Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of information and communication convergence engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 10, Issue 4 - Dec 2012
Volume 10, Issue 3 - Sep 2012
Volume 10, Issue 2 - Jun 2012
Volume 10, Issue 1 - Mar 2012
Selecting the target year
Rectangular Ring Open-Ended Monopole Antenna with Inverted L-Strip for WLAN Dual-Band Operations
Yoon, Joong-Han ;
Journal of information and communication convergence engineering, volume 10, issue 4, 2012, Pages 321~328
DOI : 10.6109/jicce.2012.10.4.321
A novel design for a simple rectangular ring with open-ended monopole antenna wireless local area network (WLAN) applications is proposed in this article. The proposed antenna consists of an open-ended rectangular ring, an inverted L-strip, and a rectangular slit in the ground plane, and is fed by a 50
microstrip feed-line. Prototypes of the proposed antenna were designed, fabricated, and tested. Experimental results show that the proposed antenna receives 2.3125-2.775 GHz and 4.8625-6.7125 GHz with a return loss less than -10 dB, covering the required bandwidths of the 2.4/5.2/5.8 GHz WLAN standards. Meanwhile, the 2D radiation patterns and 3D gain performance of the antenna in the operation bands were also observed and discussed.
Probabilistic Broadcasting Based on Selfishness and Additional Coverage in MANETs
Kim, Jae-Soo ; Kim, Jeong-Hong ;
Journal of information and communication convergence engineering, volume 10, issue 4, 2012, Pages 329~336
DOI : 10.6109/jicce.2012.10.4.329
For designing broadcast protocols in mobile ad hoc networks (MANETs), one of the important goals is to reduce the rebroadcast packets redundancy while reaching all the nodes in network. In this paper, we propose a probabilistic broadcasting mechanism based on selfishness and additional coverage in MANETs. Our approach dynamically adjusts the rebroadcast probability according to the extra covered area and number of neighbor nodes. By these two factors, mobile hosts can be classified into three groups: normal, low selfishness, and high selfishness groups. The nodes in the normal group forward packets for other nodes with high probability, whereas the nodes in the low selfishness group rebroadcast packets with low probability and the nodes in the high selfishness group do not rebroadcast packets. We compared our approach with simple flooding and the fixed probabilistic approach. The simulation results show that the proposed schemes can significantly reduce the number of retransmissions by up to 40% compared simple flooding and fixed probabilistic scheme without significant reduction in the network reachability and end-to-end packet delay.
Analyses of Characteristics of U-Healthcare System Based on Wireless Communication
Kim, Jung Tae ;
Journal of information and communication convergence engineering, volume 10, issue 4, 2012, Pages 337~342
DOI : 10.6109/jicce.2012.10.4.337
The medical industries are integrated with information technology with mobile devices and wireless communication. The advent of mobile healthcare systems can benefit patients and hospitals, by not only providing better quality of patient care, but also by reducing administrative and medical costs for both patients and hospitals. Security issues present an interesting research topic in wireless and pervasive healthcare networks. As information technology is developed, many organizations such as government agencies, public institutions, and corporations have employed an information system to enhance the efficiency of their work processes. For the past few years, healthcare organizations throughout the world have been adopting health information systems (HIS) based on the wireless network infrastructure. As a part of the wireless network, a mobile agent has been employed at a large scale in hospitals due to its outstanding mobility. Several vulnerabilities and security requirements related to mobile devices should be considered in implementing mobile services in the hospital environment. Secure authentication and protocols with a mobile agent for applying ubiquitous sensor networks in a healthcare system environment is proposed and analyzed in this paper.
ZigBee Security Using Attribute-Based Proxy Re-encryption
Seo, Hwajeong ; Kim, Howon ;
Journal of information and communication convergence engineering, volume 10, issue 4, 2012, Pages 343~348
DOI : 10.6109/jicce.2012.10.4.343
ZigBee Network is enabling technology for home automation, surveillance and monitoring system. For better secure network environment, secure and robust security model is important. The paper proposes an application, attribute-based proxy re-encryption on ZigBee networks. The method can distribute the authority to designated sensor nodes to decrypt re-encrypted ciphertext with associated attributes. However, a previous method is required to compute complex pairing operations. The high complexity is not suited to low resource device sensor networks, and it does not provide routing security either. To resolve these problems, we present a novel mechanism. The method can reduce overhead by imposing overhead to full function devices and ensure routing paths as well.
