction in bandwidth utilization of multimedia data such as image and video through compression, security still remains a great concern. Traditional cryptographic algorithms/systems for data security are often not fast enough to process the vast amounts of data generated by the multimedia applications to meet the realtime constraints. Selective encryption is a new scheme for multimedia content protection. It involves encrypting only a portion of the data to reduce computational complexity(the amount of data to encrypt)while preserving a sufficient level of security. To achieve this, many selective encryption schemes are presented in different literatures. One of them is Wavelet Tree Shuffling. In this paper we assess the security of a wavelet tree shuffling encryption scheme.

Samuel Assegie, Paul Salama, Brian King

Context Aware Systems, Methods and Trends in Smart Home Technology

Context aware applications respond and adapt to changes in the computing environment. It is the concept of leveraging information about the end user to improve the quality of the interaction. New technologies in context-enriched services will use location, presence, social attributes, and other environmental information to anticipate an end user’s immediate needs, offering more-sophisticated, situation-aware and usable functions. Smart homes connect all the devices and appliances in your home so they can communicate with each other and with you. Context-awareness can be applied to Smart Home technology. In this paper, we discuss the context-aware tools for development of Smart Home Systems.

Rosslin John Robles, Tai-hoon Kim

Data Hiding a Key Management for Interoperable Urban Services

Availability of a reliable urban services data is the key component for an industrialized area. Urban settings are challenging places for experimentation and deployment and along with its complexity insecurity also contributes a bigger challenge. To address such issues this paper has defined the implementation issues in integrating Geospatial services data and web services technologies and proposed a methodology of securing the systems. The proposition presented earlier is a symmetric encryption which is to share the common key for doing both encryption and decryption secretly, and periodically.

Maricel O. Balitanas, Taihoon Kim

Machine-Type-Communication (MTC) Device Grouping Algorithm for Congestion Avoidance of MTC Oriented LTE Network

Machine-Type-Communication (MTC) is a new paradigm in mobile wireless network domains such as Mobile WiMAX (IEEE 802.16e) and 3GPP LTE (3rd Generation Partnership Project Long Term Evolution). We explain the background for MTC environments, and its key issues. Then we focus on the uplink traffic aggressiveness characteristics in major applications such as Smart Grid. Then, we propose a new congestion avoidance algorithm to reduce the congestion of the uplink intensive applications.

Kwang-Ryul Jung, Aesoon Park, Sungwon Lee

An Architecture for the Emotion-Based Ubiquitous Services in Wearable Computing Environment

The exhibition of informatics services does not always attend to the context that involves the user’s physiologically emotional signals. Wearable computing services with user’s emotional information could be extremely effective in various applications. In this paper, with the aim of developing more effective human-centric services, we propose a novel methodological architecture. Proposed architecture employs the convergence of wearable computing technique, human’s emotional information and context tagging technique to develop more realistic and robust human-centric service.

Haesung Lee, Joonhee Kwon

Adaptive Data Dissemination Protocol for Wireless Sensor Networks

In terms of data delivery required by the application, WSN can be categorized as continuous or event-driven. The former type provides an accurate snapshot of relevant attributes with high energy consumption, whereas the latter type is more energy efficient and yet less accurate because only sudden and drastic changes in the value of a sensed attribute trigger data delivery. In this paper, we propose a hybrid data delivery protocol that adaptively switches between these two data dissemination schemes. That is, during the period when the condition referring to an event is met, sensor nodes continuously send data to an observer. However, when the condition is no longer valid, the protocol behaves as event-driven, thus eliminating unnecessary data transmission. As such, the proposed protocol is able to enable an accurate analysis of the environment being monitored with moderate consumption of valuable resources.

Byoung-Dai Lee

Scalable Multicast Protocols for Overlapped Groups in Broker-Based Sensor Networks

In sensor networks, there are lots of overlapped multicast groups because of many subscribers, associated with their potentially varying specific interests, querying every event to sensors/publishers. And gossip based communication protocols are promising as one of potential solutions providing scalability in P(Publish)/ S(Subscribe) paradigm in sensor networks. Moreover, despite the importance of both guaranteeing message delivery order and supporting overlapped multicast groups in sensor or P2P networks, there exist little research works on development of gossip-based protocols to satisfy all these requirements. In this paper, we present two versions of causally ordered delivery guaranteeing protocols for overlapped multicast groups. The one is based on sensor-broker as delegates and the other is based on local views and delegates representing subscriber subgroups. In the sensor-broker based protocol, sensor-broker might lead to make overlapped multicast networks organized by subscriber’s interests. The message delivery order has been guaranteed consistently and all multicast messages are delivered to overlapped subscribers using gossip based protocols by sensor-broker. Therefore, these features of the sensor-broker based protocol might be significantly scalable rather than those of the protocols by hierarchical membership list of dedicated groups like traditional committee protocols. And the subscriber-delegate based protocol is much stronger rather than fully decentralized protocols guaranteeing causally ordered delivery based on only local views because the message delivery order has been guaranteed consistently by all corresponding members of the groups including delegates. Therefore, this feature of the subscriber-delegate protocol is a hybrid approach improving the inherent scalability of multicast nature by gossip-based technique in all communications.

Chayoung Kim, Jinho Ahn

On Reducing the Impact of Exceptional Conditions on Museum Sightseeing Crowdedness Control Mechanisms

As ubiquitous computing technology convergences into many industrial domains, most museums want to apply this technique to their domain. However, most ubiquitous museums merely provide the simplest service giving visitors only static information of artifact. To resolve limitations of the existing ubiquitous museums, we had proposed Visitor Preference based Museum Viewing Search Algorithm that provides the best path for visitors to reflect their preferences. However, since the Visitor Preference based Museum Viewing Search Algorithm did not consider abnormal situations that occur while visitors look at the exhibit. So when abnormal situations occur, the exhibition may cause congestion problems that may make visitors feel very uncomfortable. In this paper, we propose an efficient congestion control algorithm to solve these problems. This algorithm automatically re-finds proper alternative paths for avoiding congestion resulting from the abnormal ones occurring during the museum viewing. The proposed algorithm improves comfortable museum viewing services by preventing congestion in advance when exceptional conditions occur. For the experiment of the proposed algorithm, we show that the algorithm can provide the best path without congestion exhibition.

