Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of information and communication convergence engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 9, Issue 6 - Dec 2011
Volume 9, Issue 5 - Oct 2011
Volume 9, Issue 4 - Aug 2011
Volume 9, Issue 3 - Jun 2011
Volume 9, Issue 2 - Apr 2011
Volume 9, Issue 1 - Feb 2011
Selecting the target year
Designing of Dynamic Sensor Networks based on Meter-range Swarming Flight Type Air Nodes
Kang, Chul-Gyu ; Kim, Dae-Hwan ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 625~628
DOI : 10.6109/ijice.2011.9.6.625
Dynamic sensor network(DSN) technology which is based on swarming flight type air node offers analyzed and acquired information on target data gathered by air nodes in rotation flight or 3 dimension array flight. Efficient operation of dynamic sensor network based on air node is possible when problems of processing time, data transmission reliability, power consumption and intermittent connectivity are solved. Delay tolerant network (DTN) can be a desirable alternative to solve those problems. DTN using store-and-forward message switching technology is a solution to intermittent network connectivity, long and variable delay time, asymmetric data rates, and high error rates. However, all processes are performed at the bundle layer, so high power consumption, long processing time, and repeated reliability technique occur. DSN based on swarming flight type air node need to adopt store-and-forward message switching technique of DTN, the cancelation scheme of repeated reliability technique, fast processing time with simplified layer composition.
Design and Implementation of the Recording Processing Supporting System using RFID
Baek, Mi-Hye ; Kim, Bong-Gi ; Kim, Hyun-Ju ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 629~632
DOI : 10.6109/ijice.2011.9.6.629
RFID technology is one of the verification technology that use radio frequency. Use and study of RFID are on the increase because RFID is a one of main technologies in ubiquitous. In this paper, we address to develop a Record Processing System using RFID. The purpose of this paper is improvement of accuracy and efficiency on Record Processing System by applying RFID. Later, this paper will be able to help to establish of u-Campus.
Automation of an Interactive Interview System by Hand Gesture Recognition Using Particle Filter
Lee, Yang-Weon ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 633~636
DOI : 10.6109/ijice.2011.9.6.633
This paper describes a implementation of virtual interactive interview system. A hand motion recognition algorithm based on the particle filters is applied for this system. The particle filter is well operated for human hand motion recognition than any other recognition algorithm. Through the experiments, we show that the proposed scheme is stable and works well in virtual interview system's environments.
Hybrid Neural Networks for Pattern Recognition
Kim, Kwang-Baek ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 637~640
DOI : 10.6109/ijice.2011.9.6.637
The hybrid neural networks have characteristics such as fast learning times, generality, and simplicity, and are mainly used to classify learning data and to model non-linear systems. The middle layer of a hybrid neural network clusters the learning vectors by grouping homogenous vectors in the same cluster. In the clustering procedure, the homogeneity between learning vectors is represented as the distance between the vectors. Therefore, if the distances between a learning vector and all vectors in a cluster are smaller than a given constant radius, the learning vector is added to the cluster. However, the usage of a constant radius in clustering is the primary source of errors and therefore decreases the recognition success rate. To improve the recognition success rate, we proposed the enhanced hybrid network that organizes the middle layer effectively by using the enhanced ART1 network adjusting the vigilance parameter dynamically according to the similarity between patterns. The results of experiments on a large number of calling card images showed that the proposed algorithm greatly improves the character extraction and recognition compared with conventional recognition algorithms.
Cooperative Power Control Scheme for a Spectrum Sharing System
Ban, Tae-Won ; Jung, Bang-Chul ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 641~646
DOI : 10.6109/ijice.2011.9.6.641
In this paper, we investigate a power control problem which is very critical in underlay-based spectrum sharing systems. Although an underlay-based spectrum sharing system is more efficient compared to an overlay-based spectrum sharing system in terms of spectral utilization, some practical problems obstruct its commercialization. One of them is a real-time-based power adaptation of secondary transmitters. In the underlay-based spectrum sharing system, it is essential to adapt secondary user's transmit power to interference channel states to secure primary users' communication. Thus, we propose a practical power control scheme for secondary transmitters. The feedback overhead of our proposed scheme is insignificant because it requires one-bit signaling, while the optimal power control scheme requires the perfect information of channel states. In addition, the proposed scheme is robust to feedback delay. We compare the performance of the optimal and proposed schemes in terms of primary user's outage probability and secondary user's throughput. Our simulation results show that the proposed scheme is almost optimal in terms of both primary user's outage probability and secondary user's throughput when the secondary user's transmit power is low. As the secondary user's transmit power increases, the primary user's outage probability of the proposed scheme is degraded compared with the optimal scheme while the secondary user's throughput still approaches that of the optimal scheme. If the feedback delay is considered, however, the proposed scheme approaches the optimal scheme in terms of both the primary user's outage probability and secondary user's throughput regardless of the secondary user's transmit power.
