Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of information and communication convergence engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 8, Issue 6 - Dec 2010
Volume 8, Issue 5 - Oct 2010
Volume 8, Issue 4 - Aug 2010
Volume 8, Issue 3 - Jun 2010
Volume 8, Issue 2 - Apr 2010
Volume 8, Issue 1 - Feb 2010
Selecting the target year
Moving Pixel Displacement Detection using Correlation Functions on CIS Image
Ryu, Kwang-Ryol ; Kim, Young-Bin ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 349~354
DOI : 10.6109/jicce.2010.8.4.349
Moving pixel displacement detection algorithm using correlation functions for making panorama image on the continuous images is presented in this paper. The input images get from a CMOS image sensor (CIS). The camera is maintained by constant brightness and uniform sensing area in test input pattern. For simple navigation and capture image has to 70% overlapped region. A correlation rate in two image data is evaluated by using reference image with first captures, and compare image with next captures. The displacement of the two images are expressed to second order function of x, y and solved with finding the coefficient in second order function. That results in the change in the peak correlation displacement from the reference to the compare image, is moving to pixel length. The navigating error is reduced by varying the path because the error is shown in the difference of the positioning vector between the true pixel position and the navigated pixel position. The algorithm performance is evaluated to be different from the error vector to vary the navigating path grid.
Recipient S-CSCF Assured (RSA) Session Transfer for IMS based NGN
Yun, Chang-Ho ; Cho, A-Ra ; Kim, Seung-Geun ; Park, Jong-Won ; Lim, Yong-Kon ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 355~364
DOI : 10.6109/jicce.2010.8.4.355
A session transfer method, referred to as a Recipient Serving-call session control function (S-CSCF) Assured (RSA), is proposed in order to support both session mobility and consistency in IP multimedia subsystem (IMS) based next generation network (NGN). RSA session transfer simplifies a basic session transfer operation specified in  by using the user agent client (UAC) like characteristics of an S-CSCF. To show its efficiency, the session transfer delay and the traffic cost of RSA session transfer are investigated and compared with those of existing session transfer applications, including Assured and Consultative session transfers, by practically considering multiple session transfer failures. It is shown that RSA session transfer can further improve user experience by reducing session transfer delay as well as traffic cost than Assured and Consultative session transfers.
A Study on the Novel Rectangular Split Ring Notch Resonators
Xie, Tangyao ; Kim, Gi-Rae ; Choi, Young-Kyu ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 365~369
DOI : 10.6109/jicce.2010.8.4.365
In this paper, a novel notch resonator is proposed based on Rectangular Split Ring Resonator (RRSS) element. We represented the electrical characteristics for R-SRR elements coupled with microstrip line, and measured result is compared with electromagnetic simulation (HFSS) result. We also solved equivalent circuit for R-SRR element, and also discussed influences of change structural parameters of R-SRR. The size of R-SRR is the most important parameters for frequency tuning. Also we can make tunable resonator form the basic structure. This novel resonator can apply to design of tunable bandpass filter and voltage control oscillator.
Optimizing SVM Ensembles Using Genetic Algorithms in Bankruptcy Prediction
Kim, Myoung-Jong ; Kim, Hong-Bae ; Kang, Dae-Ki ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 370~376
DOI : 10.6109/jicce.2010.8.4.370
Ensemble learning is a method for improving the performance of classification and prediction algorithms. However, its performance can be degraded due to multicollinearity problem where multiple classifiers of an ensemble are highly correlated with. This paper proposes genetic algorithm-based optimization techniques of SVM ensemble to solve multicollinearity problem. Empirical results with bankruptcy prediction on Korea firms indicate that the proposed optimization techniques can improve the performance of SVM ensemble.
Performance Evaluation of SSD-Index Maintenance Schemes in IR Applications
Jin, Du-Seok ; Jung, Hoe-Kyung ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 377~382
DOI : 10.6109/jicce.2010.8.4.377
With the advent of flash memory based new storage device (SSD), there is considerable interest within the computer industry in using flash memory based storage devices for many different types of application. The dynamic index structure of large text collections has been a primary issue in the Information Retrieval Applications among them. Previous studies have proven the three approaches to be effective: In- Place, merge-based index structure and a combination of both. The above-mentioned strategies have been researched with the traditional storage device (HDD) which has a constraint on how keep the contiguity of dynamic data. However, in case of the new storage device, we don' have any constraint contiguity problems due to its low access latency time. But, although the new storage device has superiority such as low access latency and improved I/O throughput speeds, it is still not well suited for traditional dynamic index structures because of the poor random write throughput in practical systems. Therefore, using the experimental performance evaluation of various index maintenance schemes on the new storage device, we propose an efficient index structure for new storage device that improves significantly the index maintenance speed without degradation of query performance.