Yoondeuk Seo, Jinho Ahn

A Communication Architecture for Monitoring and Diagnosing Distribution Systems

In power distribution system, a sink of each wireless sensor network is required to deliver monitoring data or fault diagnosis to a gateway for ultimate delivery to a monitoring center located in an external network. In this paper, we propose an efficient path management mechanism between the sink and the gateway. We have proved that our proposed mechanism performs much better than existing routing mechanisms in terms of the service time and the data loss rate.

Yujin Lim, Sanghyun Ahn, Jaesung Park

Network Infrastructure for Electric Vehicle Charging

Controlled charging of electric vehicles can take care of fluctuating electricity supply. In this paper, we design network infrastructure to collect and deliver data of charging data of electric vehicles to remote monitoring center. In our network infrastructure, we analyze and compare the existing routing mechanisms for multi-hop wireless networks from aspect of the control overhead for the path establishment.

Yujin Lim, Jaesung Park, Sanghyun Ahn

Prediction of Personal Power Consumption Using the Moving Average Technique

In this paper we introduce a new prediction method of personal power consumption using the moving average technique. Unlike typical methods, our method considers the trend of consumer’s statistical power consumption changes for estimating the statistical future power consumption. In the simulation section, we verify that the performance of our method is better than that of typical method.

Jongwoo Kim, Sanggil Kang, Hak-Man Kim

Personalized Energy Portal Service Using Consumers’ Profile Information

We propose a personalized energy portal service system using a collaborative filtering technique, which provides a personalized energy information in an energy portal site according to consumer’s energy interest tendency. The proposed system analyzes the registered consumers’ actions on the site, such as “clicking” energy and “downloading” on the information related personal energy interest. According to the different actions, we provide a weight for calculating the consumers’ tendency of energy consumption. However, the information is uniformly provided to the individual consumers. In order to avoid the problem, we customize the order of energy information according to whether there is any mismatching of profiles among registered consumers and target consumers.

Jongwoo Kim, Juwan Kim, Sanggil Kang, Hak-Man Kim, Young-Kuk Kim

Reliable Power Quality Data Delivery Mechanism Using Neural Network in Wireless Sensor Network

Power grids deal with the business of generation, transmission, and distribution of electric power. Current systems monitor basic electrical quantities such as voltage and current from major pole transformers with their temperature. We improve the current systems in order to gather and deliver the information of power qualities such as harmonics, voltage sags, and voltage swells. In the system, data delivery is not guaranteed for the case that a node is lost or the network is congested, because the system has the in-line and multi-hop architecture. In this paper, we propose a reliable data delivery mechanism by modeling an optimal data delivery function by employing the neural network concept.

Yujin Lim, Hak-Man Kim, Sanggil Kang

A New Challenge of Microgrid Operation

The microgrid is a small-scale power system, which is composed of distributed generators, distributed storage systems, and loads. Currently, the microgrid has been studied in many countries because of being an eco-friend power system, supplying good power quality, and including renewable energy sources such as solar power and wind power. It is anticipated that the microgrid will be introduced to distribution power systems in the near future. According to operational and geographical conditions, the microgrid is operated by two modes: the grid-connected mode and the islanded mode. In this paper, backgrounds of the microgrid are described. Microgrid operation is classified in detail. A mathematical model based on linear programming and an example of a multiagent system for microgrid operation are introduced.

Hak-Man Kim, Tetsuo Kinoshita

Authentication System for Electrical Charging of Electrical Vehicles in the Housing Development

Recently the smart grid has been a hot issue in the research area. The Electric Vehicle (EV) is the most important component in the Smart Grid, having a role of the battery component with high capacity. We have thought how to introduce the EV in the housing development, and for proper operation of the smart grid systems in the housing area the authentication system is essential for the individual houses. We propose an authentication system to discriminate an individual houses, so that the account management component can appropriately operate the electrical charging and billing in the housing estate. The proposed system has an architecture to integrate the charging system outside a house and the monitoring system inside a house.

Wang-Cheol Song

Design of a Multi-agent System for Personalized Service in the Smart Grid

This paper designs a multi-agent system capable of providing personalized services in the smart grid, defining the relevant agent modules. The proposed system provides electricity consumers with personalized power purchase recommendation. Our framework consists of four agents and seven object categories. For the operation center which manages and controls the whole system, an adaptive agent, a coordination agent, and a filtering agent are defined, while a consumer agent is define for each home to collect the history of power consumption. Based on the analysis of the consumer, power market, residence, power consumption, appliance, family member, and electric vehicle objects, those agents autonomously cooperate to provide a personalized power service to each smart grid entity. In addition, adaptive learning capability further improves the recommendation quality.

Jinhee Ko, In-Hye Shin, Gyung-Leen Park, Ho-Yong Kwak, Khi-Jung Ahn

An Efficient Scheduling Scheme on Charging Stations for Smart Transportation

This paper proposes a reservation-based scheduling scheme for the charging station to decide the service order of multiple requests, aiming at improving the satisfiability of electric vehicles. The proposed scheme makes it possible for a customer to reduce the charge cost and waiting time, while a station can extend the number of clients it can serve. A linear rank function is defined based on estimated arrival time, waiting time bound, and the amount of needed power, reducing the scheduling complexity. Receiving the requests from the clients, the power station decides the charge order by the rank function and then replies to the requesters with the waiting time and cost it can guarantee. Each requester can decide whether to charge at that station or try another station. This scheduler can evolve to integrate a new pricing policy and services, enriching the electric vehicle transport system.

Hye-Jin Kim, Junghoon Lee, Gyung-Leen Park, Min-Jae Kang, Mikyung Kang

Design for Run-Time Monitor on Cloud Computing

Cloud computing is a new information technology trend that moves computing and data away from desktops and portable PCs into large data centers. The basic principle of cloud computing is to deliver applications as services over the Internet as well as infrastructure. A cloud is the type of a parallel and distributed system consisting of a collection of inter-connected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources. The large-scale distributed applications on a cloud require adaptive service-based software, which has the capability of monitoring the system status change, analyzing the monitored information, and adapting its service configuration while considering tradeoffs among multiple QoS features simultaneously. In this paper, we design Run-Time Monitor (RTM) which is a system software to monitor the application behavior at run-time, analyze the collected information, and optimize resources on cloud computing. RTM monitors application software through library instrumentation as well as underlying hardware through performance counter optimizing its computing configuration based on the analyzed data.

