Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of information and communication convergence engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 9, Issue 6 - Dec 2011
Volume 9, Issue 5 - Oct 2011
Volume 9, Issue 4 - Aug 2011
Volume 9, Issue 3 - Jun 2011
Volume 9, Issue 2 - Apr 2011
Volume 9, Issue 1 - Feb 2011
Selecting the target year
Fan-Beam Microstrip Array Antenna for X-B and Radar
Park, Jung-Ryul ; Kim, Gue-Chol ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 483~486
DOI : 10.6109/jicce.2011.9.5.483
In this study, a fan-beam microstrip array antenna for an X-band radar was designed and fabricated using a novel technique. A microstrip array structure was used to obtain a high-gain and narrow horizontal beam-width. The feeding point is located at the center of the antenna because of its
rotational characteristic. The measured results indicate a gain of 23dBi, and a horizontal and vertical beamwidth of
, respectively. The proposed antenna performed adequately and managed to meet the specifications.
Splitting and Merging Algorithm Based on Local Statistics of Sub-Regions in Document Image
Thapaliya, Kiran ; Park, Il-Cheol ; Kwon, Goo-Rak ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 487~490
DOI : 10.6109/jicce.2011.9.5.487
This paper presents splitting and merging algorithm based on adaptive thresholding. The algorithm first divides the image into blocks, and then compares each block using the calculated thresholding value. The blocks which are same are merged using the certain threshold value and different blocks are split unless it satisfies the threshold value. When the block has been merged, maximum and minimum block sizes are determined then the average block size is determined. After the average block size is determined the average intensity and standard deviation of average block is calculated. The process of thresholding is applied to binarize the image. Finally, the experimental results show that the proposed method distinguishes clearly the background with text in the document image.
A Portfolio Model for National IT R&D Strategy Project Selection Methods
Ryu, Dong-Hyun ; Lee, Woo-Jin ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 491~499
DOI : 10.6109/jicce.2011.9.5.491
In this paper, we offer a new strategic portfolio model for national IT R&D project selection in Korea. A risk and return (R-R) portfolio model was developed using an objectively quantified index on the two axes of risk and return, in order to select a strategic project and allocate resources in compliance with a national IT R&D strategy. We strategize using the R-R portfolio model to solve the non-strategy and subjectivity problems of the existing national R&D project selection model. We also use the quantified evaluation index of the IT technology road map (TRM) and the technical level reports (TLR) for the subjectivity of project selection, and try to discover the weights using the analytic hierarchy process (AHP). In addition, we intend to maximize the chance for a successful national IT R&D project, by selecting a strategic portfolio project and balancing the allocation of resources effectively and objectively.
A Novel Equivalent Wiener-Hopf Equation with TDL coefficient in Lattice Structure
Cho, Ju-Phil ; Ahn, Bong-Man ; Hwang, Jee-Won ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 500~504
DOI : 10.6109/jicce.2011.9.5.500
In this paper, we propose an equivalent Wiener-Hopf equation. The proposed algorithm can obtain the weight vector of a TDL(tapped-delay-line) filter and the error simultaneously if the inputs are orthogonal to each other. The equivalent Wiener-Hopf equation was analyzed theoretically based on the MMSE(minimum mean square error) method. The results present that the proposed algorithm is equivalent to original Wiener-Hopf equation. The new algorithm was applied into the identification of an unknown system for evaluating the performance of the proposed method. We compared the Wiener-Hopf solution with the equivalent Wiener-Hopf solution. The simulation results were similar to those obtained in the theoretical analysis. In conclusion, our method can find the coefficient of the TDL (tapped-delay-line) filter where a lattice filter is used, and also when the process of Gram-Schmidt orthogonalization is used. Furthermore, a new cost function is suggested which may facilitate research in the adaptive signal processing area.
Facial Expression Classification through Covariance Matrix Correlations
Odoyo, Wilfred O. ; Cho, Beom-Joon ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 505~509
DOI : 10.6109/jicce.2011.9.5.505
This paper attempts to classify known facial expressions and to establish the correlations between two regions (eye + eyebrows and mouth) in identifying the six prototypic expressions. Covariance is used to describe region texture that captures facial features for classification. The texture captured exhibit the pattern observed during the execution of particular expressions. Feature matching is done by simple distance measure between the probe and the modeled representations of eye and mouth components. We target JAFFE database in this experiment to validate our claim. A high classification rate is observed from the mouth component and the correlation between the two (eye and mouth) components. Eye component exhibits a lower classification rate if used independently.
