Pub Date : 2021-01-01DOI: 10.7236/JIIBC.2021.21.4.149
Jeongho Kwak, Hoseoung Na
{"title":"An emprical analysis on the effect of OTT company's content investment","authors":"Jeongho Kwak, Hoseoung Na","doi":"10.7236/JIIBC.2021.21.4.149","DOIUrl":"https://doi.org/10.7236/JIIBC.2021.21.4.149","url":null,"abstract":"","PeriodicalId":22795,"journal":{"name":"The Journal of the Institute of Webcasting, Internet and Telecommunication","volume":"36 1","pages":"149-156"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73269472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.7236/JIIBC.2021.21.2.143
Sungin Jeong
BLDC motors are getting better performance due to the improvement of material technology including high performance of permanent magnets, advancement of driving IC technology with high integration and high functionality, and improvement of assembly technology such as high point ratio. While having the advantage of such a square wave driven BLDC motor, interest in the design and development of a square wave driven BLDC permanent magnet motor and development of a position detection circuit and driver is increasing in order to more meet the needs of users. However, in spite of the cost and functional advantages due to reduced efficiency, switching loss and vibration, noise, etc., the application is somewhat limited. Therefore, in this paper, we study a position detection circuit that generates a sinusoidal signal in proportion to the magnetic flux of a BLDC motor rotor using a Hall Effect Sensor that generates a sinusoidal wave to increase the efficiency of the motor, reduce ripple, and drive a sinusoidal current with excellent speed and torque characteristics.
{"title":"Development of Position Sensor Detection Circuit using Hall Effect Sensor","authors":"Sungin Jeong","doi":"10.7236/JIIBC.2021.21.2.143","DOIUrl":"https://doi.org/10.7236/JIIBC.2021.21.2.143","url":null,"abstract":"BLDC motors are getting better performance due to the improvement of material technology including high performance of permanent magnets, advancement of driving IC technology with high integration and high functionality, and improvement of assembly technology such as high point ratio. While having the advantage of such a square wave driven BLDC motor, interest in the design and development of a square wave driven BLDC permanent magnet motor and development of a position detection circuit and driver is increasing in order to more meet the needs of users. However, in spite of the cost and functional advantages due to reduced efficiency, switching loss and vibration, noise, etc., the application is somewhat limited. Therefore, in this paper, we study a position detection circuit that generates a sinusoidal signal in proportion to the magnetic flux of a BLDC motor rotor using a Hall Effect Sensor that generates a sinusoidal wave to increase the efficiency of the motor, reduce ripple, and drive a sinusoidal current with excellent speed and torque characteristics.","PeriodicalId":22795,"journal":{"name":"The Journal of the Institute of Webcasting, Internet and Telecommunication","volume":"15 1","pages":"143-149"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84725633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.7236/JIIBC.2021.21.4.171
Sang-Un Lee
{"title":"Assignment-Change Optimization for the Problem of Bid Evaluation","authors":"Sang-Un Lee","doi":"10.7236/JIIBC.2021.21.4.171","DOIUrl":"https://doi.org/10.7236/JIIBC.2021.21.4.171","url":null,"abstract":"","PeriodicalId":22795,"journal":{"name":"The Journal of the Institute of Webcasting, Internet and Telecommunication","volume":"27 1","pages":"171-176"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85393058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.7236/JIIBC.2021.21.3.91
Inhwan Kim, Dukyun Kim, Sungkuk Cho, Byungkook Jeon
In most hacking attacks, hackers tend to access target systems in a variety of circumvent connection methods to hide their original IP. Therefore, finding the attacker's IP(Internet Protocol) from the defender's point of view is one of important issue to recognize hackers. If an attacker uses a proxy, original IP can be obtained through a program other than web browser in attacker’s computer. Unfortunately, this method has no effect on the connection through VPN(Virtual Private Network), because VPN affects all applications. In an academic domain, various IP traceback methods using network equipments such as routers have been studied, but it is very difficult to be realized due to various problems including standardization and privacy. To overcome this limitation, this paper proposes a practical way to use client’s network configuration temporarily until it can detect original IP. The proposed method does not only restrict usage of network, but also does not violate any privacy. We implemented and verified the proposed method in real internet with various VPN tools.
