Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of information and communication convergence engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 8, Issue 6 - Dec 2010
Volume 8, Issue 5 - Oct 2010
Volume 8, Issue 4 - Aug 2010
Volume 8, Issue 3 - Jun 2010
Volume 8, Issue 2 - Apr 2010
Volume 8, Issue 1 - Feb 2010
Selecting the target year
TriSec: A Secure Data Framework for Wireless Sensor Networks Using Authenticated Encryption
Kumar, Pardeep ; Cho, Sang-Il ; Lee, Dea-Seok ; Lee, Young-Dong ; Lee, Hoon-Jae ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 129~135
DOI : 10.6109/jicce.2010.8.2.129
Wireless sensor networks (WSNs) are an emerging technology and offers economically viable monitoring solution to many challenging applications. However, deploying new technology in hostile environment, without considering security in mind has often proved to be unreasonably unsecured. Apparently, security techniques face many critical challenges in WSNs like data security and secrecy due to its hostile deployment nature. In order to resolve security in WSNs, we propose a novel and efficient secure framework called TriSec: a secure data framework for wireless sensor networks to attain high level of security. TriSec provides data confidentiality, authentication and data integrity to sensor networks. TriSec supports node-to-node encryption using PingPong-128 stream cipher based-privacy. A new PingPong-MAC (PP-MAC) is incorporated with PingPong stream cipher to make TriSec framework more secure. PingPong-128 is fast keystream generation and it is very suitable for sensor network environment. We have implemented the proposed scheme on wireless sensor platform and our result shows their feasibility.
Convergence Characteristics of the Normalized Blind Equalization Algorithm
Lee, Gwang-Seok ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 136~139
DOI : 10.6109/jicce.2010.8.2.136
We derived Stop-and-go normalized DD, dual-mode normalized Sato, dual-mode NCMA blind equalization algorithm for complex data in this research. And then, the convergence characteristics of the proposed SG-NDD, dual-mode NSato blind equalization algorithms are compared with those of SG-DD, dual-mode Sato algorithms. In general, the normalized blind equalization algorithms have better convergence characteristics than the conventional algorithms.
A Study on an Advanced Evaluation Method for Dynamic Signature Verification System
Kim, Jin-Whan ; Cho, Jae-Hyun ; Kim, Kwang-Baek ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 140~144
DOI : 10.6109/jicce.2010.8.2.140
This paper is a research on an evaluating method for the dynamic signature verification system. It is described about various factors such as error rate, the size of signature verification engine, the size of the characteristic vectors of a signature, the ability to distinguish similar signatures, the processing speed of signature verification and so on. This study identifies factors to consider in evaluating signature verification systems comprehensively and objectively without an officially approved signature database, examines the meaning of each of the factors, and proposes criteria for evaluating and analyzing the factors.
Kinematic Method of Camera System for Tracking of a Moving Object
Jin, Tae-Seok ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 145~149
DOI : 10.6109/jicce.2010.8.2.145
In this paper, we propose a kinematic approach to estimating the real-time moving object. A new scheme for a mobile robot to track and capture a moving object using images of a camera is proposed. The moving object is assumed to be a point-object and projected onto an image plane to form a geometrical constraint equation that provides position data of the object based on the kinematics of the active camera. Uncertainties in the position estimation caused by the point-object assumption are compensated using the Kalman filter. To generate the shortest time path to capture the moving object, the linear and angular velocities are estimated and utilized. The experimental results of tracking and capturing of the target object with the mobile robot are presented.
A Study on Digital RF Repeaters with Interference Cancellation System
Han, Yong-Sik ; Yang, Woon-Geun ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 150~154
DOI : 10.6109/jicce.2010.8.2.150
In this paper, the adaptive interference cancellation system (ICS) in order to cancel the feedback signal in the wireless communication system is proposed. We cancel the interference with the attenuation signal corresponding to the feedback signal and estimate the feedback signal by using Normalized Least Mean Square (NLMS) algorithm. The proposed scheme showed a better performance of interference cancellation in the measurement results.
Adaptive Interference Cancellation Using CMA-Correlation Normalized LMS for WCDMA System
Han, Yong-Sik ; Yang, Woon-Geun ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 155~158
DOI : 10.6109/jicce.2010.8.2.155
In this article, we proposed a new interference canceller using the adaptive algorithm. We designed constant modulus algorithm-correlation normailized least mean square (CMA-CNLMS) for wireless system. This structure is normalized LMS algorithm using correlation between the desired and input signal for cancelling the interference signals in the wideband code division multiple access (WCDMA) system. We showed that the proposed algorithm could improve the Mean Square Error (MSE) performance of LMS algorithm. MATLAB (Matrix Laboratory) is employed to analyze the proposed algorithm and to compare it with the experimental results. The MSE value of the LMS with mu=0.0001 was measured as - 12.5 dB, and that of the proposed algorithm was -19.5 dB which showed an improvement of 7dB.
