Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of information and communication convergence engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 7, Issue 4 - Dec 2009
Volume 7, Issue 3 - Sep 2009
Volume 7, Issue 2 - Jun 2009
Volume 7, Issue 1 - Mar 2009
Selecting the target year
3-D Reconstruction of Buildings using 3-D Line Grouping for Urban Modeling
Jung, Young-Kee ;
Journal of information and communication convergence engineering, volume 7, issue 1, 2009, Pages 1~6
In order to obtain a 3-D urban model, an abstraction of the surface model is required. This paper describes works on the 3D reconstruction and modeling by the grouping 3D line segments extracted from the stereo matching of edges, which is derived from multiple images. The grouping is achieved by conditions of degrees and distances between lines. Building objects are determined by the junction combinations of the grouped line segments. The proposed algorithm demonstrates effective results of 3D reconstruction of buildings with 2D aerial images.
Design of Hybrid Network Probe Intrusion Detector using FCM
Kim, Chang-Su ; Lee, Se-Yul ;
Journal of information and communication convergence engineering, volume 7, issue 1, 2009, Pages 7~12
The advanced computer network and Internet technology enables connectivity of computers through an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and can not detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We proposed a network based hybrid Probe Intrusion Detection model using Fuzzy cognitive maps (PIDuF) that detects intrusion by DoS (DDoS and PDoS) attack detection using packet analysis. A DoS attack typically appears as a probe and SYN flooding attack. SYN flooding using FCM model captures and analyzes packet information to detect SYN flooding attacks. Using the result of decision module analysis, which used FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.064% and the max-average false negative rate of 2.936%. The true positive error rate of the PIDuF is similar to that of Bernhard's true positive error rate.
Efficient Authentication Framework in Ubiquitous Robotic Companion
Chae, Cheol-Joo ; Cho, Han-Jin ; Lee, Jae-Kwang ;
Journal of information and communication convergence engineering, volume 7, issue 1, 2009, Pages 13~18
The robotics industry, that is the major industry of the future and one of the new growth power, is actively studied around ETRI, that is the leading under state-run research institute of the advanced technique of U.S. and Japanese and knowledge economy part. And positive and negative and academic circles, the research institute, and the industrial circles communally pursue the intelligent service robot enterprise of a network-based called URC. This network-based intelligent robot does the RUPI2.0 platform and URC environment by the base. Therefore, a stability need to be enhanced in the through this near future when the research for the preexistence vulnerability analysis and security request is needed than the commercialized network-based intelligent robot in order to implement the network-based intelligent robot. Thus, in this paper, we propose the efficient authentication Framework which is suitable for the URC environment.
Analyses of RFID System Using Lighted Weight Algorithm
Kim, Jung-Tae ;
Journal of information and communication convergence engineering, volume 7, issue 1, 2009, Pages 19~23
In this paper, we propose a general idea about an RFID system which provides lighted weight algorithm. We discuss how RFID could be applied for this kind of system, especially, compact protocol. We evaluate a few protocols that have been suggested for use in passive RFID tagged systems. We can reduce security computation without losing security features by message integration and pre-computation in this paper. And the proposed protocol can be used in low-cost RFID systems that require a small computational load for both the back-end database and the tags.
A New Construction of Fuzzy Identity Based Signature Scheme
Wang, Chang-Ji ;
Journal of information and communication convergence engineering, volume 7, issue 1, 2009, Pages 24~29
Sahai and Waters first introduced the concept of Fuzzy Identity Based Encryption (FIBE) to provide an error-tolerance property for Identity Based Encryption (IBE) in 2005. Yang et al. extended this idea and introduced the concept of Fuzzy Identity Based Signature (FIBS) in 2008, and constructed a FIBS scheme based on Sahai and Waters's FIBE scheme. In this paper, we further formalize the notion and security model of FIBS scheme and propose a new construction of FIBS scheme based on bilinear pairing. The proposed FIBS scheme not only provide shorter public parameters, private key and signature, but also have useful structures which result in more efficient key extraction, signing and verification than that of Yang et al.'s FIBS scheme.
