Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of information and communication convergence engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 5, Issue 4 - Dec 2007
Volume 5, Issue 3 - Sep 2007
Volume 5, Issue 2 - Jun 2007
Volume 5, Issue 1 - Mar 2007
Selecting the target year
Dynamic data Path Prediction in Network Virtual Environment
Jeoung, You-Sun ; Ra, Sang-Dong ;
Journal of information and communication convergence engineering, volume 5, issue 2, 2007, Pages 83~87
This research studies real time interaction and dynamic data shared through 3D scenes in virtual network environments. In a distributed virtual environment of client-server structure, consistency is maintained by the static information exchange; as jerks occur by packet delay when updating messages of dynamic data exchanges are broadcasted disorderly, the network bottleneck is reduced by predicting the movement path by using the Dead-reckoning algorithm. In Dead-reckoning path prediction, the error between the estimated and the actual static values which is over the threshold based on the shared object location requires interpolation and multicasting of the previous location by the ESPDU of DIS. The shared dynamic data of the 3D virtual environment is implementation using the VRML.
An SS_RRA Protocol for Integrated Voice/Data Services in Packet Radio Networks
Lim, In-Taek ;
Journal of information and communication convergence engineering, volume 5, issue 2, 2007, Pages 88~92
In this paper, an SS-RRA protocol that is based on Code Division Multiple Access is proposed and analyzed under the integrated voice and data traffic load. The backward logical channels consist of slotted time division frames with multiple spreading codes per slot. The protocol uses a reservation mechanism for the voice traffic, and a random access scheme for the data traffic. A discrete-time, discrete-state Markov chain is used to evaluate the performance. The numerical results show that the performance can be significantly improved by a few distinct spreading codes.
Contention-based Reservation MAC Protocol for Burst Traffic in Wireless Packet Networks
Lim, In-Taek ;
Journal of information and communication convergence engineering, volume 5, issue 2, 2007, Pages 93~97
In this paper, centralized access control and slot allocation algorithm is proposed for wireless networks. The proposed algorithm is characterized by the contention-based reservation. In order to reduce the collision probability of reservation request, the base station calculates and broadcasts the transmission probability of reservation requests, and the wireless terminal transmits its reservation request with the received transmission probability. The scheduler allocates the uplink data slots based on the successful reservation requests. Simulation results show that the proposed algorithms can provide high channel utilization, and furthermore, maintains constant delay performance in the heavy traffic environment.
A Combined QRS-complex and P-wave Detection in ECG Signal for Ubiquitous Healthcare System
Bhardwaj, Sachin ; Lee, Dae-Seok ; Chung, Wan-Young ;
Journal of information and communication convergence engineering, volume 5, issue 2, 2007, Pages 98~103
Long term Electrocardiogram (ECG)  analysis plays a key role in heart disease analysis. A combined detection of QRS-complex and P-wave in ECG signal for ubiquitous healthcare system was designed and implemented which can be used as an advanced warning device. The ECG features are used to detect life-threating arrhythmias, with an emphasis on the software for analyzing QRS complex and P-wave in wireless ECG signals at server after receiving data from base station. Based on abnormal ECG activity, the server will transfer alarm conditions to a doctor's Personal Digital Assistant (PDA). Doctor can diagnose the patients who have survived from cardiac arrhythmia diseases.
A routing protocol based on Context-Awareness for Energy Conserving in MANET
Chen, Yun ; Lee, Kang-Whan ;
Journal of information and communication convergence engineering, volume 5, issue 2, 2007, Pages 104~108
Ad hoc networks are a type of mobile network that function without any fixed infrastructure. One of the weaknesses of ad hoc network is that a route used between a source and a destination is to break during communication. To solve this problem, one approach consists of selecting routes whose nodes have the most stable link cost. This paper proposes a method for improving the low power distributed MAC. This method is based on the context awareness of the each nodes energy in clustering. We propose to select a new scheme to optimize energy conserving between the clustering nodes in MANET. And this architecture scheme would use context-aware considering the energy related information such as energy, RF strength, relative distances between each node in mobile ad hoc networks. The proposed networks scheme could get better improve the awareness for data to achieve and performance on their clustering establishment and messages transmission. Also, by using the context aware computing, according to the condition and the rules defined, the sensor nodes could adjust their behaviors correspondingly to improve the network routing.