{"title":"A Method for Original IP Detection of VPN Accessor","authors":"Inhwan Kim, Dukyun Kim, Sungkuk Cho, Byungkook Jeon","doi":"10.7236/JIIBC.2021.21.3.91","DOIUrl":"https://doi.org/10.7236/JIIBC.2021.21.3.91","url":null,"abstract":"In most hacking attacks, hackers tend to access target systems in a variety of circumvent connection methods to hide their original IP. Therefore, finding the attacker's IP(Internet Protocol) from the defender's point of view is one of important issue to recognize hackers. If an attacker uses a proxy, original IP can be obtained through a program other than web browser in attacker’s computer. Unfortunately, this method has no effect on the connection through VPN(Virtual Private Network), because VPN affects all applications. In an academic domain, various IP traceback methods using network equipments such as routers have been studied, but it is very difficult to be realized due to various problems including standardization and privacy. To overcome this limitation, this paper proposes a practical way to use client’s network configuration temporarily until it can detect original IP. The proposed method does not only restrict usage of network, but also does not violate any privacy. We implemented and verified the proposed method in real internet with various VPN tools.","PeriodicalId":22795,"journal":{"name":"The Journal of the Institute of Webcasting, Internet and Telecommunication","volume":"134 1","pages":"91-98"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79878459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.7236/JIIBC.2021.21.3.67
Inkyoo Park
{"title":"Granule-based Association Rule Mining for Big Data Recommendation System","authors":"Inkyoo Park","doi":"10.7236/JIIBC.2021.21.3.67","DOIUrl":"https://doi.org/10.7236/JIIBC.2021.21.3.67","url":null,"abstract":"","PeriodicalId":22795,"journal":{"name":"The Journal of the Institute of Webcasting, Internet and Telecommunication","volume":"2015 1","pages":"67-72"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87813599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.7236/JIIBC.2021.21.3.99
Sang-Hun Chun, Seoung-Jung Shin
In addition to the OTT video production service represented by Nexflix and YouTube, a personalized recommendation system for content with artificial intelligence has become common. YouTube's personalized recommendation service system consists of two neural networks, one neural network consisting of a recommendation candidate generation model and the other consisting of a ranking network. Netflix's video recommendation system consists of two data classification systems, divided into content-based filtering and collaborative filtering. As the online platform-led content production is activated by the Corona Pandemic, the field of virtual influencers using artificial intelligence is emerging. Virtual influencers are produced with GAN (Generative Adversarial Networks) artificial intelligence, and are unsupervised learning algorithms in which two opposing systems compete with each other. This study also researched the possibility of developing AI platform based on individual recommendation and virtual influencer (metabus) as a core content of OTT in the future.
