Time filter

Source Type

Kim T.,Future Research Creative Laboratory | Park H.,Pai Chai University | Kim B.,KAIST
Journal of Computer Virology and Hacking Techniques | Year: 2014

Explosive increasing demands for various wireless services have led to a higher spectrum requirement. However, considering the scarcity of spectrum resources, it is more important for the regulatory authority concerned to estimate the future spectrum requirements accurately. Recently, a few estimation models for calculating the spectrum requirement have been presented. In the process of forecasting the future spectrum requirement, it is necessary to estimate network capacity that is needed to transmit packets under a quality of service condition. Hence, our study focuses on designing an efficient estimation model for network capacity and spectrum requirements to increase the applicability in spectrum policy. © 2014, Springer-Verlag France.


Kim G.,KAIST | Lee S.,Future Research Creative Laboratory | Kim S.,KAIST
Expert Systems with Applications | Year: 2014

In this paper, a new hybrid intrusion detection method that hierarchically integrates a misuse detection model and an anomaly detection model in a decomposition structure is proposed. First, a misuse detection model is built based on the C4.5 decision tree algorithm and then the normal training data is decomposed into smaller subsets using the model. Next, multiple one-class SVM models are created for the decomposed subsets. As a result, each anomaly detection model does not only use the known attack information indirectly, but also builds the profiles of normal behavior very precisely. The proposed hybrid intrusion detection method was evaluated by conducting experiments with the NSL-KDD data set, which is a modified version of well-known KDD Cup 99 data set. The experimental results demonstrate that the proposed method is better than the conventional methods in terms of the detection rate for both unknown and known attacks while it maintains a low false positive rate. In addition, the proposed method significantly reduces the high time complexity of the training and testing processes. Experimentally, the training and testing time of the anomaly detection model is shown to be only 50% and 60%, respectively, of the time required for the conventional models. © 2013 Elsevier Ltd. All rights reserved.


Kwon B.-R.,Future Research Creative Laboratory | Ryu S.,KAIST | Kim Y.-G.,KAIST
ETRI Journal | Year: 2015

With recent advances in media technology, the creation of a relatively new service, N-screen, has been realized. N-screen provides seamless connections among various media and enables users to enjoy entertainment content at any time and any location. With such recent advances comes opportunity; therefore, for those N-screen service providers who have established an early edge in the ICT industry, it is imperative that they maintain this and stay ahead of the ensuing competition. In this context, the objective of this study is two-fold; first, we aim to find factors influencing the behavior of existing and potential N-screen service users, and then second, to examine the differences in how these factors operate within the two user types. The results of this study show that the perceived value and subjective norm are important influencers in both user types. However, price fairness and innovativeness are only influential on the attitude and intention of potential users, while some aspects of media usage have only significant influences on the behavior and loyalty of existing users. Based on these results, we provide some implications for both researchers and practitioners who wish to better understand the nature of N-screen users.


Lee D.,IT Convergence Technology Research Laboratory | Yoon H.,IT Convergence Technology Research Laboratory | Chung M.-A.,Future Research Creative Laboratory | Kim J.,IT Convergence Technology Research Laboratory
ETRI Journal | Year: 2014

In this paper, we present a walking guidance system for the visually impaired for use at subway stations. This system, which is based on environmental knowledge, automatically detects and recognizes both exit numbers and arrow signs from natural outdoor scenes. The visually impaired can, therefore, utilize the system to find their own way (for example, using exit numbers and the directions provided) through a subway station. The proposed walking guidance system consists mainly of three stages: (a) sign detection using the MCT-based AdaBoost technique, (b) sign recognition using support vector machines and hidden Markov models, and (c) three verification techniques to discriminate between signs and non-signs. The experimental results indicate that our sign recognition system has a high performance with a detection rate of 98%, a recognition rate of 99.5%, and a false-positive error rate of 0.152. © 2014 ETRI.


Bilal M.,Korean University of Science and Technology | Bilal M.,Future Research Creative Laboratory | Kang M.,Korean University of Science and Technology | Kang M.,Future Research Creative Laboratory | And 3 more authors.
ETRI Journal | Year: 2014

To achieve high-speed (giga-bit) connectivity for shortrange wireless multimedia applications, the millimeterwave (mmWave) wireless personal area networks with directional antennas are gaining increased interest. Due to the use of directional antennas and mmWave communications, the probability of non-interfering transmissions increases in a localized region. Network throughput can be increased immensely by the concurrent time allocation of non-interfering transmissions. The problem of finding optimum time allocation for concurrent transmissions is an NP-hard problem. In this paper, we propose two enhanced versions of previously proposed multi-hop concurrent transmission (MHCT) schemes. To increase network capacity, the proposed schemes efficiently make use of the free holes in the time-Allocation map of the MHCT scheme; thus, making it more compact. © 2014 ETRI.


