Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Institute of Electronics and Information Engineers
Journal Basic Information
Journal DOI :
The Institute of Electronics Engineers of Korea
Editor in Chief :
Volume & Issues
Volume 53, Issue 9 - Sep 2016
Volume 53, Issue 8 - Aug 2016
Volume 53, Issue 7 - Jul 2016
Volume 53, Issue 6 - Jun 2016
Volume 53, Issue 5 - May 2016
Volume 53, Issue 4 - Apr 2016
Volume 53, Issue 3 - Mar 2016
Volume 53, Issue 2 - Feb 2016
Volume 53, Issue 1 - Jan 2016
Selecting the target year
Optical Radio Wave Systems in Wireless Fronthaul Networks
Cho, S.W. ; Kim, Ajung ; Choi, J.S. ;
Journal of the Institute of Electronics and Information Engineers, volume 53, issue 2, 2016, Pages 3~9
DOI : 10.5573/ieie.2016.53.2.003
In this paper, we propose a Radio over Fiber system for small cell applications and for mobile fronthaul networks supporting cloud-radio access networks(RAN). We built a system with a downlink employing orthogonal frequency division multiplexing (OFDM) techniques and an uplink using single carrier-frequency multiple access(SC-FDMA). System parameters are evaluated for various subcarrier modulations and the results of link performance measurements are analyzed.
Delay Compensation Mechanism for a Link Failure in Control Networks of Railway Vehicles
Hwang, Hwanwoong ; Kim, Sanghyun ; Yun, Ji-Hoon ;
Journal of the Institute of Electronics and Information Engineers, volume 53, issue 2, 2016, Pages 10~16
DOI : 10.5573/ieie.2016.53.2.010
For higher reliability against a link failure of a control network in railway vehicles, a recovery mechanism is needed. We introduce a problem that, when a link failure occurs in a ring-topology control network, a node may experience a significant increase of transmission delay depending on its relative position within the network. We then propose two mechanisms to solve this problem: (1) differentiating and prioritizing node traffic in forwarding; and (2) switching some nodes to a backup bus-topology network. Our simulation study shows that, while the first mechanism achieves a limited gain by only compensating queuing delay, the second one gets a sufficient gain which is impacted by the number of nodes switched to the bus network.
An Efficient Scheme for TDD LTE ICS Exploiting the Reciprocity of the Feedback Channel in TDD LTE Networks
Kim, Hyunchae ; Im, Sungbin ;
Journal of the Institute of Electronics and Information Engineers, volume 53, issue 2, 2016, Pages 17~23
DOI : 10.5573/ieie.2016.53.2.017
It is essential to develop an estimation and cancellation algorithm for feedback signals in designing the interference cancellation systems (ICS) as a solution to extending the coverage of the TDD LTE networks. Unlike the radio access of FDD LTE networks, TDD networks utilize the same frequency band in downlink and uplink for radio access. For this reason, downlink and uplink are repeated in time and thus the estimation of the feedback signals in uplink and downlink, respectively, is periodically paused to cause performance degradation. In this study, the reciprocity of downlink and uplink is examined through experiments and exploiting the same frequency band in uplink and downlink, an efficient channel estimation and elimination algorithm is proposed since the algorithm utilizes the same structure for both downlink and uplink.
A Low Jitter Dual Output Frequency Synthesizer Using Phase-Locked Loop for Smart Audio Devices
Baek, Ye-Seul ; Lee, Jeong-Yun ; Ryu, Hyuk ; Lee, Jongyeon ; Baek, Donghyun ;
Journal of the Institute of Electronics and Information Engineers, volume 53, issue 2, 2016, Pages 27~35
DOI : 10.5573/ieie.2016.53.2.027
A Low jitter dual output frequency synthesizer for smart audio devices is described in this paper. It has been fabricated in a 1.8 V Dongbu
CMOS process. Output frequency is controlled by 3 rd order Sigma-Delta Modulation and digital divider. The frequency synthesizer has a size of
, frequency range of 0.6-200 MHz, loop bandwidth of 350 kHz, and rms jitter of 11.4 ps-21.6 ps.