A Study on the Acoustic Fault Detection System of Insulators from Their Radiation Noises
Park, Kyu-Chil ; Yoon, Jong-Rak ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 510~514
DOI : 10.6109/jicce.2011.9.5.510
To detect the insulator in the fault state on the electric poles, we first measured radiation sounds from normal state insulators and error state insulators in the anechoic chamber. We processed the signals in frequency domain to find the features with filter bank, narrow band and wide band analysis. So we could found two apparent results from their frequency spectrums - one was 120Hz harmonic components, the other was high average noise level than normal state ones. Then we also introduced a technique for the direction detection of the fault state insulator using the cross correlation from the three dimensional array microphones. To eliminate the noise signal from unexpected directions, we suggested the zero padding technique in cross correlation function. From these, we could conclude that acoustic fault detection techniques are useful of the detection of insulators' faults and the estimation of the direction of the fault state insulators.
Cooperative Diversity in a Spectrum Sharing Environment
Ban, Tea-Won ; Jung, Bang-Chul ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 515~522
DOI : 10.6109/jicce.2011.9.5.515
In this paper, we investigate cooperative diversity in a spectrum sharing environment where secondary users utilize primary users' spectrum only if the interference power received at the primary users is maintained below a predetermined level. The outage probability of a selective decode-and-forward (DF) based cooperative diversity scheme in the secondary network is derived to analyze the effects of spectrum sharing on cooperative diversity. Our analytical and simulation results show that the outage probability is saturated at a certain level of transmit power of secondary users due to interference regulation, and, hence, cooperative diversity gains are lost. Through asymptotic analysis, we also identify the critical value of transmit SNR beyond which the outage probability is saturated.
Design of a Multi-Network Selector for Multiband Maritime Networks
Cho, A-Ra ; Yun, Chang-Ho ; Park, Jong-Won ; Chung, Han-Na ; Lim, Yong-Kon ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 523~529
DOI : 10.6109/jicce.2011.9.5.523
In this paper an inter-layer protocol, referred to as a Multi-Network Selector (MNS) is proposed for multiband maritime networks. A MNS is located between the data-link layer and the network layer and performs vertical handover when a ship moves another radio network. In order to provide seamless data transfer to different radio networks, the MNS uses received signal strength (RSS) and ship's location information as decision parameters for vertical handover, which can avoid ping-pong effect and reduces handover latency. In addition, we present related issues in order to implement the MNS for a multiband maritime network.
Modified BLUE Packet Buffer for Base-Stations in Mobile IP-based Networks
Hur, Kyeong ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 530~538
DOI : 10.6109/jicce.2011.9.5.530
Performance of TCP can be severely degraded in Mobile IP-based wireless networks where packet losses not related to network congestion occur frequently during inter-subnetwork handoffs by user mobility. To solve such a problem in the networks using Mobile IP, the packet buffering method at a base station(BS) recovers those packets dropped during handoff by forwarding the buffered packets at the old BS to the mobile users. But, when the mobile user moves to a congested BS in a new foreign subnetwork, those buffered packets forwarded by the old BS are dropped and TCP transmission performance of a mobile user degrades severely. In this paper, we propose a Modified BLUE(MBLUE) buffer required at a BS to increase TCP throughput in Mobile IP-based networks. When a queue length exceed a threshold and congestion grows, MBLUE increases its packet drop probability. But, when a TCP connection is added at new BS by a handoff, the old BS marks the buffered packets. And new BS receives the marked packets without dropping. Simulation results show that MBLUE buffer reduces congestion during handoffs and increases TCP throughputs.
RIO-DC Buffer Design for Core Routers in DiffServ Assured Services
Hur, Kyeong ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 539~544
DOI : 10.6109/jicce.2011.9.5.539
In this paper, a parameter optimization method of RIO-DC (RED (Random Early Detection) with In and Out-De-Coupled Queues) scheme for Assured Service (AS) in Differentiated Services (DiffServ) is proposed. In order to optimize QoS (Quality of Service) performance of the RIO-DC policy for AS in terms of maximum tolerable latency, link utilization, fairness, etc., we should design router nodes with proper RIO-DC operating parameter values. Therefore, we propose a RIO-DC configuration method and the admission control criterion, considering the allocated bandwidth to each subclass and the corresponding buffer size, to increase throughput for In-profile traffic and link utilization. Simulation results show that RIO-DC with the proposed parameter values guarantees QoS performance comparable with the RIO scheme and it improves fairness between AS flows remarkably.