Kurtosis Driven Variable Step-Size Normalized Least Mean Square Algorithm for RF Repeater
Han, Yong-Sik ; Yang, Woon-Geun ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 159~162
DOI : 10.6109/jicce.2010.8.2.159
This paper presents a new Kurtosis driven Variable Step-Size Normalized Least Mean Square (KVSSN-LMS) algorithm to prevent repeater from oscillation due to feedback signal of radio frequency (RF) repeater. To get better Mean Square Error (MSE) performance, step-size is adjusted using the kurtosis. The proposed algorithm shows the better performance of steady state MSE. The proposed algorithm shows a better ERLE performance than that of KVSS-LMS, VSS-NLMS, NLMS algorithms.
An Approach for Implementation of Underwater Acoustic Communication Channel using 2-D TLM Modeling and Cross-Correlation Function
Park, Kyu-Chil ; Yoon, Jong-Rak ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 163~167
DOI : 10.6109/jicce.2010.8.2.163
In underwater acoustic communication, acoustic signals from transducers or hydrophones are used. And the underwater acoustic communication channels are very complicated, because of vertical distribution of acoustic velocity according depths, and reflections from boundaries like as surface or bottom. For the implementation of the underwater acoustic communication channel, the image method or ray tracing method have been used. In this paper, we introduce a new approach for implementation of underwater acoustic communication channel using the simulation of the Transmission Line Matrix Modeling and cross-correlations from the input and output signals.
A Study on the Performance Enhancement of the Macro Handover in HMIP According to Protocol Layers
Woo, Jong-Jung ; Ahn, Chi-Hyun ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 168~172
DOI : 10.6109/jicce.2010.8.2.168
The Network-based handover still has problems such as the transmission delays and the packet losses in the case of macro mobility, though technological advances have been made in the wireless and mobile communication. For end-to-end handover, the link bandwidth has been reduced in the wireless network due to its burst errors and congestion control. To overcome such problems, we propose a new scheme of the macro handover according to the protocol layer. The proposed macro handover is implemented on the network layer to partially substitute wired signaling for wireless signaling, to flexibly employ buffers, and on the transport layer to postpone its retransmission time. We have performed extensive simulation using ns-2 and the result shows that our proposed scheme outperforms the other existing schemes in terms of transmission delay, packet loss, and data transfer rate during the handovers.
A Novel Two-Stage Approach in Rectifying BioHash's Problem under Stolen Token Scenario
Lim, Meng-Hui ; Jeong, Min-Yi ; Teoh, Andrew Beng Jin ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 173~179
DOI : 10.6109/jicce.2010.8.2.173
Over recent years, much research attention has been devoted to a two-factor authentication mechanism which integrates both tokenized pseudorandom numbers with user specific biometric features for biometric verification, known as Biohash. The main advantage of Biohash over sole biometrics is that Biohash is able to achieve a zero equal error rate and provide a clean separation of the genuine and imposter populations, thereby allowing elimination of false accept rates without imperiling the false reject rates. Nonetheless, when the token of a user is compromised, the recognition performance of a biometric system drops drastically. As such, a few solutions have been proposed to improve the degraded performance but such improvements appear to be insignificant. In this paper, we investigate and pinpoint the basis of such deterioration. Subsequently, we propose a two-level approach by utilizing strong inner products and fuzzy logic weighting strategies accordingly to increase the original performance of Biohash under this scenario.
A Robot Motion Authoring Using Finger-Robot Interaction
Kim, Yoon-Sang ; Seok, Kwang-Ho ; Lee, Chang-Mug ; Kwon, Oh-Young ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 180~184
DOI : 10.6109/jicce.2010.8.2.180
This paper proposes a robot motion authoring using finger-robot interaction. The proposed method is a user friendly method that easily authors (creates and controls) robot motion according to the number of fingers. The effectiveness of the proposed motion authoring method was verified based on motion authoring simulation of an industrial robot.
Content Based Image Retrieval Based on A Novel Image Block Technique Combining Color and Edge Features
Kwon, Goo-Rak ; Haoming, Zou ; Park, Sei-Seung ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 185~190
DOI : 10.6109/jicce.2010.8.2.185
In this paper we propose the CBIR algorithm which is based on a novel image block method that combined both color and edge feature. The main drawback of global histogram representation is dependent of the color without spatial or shape information, a new image block method that divided the image to 8 related blocks which contained more information of the image is utilized to extract image feature. Based on these 8 blocks, histogram equalization and edge detection techniques are also used for image retrieval. The experimental results show that the proposed image block method has better ability of characterizing the image contents than traditional block method and can perform the retrieval system efficiently.