Mikyung Kang, Dong-In Kang, Mira Yun, Gyung-Leen Park, Junghoon Lee

Design of an Advertisement Scenario for Electric Vehicles Using Digital Multimedia Broadcasting

This paper designs an integrative advertisement system based on digital multimedia broadcasting for the electric vehicles, which need a lot of driving information for battery efficiency and charge planning. The advertiser interface interacts with the advertisement processing system to pay the fee and have the contents endorsed. The advertisement contents are registered, monitored, encoded, and finally delivered to vehicles according to the contract via the broadcasting center. Here, this paper defines a new frame format on the data service stream and is in the process of developing and verifying the encoder and decoder modules. Our system is expected to provide the fundamentals for the development of diverse electric vehicle services.

Junghoon Lee, Hye-Jin Kim, In-Hye Shin, Jason Cho, Sang Joon Lee, Ho-Young Kwak

Development of Wireless RFID Glove for Various Applications

Radio Frequency Identification is increasingly popular technology with many applications. The majority of applications of RFID are supply-chain management. In this paper, we proposed the development of wireless RFID Glove for various applications in real life. Proposed wireless RFID glove is composed of RFID reader of 13.56 MHz and RF wireless module. Proposed Gloves were applied to two applications. First is the interactive leaning and second is Meal aid system for blind people. The experimental results confirmed good performances.

Changwon Lee, Minchul Kim, Jinwoo Park, Jeonghoon Oh, Kihwan Eom

Implementation of RFID Tag for Metal Surface Mount

This paper described a metal mount RFID tag that works reliably on metallic surface. The proposed method is to use commercial RFID tags, Styrofoam103.7 material is attached on back side of RFID tag. Styrofoam103.7 material which has 2.5 mm thickness and 1.03 of relative permittivity was attached on back side of RFID tag. In order to verify the performance of proposed method, we evaluated the experiment on the supply chain system of electric transformers. The experimental results on supply chain of electric transformers show that the proposed tags can communicate with readers from a distance of 2 m. The results of recognition rates are comparable to commercial metallic mountable tags.

Chong Ryol Park, Sang Won Yoon, Kyung Kwon Jung, Ki Hwan Eom

U-Bus System Design Based on WSN for the Blind People

This paper proposed the U-bus system design based on wireless sensor network (WSN) for blind people. This system has two main parts. First part is blind people recognition. Another part is communication between a bus and bus station. Blind people recognition part is constructed simple device and system. This part decides existing or non-existing of the blind at bus station. And then if pre-process recognize blind people, the bus station will communicate the bus. We make up the announcement system about arrived bus information for the blind people using these parts. This announcement about arrived bus is very useful to blind people for taking the bus.

Trung Pham Quoc, Minchul Kim, Hyunkwan Lee, Kihwan Eom

Measurements and Modeling of Noise on 22.9-kV Medium-Voltage Underground Power Line for Broadband Power Line Communication

This paper proposed the measurements and modeling of noise on the 22.9-kV Medium-Voltage (MV) underground power distribution cable for Broadband Power Line Communication (BPLC). The proposed measurement system was composed of inductive coupler and Digital Phosphor Oscilloscope (DPO). The measurement noise data was obtained from thirty-two pad mounted transformers in the test field located in Choji area of Ansan city. After conducting analysis of noise characteristics in time and frequency domain, the noise model are presented. In order to analyze the noise in frequency domain, Power Spectral Density (PSD) was computed with empirical data using Welch’s method. The modeling of the power line noise at each frequency carried out using Cumulative Probability Distribution (CPD) of the noise power. It compared with common Cumulative Distribution Functions (CDF) of Nakagami-m distribution, Gaussian distribution, Gamma distribution. In low frequency range, gamma distribution was fitted with the CPD. Nakagami-m distribution provides a good fitting to the noise CPD above 20MHz frequency range.

Seungjoon Lee, Donghwan Shin, Yonghwa Kim, Jaejo Lee, Kihwan Eom

Optimal Control Method of Electric Power Generation in Multi Level Water Dams

Generally, about 67% of hydropower generation is depending on the rainy season. In other word the process of development of water resources is too limited to a particular season.

As a solution to this problem, this paper proposes an optimal control method of hydroelectric power development in multi level water dams.

The main advantage of the system is stabilization of the amount of power generate in dams. Simulation results show that the proposed optimal control method indicates development rate in Chungpyung Dam is about a 40%, 25% in Chungju Dam and 37.5% in Paldang.

Yeosun Kyung, Joowoong Kim, Sungboo Jung, Kihwan Eom

Real-Time Hand Gesture SEMG Using Spectral Estimation and LVQ for Two-Wheel Control

In this paper, a real-time experimental of Hand Gesture SEMG using Spectral Estimation and Linear Vector Quantization for Two-Wheel Machine Control is proposed. The raw SEMG signals been captured from SEMG amplifier and the Auto Regressive (AR) Covariance returned the power spectral density (PSD) magnitude squared frequency response. Up to 4 channels of AR data will be combined and a fine tuning step by using LVQ will then incorporate for pattern classification. The database then been build and use for real-time experimental control classification. Captured data will send through serial port and Two-Wheel Machine will receive and move accordingly. The detail of the experiment and simulation conducted described here to verify the differentiation and effectiveness of combined channels PSD method SEMG pattern classification of hand gesture for real-time control.

Mohammad Afif B Kasno, Jihoon Ahn, Kyungkwon Jung, Yonggu Lee, Kihwan Eom

A Self-deployment Scheme for Mobile Sensor Network with Obstacle Avoidance

In our previous study, we showed that the coverage area can be efficiently expanded by having sensors move to the centroids of their Voronoi polygon generated using the location information of neighboring sensors. In this paper, we present an energy-efficient self-deployment scheme to utilize the attractive force generated from the centroid of a sensor’s local Voronoi polygon as well as the repulsive force frequently used in self-deployment schemes using the potential field. By using the proposed scheme, mobile sensors also have the obstacle-avoidance capability. The simulation results show that our scheme can achieve a higher coverage and enables less sensor movements in shorter times in a region with obstacles than self-deployment schemes using the traditional potential field.