Four Anchor Sensor Nodes Based Localization Algorithm over Three-Dimensional Space
Seo, Hwajeong ; Kim, Howon ;
Journal of information and communication convergence engineering, volume 10, issue 4, 2012, Pages 349~358
DOI : 10.6109/jicce.2012.10.4.349
Over a wireless sensor network (WSN), accurate localization of sensor nodes is an important factor in enhancing the association between location information and sensory data. There are many research works on the development of a localization algorithm over three-dimensional (3D) space. Recently, the complexity-reduced 3D trilateration localization approach (COLA), simplifying the 3D computational overhead to 2D trilateration, was proposed. The method provides proper accuracy of location, but it has a high computational cost. Considering practical applications over resource constrained devices, it is necessary to strike a balance between accuracy and computational cost. In this paper, we present a novel 3D localization method based on the received signal strength indicator (RSSI) values of four anchor nodes, which are deployed in the initial setup process. This method provides accurate location estimation results with a reduced computational cost and a smaller number of anchor nodes.
A Simple Energy Harvesting Algorithm for Wireless Sensor Networks
Encarnacion, Nico N. ; Yang, Hyunho ;
Journal of information and communication convergence engineering, volume 10, issue 4, 2012, Pages 359~364
DOI : 10.6109/jicce.2012.10.4.359
Harvesting energy from the environment is essential for many applications to slow down the deterioration of energy of the devices in sensor networks and in general, the network itself. Energy from the environment is an inexhaustible supply which, if properly managed and harvested from the sources, can allow the system to last for a longer period - more than the expected lifetime at the time of deployment, or even last indefinitely. The goal of this study is to develop a simple algorithm for ns-2 to simulate energy harvesting in wireless sensor network simulations. The algorithm is implemented in the energy module of the simulator. Energy harvesting algorithms have not yet been developed for ns-2. This study will greatly contribute to the existing knowledge of simulating wireless sensor networks with energy harvesting capabilities in ns-2. This paper will also serve as a basis for future research papers that make use of energy harvesting.
Context-Aware Mobile Gateway Relocation Scheme for Clustered Wireless Sensor Networks
Encarnacion, Nico N. ; Yang, Hyunho ;
Journal of information and communication convergence engineering, volume 10, issue 4, 2012, Pages 365~371
DOI : 10.6109/jicce.2012.10.4.365
In recent years, researchers have been attracted to clustering methods to improve communication and data transmission in a network. Compared with traditional wireless networks, wireless sensor networks are energy constrained and have lower data rates. The concept of implementing a clustering algorithm in an existing project on gateway relocation is being explored here. Low energy adaptive clustering hierarchy (LEACH) is applied to an existing study on relocating a gateway. The study is further improved by moving the gateway to a specific cluster based on the number or significance of the events detected. The protocol is improved so that each cluster head can communicate with a mobile gateway. The cluster heads are the only nodes that can communicate with the mobile gateway when it (the mobile gateway) is out of the cluster nodes' transmission range. Once the gateway is in range, the nodes will begin their transmission of real-time data. This alleviates the load of the nodes that would be located closest to the gateway if it were static.
OSEK/VDX Porting to the Two-Wheel Mobile Robot Based on the Differential Drive Method
Le Nguyen, Duy ; Lee, Myung-Eui ;
Journal of information and communication convergence engineering, volume 10, issue 4, 2012, Pages 372~377
DOI : 10.6109/jicce.2012.10.4.372
In this paper, we propose an implementation of a real-time operating system for the two-wheel mobile robot. With this implementation, we have the ability to control the complex embedded systems of the two-wheel mobile robot. The advantage of the real-time operating system is increasing the reliability and stability of the two-wheel mobile robot when they work in critical environments such as military and industrial applications. The real-time operating system which was ported to this implementation is open systems and the corresponding interfaces for automotive electronics (OSEK/VDX). It is known as the set of specifications on automotive operating systems, published by a consortium founded by the automotive industry. The mechanical design and kinematics of the two-wheel mobile robot are described in this paper. The contributions of this paper suggest a method for adapting and porting OSEK/VDX real-time operating system to the two-wheel mobile robot with the differential drive method, and we are also able to apply the real-time operating system to any complex embedded system easily.
An Automatic Road Sign Recognizer for an Intelligent Transport System
Miah, Md. Sipon ; Koo, Insoo ;
Journal of information and communication convergence engineering, volume 10, issue 4, 2012, Pages 378~383
DOI : 10.6109/jicce.2012.10.4.378
This paper presents the implementation of an automatic road sign recognizer for an intelligent transport system. In this system, lists of road signs are processed with actions such as line segmentation, single sign segmentation, and storing an artificial sign in the database. The process of taking the video stream and extracting the road sign and storing in the database is called the road sign recognition. This paper presents a study on recognizing traffic sign patterns using a segmentation technique for the efficiency and the speed of the system. The image is converted from one scale to another scale such as RGB to grayscale or grayscale to binary. The images are pre-processed with several image processing techniques, such as threshold techniques, Gaussian filters, Canny edge detection, and the contour technique.