A Non-coherent IR-UWB RF Transceiver for WBAN Applications in 0.18㎛ CMOS
Park, Myung Chul ; Chang, Won Il ; Ha, Jong Ok ; Eo, Yun Seong ;
Journal of the Institute of Electronics and Information Engineers, volume 53, issue 2, 2016, Pages 36~44
DOI : 10.5573/ieie.2016.53.2.036
In this paper, an Impulse Radio-Ultra Wide band RF Transceiver for WBAN applications is implemented in
CMOS technology. The designed RF transceiver support 3-5GHz UWB low band and employs OOK(On-Off Keying) modulation. The receiver employs non-coherent energy detection architecture to reduce complexity and power consumption. For the rejection of the undesired interferers and improvement of the receiver sensitivity, RF active notch filter is integrated. The VCO based transmitter employs the switch mechanism. As adapt the switch mechanism, power consumption and VCO leakage can be reduced. Also, the spectrum mask is always same at each center frequency. The measured sensitivity of the receiver is -84.1 dBm at 3.5 GHz with 1.579 Mbps. The power consumption of the transmitter and receiver are 0.3nJ/bit and 41 mW respectively.
Downscaling Forgery Detection using Pixel Value`s Gradients of Digital Image
RHEE, Kang Hyeon ;
Journal of the Institute of Electronics and Information Engineers, volume 53, issue 2, 2016, Pages 47~52
DOI : 10.5573/ieie.2016.53.2.047
The used digital images in the smart device and small displayer has been a downscaled image. In this paper, the detection of the downscaling image forgery is proposed using the feature vector according to the pixel value`s gradients. In the proposed algorithm, AR (Autoregressive) coefficients are computed from pixel value`s gradients of the image. These coefficients as the feature vectors are used in the learning of a SVM (Support Vector Machine) classification for the downscaling image forgery detector. On the performance of the proposed algorithm, it is excellent at the downscaling 90% image forgery compare to MFR (Median Filter Residual) scheme that had the same 10-Dim. feature vectors and 686-Dim. SPAM (Subtractive Pixel Adjacency Matrix) scheme. In averaging filtering (
) and median filtering (
) images, it has a higher detection ratio. Especially, the measured performances of all items in averaging and median filtering (
), AUC (Area Under Curve) by the sensitivity and 1-specificity is approached to 1. Thus, it is confirmed that the grade evaluation of the proposed algorithm is `Excellent (A)`.
Enhanced Object Extraction Method Based on Multi-channel Saliency Map
Choi, Young-jin ; Cui, Run ; Kim, Kwang-Rag ; Kim, Hyoung Joong ;
Journal of the Institute of Electronics and Information Engineers, volume 53, issue 2, 2016, Pages 53~61
DOI : 10.5573/ieie.2016.53.2.053
Extracting focused object with saliency map is still remaining as one of the most highly tasked research area around computer vision for it is hard to estimate. Through this paper, we propose enhanced object extraction method based on multi-channel saliency map which could be done automatically without machine learning. Proposed Method shows a higher accuracy than Itti method using SLIC, Euclidean, and LBP algorithm as for object extraction. Experiments result shows that our approach is possible to be used for automatic object extraction without any previous training procedure through focusing on the main object from the image instead of estimating the whole image from background to foreground.
A Study on a Combination Model Development for Counterfire Operation with Heterogeneous Weapon System
Kim, Hanyoung ; Kim, Seungcheon ; Ro, Kwanghyun ;
Journal of the Institute of Electronics and Information Engineers, volume 53, issue 2, 2016, Pages 62~69
DOI : 10.5573/ieie.2016.53.2.062
This paper proposes to select Measure of Performance(MOP) for object attainment in the counterfire operation and deduce the reasonable combination of blue force`s hitting resources satisfying MOP`s optimal value and regression equation for the object achievement time. Also, in the study-methodological perspective, a series of procedures for drawing the regression equation from the real world is presented. Firstly the model was made by simplifying the weapon-system information of red force and blue force, then the time for object attainment was derived from its simulation. Simulating the model for the counterfire operation was divided into three phases-detection, decision and hitting. The probability method by applying the random numbers were used for detection, fixed constant numbers for decision and hitting. The simulation was repeatedly performed to get the minimum time for the object attainment against the fixed enemy, and it was estimated as the optimal value of simulation. From this result, the optimum combination of blue force`s weapon system against the red force and finally, the regression equation were obtained by using the response surface analyzing method in MINITAB. Thereafter this equation was completely verified by using `the 2-sample t-test.` As a result, the regression equation is suitable.