Performance Analysis of Full Duplex on-regenerative Relay
Ban, Tae-Won ; Jung, Bang-Chul ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 647~651
DOI : 10.6109/ijice.2011.9.6.647
In this letter, non-regenerative Amplify-and-Forward (AF) relay systems based on half and full duplex schemes are investigated and their performance is analyzed and compared in terms of outage probability. Although the AF relay systems have been widely investigated in many previous literatures, most of them adopted a half duplex scheme due to hardware limitation and mathematical tractability. To the best of our knowledge, this letter is the first study to investigate the performance of the full duplex AF relay system considering practical hardware limitations. In full duplex AF relay systems, it is important to secure the isolation between transmit and receive antennas. Our numerical and simulation results show that there exists a threshold point of the isolation gain that the full duplex relay system outperforms the half duplex relay system.
Taps Delayed Lines Architecture Based on Linear Transmit Zero-Forcing Approach for Ultra-Wide Band MIMO Communication Systems
Kim, Sang-Choon ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 652~656
DOI : 10.6109/ijice.2011.9.6.652
In this paper, a transmitter-based multipath processing and inter-channel interference (ICI) cancellation scheme for a ultra-wideband (UWB) spatial multiplexing (SM) multiple input multiple output (MIMO) system is presented. It consists of taps delayed lines and zero-forcing (ZF) filters in the transmitter and correlators in the receiver. For a UWB SM MIMO system with N transmit antennas, M receive antennas, and Q resolvable multipath components, the BER performance of a linear transmit ZF scheme is analyzed in a log-normal fading channel and also compared with that of a receiver-based ICI rejection approach. It is found that when M
N, the transmit ZF processing approach outperforms the ZF receiver while making the mobile units low-cost and low-power.
Viterbi-based Decoding Algorithm for DBO-CSS
Yoon, Sang-Hun ; Jung, Jun-Mo ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 657~660
DOI : 10.6109/ijice.2011.9.6.657
Differential detection algorithm for DBO-CSS based on maximum signal energy detection (MSED) using viterbi algorithm is proposed. In order to mitigate SNR degradation caused by differential decoding, a modified viterbi algorithm with so called correlation metric (CM) in every state is proposed. It is shown that the performance gain of the proposed algorithm when compared with that of the conventional differential detection with the block decoding algorithm is about 2.5dB at BER =
An Efficient Extraction of Pulmonary Parenchyma in CT Images using Connected Component Labeling
Thapaliya, Kiran ; Park, Il-Cheol ; Kwon, Goo-Rak ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 661~665
DOI : 10.6109/ijice.2011.9.6.661
This paper presents the method for the extraction of the lungs part from the other parts for the diagnostic of the lungs part. The proposed method is based on the calculation of the connected component and the centroid of the image. Connected Component labeling is used to label the each objects in the binarized image. After the labeling is done, centroid value is calculated for each object. The filing operation is applied which helps to extract the lungs part from the image retaining all the parts of the original lungs image. The whole process is explained in the following steps and experimental results shows it's significant.
Stable Model for Active Contour based Region Tracking using Level Set PDE
Lee, Suk-Ho ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 666~670
DOI : 10.6109/ijice.2011.9.6.666
In this paper, we propose a stable active contour based tracking method which utilizes the bimodal segmentation technique to obtain a background color diminished image frame. The proposed method overcomes the drawback of the Mansouri model which is liable to fall into a local minimum state when colors appear in the background that are similar to the target colors. The Mansouri model has been a foundation for active contour based tracking methods, since it is derived from a probability based interpretation. By stabilizing the model with the proposed speed function, the proposed model opens the way to extend probability based active contour tracking for practical applications.