Fuzzy Classification Method for Processing Incomplete Dataset
Woo, Young-Woon ; Lee, Kwang-Eui ; Han, Soo-Whan ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 383~386
DOI : 10.6109/jicce.2010.8.4.383
Pattern classification is one of the most important topics for machine learning research fields. However incomplete data appear frequently in real world problems and also show low learning rate in classification models. There have been many researches for handling such incomplete data, but most of the researches are focusing on training stages. In this paper, we proposed two classification methods for incomplete data using triangular shaped fuzzy membership functions. In the proposed methods, missing data in incomplete feature vectors are inferred, learned and applied to the proposed classifier using triangular shaped fuzzy membership functions. In the experiment, we verified that the proposed methods show higher classification rate than a conventional method.
Joint BLAST-STTC for MIMO-OFDM System
Niyizamwiyitira, Christine ; Kang, Chul-Gyu ; Oh, Chang-Heon ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 387~392
DOI : 10.6109/jicce.2010.8.4.387
This study focuses on improving MIMO-OFDM systems by combining a wireless communication architecture known as vertical BLAST(bell laboratories layered space-time) or V-BLAST and STTC(space time trellis coding). In this paper, the combination is done by introducing STTC in each V-BLAST layer. Moreover, this architecture uses multiple antennas that are grouped into small number of antennas which makes it less complex to decode by decoding every group. Whereas, in traditional V-BLAST, all the antennas form one group and they are decoded together at the receiver, therefore, this increases the complexity as the number of antennas is getting high. We compare the bit error rate performance of this system with MIMO-OFDM that uses convolutional coding instead of STTC. Under the same spectral efficiency, the simulation results prove that joining V-BLAST with STTC improves MIMO-OFDM systems performance.
Performance Analysis of Coordinated Random Beamforming Technique in Multi-cell Environments
Lee, Jong-Min ; Jung, Bang-Chul ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 393~398
DOI : 10.6109/jicce.2010.8.4.393
For multi-cell environments, coordinated random beamforming technique in multiuser MIMO(multiple-input multiple-output) broadcast channel is considered. In order to mitigate severe interference at receivers, the multi-cell environments might require complex transmitter and receiver design because the scheduler decision based on full channel state information (CSI) in one cell must be intertwined with decision made by other cells' CSI. With limited CSI, however, this paper considers a scheme of randomizing transmitters' beamforming but being coordinated with other cell transmitters. The transmitters in each cell share random beamforming patterns and schedule data transmission within coherent scheduling period. The corandomized beams allow the users to be selected with the highest SINRs even in multi-cell environments. We analyze the performance of the proposed scheme. And numerical results show that the scheme achieves better performance than the conventional random beamforming when applying to multi-cell environments.
Study of Multiple Interface Control and Dynamic Delivery Model for Seamless Mobile Transportation
Lee, Seon-Ung ; Moon, Il-Young ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 399~404
DOI : 10.6109/jicce.2010.8.4.399
We propose a seamless IPTV transport technology of mobile device. This technology uses multiple interfaces of wireless communication on mobile device. This proposal for transportation of mobile IPTV contents is more mobile and adaptable than other wireless technologies that are currently being used. Algorithm of proposed technology is as follow. When the signal strength of the connected wireless network interface of mobile device is getting lower than specified level, another wireless network interface is connected to continue downloading the IPTV contents in advance. Another connection is maintained until the signal strength of the first connected interface is stable or the interface is connected to another base station (or AP) that have good signal strength. For more seamless services, we consider classifying the packets of mobile IPTV and using dynamic content quality select techniques. Dynamic content quality selection is based on notifying transfer rate to the content delivery network (CDN) server. The proposed technology is expected to use efficiently with both mobile IPTV and the transportation of mobile P2P/P4P.
Comparison of Common Methods from Intertwined Application in Image Processing
Shin, Seong-Yoon ; Lee, Hyun-Chang ; Rhee, Yang-Won ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 405~410
DOI : 10.6109/jicce.2010.8.4.405
Image processing operations like smoothing and edge detection, and many more are very widely used in areas like Computer Vision. We classify the image processing domain as seven branches-image acquirement and output, image coding and compression, image enhancement and restoration, image transformation, image segmentation, image description, and image recognition and description. We implemented algorithms of gaussian smoothing, laplace sharpening, image contrast effect, image black and white effect, image fog effect, image bright and dark effect, image median filter, and canny edge detection. Such experimental results show the figures respectively.