Design of the Multiplier in case of P
Park, Chun-Myoung ;
Journal of the Institute of Electronics and Information Engineers, volume 53, issue 2, 2016, Pages 70~75
DOI : 10.5573/ieie.2016.53.2.070
This paper proposes the constructing method of effective multiplier based on the finite fields in case of P
Counter Measures by using Execution Plan Analysis against SQL Injection Attacks
Ha, Man-Seok ; Namgung, Jung-Il ; Park, Soo-Hyun ;
Journal of the Institute of Electronics and Information Engineers, volume 53, issue 2, 2016, Pages 76~86
DOI : 10.5573/ieie.2016.53.2.076
SQL Injection attacks are the most widely used and also they are considered one of the oldest traditional hacking techniques. SQL Injection attacks are getting quite complicated and they perform a high portion among web hacking. The big data environments in the future will be widely used resulting in many devices and sensors will be connected to the internet and the amount of data that flows among devices will be highly increased. The scale of damage caused by SQL Injection attacks would be even greater in the future. Besides, creating security solutions against SQL Injection attacks are high costs and time-consuming. In order to prevent SQL Injection attacks, we have to operate quickly and accurately according to this data analysis techniques. We utilized data analytics and machine learning techniques to defend against SQL Injection attacks and analyzed the execution plan of the SQL command input if there are abnormal patterns through checking the web log files. Herein, we propose a way to distinguish between normal and abnormal SQL commands. We have analyzed the value entered by the user in real time using the automated SQL Injection attacks tools. We have proved that it is possible to ensure an effective defense through analyzing the execution plan of the SQL command.
Keypoint-based Fast CU Depth Decision for HEVC Intra Coding
Kim, Namuk ; Lim, Sung-Chang ; Ko, Hyunsuk ; Jeon, Byeungwoo ;
Journal of the Institute of Electronics and Information Engineers, volume 53, issue 2, 2016, Pages 89~96
DOI : 10.5573/ieie.2016.53.2.089
The High Efficiency Video Coding (MPEG-H HEVC/ITU-T H.265) is the newest video coding standard which has the quadtree-structured coding unit (CU). The quadtree-structure splits a CU adaptively, and its optimum CU depth can be determined by rate-distortion optimization. Such HEVC encoding requires very high computational complexity for CU depth decision. Motivated that the blob detection, which is a well-known algorithm in computer vision, detects keypoints in pictures and decision of CU depth needs to consider high frequency energy distribution, in this paper, we propose to utilize these keypoints for fast CU depth decision. Experimental results show that 20% encoding time can be saved with only slightly increasing BDBR by 0.45% on all intra case.
Face Recognition Using Histograms of Multi-resolution Segments Based on Discriminant Face Descriptor
Lee, Jang-yoon ; Lee, Yonggeol ; Choi, Sang-Il ;
Journal of the Institute of Electronics and Information Engineers, volume 53, issue 2, 2016, Pages 97~105
DOI : 10.5573/ieie.2016.53.2.097
We propose a face recognition method using the histograms of multi-resolution segments in order to effectively utilize the local information of faces. Since the variations in faces can occur in various sizes, the DFD method, which uses the histograms from the sub-regions of the same size, is not effective for obtaining local information of faces. In this paper, we first divide an image into several sub-regions and extract the DFD(Discriminant Face Descriptor) from each sub-region. By dividing each sub-region into several segments with multi-resolution and extracting histograms for each segment, we reduce the loss of local information in the process of recognition. The experimental results for the Yale B, AR, CAS-PEAL-R1 databases show that the proposed method improves the recognition performance compared to the existing DFD based method.
Development of Standing and Moving Human Body Sensing Module Using a Chopper of Shutter Method
Cha, Hyeong-Woo ; Lee, Won-Ho ;
Journal of the Institute of Electronics and Information Engineers, volume 53, issue 2, 2016, Pages 109~116
DOI : 10.5573/ieie.2016.53.2.109
Sensing module of standing and moving human body using shutter method was developed. The module consists of Fresnel lens, pyroelectric infrared (PIR) sensor, interface circuit of the PIR, micro control unit(MCU), and alarm light emitting diode(LED). The principle for standing human body is chopping the thermal of human body using camera shutter. The human sensing signal in MCU by algorithm of interrupt function is detected. By unifying an apparatus and print circuit board(PCB), the developed module can be replaced as commercial moving human body detector. Experiment results show that sensing distance is about 7.0m and sensing angles is about
at room temperature. In these condition, sending ratio was 100% and the power dissipation of the module was 100mW.
pH Sensitive Graphene Field-Effect Transistor(FET)
Park, Woo Hwan ; Song, Kwang Soup ;
Journal of the Institute of Electronics and Information Engineers, volume 53, issue 2, 2016, Pages 117~122
DOI : 10.5573/ieie.2016.53.2.117
Recently, the detection of pH with real-time and in vivo has been focal pointed in the environmental or medical fields. In this work, we developed the pH sensor using graphene sheet. Graphene has high biocompatibility. We fabricated flexible solution-gated field-effect transistors (SGFETs) on graphene sheet transferred on the polyethylene terephthalate (PET) substrate to detect pH in electrolyte solution. The gate length was
and the gate width was 8 mm. We evaluated the current-voltage (I-V) transfer characteristics of graphene SGFETs in pH solution. The drain-source current (
) and the gate-source voltage (
) curves of graphene SGFETs were depended on pH value. The Dirac point of graphene SGFETs linearly shifted to the positive direction about 19.32 mV/pH depending on the pH value in electrolyte solution.