A Performance Comparison of Block-Based Matching Cost Evaluation Models for FRUC Techniques
Kim, Jin-Soo ; Kim, Jae-Gon ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 671~675
DOI : 10.6109/ijice.2011.9.6.671
DVC (Distributed Video Coding) and FRUC (Frame Rate Up Conversion) techniques need to have an efficient motion compensated frame interpolation algorithms. Conventional works of these applications have mainly focused on the performance improvement of overall system. But, in some applications, it is necessary to evaluate how well the MCI (Motion Compensated Interpolation) frame matches the original frame. For this aim, this paper deals with the modeling methods for evaluating the block-based matching cost. First, several matching criteria, which have already been dealt with the motion compensated frame interpolation, are introduced and then combined to make estimate models for the size of MSE (Mean Square Error) noise of the MCI frame to original one. Through computer simulations, it is shown that the block-based matching criteria are evaluated and the proposed model can be effectively used for estimating the MSE noise.
Transmission Power Range based Sybil Attack Detection Method over Wireless Sensor Networks
Seo, Hwa-Jeong ; Kim, Ho-Won ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 676~682
DOI : 10.6109/ijice.2011.9.6.676
Sybil attack can disrupt proper operations of wireless sensor network by forging its sensor node to multiple identities. To protect the sensor network from such an attack, a number of countermeasure methods based on RSSI (Received Signal Strength Indicator) and LQI (Link Quality Indicator) have been proposed. However, previous works on the Sybil attack detection do not consider the fact that Sybil nodes can change their RSSI and LQI strength for their malicious purposes. In this paper, we present a Sybil attack detection method based on a transmission power range. Our proposed method initially measures range of RSSI and LQI from sensor nodes, and then set the minimum, maximum and average RSSI and LQI strength value. After initialization, monitoring nodes request that each sensor node transmits data with different transmission power strengths. If the value measured by monitoring node is out of the range in transmission power strengths, the node is considered as a malicious node.
Speed Optimized Implementation of HUMMINGBIRD Cryptography for Sensor Network
Seo, Hwa-Jeong ; Kim, Ho-Won ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 683~688
DOI : 10.6109/ijice.2011.9.6.683
The wireless sensor network (WSN) is well known for an enabling technology for the ubiquitous environment such as real-time surveillance system, habitat monitoring, home automation and healthcare applications. However, the WSN featuring wireless communication through air, a resource constraints device and irregular network topology, is threatened by malicious nodes such as eavesdropping, forgery, illegal modification or denial of services. For this reason, security in the WSN is key factor for utilizing the sensor network into the commercial way. There is a series of symmetric cryptography proposed by laboratory or industry for a long time. Among of them, recently proposed HUMMINGBIRD algorithm, motivated by the design of the well-known Enigma machine, is much more suitable to resource constrained devices, including smart card, sensor node and RFID tags in terms of computational complexity and block size. It also provides resistance to the most common attacks such as linear and differential cryptanalysis. In this paper, we implements ultra-lightweight cryptography, HUMMINGBIRD algorithm into the resource constrained device, sensor node as a perfectly customized design of sensor node.
Cellular Automata Transform based Invisible Digital Watermarking in Middle Domain for Gray Images
Li, Xiao-Wei ; Kim, Seok-Tae ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 689~694
DOI : 10.6109/ijice.2011.9.6.689
Cellular automata are discrete dynamical systems, which provide the basis for the synthesis of complex emergent behavior. This paper proposes a new algorithm of digital watermarking based on cellular automata transform (CAT). The idea of two-dimensional CAT is introduced into the algorithm. After the original image is disassembled with 2D CAT, the watermark information is embedded into the Middle-frequency of the carrier picture. Cellular automata have a huge number of combinations, such as gateway values, rule numbers, initial configuration, boundary condition, etc. Using CAT, the robustness of the watermark will be tremendous strengthened as well as its imperceptibility. Experimental results show that this algorithm can resist some usual attacks such as compression, sharpening and so on. The proposed method is robust to different attacks and is more security.
Effective Evaluation about the Antivirus Solution for Smart Phone
Shin, Suk-Jo ; Kim, Seon-Joo ; Jiang, Chun-Yan ; Jo, In-Jun ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 695~700
DOI : 10.6109/ijice.2011.9.6.695
Smartphone has formed a new market and introduced a new environment. They have an operating system like PCs, enabling free installation and removal of application programs. As the number of Smartphone users is increasing, more personal information is also exposed to malicious codes. There are problem of modification and deletion of files, battery consumption, and information leakage due to malicious codes. As the needs of Smartphone antivirus solutions are increasing, the antivirus solutions should be evaluated with quality characteristics. In this paper, we propose an effective evaluation method for functionality and performance of Smartphone antivirus solutions, and the best practices for evaluation.