{"title":"Comparison of online video(OTT) content production technology based on artificial intelligence customized recommendation service","authors":"Sang-Hun Chun, Seoung-Jung Shin","doi":"10.7236/JIIBC.2021.21.3.99","DOIUrl":"https://doi.org/10.7236/JIIBC.2021.21.3.99","url":null,"abstract":"In addition to the OTT video production service represented by Nexflix and YouTube, a personalized recommendation system for content with artificial intelligence has become common. YouTube's personalized recommendation service system consists of two neural networks, one neural network consisting of a recommendation candidate generation model and the other consisting of a ranking network. Netflix's video recommendation system consists of two data classification systems, divided into content-based filtering and collaborative filtering. As the online platform-led content production is activated by the Corona Pandemic, the field of virtual influencers using artificial intelligence is emerging. Virtual influencers are produced with GAN (Generative Adversarial Networks) artificial intelligence, and are unsupervised learning algorithms in which two opposing systems compete with each other. This study also researched the possibility of developing AI platform based on individual recommendation and virtual influencer (metabus) as a core content of OTT in the future.","PeriodicalId":22795,"journal":{"name":"The Journal of the Institute of Webcasting, Internet and Telecommunication","volume":"102 1","pages":"99-105"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79205398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.7236/JIIBC.2021.21.3.143
Sang-Un Lee
This paper proposes length rate measurement for relative efficiency that is a core of data envelopment analysis(DEA). It has been said that the linear programming(LP) is a unique method to get the relative efficiency. This method has drawback that applies fractional LP focusing on each DMU in turn. This paper draws bi-dimensional input-output relational graph and distinguishes between efficient and inefficient DMU. The relative efficiency of inefficient DUM is solve using length rate measurement. As a result of various experimental data, the LP shows mistake of application, but this method gets the correct relative efficiency at all times. Also, this method only gets the relative efficiency for only inefficient DMUs without efficient DUMs that already achieved 100% efficiency. This method solves the relative efficiency of inefficient DUM draws the line to efficient frontier and decides the reference set easily.
{"title":"Data Envelopment Analysis(DEA) using Length Rate-based Efficiency Measurement","authors":"Sang-Un Lee","doi":"10.7236/JIIBC.2021.21.3.143","DOIUrl":"https://doi.org/10.7236/JIIBC.2021.21.3.143","url":null,"abstract":"This paper proposes length rate measurement for relative efficiency that is a core of data envelopment analysis(DEA). It has been said that the linear programming(LP) is a unique method to get the relative efficiency. This method has drawback that applies fractional LP focusing on each DMU in turn. This paper draws bi-dimensional input-output relational graph and distinguishes between efficient and inefficient DMU. The relative efficiency of inefficient DUM is solve using length rate measurement. As a result of various experimental data, the LP shows mistake of application, but this method gets the correct relative efficiency at all times. Also, this method only gets the relative efficiency for only inefficient DMUs without efficient DUMs that already achieved 100% efficiency. This method solves the relative efficiency of inefficient DUM draws the line to efficient frontier and decides the reference set easily.","PeriodicalId":22795,"journal":{"name":"The Journal of the Institute of Webcasting, Internet and Telecommunication","volume":"52 1","pages":"143-149"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89682637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.7236/JIIBC.2021.21.2.111
Sangsoo Lee, Jong-Hwan Kim, Sunghwa Lee, Jin-Tea Kim
This study is a study on improving the pedestrian Care system, which delivers jaywalking events in real time to the autonomous driving control center and Autonomous driving vehicles in operation and issues warnings and announcements to pedestrians based on pedestrian signals. In order to secure reliability of object detection method of pedestrian Care system, the inspection method combined with camera sensor with Lidar sensor and the improved system algorithm were presented. In addition, for the occurrence events of Lidar sensors and intelligent CCTV received during the operation of autonomous driving vehicles, the system algorithm for the elimination of overlapping events and the improvement of accuracy of the same time, place, and object was presented.