A Study on the Encryption Model for Numerical Data
Kim, Ji-Hong ; Sahama, Tony ;
Journal of information and communication convergence engineering, volume 7, issue 1, 2009, Pages 30~34
The encryption method is a well established technology for protecting sensitive data. However, once encrypted, the data can no longer be easily queried. The performance of the database depends on how to encrypt the sensitive data. In this paper we review the conventional encryption method which can be partially queried and propose the encryption method for numerical data which can be effectively queried. The proposed system includes the design of the service scenario, and metadata.
Data Reduction Method in Massive Data Sets
Namo, Gecynth Torre ; Yun, Hong-Won ;
Journal of information and communication convergence engineering, volume 7, issue 1, 2009, Pages 35~40
Many researchers strive to research on ways on how to improve the performance of RFID system and many papers were written to solve one of the major drawbacks of potent technology related with data management. As RFID system captures billions of data, problems arising from dirty data and large volume of data causes uproar in the RFID community those researchers are finding ways on how to address this issue. Especially, effective data management is important to manage large volume of data. Data reduction techniques in attempts to address the issues on data are also presented in this paper. This paper introduces readers to a new data reduction algorithm that might be an alternative to reduce data in RFID Systems. A process on how to extract data from the reduced database is also presented. Performance study is conducted to analyze the new data reduction algorithm. Our performance analysis shows the utility and feasibility of our categorization reduction algorithms.
Design of Elevation Data Transmission Method for Mobile Vector GIS
Choi, Jin-Oh ;
Journal of information and communication convergence engineering, volume 7, issue 1, 2009, Pages 41~45
In mobile GIS environments, a client needs to receive the isogram data with a topographical map from a server, if the mobile client wants to display map with elevation information. Because the elevation data size is normally quite large, the client will suffer some problems to receive the elevation data from server. The main reason is a resource limitation of the mobile devices. To overcome these problems, this paper proposes new data structures and algorithms. They are designed for efficient transmission of contour data to a client. Because of the contour data are generated as a vector style from elevation information stored at a server, the proposed algorithms are focused to minimize the transmission data volume and time.
Wound-rotor induction generator system for random wave input power
Kim, Moon-Hwan ;
Journal of information and communication convergence engineering, volume 7, issue 1, 2009, Pages 46~51
In this paper, the two-axis theory is adopted to analyze the secondary excited induction generator applied to random wave input generation system. The analysis by the two-axis theory helps to know the transmitted power of the induction machine. The electric variables, like as primary and secondary currents, voltages, and electric output power, were able to express as equations. These equations are help to simulate the generation system numerical model and to know the transient state of the system. As it is preferred to stabilize the output voltage and frequency in the constant level, microcomputer controlled VSI connected to the secondary windings supplies the secondary current with slip frequency. For testing the appropriateness of this method, the input torque simulator in the laboratory to drive the secondary excited results show the advantage of secondary excited induction generator system for the random input wave generation system.
A study on the development of DC-DC converter for low-power DSC
Park, Sung-Joon ; Kim, Whi-Young ;
Journal of information and communication convergence engineering, volume 7, issue 1, 2009, Pages 52~56
In this research, we have studied the development of dc-dc converter suitable for the driving of mobile instruments by using a dye-sensitized solar cell(DSC). We also have designed a interlocking circuit. The circuit makes power generation be saved in one battery and concurrently be discharged in the other battery. As this application, mobile devices such as MP3, cellular phone are operated by using power generator from DSC during the daytime and they can be operated by using the saving energy of the daytime during the night. Consequently, it has a simple and robust circuit configuration. Besides, we designed dc-dc converter circuit to drive low power instruments by using NMOS switch and PMOS rectifier. Operational modes are analysed, and then validity of the proposed interface circuit is verified through DCS.