Analyses of Security, Privacy Issues and Challenges for RFID System
Kim, Jung-Tae ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 701~705
DOI : 10.6109/ijice.2011.9.6.701
RFID is a widely adopted in the field of identification technology these days. Radio Frequency IDentification (RFID) has wide applications in many areas including manufacturing, healthcare, and transportation. Because limited resource RFID tags are used, various risks could threaten their abilities to provide essential services to users. A number of RFID protocols have done by researcher in order to protect against some malicious attacks and threat. Existing RFID protocols are able to resolve a number of security and privacy issues, but still unable to overcome other security & privacy related issues. In this paper, we analyses security schemes and vulnerability in RFID application. Considering this RFID security issues, we survey the security threats and open problems related to issues by means of information security and privacy. Neither a symmetric nor an asymmetric cryptographic deployment is necessarily used with light weighted algorithm in the future.
Hangeul Keypad for Smart Phones Using Gesture
Lee, Jung-Hwa ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 706~711
DOI : 10.6109/ijice.2011.9.6.706
In accordance with development of smart phone, the importance of keypad was increasing, because the smart phone provides a variety of feature like word processor, chatting program, messenger and etc. In this paper, we propose the new Hangeul keypad for smart phones using gestures. And, also we do experiment for performance evaluation of the proposed keypad in this paper. The experiment shows that the proposed keypad is more efficient than other keypads.
A Framework for Supporting RFID-enabled Business Processes Automation
Moon, Mi-Kyeing ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 712~720
DOI : 10.6109/ijice.2011.9.6.712
Radio frequency identification (RFID) is an established technology and has the potential, in a variety of applications, to significantly reduce cost and improve performance. As RFID-enabled applications will fulfill similar tasks across a range of processes adapted to use the data gained from RFID tags, they can be considered as software products derived from a common infrastructure and assets that capture specific ions in the domain. This paper discusses a framework that supports the development of RFID-enabled applications based on a business process family model (BPFM), explicitly representing both commonalities and variabilities. To develop this framework, common activities are identified from RFID-enabled applications and the variabilities in the common activities are analyzed in detail using variation point concepts. Through this framework, RFID data is preprocessed, and thus, RFID-enabled applications can be developed without having to process RFID data. Sharing a common model and reusing assets to deploy recurrent services may be considered an advantage in terms of economic significance and the overall product quality afforded.
Polymer PN Junction by low Energy Double Implantation Technique
Jeong, Yong-Seok ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 721~724
DOI : 10.6109/ijice.2011.9.6.721
Polymer base organic PN junction with various ion types was studied. Low-energy ion implantation technique(~keV) is very useful in physical doping on PPP(Polyparaphenylene) polymer. By double implantation, effective organic PN junction was achieved. The best obtained electrical I-V property was rectification ratio which was about 10000. However, still have problems in low junction current density.
The role of EL2 in the infrared transmission images of defects in semi-insulating GaAs
Kang, Seong-Jun ; Lee, Sung-Seok ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 725~728
DOI : 10.6109/ijice.2011.9.6.725
Infrared transmission images from GaAs semi insulating wafers were considered for years as directly related to the quantum absorption by electrons on fundamental states of deep centers, especially EL2. The satisfying correspondence of these images with the dislocations revealed by etching or X ray topography or infrared tomography led to the opinion that a strong concentration of EL2 centers was to be expected in the immediate vicinity of the dislocations. More recent work indicates that contrary to the expected behavior the photoqu
nching of transmission images at T=80K does not appreciably change the image structure itself but more largely the uniform background level of absorption. Such investigations show that the transmission images of isolated dislocations (Indium doped materials) or cell structures of tangled dislocations (undoped materials) can be partly attributed to scattered light; similar operation at T=10K removes the dark features associated to EL2 but still preserves the skeleton of the pattern which is due to scattering. A result of the measurements is that dislocations must not be considered any longer as inexhaustive EL2 reservoirs. The lifetime of the photoqu
nching mechanism is shown to vary differently for EL2 centers located close to the dislocations or in the matrix. In this paper we will develop the details of infrared image photoqu
nching experiments in the vicinity of dislocations; undoped and In doped GaAs materials will be shown. These results will be discussed in the light of surface etching experiments.