An Object Representation System Using Virtual Space Coordinates
Ban, Kyeong-Jin ; Kim, Jong-Chan ; Kim, Eung-Kon ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 411~415
DOI : 10.6109/jicce.2010.8.4.411
Conventional Augmented Reality has used data gloves or markers for smooth interaction between objects and background. This causes inconvenience of use and lower immersion. To build up immersion in Augmented Reality, additional input devices must be removed. For this purpose, accurate recognition of space coordinates is needed even with no attachment of markers. This paper proposes a method to create virtual space coordinates for interaction without wearing additional input devices so as to improve immersion in Augmented Reality. The acquired image was projected to 2D space and vanishing lines were extracted to calculate the virtual space coordinates. Then the sizes of the inserted objects were varied in accordance with the size of the virtual coordinates area based on the image projected onto the 2D coordinates. This resulted in improved immersion. This method can increase the efficiency of object creation by excluding the use of a 3D modeler for creation of 3D objects.
Design and Implementation for Web Page Visualization Techniques using Android Smartphone
Song, Teuk-Seob ; Choi, Seung-Ho ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 416~420
DOI : 10.6109/jicce.2010.8.4.416
SMARTPHONE has become a big issue in South Korea and worldwide. In this work we will propose techniques that display web contents according to user preference and service provider' interest for small screen devices such as smartphones. A number of works and research have been conducted to generate suitable web contents for small screen devices. But such previous attempts have not failed to reflect the interest of users and service providers. Our proposed system simulates the Google Android Emulator, which is a free and well known open source.
A Study on Counter Design using Sequential Systems based on Synchronous Techniques
Park, Chun-Myoung ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 421~426
DOI : 10.6109/jicce.2010.8.4.421
This paper presents a method of design the counter using sequential system based on synchronous techniques. For the design the counter, first of all, we derive switching algebras and their operations. Also, we obtain the next-state functions, flip-flop excitations and their input functions from the flip-flop. Then, we propose the algorithm which is a method of implementation of the synchronous sequential digital logic circuits. Finally, we apply proposed the sequential logic based on synchronous techniques to counter.
Two Factor Authentication for Cloud Computing
Lee, Shirly ; Ong, Ivy ; Lim, Hyo-Taek ; Lee, Hoon-Jae ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 427~432
DOI : 10.6109/jicce.2010.8.4.427
The fast-emerging of cloud computing technology today has sufficiently benefited its wide range of users from individuals to large organizations. It carries an attractive characteristic by renting myriad virtual storages, computing resources and platform for users to manipulate their data or utilize the processing resources conveniently over Internet without the need to know the exact underlying infrastructure which is resided remotely at cloud servers. However due to the loss of direct control over the systems/applications, users are concerned about the risks of cloud services if it is truly secured. In the literature, there are cases where attackers masquerade as cloud users, illegally access to their accounts, by stealing the static login password or breaking the poor authentication gate. In this paper, we propose a two-factor authentication framework to enforce cloud services' authentication process, which are Public Key Infrastructure (PKI) authentication and mobile out-of-band (OOB) authentication. We discuss the framework's security analysis in later session and conclude that it is robust to phishing and replay attacks, prohibiting fraud users from accessing to the cloud services.
A Stream Ciphering Method using a Chaotic System
Choi, Hyun-Jun ; Seo, Young-Ho ; Kim, Dong-Wook ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 433~436
DOI : 10.6109/jicce.2010.8.4.433
In this paper, we presented a ciphering method whose target data is any kind of digital bit-stream. It uses a chaotic system as the main encrypting tool, MISR (Multi-Input Signature Register), and shift-and-rotation function, all of which are exclusive-ORed with the plaintext. Also, it incorporates a cipher text feedback mode such that part of the previously ciphered data is fed back to encrypt the current data. The encryption block size and the amount of feedback data are different at each ciphering operation. Experimental results with the image/video date showed that this method has enough speed and encryption effect with negligible latency time. Thus, we are expecting it to have various application areas that need high speed stream ciphering with high security level.
Mutual Authentication and Secure Session Termination Scheme in iATA Protocol
Ong, Ivy ; Lee, Shirly ; Lee, Hoon-Jae ; Lim, Hyo-Taek ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 437~442
DOI : 10.6109/jicce.2010.8.4.437
Ubiquitous mobile computing is becoming easier and more attractive in this ambient technological Internet world. However, some portable devices such as Personal Digital Assistant (PDAs) and smart phones are still encountering inherent constraints of limited storages and computing resources. To alleviate this problem, we develop a cost-effective protocol, iATA to transfer ATA commands and data over TCP/IP network between mobile appliances and stationary servers. It provides mobile users a virtual storage platform which is physically resided at remote home or office. As communications are made through insecure Internet connections, security risks of adopting this service become a concern. There are many reported cases in the history where attackers masquerade as legitimate users, illegally access to network-based applications or systems by breaking through the poor authentication gates. In this paper, we propose a mutual authentication and secure session termination scheme as the first and last defense steps to combat identity thief and fraud threat in particular for iATA services. Random validation factors, large prime numbers, current timestamps, one-way hash functions and one-time session key are deployed accordingly in the scheme. Moreover, we employ the concept of hard factorization problem (HFP) in the termination phase to against fraud termination requests. Theoretical security analysis discussed in later section indicates the scheme supports mutual authentication and is robust against several attacks such as verifiers' impersonation, replay attack, denial-of-services (DoS) attack and so on.