Chan-Myung Kim, Yong-hwan Kim, Hee-Sung Lim, Youn-Hee Han

ICSW2AN : An Inter-vehicle Communication System Using Mobile Access Point over Wireless Wide Area Networks

This paper presents a prototype of inter-vehicle communication system using mobile access point that internetworks wired or wireless LAN and wireless WAN anywhere. Implemented mobile access point can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. Mobile access point in the IP mechanism has to process connection setup procedure to one wireless WAN. To show the applicability of the mobile access point to inter-vehicle communication, a simplified V2I2V-based car communication system called ICSW

2

AN is implemented to evaluate major performance metrics by road test. In addition, results of road test for traffic information service are investigated in view of RTT, latency and server processing time. The experimental result indicates that V2I2V-based car communication system sufficiently can provide time-tolerant traffic information to moving vehicles while more than two mobile devices in restricted spaces such as car, train and ship access wireless Internet simultaneously.

Tae-Young Byun

MAMODE: A Routing Scheme Using Mixed Address Mode for Wireless Sensor Networks

As deployment of sensor networks are recently spread, a variety of services based on sensor network have been introduced. Nevertheless, prolonging of battery life becomes primary challenges to overcome for deploying sensor networks in various fields. Problems such as network bandwidth reduction, collision occurrence and performance deterioration due to broadcasting of message in large scale networks have become primary challenges. In this paper, we presented a new routing algorithm based on data-centric routing and address-based routing schemes, which is that query messages are delivered to specific area by using address-based routing scheme in unicast scheme, and then, broadcast scheme is used in specific area by inserting additional information of neighbor nodes to broadcast into the message payload. This method prevents severe broadcast storm caused by broadcast message, and also provides data reliability at reasonable level by utilizing address information in message. By computer simulation, our proposed scheme significantly reduces energy consumption caused by broadcasting of messages as well as it improves appropriate data reliability in wireless sensor networks.

Jeongho Son, Tae-Young Byun

Processing of Large-Scale Nano-ink Data by Supercomputer

Recently, the simulation techniques using computers have been actively utilized to examine the effects of social or physical interactions. Those works often generate very large amounts of data, and to deal with them, it may be necessary to use high-performance supercomputers as well as to develop efficient algorithms. This paper presents the results of the simulation works to deal with the data generated in developing a printable board using nano-size, conductible inks. Our works are conducted with a supercomputer, based on parallel programming using message passing interface (MPI). The simulation results obtained from our works can be utilized to verify the findings obtained from the real physical experiments.

Sungsuk Kim, Joon-Min Gil

Efficient Resource Management and Task Migration in Mobile Grid Environments

Grid computing using wireless networks is receiving increasing attention and is expected to become a critical part of future grid computing. However, the inherent challenges of mobile environments such as mobility management, disconnected operation, device heterogeneity, service discovery, and resource sharing are significant issues in mobile grid computing. To achieve the best performance in a mobile grid computing environment, the mobile devices with the lowest probability of mobility should be selected for use first. We therefore focus on the idle state of mobile devices and use IP-paging scheme to identify the idle mobile devices. For this, we propose a user-defined checkpoint technique for task migration, which is based on the information of when a mobile device will leave the network or stop due to low battery. Our checkpoint technique performs checkpoints by two conditions: when a mobile device leaves its current cell and when it turns off due to low battery capacity.

DaeWon Lee, SungHo Chin, JoonMin Gil

Group-based Scheduling Algorithm for Fault Tolerance in Mobile Grid

Mobile Grid is a branch of Grid computing where the infrastructure includes mobile devices. Because mobile devices are resource-constrained, mobile Grid should provide new scheduling strategies considering its environment. This paper presents a group-based fault tolerance scheduling algorithm. The algorithm classifies mobile devices into several groups considering characteristic parameters of mobile Grid. Then, it uses an adaptive replication algorithm for enduring faults in an active manner. The experimental results show that our scheduling algorithm provides a superior performance in terms of execution times to the one without considering grouping and fault tolerance. Throughout the experiments, we found that the active fault tolerance (i.e., replication) is essential to improving performance in mobile Grid.

JongHyuk Lee, SungJin Choi, Taeweon Suh, HeonChang Yu, JoonMin Gil

Context-Aware Hierarchy k-Depth Estimation and Energy-Efficient Clustering in Ad-hoc Network

Ad-hoc Network needs an efficient node management because the wireless network has energy constraints. Previously proposed a hierarchical routing protocol reduce the energy consumption and prolong the network lifetime. Further, there is a deficiency conventional works about the energy efficient depth of cluster associated with the overhead. In this paper, we propose a novel top-down method clustered hierarchy, CACHE(Context-aware Clustering Hierarchy and Energy-Efficient). The proposed analysis could estimate the optimum k-depth of hierarchy architecture in clustering protocols.

Chang-min Mun, Young-hwan Kim, Kang-whan Lee

Two Scheduling Schemes for Extending the Lifetime of Directional Sensor Networks

Since directional sensor networks (DSNs) are composed of a large number of sensors equipped with a limited battery and limited angles of sensing range, maximizing network lifetime while covering all the targets in a given area is still a challenge problem. In this paper, we first address the MSCD (Maximum Set Cover for DSNs) problem that is known as NP-complete. We then present a new target coverage scheduling scheme to solve this problem with a greedy algorithm. We also present another target coverage scheduling scheme based on a genetic algorithm that can find an optimal solution for target coverage by evolutionary global search technique. To verify and evaluate these schemes, we conduct simulations and show that they can contribute to extending the network lifetime. Simulation results indicate that a genetic algorithm-based scheduling scheme has a better performance than a greedy algorithm-based one in terms of the maximization of the network lifetime.

Joon-Min Gil, Chan-Myung Kim, Youn-Hee Han

Data Aggregation Using Mobile Agent Mechanism on Distributed Sensor Networks

In this paper, we propose mobile agent mechanism to efficiently aggregate data on distributed sensor networks (DSN), and describe the itinerary of mobile agent to establish by the sink node. The proposal of this mechanism is to reduce consumption of sensor network energy, network bandwidth and the limited resources. This mobile agent mechanism is based on mobile-agent-based DSN (MADSN) which the sink node migrate mobile agent to the sensor node on multicasting based on the binomial tree. It reduces time-cost to aggregate sensor data on MADSN.