Characterization of Ultrathin Gate Dielectrics for Nanoscale CMOS Applications
Yoon, Gi-Wan ; Mai, Linh ; Lee, Jae-Young ;
Journal of information and communication convergence engineering, volume 5, issue 2, 2007, Pages 109~111
In this paper, MOS devices with ultrathin gate dielectrics (5.5 nm) are characterized and compared with those with conventional oxides particularly for nanoscale CMOS applications. Nitrogen concentrations and profiles in the nitride gate dielectrics were obtained that will play an important role in improving both hot-carrier lifetime and resistance to boron penetration. This approach seems very useful for future nanoscale CMOS device applications.
A Cyclic CMOS Time-to-Digital Converter
Choi, Jin-Ho ; Kim, Ji-Hong ;
Journal of information and communication convergence engineering, volume 5, issue 2, 2007, Pages 112~115
A CMOS TDC(time-to-digital converter) is proposed which has a simple cyclic structure. The proposed TDC consists of pulse-shrinking elements, D latches and D flip-flops. The operation is based on pulse-shrinking of the input pulse. The resolution of digital output can be easily improved by increasing the number of the pulse-shrinking elements, D latches and D flip flops. The TDC performance is improved in viewpoints of power consumption and chip area. Simulation results are shown to illustrate the performance of the proposed TDC circuit.
a-Si:H Image Sensor for PC Scanner
Hur, Chang-Wu ;
Journal of information and communication convergence engineering, volume 5, issue 2, 2007, Pages 116~120
In this paper, the image sensor using the a-Si:H TFT is proposed. The optimum amorphous silicon thin film is deposited using plasma enhanced chemical vapor deposition (PECVD). TFT and photodiode both with the thin film are fabricated and form image sensor. The photodiode shows that
, respectively. In the case of a-Si:H TFT, it indicates that
, the drain current is a few
volts. For the analysis on the fabricated image sensor, the reverse bias of -5 volts in ITO of photodiode and
pulse in the gate of TFT are applied. The image sensor with good property was conformed through the measured photo/dark current.
The Auto-Tracking Communication Link Using Planar Active Rectrodirective Array
Kim, Gi-Rae ;
Journal of information and communication convergence engineering, volume 5, issue 2, 2007, Pages 121~125
In this paper, a planar active retrodirective four-element array with subharmonic phase conjugation mixers based on anti-parallel diode pairs (APDPs) is designed, and its application in the auto-tracking duplex communication link is presented. As compared to previous phase conjugation mixers using twice RF frequency for LO frequency, the proposed conjugation mixers need only half RF frequency so that it can be easily applied for millimeter-wave applications. The proposed architecture, which conventionally performs the function of the transmission of an incident signal back in the direction of its source, is modified in order to include a receive function. Experimental verification of these architectures is performed at 1GHz and the results from the prototypes are compared with a theoretical model.
Extraction of Characteristics of Concrete Surface Cracks
Ahn, Sang-Ho ;
Journal of information and communication convergence engineering, volume 5, issue 2, 2007, Pages 126~130
This paper proposes a method that automatically extracts characteristics of cracks such as length, thickness and direction, etc., from a concrete surface image with image processing techniques. This paper, first, uses the closing morphologic operation to adjust the effect of light extending over the whole concrete surface image. After applying the high-pass filtering operation to sharpen boundaries of cracks, we classify intensity values of the image into 8 groups and remove intensity values belong to the highest frequency group among them for the removal of background. Then, we binarize the preprocessed image. The auxiliary lines used to measure cracks of concrete surface are removed from the binarized image with position information extracted by the histogram operation. Then, cracks broken by the removal of background are extended to reconstruct an original crack with the
masking operation. We remove unnecessary information by applying three types of noise removal operations successively and extracts areas of cracks from the binarized image. At last, the opening morphologic operation is applied to compensate extracted cracks and characteristics of cracks are measured on the compensated ones. Experiments using real images of concrete surface showed that the proposed method extracts cracks well and precisely measures characteristics of cracks.