Joung S.,National Research Facilities and Equipment Center | Han E.,Future Research Creative Laboratory | Han H.,Hanyang University
ETRI Journal | Year: 2014

Technological advances made with the development of digital technology and the Internet have led to the emergence and evolution of digital convergence - the integration of media and communications. This, in turn, has led to the creation of the representative broadcast and communication convergence business model (IPTV service). This study examines the consumption patterns and behaviors of IPTV service customers and explores the process of their continuous use of the IPTV service, thereby endeavoring to contribute to the diffusion of digital convergence services. To survey customers' continuous use of the IPTV service, this study first designs a research framework based on an examination of the existing literature on satisfaction, loyalty, and so on. In addition, research is conducted on the switching barrier of the method of consolidating customers' adherence to a given IPTV service by increasing the burden on them, thereby developing a final research model with which to attempt yet another heterogeneous approach. This enables not only an analysis of the causal relationship with antecedent variables but also a measurement of the explanatory contribution of the antecedent variables' subvariables. © 2014 ETRI.


Kim M.-K.,Future Research Creative Laboratory | Park J.-H.,Future Research Creative Laboratory | Paik J.-H.,Standards Policy Research Center
ETRI Journal | Year: 2014

The market performance of WiBro in Korea has not been as expected, and its rapid diffusion in the near future is unlikely owing to the existence of competing services. There has been little research on the factors affecting this low market diffusion. This study is based on an analytical framework in which a lack of service capability and the insufficiency of service-related activities have resulted in the current poor market performance. An expert survey was conducted on WiBro specialists and verified using the analytical hierarchy process method. The result of this analysis is as follows: underinvestment in network deployment and marketing, insufficient promotional policies, and a shortage of service capabilities are to be analyzed as the main causes of WiBro's low market diffusion. © 2014 ETRI.


Song Y.-K.,Future Research Creative Laboratory | Zo H.,Korea Advanced Institute of Science and Technology | Ciganek A.P.,University of Wisconsin - Whitewater
ETRI Journal | Year: 2014

Mobile operators in saturated markets increasingly favor mobile network sharing (MNS) over facility-based competition. Previous research examining MNS primarily focused on its positive effects, while the negative effects were largely overlooked. This study proposes a decisionmaking model using an analytic hierarchy process technique to evaluate decision-making criteria among various types of MNS policies. The decision-making model was applied to Wireless Broadband services in Korea todetermine the relative importance of both positive and negative evaluation criteria and preference among multiple types of MNS policies. Positive evaluation criteria(that is, efficiency) were far greater in importance than negative evaluation criteria (that is, competition harm).The preference for adopting MNS among five alternativeapproaches was also revealed. The study findings offer immediate policy insights in Korea and provide a decisionmaking framework for policy makers in other countries toutilize. © 2014 ETRI.


Kim K.,Future Research Creative Laboratory | Kwon S.,Future Research Creative Laboratory | You W.,Future Research Creative Laboratory | Lee K.,Pai Chai University
Contemporary Engineering Sciences | Year: 2014

The throughput performance of Massive MIMO is limited due to pilot contamination. In the conventional research, we considered maximum network capacity when the number of user and total pilots fixed. However, we want to calculate theoretically maximum network capacity when the number of user and total pilot symbols change continuously. Then total network capacity changes according to total pilot symbols and pilot assignment. So this paper proposes to calculate the maximum network capacity considering total pilot symbols and pilot assignment to minimize the pilot contamination. © 2014 Kwihoon Kim, Sunhyung Kwon, Woongsik You and Kyounghee Lee.


Kong H.,Chungbuk National University | Jung S.,HR Development | Lee I.,Chungbuk National University | Yeon S.-J.,Future Research Creative Laboratory
ETRI Journal | Year: 2015

This study was conducted to analyze the effect of information security activities on organizational performance. With this in mind and with the aim of resolving transaction stability in the securities industry, using an organization's security activities as a tool for carrying out information security activities, the effect of security activities on organizational performance was analyzed. Under the assumption that the effectiveness of information security activities can be bolstered to enhance organizational performance, such effects were analyzed based on Herzberg's motivation theory, which is one of the motivation theories that may influence information protection activities. To measure the actual attributes of the theoretical model, an empirical survey of the securities industry was conducted. In this explorative study, the proposed model was verified using partial least squares as a structural equation model consisting of IT service, information security, information sharing, transaction stability, and organizational performance.

Loading Future Research Creative Laboratory collaborators
Loading Future Research Creative Laboratory collaborators