Youn-Gyou Kook, Joon Lee, Ki-Seock Choi, Jae-Soo Kim, R. Young-Chul Kim

Issues on Selecting National R&D Project

Because of the difficulties on selecting National R&D projects, it is expected that the errors of decision making can be reduced if the information on project (i.e. project duration, people, budget etc.), and its evaluation result is properly provided to stakeholders as a reference. In reality, however, the result of project evaluation is rarely utilized in its own purpose. One reason is that the information on evaluation result and budget is not shared amongst stakeholders at the right time. The other is that the interconnection between systems to support the R&D evaluation and budget information is not realized yet for further utilization. Therefore, this paper is focused on the improvement of decision process that reviews and selects the R&D project to provide relevant information through the data mapping approaches from different system domain and to suggest the enhanced process for the seamless interconnection between National R&D performance evaluation and budget information.

Joon Lee, Youn-Gyou Kook, Jae-Soo Kim, Ki-Seock Choi

A Study on S-band Short-range Surveillance Radar Optimum Deployment Considering Frequency Interference

Inter-radar interference can cause the important impact to the radar detection performance because radar operates with high transmitter power, sensitive receiver and wideband. Because short-range surveillance radar is deployed rather close to each other, inter-radar interference is more critical. In this paper, the international criteria for radar interference protection is reviewed based on the ITU-R and NTIA documents, and the radar analysis is presented by taking into account the S-band short-range surveillance radar operating environments. Finally, S-band short-range surveillance radar optimum deployment is presented with the interference impact analysis.

Bong-Ki Jang, Young-soon Lee, Byung-sam Kim, Ui-jung Kim

Proposal of Secure VoIP System Using Attribute Certificate

VoIP is a service that changes the analogue audio signal into a digital signal and then transfers the audio information to the users after configuring it as a packet; and it has an advantage of lower price than the existing voice call service and better extensibility. However, VoIP service has a system structure that, compared to the existing PSTN (Public Switched Telephone Network), has poor call quality and is vulnerable in the security aspect. To make up these problems, TLS service was introduced to enhance the security. In practical system, however, since QoS problem occurs, it is necessary to develop the VoIP security system that can satisfy QoS at the same time in the security aspect. In this paper, a user authentication VoIP system that can provide a service according to the security and the user through providing a differential service according to the approach of the users by adding AA server at the step of configuring the existing VoIP session is suggested. It was found that the proposed system of this study provides a quicker QoS than the TLS-added system at a similar level of security. Also, it is able to provide a variety of additional services by the different users.

Jin-Mook Kim, Young-Ae Jeong, Seong-sik Hong

Cooperation System Design for the XMDR-Based Business Process

This paper proposes a cooperation system for the XMDR-based business process. The proposed system solves the problem of heterogeneousness that may take place regarding interoperability of queries in a XMDR-based business process. Heterogeneousness in an operation of a business process may involve metadata collision, schema collision, or data collision. This can be handled by operating a business process by making use of XMDR-based Global Query and Local Query.

SeokJae Moon, GyeDong Jung, ChiGon Hwang, YoungKeun Choi

Architecture of the SDP in the Cloud Environment

Recently, cloud computing, which is Internet-based computing, is attracting type of business. Besides, network is integrated wire and wireless (including mobile) by the IP Multimedia Subsystem (IMS). Therefore, cloud computing needs to support the IMS and common platform in order to support between the IMS and cloud computing. So, in this paper we consider about deployment of the IMS and suggest Service Delivery Platform (SDP) that is common platform for cloud computing.

Jae-Hyoung Cho, Jae-Oh Lee

P-CSCF’s Algorithm for Solving NAT Traversal

Many ways for efficient use of limited IP address of IPv4 are existed. The one of these ways is to construct the private network using Network Address Translator (NAT). NAT filtering rule makes network management easier. However, NAT Filtering rule makes NAT Traversal. Many solutions like Simple Traversal of UDP through NAT (STUN), Traversal Using Relay NAT (TURN) and Media Relay method exist. But these solutions require additional servers or devices. So, we suggest that P-CSCFs in the IP Multimedia Subsystem (IMS) change the packet’s header and solve the NAT Traversal without any additional equipment.

Jung-Ho Kim, Jae-Hyoung Cho, Jae-Oh lee

Model Based User’s Access Requirement Analysis of E-Governance Systems

The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user’s access requirement for the stakeholders and then according to the models of Nath’s approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

Shilpi Saha, Seung-Hwan Jeon, Rosslin John Robles, Tai-hoon Kim, Samir Kumar Bandyopadhyay

Retracted: Energy Efficient, Chain Based Clustering Routing Protocol for Wireless Sensor Networks

In this paper we try to improve the LEACH [1] protocol by implementing a chain among the cluster head (CH) nodes. Initially, the clusters are formed and the sensor nodes are kept under any one of the cluster heads according to the LEACH protocol. In LEACH, after sensing the environment, all the sensor nodes transmit the sensed data to its own CH at their time schedule. The CHs fuse all data and send them to base station (BS). The BS get information from all the cluster heads. In our approach, all the CHs form a chain among themselves and only one CH (called leader) nearest to BS sends data to this base station by implementing the concept of PEGASIS [2] protocol. This chain is started from the farthest CH from BS and ending at CH nearest to BS. Each CH gets data from its previous CH in the chain, fuses its own data and sends it to its next CH in the chain. The CH, nearest to BS within this chain only sends data to BS. LEACH, a clustering based protocol uses randomization among the CHs to distribute the energy load among the sensors and thus it reduces energy dissipation. In our protocol, in addition to this energy reduction, the CHs decrease the data transmission and energy among them by incorporating a chain based clustering approach.