Subthreshold Current Model of FinFET Using Three Dimensional Poisson's Equation
Jung, Hak-Kee ;
Journal of information and communication convergence engineering, volume 7, issue 1, 2009, Pages 57~61
This paper has presented the subthreshold current model of FinFET using the potential variation in the doped channel based on the analytical solution of three dimensional Poisson's equation. The model has been verified by the comparison with the data from 3D numerical device simulator. The variation of subthreshold current with front and back gate bias has been studied. The variation of subthreshold swing and threshold voltage with front and back gate bias has been investigated.
Temperature Dependent Characteristics Analysis of FLL Circuit
Choi, Jin-Ho ;
Journal of information and communication convergence engineering, volume 7, issue 1, 2009, Pages 62~65
In this paper, the temperature characteristics of full CMOS FLL(frequency locked loop) re analyzed. The FLL circuit is used to generate an output signal that tracks an input efference signal. The locking time of FLL is short compared to PLL(phase locked loop) circuit because the output signal of FLL is synchronized only in frequency. Also the FLL s designed to allow the circuit to be fully integrated. The FLL circuit is composed two VCs, two buffers, a VCO and two frequency dividers. The temperature variation of frequency divider, FVC and buffer cancelled because the circuit structure. is the same and he temperature effect is cancelled by the comparator. Simulation results are shown to illustrate the performance of the designed FLL circuit with temperature.
A Robust Resistive Fingerprint Sensor
Jung, Seung-Min ;
Journal of information and communication convergence engineering, volume 7, issue 1, 2009, Pages 66~71
A novel sensing scheme using resistive characteristics of the finger is proposed. ESD problem is more harmful than a capacitive fingerprint sensor in a resistive fingerprint sensor, because the sensor plate is directly connected to the sensing cell. The proposed circuit is more robust than conventional circuit for ESD. The sensor plate and sensing cell are isolated by capacitor. The pixel level simple detection circuit is fully digital operation unlike that of the capacitive sensing cell. The sensor circuit blocks are designed and simulated in a standard CMOS
process. The proposed circuit is more stable and effective than a typical circuit.
-based oxide semiconductor thick-film gas sensors prepared by three different catalyst-addition processes
Lee, Kyu-Chung ; Hur, Chang-Wu ;
Journal of information and communication convergence engineering, volume 7, issue 1, 2009, Pages 72~77
Three different procedures for adding Pd compounds to
particles have been investigated. These processes are: (1) coprecipitation; (2) dried powder impregnation; and (3) calcined powder impregnation. The microstructures of
particles have been analyzed by X-ray diffraction (XRD), Brunauer-Emmett-Teller (BET), scanning electron microscope (SEM) and X-ray photoelectron spectroscopy (XPS). In the coprecipitaion method, the process does not restrain the growth of
particles and it forms huge agglomerates. In the dried powder impregnation method, the process restrains the growth of
particles and the surfaces of the agglomerates have many minute pores. In the calcined powder impregnation method, the process restrains the growth of
particles further and the agglomerates have a lot more minute pores. The sensitivity (
) of the
gas sensor made by the calcined powder impregnation process shows the highest value (S = 21.5 at 5350 ppm of
) and the sensor also indicates the lowest operating temperature of around
. It is believed that the best result is caused by the plenty of minute pores at the surface of the microstructure and by the catalyst Pd that is dispersed at the surface rather than the inside of the agglomerate. Schematic models of Pd distribution in and on the three different
particles are presented.
Power Control Schemes for Land Mobile Satellite Communication Systems
Lee, Nam-Gil ; Hwang, In-Tae ; Kim, Seong-Hwan ; Na, Cheol-Hun ; Ryoo, Sang-Jin ;
Journal of information and communication convergence engineering, volume 7, issue 1, 2009, Pages 78~85
In order to increase system capacity and reduce the transmitting power of the user's equipment, we propose an advanced power control scheme consisting of a modified open-loop power control (OLPC) and closed-loop power control (CLPC) for land mobile satellite communication systems. The improved CLPC scheme, combining delay compensation algorithms and pilot diversity, is mainly applied to the ancillary terrestrial component (ATC). ATC link in urban areas, because it is more suitable to the short round-trip delay (RTD).