Identifying the Location of a Mobile Object in Real-time using PID-controlled Moving Objects Spatio-Temporal Model
Zhi, Wang ; Sung, Kil-Young ; Lee, Kyou-Ho ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 545~550
DOI : 10.6109/jicce.2011.9.5.545
Trilateration is a typical method to locate an object, which requires inherently at least three prerecognized reference points. In some cases, owing to out of reachability to communication facilities the target node cannot be reachable always to three base stations. This paper presents a predictive method, which can identify the location of a moving target node in real time even though the target node could not get in touch with all three base stations. The method is based on the PIDcontrolled Moving Objects Spatio-Temporal Model Algorithm. Simulation results verify that this method can predict the moving direction of a moving target, and then combine with its past position information to judge accurately the location.
Comparative Performance Study of WDM Packet Switch for Different Traffic Arrival Approach
Reza, Ahmed Galib ; Lim, Hyo-Taek ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 551~555
DOI : 10.6109/jicce.2011.9.5.551
Optical packet switching is a promising technology, which can integrate both data and optical network. In this paper, we present a comparative study of various traffic arrival approaches in WDM packet switches. The comparison is made based on packet loss rate and average delay under uniform and self-similar Pareto traffic. Computer simulations are performed in order to obtain the switch performance metrics. Study shows that burstiness of data traffic has a strong negative impact in the performance of WDM packet switches.
A Study on Performance Analysis for Error Probability in SWSK Systems
Jeong, Tae-Il ; Moon, Kwang-Seok ; Kim, Jong-Nam ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 556~561
DOI : 10.6109/jicce.2011.9.5.556
This paper presents a new method for shift keying using the combination of scaling function and wavelet named scaling wavelet shift keying (SWSK). An algorithm for SWSK modulation is carried out where the scaling function and the wavelet are encoded to 1 and 0 in accordance with the binary input, respectively. Signal energy, correlation coefficient and error probability of SWSK are derived from error probability of frequency shift keying(FSK). The performance is analyzed in terms of error probability and it is simulated in accordance with the kind of the wavelet. Based on the results, we can conclude that the proposed scheme is superior to the performance of the conventional schemes.
Secure Authentication with Mobile Device for Ubiquitous RFID Healthcare System in Wireless Sensor Networks
Kim, Jung-Tae ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 562~566
DOI : 10.6109/jicce.2011.9.5.562
As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure M-health systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.
The Implementation of DXF Application On Smart Devices
Kim, Dong-Hyun ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 567~572
DOI : 10.6109/jicce.2011.9.5.567
As the mobile devices have powerful CPUs and memories, it is possible to carry the large volumes of design drawings, such as DXF files, on mobile devices. However, since the format of a DXF file is the ASCII, it has the shortcoming where the size of a file is larger than a binary formatted file and it is difficult to display the entities of drawings quickly on mobile devices. In this paper, we design the DXF manager system on a smart phone. To speed up the rate of the display and panning, the DXF manager hires the spatial index, the fixed grid file. We also implement the system on the Samsung Omnia-1
to exploit the Windows Mobile
Payment method based on USSD-commands
Karimova, Vasila ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 573~576
DOI : 10.6109/jicce.2011.9.5.573
In this paper is given one method of constructing payment via commonly used mobile phone, SIM-card and plastic card based on USSD-commands.