Subhajit Pal, Debnath Bhattacharyya, Tai-hoon Kim

Chain Based Hierarchical Routing Protocol for Wireless Sensor Networks

Wireless Sensor Networks (WSNs) are very crucial network system in present day for getting information from an unattendant environment. The small tiny sensor nodes can sense environment’s condition (temperature, pressure, humidity etc.) and send data to a particular location through wireless sensor networks. For collecting data from such an environment through these sensor nodes, there are different existing approaches in WSNs. LEACH[1] is one of them energy efficient cluster based routing protocol. In this paper we try to improve LEACH protocol by introducing a chain among the sensor nodes in each and every cluster as discussed in PEGASIS[2] protocol. The cluster heads get accumulated data or information from this chain and send it to its nearest base station (BS). Due to limited resources (energy, storage capacity, computing power etc) the lifetime of the sensor nodes are very restricted. LEACH protocol saves energy of the total network by using randomization for distributing the energy load among the sensor nodes and thus it enhances the lifespan of the network. But in the modified protocol, each sensor nodes except the cluster head sends sensed data to its nearest node, not to the cluster head like LEACH. As a result each node can preserve some energy and thus enhancing life span of the system. Moreover, since each node sends data to its nearest node, the modified approach can complete every round more quickly.

Subhajit Pal, Debnath Bhattacharyya, Tai-hoon Kim

Extraction of Features from Signature Image and Signature Verification Using Clustering Techniques

Humans are comfortable with pen and papers for authentication and authorization in legal transactions. In this case it is very much essential that a person’s Hand written signature to be identified uniquely. The development of efficient technique is to extract features from Handwritten Signature Image and verify the signature with higher accuracy. This paper presents a method for off line hand written signature verification with higher accuracy. In this paper we have introduced a procedure to extract features from Handwritten Signature Images. That computed feature is used for verification. Here we used a clustering technique for verification.

Samit Biswas, Debnath Bhattacharyya, Tai-hoon Kim, Samir Kumar Bandyopadhyay

Medical Imaging: A Review

The rapid progress of medical science and the invention of various medicines have benefited mankind and the whole civilization. Modern science also has been doing wonders in the surgical field. But, the proper and correct diagnosis of diseases is the primary necessity before the treatment. The more sophisticate the bio-instruments are, better diagnosis will be possible. The medical images plays an important role in clinical diagnosis and therapy of doctor and teaching and researching etc. Medical imaging is often thought of as a way to represent anatomical structures of the body with the help of X-ray computed tomography and magnetic resonance imaging. But often it is more useful for physiologic function rather than anatomy. With the growth of computer and image technology medical imaging has greatly influenced medical field. As the quality of medical imaging affects diagnosis the medical image processing has become a hotspot and the clinical applications wanting to store and retrieve images for future purpose needs some convenient process to store those images in details. This paper is a tutorial review of the medical image processing and repository techniques appeared in the literature.

Debashis Ganguly, Srabonti Chakraborty, Maricel Balitanas, Tai-hoon Kim

Hybridization of GA and ANN to Solve Graph Coloring

A recent and very promising approach for combinatorial optimization is to embed local search into the framework of evolutionary algorithms. In this paper, we present one efficient hybrid algorithms for the graph coloring problem. Here we have considered the hybridization of Boltzmann Machine (BM) of Artificial Neural Network with Genetic Algorithms. Genetic algorithm we have used to generate different coloration of a graph quickly on which we have applied boltzmann machine approach. Unlike traditional approaches of GA and ANN the proposed hybrid algorithm is guranteed to have 100% convergence rate to valid solution with no parameter tuning. Experiments of such a hybrid algorithm are carried out on large DIMACS Challenge benchmark graphs. Results prove very competitive. Analysis of the behavior of the algorithm sheds light on ways to further improvement.

Timir Maitra, Anindya J. Pal, Minkyu Choi, Taihoon Kim

Alerting of Laboratory Critical Values

Critical value is defined as a result suggesting that the patient is in danger unless appropriate action is taken immediately. We designed an automated reporting system of critical values and evaluated its performance. Fifteen critical values were defined and 2-4 doctors were assigned to receive short message service (SMS).Laboratory results in LIS and EMR were called back to the DIA server. The rule engine named U-brain in the CDSS server was run in real-time and decision if the laboratory data was critical was made. The CDSS system for alerting of laboratory critical values was fast and stable without additional burden to the entire EMR system. Continuous communication with clinicians and feedback of clinical performance are mandatory for the refinement and development of user-friendly CDSS contents. Appropriate clinical parameters are necessary for demonstration of the usefulness of the system.

Sang Hoon Song, Kyoung Un Park, Junghan Song, Hyeon Young Paik, Chi Woo Lee, Su mi Bang, Joon Seok Hong, Hyun Joo Lee, In-Sook Cho, Jeong Ah Kim, Hyun-Young Kim, Yoon Kim

Accuracy and Performance Evaluation of a Laboratory Results Alerting

This study was designed to evaluate the accuracy and performance of clinical decision support (CDS) architecture which consisted of a knowledge engine and data interface adaptor (DIA) developed as knowledge sharing tools. A laboratory alerting system was selected for the test field and 10 rules represented by SAGE formalism were used. Laboratory results (N=323,455) captured from a tertiary and teaching hospital over three months were retrospectively evaluated. We were able to confirm accuracy, stability, and feasibility of the CDS application architecture and the knowledge engine. However, DIA throughput time suggested the need for further improvements.

InSook Cho, JeongAh Kim, Ji-Hyeun Kim, Kyu Seob Ha, Yoon Kim

National Medical Terminology Server in Korea

Interoperable EHR (Electronic Health Record) necessitates at least the use of standardized medical terminologies. This paper describes a medical terminology server, LexCare Suite, which houses terminology management applications, such as a terminology editor, and a terminology repository populated with international standard terminology systems such as Systematized Nomenclature of Medicine (SNOMED). The server is to satisfy the needs of quality terminology systems to local primary to tertiary hospitals. Our partner general hospitals have used the server to test its applicability. This paper describes the server and the results of the applicability test.

Sungin Lee, Seung-Jae Song, SoonJeong Koh, Soo Kyoung Lee, Hong-gee Kim

A Typology for Modeling Processes in Clinical Guidelines and Protocols

We analyzed the graphical representations that are used by various guideline-modeling methods to express process information embodied in clinical guidelines and protocols. From this analysis, we distilled four modeling formalisms and the processes they typically model: (1) flowcharts for capturing problem-solving processes, (2) disease-state maps that link decision points in managing patient problems over time, (3) plans that specify sequences of activities that contribute toward a goal, (4) workflow specifications that model care processes in an organization. We characterized the four approaches and showed that each captures some aspect of what a guideline may specify. We believe that a general guideline-modeling system must provide explicit representation for each type of process.