Low Power Test for SoC(System-On-Chip)
Jung, Jun-Mo ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 729~732
DOI : 10.6109/ijice.2011.9.6.729
Power consumption during testing System-On-Chip (SOC) is becoming increasingly important as the IP core increases in SOC. We present a new algorithm to reduce the scan-in power using the modified scan latch reordering and clock gating. We apply scan latch reordering technique for minimizing the hamming distance in scan vectors. Also, during scan latch reordering, the don't care inputs in scan vectors are assigned for low power. Also, we apply the clock gated scan cells. Experimental results for ISCAS 89 benchmark circuits show that reduced low power scan testing can be achieved in all cases.
Analysis of Subthreshold Characteristics for Device Parameter of DGMOSFET Using Gaussian Function
Jung, Hak-Kee ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 733~737
DOI : 10.6109/ijice.2011.9.6.733
This paper has studied subthreshold characteristics for double gate(DG) MOSFET using Gaussian function in solving Poisson's equation. Typical two dimensional analytical transport models have been presented for symmetrical Double Gate MOSFETs (DGMOSFETs). Subthreshold swing and threshold voltage are very important factors for digital devices because of determination of ON and OFF. In general, subthreshold swings have to be under 100mV/dec, and threshold voltage roll-off small in short channel devices. These models are used to obtain the change of subthreshold swings and threshold voltage for DGMOSFET according to channel doping profiles. Also subthreshold swings and threshold voltages have been analyzed for device parameters such as channel length, channel thickness and channel doping profiles.
Analysis on DIBL of DGMOSFET for Device Parameters
Jung, Hak-Kee ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 738~742
DOI : 10.6109/ijice.2011.9.6.738
This paper has studied drain induced barrier lowering(DIBL) for Double Gate MOSFET(DGMOSFET) using analytical potential model. Two dimensional analytical potential model has been presented for symmetrical DGMOSFETs with process parameters. DIBL is very important short channel effects(SCEs) for nano structures since drain voltage has influenced on source potential distribution due to reduction of channel length. DIBL has to be small with decrease of channel length, but it increases with decrease of channel length due to SCEs. This potential model is used to obtain the change of DIBL for DGMOSFET correlated to channel doping profiles. Also device parameters including channel length, channel thickness, gate oxide thickness and doping intensity have been used to analyze DIBL.
Surface EMG Network Analysis and Robotic Arm Control Implementation
Ryu, Kwang-Ryol ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 743~746
DOI : 10.6109/ijice.2011.9.6.743
An implementation for surface EMG network analysis and vertical control system of robotic arm is presented in this paper. The transmembranes are simulated by equivalent circuit and cable equation for propagation to be converted to circuit networks. The implementation is realized to be derived from the detecting EMG signal from 3 electrodes, and EMG transmembrane signals of human arm muscles are detected by several surface electrodes, high performance amplifier and filtering, converting analog to digital data and driving a servomotor for spontaneous robotic arm. The system is experimented by monitoring multiple steps vertical control angles corresponding to biceps muscle movement. The experimental results are that the vertical moving control level is measured to around 2 degrees and mean error ranges are lower 5%.
Image Path Searching using Auto and Cross Correlations
Kim, Young-Bin ; Ryu, Kwang-Ryol ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 747~752
DOI : 10.6109/ijice.2011.9.6.747
The position detection of overlapping area in the interframe for image stitching using auto and cross correlation function (ACCF) and compounding one image with the stitching algorithm is presented in this paper. ACCF is used by autocorrelation to the featured area to extract the filter mask in the reference (previous) image and the comparing (current) image is used by crosscorrelation. The stitching is detected by the position of high correlation, and aligns and stitches the image in shifting the current image based on the moving vector. The ACCF technique results in a few computations and simplicity because the filter mask is given by the featuring block, and the position is enabled to detect a bit movement. Input image captured from CMOS is used to be compared with the performance between the ACCF and the window correlation. The results of ACCF show that there is no seam and distortion at the joint parts in the stitched image, and the detection performance of the moving vector is improved to 12% in comparison with the window correlation method.
WDM Transmission Using Dispersion Compensation in Optical Transmission Links with Nonuniform Residual Dispersion per Span
Lee, Seong-Real ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 753~757
DOI : 10.6109/ijice.2011.9.6.753
The possibility of implementing nonuniform residual dispersion per span (RDPS) in optical links with net residual dispersion (NRD) controlled by precompensation and postcompensation for 960 Gbps WDM transmissions is studied and discussed. The fiber optic communication links investigated in this paper consist of inline dispersion management (DM) for each fiber spans and optical phase conjugator (OPC) at mid-way of total transmission length in order to compensate for WDM signal distortions due to group velocity dispersion (GVD) and nonlinearities. It is confirmed that the effect of nonuniform RDPS distribution on system performance is not significant. It is also confirmed that the optimal NRD is obtained to be one of two values of +10 ps/nm or -10 ps/nm, which depend on the deciding of NRD controlled by precompensation or postcompensation, and the exact RDPS configurations. The effective NRD ranges resulting eye opening penalty (EOP) below 1 dB are independent on the exact RDPS distribution for relative low launch power. Therefore, results show the possibility of implementing the flexible optical links to expand network construction for WDM transmission of high bit-rate capability.