Automatic Motion Generation from the Posture Template
Lee, Chang-Mug ; Kwon, Oh-Young ; Seok, Kwang-Ho ; Kim, Yoon-Sang ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 191~196
DOI : 10.6109/jicce.2010.8.2.191
This paper presents automatic generation of robot motion using posture template in physical training system. In this system, we define a human-like generic template with two angles, then, we generate robot motion that has used angle data of the created template. The angle data is transformed automatically to the most similar motion. This is achieved by suitable expressions for robot specification. The expressions intend to differences of angle measurement on X,Y,Z planes and DOF constraint. We choose several postures and create generic templates for chosen postures. Robot motions are also generated from generic templates by expressions.
Design of Temperature Stable FLL Circuit
Choi, Jin-Ho ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 197~200
DOI : 10.6109/jicce.2010.8.2.197
The FLL(frequency locked loop) circuit is used to generate an output signal that tracks an input reference signal. The locking time of FLL is short compared to PLL(phase locked loop) circuit because the output signal of FLL is synchronized only in frequency. Also the FLL is designed to allow the circuit to be fully integrated. In this paper, the temperature stable FLL circuit is designed by using full CMOS transistors. When the temperature is varied from
, the variation of output frequency is about from -2% to 1.6% from HSPICE simulation results.
Design of Kalman Filter to Estimate Heart Rate Variability from PPG Signal for Mobile Healthcare
Lee, Ju-Won ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 201~204
DOI : 10.6109/jicce.2010.8.2.201
In the mobile healthcare system, a very important vital sign in analyzing the status of user health is the HRV (heart rate variability). The used signals for measuring the HRV are electrocardiograph and PPG (photoplethysmograph). In extracting the HRV from the PPG signal, an important issue is that extract the exactly HRV from PPG signal distorted from the user's movements. This study suggested a design method of the Kalman filter to solve the problem, and evaluated the performances of a proposed method by PPG signals containing motion artifacts. In the results of experiments that compared with a variable step size adaptive filter proposed in recently, the proposed method showed better performance than an adaptive filter.
The Output Characteristics of Transcranial Magnetic Stimulation with Voltage Variable Capacitor-Charging System
Kim, Whi-Young ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 205~211
DOI : 10.6109/jicce.2010.8.2.205
In this study, a Magnetic stimulation Pulse Train control technique is introduced and applied to Flyback converter operating in discontinuous conduction mode. In contrast to the conventional pulse width modulation control scheme, the principal idea of a Magnetic stimulation Pulse Train is to achieve output voltage regulation using high and low power pulses. The proposed technique is applicable to any converter operating in discontinuous conduction. However, this work mainly focuses on Flyback topology. In this paper, the main mathematical concept of the new control algorithm is introduced and simulations as well as experimental results are presented.
Hierarchical Real-Time MAC Protocol for (m,k)-firm Stream in Wireless Sensor Networks
Teng, Zhang ; Kim, Ki-Il ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 212~218
DOI : 10.6109/jicce.2010.8.2.212
In wireless sensor networks (WSNs), both efficient energy management and Quality of Service (QoS) are important issues for some applications. For creating robust networks, real-time services are usually employed to satisfy the QoS requirements. In this paper, we proposed a hierarchical real-time MAC (medium access control) protocol for (m,k)-firm constraint in wireless sensor networks shortly called HRTS-MAC. The proposed HRTS-MAC protocol is based on a dynamic priority assignment by (m,k)-firm constraint. In a tree structure topology, the scheduling algorithm assigns uniform transmitting opportunities to each node. The paper also provides experimental results and comparison of the proposed protocol with E_DBP scheduling algorithm.
Design and Implementation of Ubiquitous Sensor Network System for Monitoring the Bio-information and Emergency of the Elderly in Silver Town
Choi, Seong-Ho ; Park, Hyung-Kun ; Yu, Yun-Seop ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 219~222
DOI : 10.6109/jicce.2010.8.2.219
An ubiquitous sensor network (USN) system to monitor the bio information and the emergency of the elderly in the silver town is presented. The USN system consists of the sensor node platforms based on MCU of Atmage128L and RF Chip of CC2420 satisfying IEEE 802.15.4, which includes the bios sensor module such as the electrocardiogram (ECG) sensor and the temperature sensor. Additionally, when an emergency of the elderly is occurred in the silver town, the routing algorithm suitable to find and inform the location of the elderly is proposed, and the proposed routing algorithm is applied to the USN. To collect and manage the ECG data at the PC connected to the sink node, LabView software is used. The bio information and the emergency of the elderly can also be monitored at the client PC by TCP/IP networks in the USN system.