Samson W. Tu, Mark A. Musen

How Process Helps You in Developing a High Quality Medical Information System

A medical information system is one extreme in using tacit knowledge that patricians and medical experts such as medical doctors use a lot but the knowledge may include a lot of experience information and be not explicitly formulated or implied. This is simply different from other discipline areas such as embedded engineering systems. Developing a mechanical system critically depends on how effectively such various knowledge is organized and integrated in implementing a system. As such, the development process that customers, management, engineers, and teams are involved must be evaluated from this view point. Existence of tacit knowledge may not be sensed well enough at project beginning, however it is necessary for project success. This paper describes the problems and how the Personal Software Process (PSP) and Team Software Process (TSP

2

) manage this problem and then typical performance results are discussed. It may be said that PSP individual and TSP team are CMMI level 4 units respectively.

Yoshihiro Akiyama

An Implementation Strategy of Evidence-Based Application Lifecycle Management

Application lifecycle management (ALM) facilitate and integrate facilitate and integrate requirements management, architecture, coding, testing, tracking, and release management. Process automation and seamless traceability among tools are getting important. In this paper, we suggest new approach to achieve the seamless traceability and process automation. For these features, knowledge formalization is critical. Evidence-based medicine is good reference architecture to ALM2. Software Engineering ontology is powerful solution to semantic gap between tools and guideline-based process execution environment can be practical solution to process automation.

Jeong Ah Kim, SeungYong Choi

Architecture and Workflow of Medical Knowledge Repository

Recently, clinical field builds various forms of computerized medical knowledge and tries to use it efficiently. In general, to build and reuse knowledge easily, it is needed to build a knowledge repository. Especially, the credibility of knowledge is important in clinical domain. This paper proposes methods for supporting it. To perform it systematically, we propose the method of the knowledge management processes. The methods for knowledge management can serve equal quality, usability and credibility of knowledge. Knowledge management methods consist of 2 methods. They are the knowledge management processes and the specification of the management targets. And this paper proposes the requirement of a knowledge repository and the architecture of the knowledge repository.

HyunSook Choi, Jeong Ah Kim, InSook Cho

SW Architecture for Access to Medical Information for Knowledge Execution

Recently, many approaches have been studied to author medical knowledge and verify doctor’s diagnosis based on the specified knowledge. During the verification, intensive access to medical information is unavoidable. Also, the access approach should consider modifiability in order to cover diverse medical information from the variety of hospitals. This paper presents an approach to generating query language from medical knowledge, and shows software architecture for accessing medical information from hospitals by executing generated query languages. Implementation of this architecture has been deployed in a hospital of South Korea so that it shows the feasibility of the architecture.

Suntae Kim, Bingu Shim, Jeong Ah Kim, InSook Cho

Implementation of Wireless Sensor Networks Based Pig Farm Integrated Management System in Ubiquitous Agricultural Environments

The wireless sensor networks (WSN) technology based on low power consumption is one of the important technologies in the realization of ubiquitous society. When the technology would be applied to the agricultural field, it can give big change in the existing agricultural environment such as livestock growth environment, cultivation and harvest of agricultural crops. This research paper proposes the ‘Pig Farm Integrated Management System’ based on WSN technology, which will establish the ubiquitous agricultural environment and improve the productivity of pig-raising farmers. The proposed system has WSN environmental sensors and CCTV at inside/outside of pig farm. These devices collect the growth-environment related information of pigs, such as luminosity, temperature, humidity and CO2 status. The system collects and monitors the environmental information and video information of pig farm. In addition to the remote-control and monitoring of the pig farm facilities, this system realizes the most optimum pig-raising environment based on the growth environmental data accumulated for a long time.

Jeonghwan Hwang, Jiwoong Lee, Hochul Lee, Hyun Yoe

A Study on Energy Efficient MAC Protocol of Wireless Sensor Network for Ubiquitous Agriculture

Various technologies are used in the agricultural sites now. Especially, the recent application of sensor network related technology is quite notable. Considering the efficiency of MAC protocol of WSN is being researched in various aspects, it is believed that a research on how to apply the MAC protocol to agriculture would be also required. This research is based on the sensor node developed by Sunchon University ITRC. Once the sensor nodes are effectively located in the farm, they operate for a long time and they are rarely relocated once installed. The concentration of multiple sensor nodes in a narrow area is another characteristic the sensor node. The purpose of this research is to select a sensor network MAC protocol, which would be most proper to agricultural site with good energy efficiency and excellent transmission delay performance. The applicable protocols such as S-MAC and X-MAC were set up for the installation environment. They were compared and a methodology to select the most optimum protocol to agricultural site is suggested.

Ho-chul Lee, Ji-woong Lee, Jeong-hwan Hwang, Hyun Yoe

An u-Service Model Based on a Smart Phone for Urban Computing Environments

In urban computing environments, all of services should be based on the interaction between humans and environments around them, which frequently and ordinarily in home and office. This paper propose an u-service model based on a smart phone for urban computing environments. The suggested service model includes a context-aware and personalized service scenario development environment that can instantly describe user’s u-service demand or situation information with smart devices. To do this, the architecture of the suggested service model consists of a graphical service editing environment for smart devices, an u-service platform, and an infrastructure with sensors and WSN/USN. The graphic editor expresses contexts as execution conditions of a new service through a context model based on ontology. The service platform deals with the service scenario according to contexts. With the suggested service model, an user in urban computing environments can quickly and easily make u-service or new service using smart devices.

Yongyun Cho, Hyun Yoe

An Incremental Join Algorithm in Sensor Network

Given their autonomy, flexibility and large range of functionality, wireless sensor networks can be used as an effective and discrete means for monitoring data in many domains needed to gather and process real-time state information which is one of the sensor network features. But sensor nodes are generally very constrained, in particular regarding their energy and memory resources. While simple queries such as select and aggregate queries in wireless sensor networks have been addressed in the literature, the processing of join queries in sensor networks remain to be investigated. Previous approaches have either assumed that the join processing nodes have sufficient memory to buffer the subset of the join relations assigned to them, or that the amount of available memory at nodes is known in advance. Therefore, in this paper including these assumptions, we describes an Incremental Join Algorithm(IJA) in Sensor Networks to reduce the overhead of moving a join tuple to the final join node or minimize the communication cost that is the main consumer of the battery when processing the distributed queries in sensor networks environments. The simulation result shows that the proposed IJA algorithm significantly reduces the number of bytes to be moved to join nodes compared to the popular synopsis join algorithm.