The Scalability and the Strategy for EMR Database Encryption Techniques
Shin, David ; Sahama, Tony ; Kim, Steve Jung-Tae ; Kim, Ji-Hong ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 577~582
DOI : 10.6109/jicce.2011.9.5.577
EMR(Electronic Medical Record) is an emerging technology that is highly-blended between non-IT and IT area. One of methodology to link non-IT and IT area is to construct databases. Nowadays, it supports before and after-treatment for patients and should satisfy all stakeholders such as practitioners, nurses, researchers, administrators and financial department and so on. In accordance with the database maintenance, DAS (Data as Service) model is one solution for outsourcing. However, there are some scalability and strategy issues when we need to plan to use DAS model properly. We constructed three kinds of databases such as plain-text, MS built-in encryption which is in-house model and custom AES (Advanced Encryption Standard) - DAS model scaling from 5K to 2560K records. To perform custom AES-DAS better, we also devised Bucket Index using Bloom Filter. The simulation showed the response times arithmetically increased in the beginning but after a certain threshold, exponentially increased in the end. In conclusion, if the database model is close to in-house model, then vendor technology is a good way to perform and get query response times in a consistent manner. If the model is DAS model, it is easy to outsource the database, however, some technique like Bucket Index enhances its utilization. To get faster query response times, designing database such as consideration of the field type is also important. This study suggests cloud computing would be a next DAS model to satisfy the scalability and the security issues.
Structure-Dependent Subthreshold Swings for Double-gate MOSFETs
Han, Ji-Hyeong ; Jung, Hak-Kee ; Park, Choon-Shik ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 583~586
DOI : 10.6109/jicce.2011.9.5.583
In this paper, subthreshold swing characteristics have been presented for double-gate MOSFETs, using the analytical model based on series form of potential distribution. Subthreshold swing is very important factor for digital devices because of determination of ON and OFF. In general, subthreshold swings have to be under 100mV/dec. The channel length
is varied from 30nm to 100nm, and channel thickness
from 15 to 20nm according to channel length, and oxide thickness 5nm to investigate subthreshold swing. The doping of channel is fixed with
p-type. The results show good agreement with numerical simulations, confirming this model.
Some Peculiarities of Photo-structural Transformations in Amorphous Chalcogenide Glassy Semiconductor Films
Prikhodko, O. ; Almasov, N. ; Korobova, Natalya ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 587~590
DOI : 10.6109/jicce.2011.9.5.587
The absence of deep traps for electrons in the spectrum of
localized states films obtained by ion sputtering was determined. Bipolar drift of charge carriers was found in amorphous
films of chalcogenide glassy semiconductors, obtained by ion-plasma sputtering of high-frequency, unlike the films of these materials obtained by thermal evaporation.
A Mixed Nonlinear Filter for Image Restoration under AWGN and Impulse Noise Environment
Gao, Yinyu ; Kim, Nam-Ho ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 591~596
DOI : 10.6109/jicce.2011.9.5.591
Image denoising is a key issue in all image processing researches. Generally, the quality of an image could be corrupted by a lot of noise due to the undesired conditions of image acquisition phase or during the transmission. Many approaches to image restoration are aimed at removing either Gaussian or impulse noise. Nevertheless, it is possible to find them operating on the same image, which is called mixed noise and it produces a hard damage. In this paper, we proposed noise type classification method and a mixed nonlinear filter for mixed noise suppression. The proposed filtering scheme applies a modified adaptive switching median filter to impulse noise suppression and an efficient nonlinear filer was carried out to remove Gaussian noise. The simulation results based on Matlab show that the proposed method can remove mixed Gaussian and impulse noise efficiently and it can preserve the integrity of edge and keep the detailed information.
The Study on Project Information Management System for the Efficient Project Management of Commercialization-Linked Technology Development
Kim, Chang-Su ; Jang, Bong-Im ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 597~601
DOI : 10.6109/jicce.2011.9.5.597
As researches of on scientific technology are considered as a pivotal factor of a national competitiveness, the central and local governments have extended assistance for commercialization-linked technology development (CLTD) and accordingly various outputs are coming out now. However, the valuable findings from painstaking researches are not sufficiently distributed to or shared with other governmental and public organizations, and businesses. As a result, it could be possible for them to become unknown and unused. Therefore, it is being sensed that a measure to coordinately and systematically manage the information and outputs derived from the research projects is urgently needed. Hence, this study designs PIMS to manage CLTD efficiently and transparently.