本研究是对行人护理系统(pedestrian Care system)的改进研究,该系统将乱穿马路事件实时传递给自动驾驶控制中心和运行中的自动驾驶车辆,并根据行人信号向行人发出警告和公告。为了保证行人看护系统目标检测方法的可靠性,提出了摄像头传感器与激光雷达传感器相结合的检测方法以及改进的系统算法。此外,针对自动驾驶车辆运行过程中接收到的激光雷达传感器和智能CCTV的发生事件,提出了消除重叠事件,提高同一时间、同一地点、同一对象精度的系统算法。
{"title":"A Study on Improvement of Pedestrian Care System for Cooperative Automated Driving","authors":"Sangsoo Lee, Jong-Hwan Kim, Sunghwa Lee, Jin-Tea Kim","doi":"10.7236/JIIBC.2021.21.2.111","DOIUrl":"https://doi.org/10.7236/JIIBC.2021.21.2.111","url":null,"abstract":"This study is a study on improving the pedestrian Care system, which delivers jaywalking events in real time to the autonomous driving control center and Autonomous driving vehicles in operation and issues warnings and announcements to pedestrians based on pedestrian signals. In order to secure reliability of object detection method of pedestrian Care system, the inspection method combined with camera sensor with Lidar sensor and the improved system algorithm were presented. In addition, for the occurrence events of Lidar sensors and intelligent CCTV received during the operation of autonomous driving vehicles, the system algorithm for the elimination of overlapping events and the improvement of accuracy of the same time, place, and object was presented.","PeriodicalId":22795,"journal":{"name":"The Journal of the Institute of Webcasting, Internet and Telecommunication","volume":"67 1","pages":"111-116"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83162267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.7236/JIIBC.2021.21.3.201
Halim Jung, Hangil Kwon, Gil-Won Lee, S. Jung, Dongbeom Ko, Gwangil Jeon, Jeongmin Park
{"title":"A Study on Futsal Video Analysis System Using Object Tracking","authors":"Halim Jung, Hangil Kwon, Gil-Won Lee, S. Jung, Dongbeom Ko, Gwangil Jeon, Jeongmin Park","doi":"10.7236/JIIBC.2021.21.3.201","DOIUrl":"https://doi.org/10.7236/JIIBC.2021.21.3.201","url":null,"abstract":"","PeriodicalId":22795,"journal":{"name":"The Journal of the Institute of Webcasting, Internet and Telecommunication","volume":"14 1","pages":"201-210"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82814295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.7236/JIIBC.2021.21.3.159
Kyeong-Rae Kim, Hong-Rak Choi, Kyung-Seok Kim
As the information age enters, the use of biometrics using the body is gradually increasing because it is very important to accurately recognize and authenticate each individual's identity for information protection. Among them, finger vein authentication technology is receiving a lot of attention because it is difficult to forge and demodulate, so it has high security, high precision, and easy user acceptance. However, the accuracy may be degraded depending on the algorithm for identification or the surrounding light environment. In this paper, we designed and manufactured a side-type finger vein recognizer that is highly versatile among finger vein measuring devices, and authenticated using the deep learning model of DenseNet-201 for high accuracy and recognition rate. The performance of finger vein authentication technology according to the influence of the infrared light source used and the surrounding visible light was analyzed through simulation. The simulations used data from MMCBNU_6000 of Jeonbuk National University and finger vein images taken directly were used, and the performance were compared and analyzed using the EER.
{"title":"Design and Implementation of Side-Type Finger Vein Recognizer","authors":"Kyeong-Rae Kim, Hong-Rak Choi, Kyung-Seok Kim","doi":"10.7236/JIIBC.2021.21.3.159","DOIUrl":"https://doi.org/10.7236/JIIBC.2021.21.3.159","url":null,"abstract":"As the information age enters, the use of biometrics using the body is gradually increasing because it is very important to accurately recognize and authenticate each individual's identity for information protection. Among them, finger vein authentication technology is receiving a lot of attention because it is difficult to forge and demodulate, so it has high security, high precision, and easy user acceptance. However, the accuracy may be degraded depending on the algorithm for identification or the surrounding light environment. In this paper, we designed and manufactured a side-type finger vein recognizer that is highly versatile among finger vein measuring devices, and authenticated using the deep learning model of DenseNet-201 for high accuracy and recognition rate. The performance of finger vein authentication technology according to the influence of the infrared light source used and the surrounding visible light was analyzed through simulation. The simulations used data from MMCBNU_6000 of Jeonbuk National University and finger vein images taken directly were used, and the performance were compared and analyzed using the EER.","PeriodicalId":22795,"journal":{"name":"The Journal of the Institute of Webcasting, Internet and Telecommunication","volume":"15 1","pages":"159-168"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81926748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}