Digital Sequence CPLD Technology Mapping Algorithm
Youn, Choong-Mo ;
Journal of information and communication convergence engineering, volume 5, issue 2, 2007, Pages 131~135
In this paper, The proposed algorithm consists of three steps. In the first step, TD(Transition Density) calculation has to be performed. a CLB-based CPLD low-power technology mapping algorithm considered a Trade-off is proposed. To perform low-power technology mapping for CPLDs, a given Boolean network has to be represented in a DAG. Total power consumption is obtained by calculating the switching activity of each node in a DAG. In the second step, the feasible clusters are generated by considering the following conditions: the number of inputs and outputs, the number of OR terms for CLB within a CPLD. The common node cluster merging method, the node separation method, and the node duplication method are used to produce the feasible clusters. In the final step, low-power technology mapping based on the CLBs packs the feasible clusters. The proposed algorithm is examined using SIS benchmarks. When the number of OR terms is five, the experiment results show that power consumption is reduced by 30.73% compared with TEMPLA, and by 17.11 % compared with PLA mapping.
Design of RFID System for User's Authentication Under Ubiquitous Surroundings
Kim, Dae-Yoo ; Kim, Jung-Tae ;
Journal of information and communication convergence engineering, volume 5, issue 2, 2007, Pages 136~139
In this paper we will discuss a general idea about an information system which provides information a user really needs in user's authentication. We will discuss how RFID could be applied for this kind of system especially from the standpoint of using RFID as a way to collect information of personal belongings. Also we will discuss security issues of using RFID as a component of the proposed system because while RFID could provide usefulness, it could also be very dangerous for revealing private information without user's awareness.
Union and Division using Technique in Fingerprint Recognition Identification System
Park, Byung-Jun ; Park, Jong-Min ; Lee, Jung-Oh ;
Journal of information and communication convergence engineering, volume 5, issue 2, 2007, Pages 140~143
Fingerprint Recognition System is made up of Off-line treatment and On-line treatment; the one is registering all the information of there trieving features which are retrieved in the digitalized fingerprint getting out of the analog fingerprint through the fingerprint acquisition device and the other is the treatment making the decision whether the users are approved to be accessed to the system or not with matching them with the fingerprint features which are retrieved and database from the input fingerprint when the users are approaching the system to use. In matching between On-line and Off-line treatment, the most important thing is which features we are going to use as the standard. Therefore, we have been using "Delta" and "Core" as this standard until now, but there might have been some deficits not to exist in every person when we set them up as the standards. In order to handle the users who do not have those features, we are still using the matching method which enables us to make up of the spanning tree or the triangulation with the relations of the spanned feature. However, there are some overheads of the time on these methods and it is not sure whether they make the correct matching or not. In this paper, introduces a new data structure, called Union and Division, representing binary fingerprint image. Minutiae detecting procedure using Union and Division takes, on the average, 32% of the consuming time taken by a minutiae detecting procedure without using Union and Division.
A Trust Management Model for PACS-Grid
Cho, Hyun-Sook ; Lee, Bong-Hwan ; Lee, Kyu-Won ; Lee, Hyoung ;
Journal of information and communication convergence engineering, volume 5, issue 2, 2007, Pages 144~149
Grid technologies make it possible for IT resources to be shared across organizational and security domains. The traditional identity-based access control mechanisms are unscalable and difficult to manage. Thus, we propose the FAS (Federation Agent Server) model which is composed of three modules: Certificate Conversion Module (CCM), Role Decision Module (RDM), and Authorization Decision Module (ADM). The proposed FAS model is an extended Role-Based Access Control (RBAC) model which provides resource access capabilities based on roles assigned to the users. FAS can solve the problem of assigning multiple identities to a shared local name in grid-map file and mapping the remote entity's identity to a local name manually.
A Study on Power Stability Improvement in the Inductive Coupled RFID Transponder System
Kim, Gi-Rae ; Choi, Young-Kyu ;
Journal of information and communication convergence engineering, volume 5, issue 2, 2007, Pages 150~154
Transponders of RFID system are classified as active or passive depending on the type of power supply they use. In passive transponders the data carrier has to obtain its power from the induced voltage. The induced voltage is converted into direct current using a low loss bridge rectifier and then smoothed. In practice, the induced voltage in the transponder coil is variable according to the coupling coefficient k and the load resistance (
). Therefore, the rectified voltage is unstable and the transponder of RFID is unstable sometimes. In this paper, a voltage-dependent shunt resistor (
) circuits are designed and inserted in parallel with the load resistance of RFID transponder in order to improve the stability of power.