Hyun Chang Lee, Young Jae Lee, Dong Hwa Kim

Interface of Augmented Reality Game Using Face Tracking and Its Application to Advertising

This paper proposes the face interface method which can be used in recognizing gamer’s movements in the real world for application in the cyber space so that we could make three-dimensional space recognition motion-based game. The proposed algorithm is the new face recognition technology which incorporates the strengths of two existing algorithms, CBCH and CAMSHIFT and its validity has been proved through a series of experiments. Moreover, for the purpose of the interdisciplinary studies, concepts of advertising have been introduced into the three-dimensional motion-based game to look into the possible new beneficiary models for the game industry. This kind of attempt may be significant in that it tried to see if the advertising brand when placed in the game could play the role of the game item or quest. The proposed method can provide the basic references for developing motion-based game development.

Young Jae Lee, Yong Jae Lee

Bankruptcy Problem Approach to Load-Shedding in Agent-Based Microgrid Operation

Research, development, and demonstration projects on microgrids have been progressed in many countries. Furthermore, microgrids are expected to introduce into power grids as eco-friendly small-scale power grids in the near future. Load-shedding is a problem not avoided to meet power balance between power supply and power demand to maintain specific frequency such as 50 Hz or 60 Hz. Load-shedding causes consumers inconvenience and therefore should be performed minimally. Recently, agent-based microgrid operation has been studied and new algorithms for their autonomous operation including load-shedding has been required. The bankruptcy problem deals with distribution insufficient sources to claimants. In this paper, we approach the load-shedding problem as a bankruptcy problem and adopt the Talmud rule as an algorithm. Load-shedding using the Talmud rule is tested in islanded microgrid operation based on a multiagent system.

Hak-Man Kim, Tetsuo Kinoshita, Yujin Lim, Tai-Hoon Kim

State of the Art of Network Security Perspectives in Cloud Computing

Cloud computing is now regarded as one of social phenomenon that satisfy customers’ needs. It is possible that the customers’ needs and the primary principle of economy – gain maximum benefits from minimum investment – reflects realization of cloud computing. We are living in the connected society with flood of information and without connected computers to the Internet, our activities and work of daily living will be impossible. Cloud computing is able to provide customers with custom-tailored features of application software and user’s environment based on the customer’s needs by adopting on-demand outsourcing of computing resources through the Internet. It also provides cloud computing users with high-end computing power and expensive application software package, and accordingly the users will access their data and the application software where they are located at the remote system. As the cloud computing system is connected to the Internet, network security issues of cloud computing are considered as mandatory prior to real world service. In this paper, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.

Tae Hwan Oh, Shinyoung Lim, Young B.Choi, Kwang-Roh Park, Heejo Lee, Hyunsang Choi

Design and Implementation of Wireless Sensor Networks Based Paprika Green House System

This research paper suggests the ‘Paprika green house system’ (PGHS), which collects paprika growth information and greenhouse information to control the paprika growth at optimum condition. The temperature variation range of domestic paprika cultivation facilities are relatively quite big and the facility internal is kept at relatively dry condition. In addition, the concentration of CO2 is not uniform, giving bad impact on the growth of paprika. In order to cope with these issues, the ‘Paprika green house system’ (PGHS) based on wireless technology was designed and implemented for the paprika cultivating farmers. The system provides with the ‘growth environment monitoring service’, which is monitoring the paprika growth environment data using sensors measuring temperature, humidity, illuminance, leaf wetness and fruit condition, the ‘artificial light-source control service’, which is installed to improve the energy efficiency inside greenhouse, and ‘growth environment control service’, controlling the greenhouse by analyzing and processing of collected data.

Jiwoong Lee, Hochul Lee, Jeonghwan Hwang, Yongyun Cho, Changsun Shin, Hyun Yoe

An Implementation of the Salt-Farm Monitoring System Using Wireless Sensor Network

In producing solar salt, natural environmental factors such as temperature, humidity, solar radiation, wind direction, wind speed and rain are essential elements which influence on the productivity and quality of salt. If we can manage the above mentioned environmental elements efficiently, we could achieve improved results in production of salt with good quality. To monitor and manage the natural environments, this paper suggests the Salt-Farm Monitoring System (SFMS) which is operated with renewable energy power. The system collects environmental factors directly from the environmental measure sensors and the sensor nodes. To implement a stand-alone system, we applied solar cell and wind generator to operate this system. Finally, we showed that the SFMS could monitor the salt-farm environments by using wireless sensor nodes and operate correctly without external power supply.

JongGil Ju, InGon Park, YongWoong Lee, JongSik Cho, HyunWook Cho, Hyun Yoe, ChangSun Shin

Retraction Note to: Access Requirement Analysis of E-Governance Systems

The paper starting on page 124 of this volume has been retracted because it is a duplicate of the paper starting on page 466 of the same volume.

Tai-hoon Kim

Retraction Note to: Energy Efficient, Chain Based Clustering Routing Protocol for Wireless Sensor Networks

The paper starting on page 472 of this volume has been retracted as the vast majority of its contents is included in the paper starting on page 482 of the same volume.

Subhajit Pal, Debnath Bhattacharyya, Tai-hoon Kim

Backmatter

Weitere Informationen

Premium Partner

BranchenIndex Online

Die B2B-Firmensuche für Industrie und Wirtschaft: Kostenfrei in Firmenprofilen nach Lieferanten, Herstellern, Dienstleistern und Händlern recherchieren.

Whitepaper

- ANZEIGE -

Best Practices für die Mitarbeiter-Partizipation in der Produktentwicklung

Unternehmen haben das Innovationspotenzial der eigenen Mitarbeiter auch außerhalb der F&E-Abteilung erkannt. Viele Initiativen zur Partizipation scheitern in der Praxis jedoch häufig. Lesen Sie hier  - basierend auf einer qualitativ-explorativen Expertenstudie - mehr über die wesentlichen Problemfelder der mitarbeiterzentrierten Produktentwicklung und profitieren Sie von konkreten Handlungsempfehlungen aus der Praxis.
Jetzt gratis downloaden!

Bildnachweise