QA-MAC: QoS-Aware MAC Protocol for Wireless Sensor Networks
Kim, Seong-Cheol ; Park, Hyun-Joo ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 223~227
DOI : 10.6109/jicce.2010.8.2.223
In this paper, we present a QoS-aware MAC protocol (QA-MAC) for cluster based wireless sensor networks (WSNs). QA-MAC is a TDMA-based scheduling protocol that minimizes the energy consumption in multi-hop WSNs and provides Quality of Service (QoS). A dynamic scheduling algorithm according to the number of member nodes, node traffics, and traffic priorities is suggested. The selected cluster head allocates time slots for all member nodes in the first TDMA schedule period of each round. During the second schedule period in each round, the cluster head makes a schedule for all data transmission. The proposed QA-MAC (QoS-Aware MAC) could save energy, reduce transmission delay, and support QoS.
NLOS Signal Effect Cancellation Algorithm for TDOA Localization in Wireless Sensor Network
Kang, Chul-Gyu ; Lee, Hyun-Jae ; Oh, Chang-Heon ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 228~233
DOI : 10.6109/jicce.2010.8.2.228
In this paper, the iteration localization algorithm that NLOS signal is iteratively removed to get the exact location in the wireless sensor network is proposed. To evaluate the performance of the proposed algorithm, TDOA location estimation method is used, and readers are located on every 150m intervals with rectangular shape in
searching field. In that searching field, the error distance is analyzed according to increasing the number of iteration, sub-blink and the estimated sensor node locations which are located in the iteration range. From simulation results, the error distance is diminished according to increasing the number of the sub-blink and iteration with the proposed location estimation algorithm in NLOS environment. Therefore, to get more accurate location information in wireless sensor network in NLOS environments, the proposed location estimation algorithm removing NLOS signal effects through iteration scheme is suitable.
Detection and Analysis of Event-Related Potential P300 in EEG by 4-Stimulus Oddball Paradigm
Jang, Yun-Seok ; Ryu, Soo-Ah ; Park, Kyu-Chil ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 234~237
DOI : 10.6109/jicce.2010.8.2.234
P300 component of the event-related potential(ERP) has been studied for theoretical, empirical, and clinical applications. Nowadays the 1-, 2-, and 3-stimulus oddball paradigms are used for eliciting P300 component of EEG in the auditory stimulus experiments. In this paper, we used a method to add one more stimulus to the 3-stimulus auditory paradigm. The adding stimulus has not the same volume but the same tone of the target stimulus. The 4-stimulus oddball paradigm to use two targets is used to elicit the P300 event-related potentials. In 4-stimulus oddball paradigm, an infrequent non-target (p=0.10) is presented in addition to two infrequent targets (p=0.10) and a frequent standard (p=0.70). Two target stimuli elicited a P300 component with a parietal maximum distribution. The amplitude of the P300 in target 2 was larger than that in target 1 and the latency of the P300 in target 2 was longer than that in target 1. The P300 component due to target 2 stimuli was larger than that due to target 1 stimuli. The experimental results approve that the 4-stimulus oddball paradigm can elicit P300 component clearly. The results are compared with the results of the traditional oddball paradigm.
Pilot Case for Container Security Device (CSD) Based on Active RFID
Lee, Eun-Kyu ; Moon, Young-Sik ; Shin, Joong-Jo ; Shon, Jung-Rock ; Choi, Sung-Pill ; Kim, Chae-Soo ; Kim, Jae-Joong ; Choi, Hyung-Rim ;
Journal of information and communication convergence engineering, volume 8, issue 2, 2010, Pages 238~243
DOI : 10.6109/jicce.2010.8.2.238
CSD is Active RFID based Container Security Device which is proposed by the U.S Department of Home Security. It is mounted inside the container to sense opening of the container door. ConTracer is the CSD which is developed in this research whose major features are sensing door opening status as well as history inquiring on internal environment and shock to the container by mounting the temperature/ humidity/ shock sensors. Moreover, its RFID frequency bandwidth uses 433MHz and 2.4GHz to correspond actively to the frequency used by different countries. This paper introduces the development trend of CSD, compares the ConTracer which is developed thru this research and other company's CSD, and introduces CSD System which is designed and established using ConTracer. Finally, the implemented CSD System is verified by applying the demonstration service to container distribution between Korea and China.