Implementation of CoAP-Lite Protocol over USN
Jeong, Sun-Chul ; Yu, So-Ra ; Jung, Hoe-Kyung ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 602~606
DOI : 10.6109/jicce.2011.9.5.602
It is necessary for developing specific application protocol for mobile sensor end nodes and data collection devices that have constrained resources and computing powers. Because of these needs, IETF WG developed CoAP protocol and Internet draft was released, and processing to international standardization of this protocol. Because sensor nodes and information collection devices have restricted resources and computing powers, there are some limitations for applying to this proposed protocol directly. Thus in this paper we shows the implementation of full CoAP protocol for server, works on Linux and CoAP-Lite over telos which works on TinyOS for information collection devices. In this implementation we verified the main activities of CoAP protocol over USN by modifying some hardware with dependent algorithm.
On a Model of Forming the Optimal Parameters of the Recognition Algorithms
Hudayberdiev, Mirzaakbar Kh. ; Akhatov, Akmal R. ; Hamroev, Alisher Sh. ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 607~609
DOI : 10.6109/jicce.2011.9.5.607
In this work, we present solutions of two problems. First, the representation of pattern recognition problem in the standard
table of the algorithm estimate calculation was considered. Second, the problem of finding the model, consisting of the optimal parameters of an algorithm was considered. Such procedure is carried out by the selection optimal values of the parameters of extreme algorithms. This serves to reduce the number of calculations in the algorithms of estimate calculation and to increase the quality of recognition process. The algorithmic data base of the developed system was based on mathematical apparatus of pattern recognition.
Performance of Mobility Models for Routing Protocol in Wireless Ad-hoc Networks
Singh, Madhusudan ; Lee, Sang-Gon ; Lee, Hoon-Jae ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 610~614
DOI : 10.6109/jicce.2011.9.5.610
Nowadays Mobile Ad Hoc Networks (MANETs) are a very popular and emerging technology in the world. MANETs helps mobile nodes to communicate with each other anywhere without using infrastructure. For this purpose we need good routing protocols to establish the network between nodes because mobile nodes can change their topology very fast. Mobile node movements are very important features of the routing protocol. They can have a direct effect on the network performance. In this paper, we are going to discuss random walk and random waypoint mobility models and their effects on routing parameters. Previously, mobility models were used to evaluate network performance under the different routing protocols. Therefore, the network performance will be strongly modeled by the nature of the mobility pattern. The routing protocols must rearrange the changes of accurate routes within the order. Thus, the overheads of traffic routing updates are significantly high. For specific network protocols or applications, these mobility patterns have different impacts.
A Study on Self Repairing for Fast Fault Recovery in Digital System by Mimicking Cell
Kim, Soke-Hwan ; Hur, Chang-Wu ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 615~618
DOI : 10.6109/jicce.2011.9.5.615
Living cells generate the cell cycle or apoptosis, depending on the course will be repeated. If an error occurs during this period of life in order to maintain the cells in the peripheral cells find the error portion. These cellular functions were applied to the system to simulate the circuit. Circuit implementation of the present study was constructed the redundant structure in order to found the error quickly. Self-repairing of digital systems as an advanced form of fault-tolerance has been increasingly receiving attention according as digital systems have been more and more complex and speed-up especially for urgent systems or those working on extreme environments such as deep sea and outer space. Simulating the process of cell differentiation algorithm was confirmed by the FPGA on the counter circuit. If an error occurs on the circuit where the error was quickly locate and repair. In this paper, we propose a novel self-repair architecture for fast and robust fault-recovery that can easily apply to real, complex digital systems. These Self-Repairing Algorithms make it possible for the application digital systems to be alive even though in very noisy and extreme environments.
Game Transformation from Non-Augmented Reality to Augmented Reality
Tan, Chin-Tong ; Hwang, Gi-Hyun ; Kang, Dae-Ki ;
Journal of information and communication convergence engineering, volume 9, issue 5, 2011, Pages 619~623
DOI : 10.6109/jicce.2011.9.5.619
The evolution of technology has lead gaming playable in augmented reality and more games are developed only for augmented reality. There are mainly no supportive reasons for game designed in non-augmented reality and transforms to augmented reality. Genre of game played in augmented reality is always one of the defined game genres. In this paper, transformation process and effects of mobile games to augmented reality is discussed. Augmented reality game is recommended for mobile devices due to its portability. Modification for mobile games transformation including way of game rendering, game controlling, camera view controlling and game environment design are discussed. User experience is affected after the game transformed to augmented reality because of the differences in game controlling. The presence of game in real world is increased due to the usage of actual view in game playing.