Edge Complement of the Cornea's Endothelial Cell Using Energy Function
Kim, Jin-Woo ;
Journal of information and communication convergence engineering, volume 5, issue 2, 2007, Pages 155~158
An area distribution of Corneal Endothelial Cell(CEC) include important clinical information. In this paper, we present a two-step processing method of contour complement for the CEC. In the first step; we apply not only conventional Laplasian Gaussian filters(LGF) but also three-arrow-shaped LGFs which is newly developed to extract vertices of hexagonal shapes. In the second step; we complement the lacking part of CEC by using an energy minimum algorithm. Using the results, we measure areas of CEC.
Temporal Data Modeling for RFID Data in the Retail Industry
Yun, Hong-Won ; Lee, Jung-Hwa ;
Journal of information and communication convergence engineering, volume 5, issue 2, 2007, Pages 159~163
RFID applications are mostly associated with the timestamp when the events occur. For managing RFID data we need to design data modeling for RFID data to support monitoring and temporal queries. In this paper, we propose a temporal RFID data modeling to maintain the history of events and state changes and to monitor the states of RFID objects. This data modeling involves essential basic operations for RFID data to monitor the information of RFID objects and to support temporal queries. Filter operations can achieve better query performance and obtain efficient storage space usage. It is possible to adapt into different temporal business applications.
Performance Improvement of 24X40 Gbps NRZ Channels in WDM System with 1,000 km NZ-DSF using Optimal Parameters of Optical Phase Conjugator
Lee, Seong-Real ; Chung, Jae-Pil ;
Journal of information and communication convergence engineering, volume 5, issue 2, 2007, Pages 164~170
In this paper, the new method alternating with the method for forming the symmetrical distribution of power and local dispersion in high bit-rate WDM system with optical phase conjugator (OPC) is proposed. The proposed method is carried by finding out the optimal values of OPC position offset and fiber dispersion offset. It is assumed to be that NRZ-formatted 24-channels of 40 Gbps are simultaneously propagated in WDM system with non zero - dispersion shifted fiber (NZ-DSF) of 1,000 km. It is confirmed that the compensation extents of overall WDM channels are more improved by applying the induced optimal values into WDM system than those in WDM system with the conventional mid-span spectral inversion (MSSI) technique, and the searching procedure of the optimal values makes little difference of performance if the optimal value of one parameter related with another parameter. And, it is confirmed that the flexible design of WDM system with OPC is possible by effectiviely using by these optimal values. Thus, it is expected that the proposed method alternate with the forming method of the symmetrical distributions of power and local dispersion.
An Adaptable Integrated Prediction System for Traffic Service of Telematics
Cho, Mi-Gyung ; Yu, Young-Jung ;
Journal of information and communication convergence engineering, volume 5, issue 2, 2007, Pages 171~176
To give a guarantee a consistently high level of quality and reliability of Telematics traffic service, traffic flow forecasting is very important issue. In this paper, we proposed an adaptable integrated prediction model to predict the traffic flow in the future. Our model combines two methods, short-term prediction model and long-term prediction model with different combining coefficients to reflect current traffic condition. Short-term model uses the Kalman filtering technique to predict the future traffic conditions. And long-term model processes accumulated speed patterns which means the analysis results for all past speeds of each road by classifying the same day and the same time interval. Combining two models makes it possible to predict future traffic flow with higher accuracy over a longer time range. Many experiments showed our algorithm gives a better precise prediction than only an accumulated speed pattern that is used commonly. The result can be applied to the car navigation to support a dynamic shortest path. In addition, it can give users the travel information to avoid the traffic congestion areas.
Evaluation Performance of Speech Coder in Speech Signal Processing
Lee, Kwang-Seok ;
Journal of information and communication convergence engineering, volume 5, issue 2, 2007, Pages 177~180
We compared CS-ACELP with QCELP speech coder in CDMA cellular under channel error environment and experimented performance with its measured value under channel error environment. Also, we specified the effective coding scheme to overcome. CS-ACELP speech coder using a LSP vector quantizer shows transparent speech quality from the results that SD is 0.92dB and outlier frames over 2dB is 2.9% in the BER 0.10% condition. CS-ACELP speech coder which is utilizing MA predictor shows better results on SVR and SEGSNR than QCELP speech coder(IS-96) adopting DPCM type predictor when bit error occurs from BER 0.01% to 0.50%.