A Study on Adaptive Operation Control to Stabilize bus Voltage of GEO Satellite Power Supply Module
Ahn, Tae-Young ; Choe, Hyun-Su ;
Journal of the Institute of Electronics and Information Engineers, volume 53, issue 2, 2016, Pages 123~129
DOI : 10.5573/ieie.2016.53.2.123
In this paper, results of produced PCU(Power Control Unit) prototype was showed by suggesting and maintaining optimal operation status which let the three functional modules automatically operate with its necessity by prioritizing operation process. In order to validate effectiveness of the suggested method, we produced a test PCU and examined the results. PCU consists of S3R(Sequential Switching Shunt Regulator), BCR(Battery Charge Regulator), and BDR(Battery Discharge Regulator): converting photovoltaic power into constant voltage at linked bus voltage; storing dump power in the battery which is an auxiliary energy storage device; and supplying power charged in battery to the load. To maintain its high reliability and optimal condition of these three power conversion modules, each module operates in parallel and stable bus voltage is required to be retained at all-time due to the nature of power supply for satellite.
Target Localization Using Geometry of Detected Sensors in Distributed Sensor Network
Ryu, Chang Soo ;
Journal of the Institute of Electronics and Information Engineers, volume 53, issue 2, 2016, Pages 133~140
DOI : 10.5573/ieie.2016.53.2.133
In active sonar field, a target detection and localization based on a distributed sensor network has been much studied for the underwater surveillance of the coast. Zhou et al. proposed a target localization method utilizing the positions of target-detected sensors in distributed sensor network which consists of detection-only sensors. In contrast with a conventional method, Zhou`s method dose not require to estimate the propagation model parameters of detection signal. Also it needs the lower computational complexity, and to transmit less data between network nodes. However, it has large target localization error. So it has been modified for reducing localization error by Ryu. Modified Zhou`s method has better estimation performance than Zhou`s method, but still relatively large estimation error. In this paper, a target localization method based on modified Zhou`s method is proposed for reducing the localization error. The proposed method utilizes the geometry of the positions of target-detected sensors and a line that represents the bearing of target, a line can be found by modified Zhou`s method. This paper shows that the proposed method has better target position estimation performance than Zhou`s and modified Zhou`s method by computer simulations.
A Study on Frequency Modulation Method to Reduce Time Interval Error
Ahn, Tae-Won ; Lee, Won-Seok ;
Journal of the Institute of Electronics and Information Engineers, volume 53, issue 2, 2016, Pages 141~146
DOI : 10.5573/ieie.2016.53.2.141
This paper presents a method to improve time interval error for asynchronous communication systems. The proposed method is designed and simulated with multi-phase VCO, interpolator, phase selector, up-down counter, comparator and adder. The simulation results for CAN communication system show that the maximum time interval error can be tightly managed for satisfying the required specification. The proposed frequency modulation method can be properly used for asynchronous communication systems requiring high reliability.
Analysis of Transient Potential Rises of Horizontal Ground Electrodes Considering the Frequency-Dependent of Soil
Ahn, Chang Hwan ;
Journal of the Institute of Electronics and Information Engineers, volume 53, issue 2, 2016, Pages 147~153
DOI : 10.5573/ieie.2016.53.2.147
The lightning protection of information and communication facilities is very important factor to improve a reliability of the action of these equipment. Especially the transient potential rise of ground electrode being injected with the lightning current is to be a basic data of the dielectric strength for both power and communication facilities so that more accurate analysis should be required. The transient potential rise can be calculated from the ground impedance and the ground impedance is strongly dependent upon the shape of the ground electrode and the frequency-dependence of soil. The Debye`s equation which is able to calculate the characteristics of dielectrics is used to analyze the frequency-dependent of soil. Also, the method to calculate the transient potential rise from the ground impedance is specified in this paper. In order to analyze the transient potential rise resulting from calculations with Debye`s equation, TLM(transmission line method) and case of
(resistivity)-constant are simulated, respectively. The length of a horizontal ground electrode is 30 m and simulations were performed at 10, 100,
with the standard lightning current waveform. In result, the transient potential rise of horizontal ground electrode calculating with Debye`s equation is lower than it of other models.