The Design and Implementation of Electromotion Curtain System using PLC and CDM Controller
Choo, Yeon-Gyu ; Kang, Sung-Soo ; Kim, Bong-Gi ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 443~448
DOI : 10.6109/jicce.2010.8.4.443
The electrical curtain is an electronic product which is most suitable for the sphere of intelligent home network. It provides the basic feature of intelligent home network such as the followings; various functions, powerful control. It also becomes the ideal technology with inexpensive power-line protocol, energy saving and solar power generation. Generally it is a suitable motor for BLDC to move the electrical curtain, because it provides the maintenance without difficulty, long-lived use with good efficiency. On this paper, we proposed the BLDC motor controller designed by CDM(Coefficient Diagram Method) and evaluated its performance with a simulation of the plant, designed the electrical curtain using BLDC motor and powe-line protocol.
Design of DGMOSFET for Optimum Subthreshold Characteristics using MicroTec
Jung, Hak-Kee ; Han, Ji-Hyeong ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 449~452
DOI : 10.6109/jicce.2010.8.4.449
We have analyzed channel doping and dimensions(channel length, width and thickness) for the optimum subthreshold characteristics of DG(Double Gate) MOSFET based on the model of MicroTec 4.0. Since the DGMOSFET is the candidate device to shrink short channel effects, the determination of design rule for DGMOSFET is very important to develop sub-100nm devices for high speed and low power consumption. As device size scaled down, the controllability of dimensions and oxide thickness is very low. We have analyzed the short channel effects for the variation of channel dimensions, and found the design conditions of DGMOSFET having the optimum subthreshold characteristics for digital applications.
The study on the thickness change of tantalum oxide as voltage drop in electrolyte
Hur, Chang-Wu ; Lee, Kyu-Chung ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 453~456
DOI : 10.6109/jicce.2010.8.4.453
Tantalum oxide (
) films are of considerable interest for a range of application, including optical waveguide devices, high temperature resistors, and oxygen sensors. In this paper, we establish an anode oxidation process of tantalum thin film. The voltage drop in the electrolyte is affected not in voltage change but in current change. If the voltage drop in the electrolyte is same with cathode oxidation voltage, the current changes logarithmically in proportion to the voltage drop in interface of tantalum oxide and electrolyte. As a result of the measurement on the electrical property of tantalum oxide thin film, when the thickness of the insulator film is
, the breakdown voltage is 350volts and dielectric constant is 29.
Analysis of Spectral Characteristics of Semiconductor Lasers under Strong Optical Injection Locking for Tens of Giga Hz Signal Generation
Kim, Jung-Tae ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 457~460
DOI : 10.6109/jicce.2010.8.4.457
we have analyzed tens of Giga pulse signal generation using sideband injection locking scheme. The numerical model for semiconductor lasers under the strong optical injection is based on the Lang's equation and has been extended in order to take into account the simultaneous injection of the multiple sidebands of the current-modulated laser. The numerical simulation results show that the unselected sidebands will affect the optical and RF-spectral characteristics even though the semiconductor laser is locked to the target sidebands.
Comparison of TDC Circuit Design Method to Constant Delay Time
Choi, Jin-Ho ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 461~465
DOI : 10.6109/jicce.2010.8.4.461
This paper describes the design method of Time-to-Digital Converter(TDC) to obtain the constant delay time and good reliability. The reliability property is described with delay elements. In TDC the time signal is converted to digital value which is based on delay elements for the time interpolation. To obtain the constant delay time, the first and the last delay elements have different structure compared to the middle delay elements. In the first and the last delay elements, the driving ability could be controlled for the different delay time. The delay element can be designed by analog and digital devices. The delay time of the element using analog devices is not sensitive to process parameters than that of the element using digital devices. And the TDC circuit by the elements using analog devices shows better reliability than that by the elements using digital devices also.
Maritime Object Segmentation and Tracking by using Radar and Visual Camera Integration
Hwang, Jae-Jeong ; Cho, Sang-Gyu ; Lee, Jung-Sik ; Park, Sang-Hyon ;
Journal of information and communication convergence engineering, volume 8, issue 4, 2010, Pages 466~471
DOI : 10.6109/jicce.2010.8.4.466
We have proposed a method to detect and track moving ships using position from Radar and image processor. Real-time segmentation of moving regions in image sequences is a fundamental step in the radar-camera integrated system. Algorithms for segmentation of objects are implemented by composing of background subtraction, morphologic operation, connected components labeling, region growing, and minimum enclosing rectangle. Once the moving objects are detected, tracking is only performed upon pixels labeled as foreground with reduced additional computational burdens.