Direction Information Concerned Algorithm for Removing Gaussian Noise in Images
Gao, Yinyu ; Kim, Nam-Ho ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 758~762
DOI : 10.6109/ijice.2011.9.6.758
In this paper an efficient algorithm is proposed to remove additive white Gaussian noise(AWGN) with edge preservation. A function is used to separate the filtering mask to two sets according to the direction information. Then, we calculate the mean and standard deviation of the pixels in each set. In order to preserve the details, we also compare standard deviations between the two sets to find out smaller one. Corrupted pixel is replaced by the mean of the filtering window's median value and the smaller set's mean value that the rate of change is faster than the other one. Experiment results show that the proposed algorithm outperforms with significant improvement in image quality than the conventional algorithms. The proposed method removes the Gaussian noise very effectively.
Image Denoising using Adaptive Threshold Method in Wavelet Domain
Gao, Yinyu ; Kim, Nam-Ho ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 763~768
DOI : 10.6109/ijice.2011.9.6.763
Image denoising is a lively research field. Today the researches are focus on the wavelet domain especially using wavelet threshold method. We proposed an adaptive threshold method which considering the characteristic of different sub-band, the method is adaptive to each sub-band. Experiment results show that the proposed method extracts white Gaussian noise from original signals in each step scale and eliminates the noise effectively. In addition, the method also preserves the detail information of the original image, obtaining superior quality image with higher peak signal to noise ratio(PSNR).
Study of Producing Creative Ideas Through Thinking Disposition (Centering on Project Class in High Schools based on IT technology)
An, Jae-Min ; Park, Dea-Woo ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 769~774
DOI : 10.6109/ijice.2011.9.6.769
IT technology based projects was conducted to implement education on producing creative ideas through on-line education and grasp thinking disposition of students in terms of creativity education efficiency. The differences in idea creation among students according to thinking dispositions were analyzed through qualitative evaluation and quantitative evaluation of project and its result was drawn. The purpose of this study was to help cultivate a man of ability who will make a great contribution to knowledge information society by proposing education model based on new method of teaching and learning.
A Forwarding Scheme for (m,k)-firm Streams Based on Local Decision in Wireless Sensor Networks
Li, Bijun ; Kim, Ki-Il ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 775~779
DOI : 10.6109/ijice.2011.9.6.675
As the technology of multimedia sensor networks is desired in large numbers of applications nowadays, real-time service becomes one of the most important research challenges. Even though lots of related works have been conducted to meet this requirement in several ways, the specific traffic model for real-time has not been taken yet. Thus, it causes lack of adaptability of those approaches in real deployment. To solve this problem, in this paper, we model the application via (m,k)-firm streams which have weakly hard real-time property. And then, a novel forwarding scheme based on modified DBP (Distance-Based Priority) is proposed by considering local-DBP and stream DBP together. Local-DBP can contribute to identify the detailed causes of unsatisfied quality, that is, network congestion or wireless link failure. Simulation results reveal that (m,k)-firm is a good traffic model for multimedia sensor networks and the proposed scheme can contribute to guarantee real-time requirement well.
3D Panorama Generation Using Depth-MapStitching
Cho, Seung-Il ; Kim, Jong-Chan ; Ban, Kyeong-Jin ; Park, Kyoung-Wook ; Kim, Chee-Yong ; Kim, Eung-Kon ;
Journal of information and communication convergence engineering, volume 9, issue 6, 2011, Pages 780~784
DOI : 10.6109/ijice.2011.9.6.780
As the popularization and development of 3D display makes common users easy to experience a solid 3D virtual reality, the demand for virtual reality contents are increasing. In this paper, we propose 3D panorama system using vanishing point locationbased depth map generation method. 3D panorama using depthmap stitching gives an effect that makes users feel staying at real place and looking around nearby circumstances. Also, 3D panorama gives free sight point for both nearby object and remote one and provides solid 3D video.