Performance Analysis of ILEACH and LEACH Protocols for Wireless Sensor Networks
Miah, Md. Sipon ; Koo, Insoo ;
Journal of information and communication convergence engineering, volume 10, issue 4, 2012, Pages 384~389
DOI : 10.6109/jicce.2012.10.4.384
In this paper, we examine the problems of the low energy adaptive clustering hierarchy (LEACH) protocol and present ideas for improvement by selecting the cluster head node. The main problem with LEACH lies in the random selection of cluster heads. There exists a probability that the formed cluster heads are unbalanced and may remain in one part of the network, which makes some part of the network unreachable. In this paper, we present a new version of the LEACH protocol called the improved LEACH (ILEACH) protocol, which a cluster head is selected based on its ratio between the current energy level and an initial energy level, and multiplies by the root square of its number of neighbor nodes. The simulation results show that the proposed ILEACH increases the energy efficiency and network lifetime.
Automatic Mutual Localization of Swarm Robot Using a Particle Filter
Lee, Yang-Weon ;
Journal of information and communication convergence engineering, volume 10, issue 4, 2012, Pages 390~395
DOI : 10.6109/jicce.2012.10.4.390
This paper describes an implementation of automatic mutual localization of swarm robots using a particle filter. Each robot determines the location of the other robots using wireless sensors. The measured data will be used for determination of the movement method of the robot itself. It also affects the other robots' self-arrangement into formations such as circles and lines. We discuss the problem of a circle formation enclosing a target that moves. This method is the solution for enclosing an invader in a circle formation based on mutual localization of the multi-robot without infrastructure. We use trilateration, which does require knowing the value of the coordinates of the reference points. Therefore, specifying the enclosure point based on the number of robots and their relative positions in the coordinate system. A particle filter is used to improve the accuracy of the robot's location. The particle filter is operates better for mutual location of robots than any other estimation algorithms. Through the experiments, we show that the proposed scheme is stable and works well in real environments.
Improved Schedulability Analysis of Real-Time Sporadic Tasks with EDF Preemptive Scheduling
Darbandi, Armaghan ; Kim, Myung-Kyun ;
Journal of information and communication convergence engineering, volume 10, issue 4, 2012, Pages 396~404
DOI : 10.6109/jicce.2012.10.4.396
This paper proposes an analysis method to check the schedulability of a set of sporadic tasks under earliest deadline first (EDF) scheduler. The sporadic task model consists of subtasks with precedence constraints, arbitrary arrival times and deadlines. In order to determine the schedulability, we present an approach to find exact worst case response time (WCRT) of subtatsks. With the technique presented in this paper, we exploit the precedence relations between subtasks in an accurate way while taking advantage of the deadline of different subtasks. Another nice feature of our approach is that it avoids calculation time overhead by exploiting the concept of deadline busy period. Experimental results show that this consideration leads to a significant improvement compared with existing work.
HFAT: Log-Based FAT File System Using Dynamic Allocation Method
Kim, Nam Ho ; Yu, Yun Seop ;
Journal of information and communication convergence engineering, volume 10, issue 4, 2012, Pages 405~410
DOI : 10.6109/jicce.2012.10.4.405
Several attempts have been made to add journaling capability to a traditional file allocation table (FAT) file system. However, they encountered issues such as excessive system load or instability of the journaling data itself. If journaling data is saved as a file format, it can be corrupted by a user application. However, if journaling data is saved in a fixed area such as a reserved area, the storage can be physically corrupted because of excessive system load. To solve this problem, a new method that dynamically allocates journaling data is introduced. In this method, the journaling data is not saved as a file format. Using a reserved area and reserved FAT status entry of the FAT file system specification, the journaling data can be dynamically allocated and cannot be accessed by user applications. The experimental results show that this method is more stable and scalable than other log-based FAT file systems. HFAT was tested with more than 12,000 power failures and was stable.
City-Scale Modeling for Street Navigation
Huang, Fay ; Klette, Reinhard ;
Journal of information and communication convergence engineering, volume 10, issue 4, 2012, Pages 411~419
DOI : 10.6109/jicce.2012.10.4.411
This paper proposes a semi-automatic image-based approach for 3-dimensional (3D) modeling of buildings along streets. Image-based urban 3D modeling techniques are typically based on the use of aerial and ground-level images. The aerial image of the relevant area is extracted from publically available sources in Google Maps by stitching together different patches of the map. Panoramic images are common for ground-level recording because they have advantages for 3D modeling. A panoramic video recorder is used in the proposed approach for recording sequences of ground-level spherical panoramic images. The proposed approach has two advantages. First, detected camera trajectories are more accurate and stable (compared to methods using multi-view planar images only) due to the use of spherical panoramic images. Second, we extract the texture of a facade of a building from a single panoramic image. Thus, there is no need to deal with color blending problems that typically occur when using overlapping textures.