Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Kyung-Hi Chang / Song Chong / Jong-Taek Oh / Jae-Jin Lee / Myung-Sik Yoo
Volume & Issues
Volume 29, Issue 12C - Dec 2004
Volume 29, Issue 12B - Dec 2004
Volume 29, Issue 12A - Dec 2004
Volume 29, Issue 11C - Nov 2004
Volume 29, Issue 11B - Nov 2004
Volume 29, Issue 11A - Nov 2004
Volume 29, Issue 10C - Oct 2004
Volume 29, Issue 10B - Oct 2004
Volume 29, Issue 10A - Oct 2004
Volume 29, Issue 9C - Sep 2004
Volume 29, Issue 9B - Sep 2004
Volume 29, Issue 9A - Sep 2004
Volume 29, Issue 8C - Aug 2004
Volume 29, Issue 8B - Aug 2004
Volume 29, Issue 8A - Aug 2004
Volume 29, Issue 7C - Jul 2004
Volume 29, Issue 7B - Jul 2004
Volume 29, Issue 7A - Jul 2004
Volume 29, Issue 6C - Jun 2004
Volume 29, Issue 6B - Jun 2004
Volume 29, Issue 6A - Jun 2004
Volume 29, Issue 5C - May 2004
Volume 29, Issue 5B - May 2004
Volume 29, Issue 5A - May 2004
Volume 29, Issue 4C - Apr 2004
Volume 29, Issue 4B - Apr 2004
Volume 29, Issue 4A - Apr 2004
Volume 29, Issue 3C - Mar 2004
Volume 29, Issue 3B - Mar 2004
Volume 29, Issue 3A - Mar 2004
Volume 29, Issue 2C - Feb 2004
Volume 29, Issue 2B - Feb 2004
Volume 29, Issue 2A - Feb 2004
Volume 29, Issue 1C - Jan 2004
Volume 29, Issue 1B - Jan 2004
Volume 29, Issue 1A - Jan 2004
Selecting the target year
Design and Implementation of Network Defense Simulator
The Journal of Korean Institute of Communications and Information Sciences, volume 29, issue 4C, 2004, Pages 441~447
Information security simulator is required for the study on the cyber intrusion and defense as information security has been increasingly popular Until now, the main purposes of information security simulation are security estimation of small network as well as performance analysis of information protection systems. However, network simulators that can simulate attacks in a huge network are in needs since large scale internet attacks are very common in these days. In this paper we proposed a simulator design and its implementation details. Our simulator is implemented by expanding the SSFNet program to the client-sewer architecture. A cyber attack scenario used in our simulator is composed by the advanced attack tree model. We analyzed the simulation results to show the correctness of our network defense simulator.
Adaptive Trellis-Coded 8PSK Using Symbol Transformation
The Journal of Korean Institute of Communications and Information Sciences, volume 29, issue 4C, 2004, Pages 448~453
Conventional pragmatic TCMs need sector phase quantizer to apply Viterbi decoder which uses 3-bit soft decision. A symbol transformation applied to the incoming I-channel and Q-channel symbols allows to use Viterbi decoder without sector phase quantizer. We analyzed structure and performance of proposed decoder, and applied it to the turbo decoder. We know that the performance of proposed decoder is better than that of conventional decoder by 1 ［㏈］because of increasing of Euclidean distance.
Hierarchical channel coding scheme Using Unequal Error Protection
The Journal of Korean Institute of Communications and Information Sciences, volume 29, issue 4C, 2004, Pages 454~460
In this paper, we studied hierarchical channel coding scheme using unequal error protection method for consecutively broadcastingservice under the rain attenuation of Ka band satellite broadcasting. Unlike time-sharing methods, which are design for different channel coding scheme in according to different modulation, unequal error protection method is made in such way that minimum distance between signals are different for importance of signals with same modulation. Consequently we proposed optimal method according to performance analysis.
Design and Performance Evaluation of a Scheduling Algorithm for Edge Node supporting Assured Service in High-speed Internet Access Networks
The Journal of Korean Institute of Communications and Information Sciences, volume 29, issue 4C, 2004, Pages 461~471
Recently, subscribers have strong desire to get QoS based personalized services in high-speed Internet access. Service providers have been rapidly replacing ADSL, cable broadband access networks with Metro-Ethernet based VDSL. But, it is difficult for Motto-Ethernet based broadband access networks to provide QoS based personalized services, because already deployed network elements cannot distinguish subscribers by specific traffic characteristics. In this paper, when the access network has tree topology, we show that it is possible to provide QoS for each downstream flow with only per flow traffic shaping at the edge node without QoS functions in access networks. In order to show that our suggested scheduling algorithm at the edge node can support the assured service in tree topology access networks, we evaluated its performance by simulation. The suggested scheduling algorithm can shape per-flow traffic based on the maximum bandwidth, and guarantees minimum bandwidth per flow by modifying the DRR scheduler. Simulation results show that congestion and loss in the access network elements are greatly reduced, TCP performance is highly enhanced and loss for assured CBR service flows is reduced by only shaping per-flow traffic at the edge node using our proposed scheduling algorithm.
3D Mesh Watermarking Using CEGI
The Journal of Korean Institute of Communications and Information Sciences, volume 29, issue 4C, 2004, Pages 472~484
We proposed 3D mesh watermarking algorithm using CEGI distribution. In the proposed algorithm, we divide a 3D mesh of VRML data into 6 patches using distance measure and embed the same watermark bits into the normal vector direction of meshes that mapped into the cells of each patch that have the large magnitude of complex weight of CEGI. The watermark can be extracted based on the known center point of each patch and order information of cell. In an attacked model by affine transformation, we accomplish the realignment process before the extraction of the watermark. Experiment results exhibited the proposed algorithm is robust by extracting watermark bit for geometrical and topological deformed models.
Performance Analysis of Optical Hard-Limiter for The Beat Noise in 2-Dimensional OCDMA Receivers
The Journal of Korean Institute of Communications and Information Sciences, volume 29, issue 4C, 2004, Pages 485~493
The system performance of 2-Dimensional wavelength hopping/time spreading optical CDMA systems is found to be limited by the occurrence of the beat noise between the components of the signal and the multiple user interference. This paper shows that the performance is analyzed under the beat noise and no beat noise to blow impact of the beat noise. To overcome this problem, the OHL(Optical Hard-Limiter) is used in the receiver. The performance is calculated for a optical CDMA system employing asymmetric and symmetric prime-hop 2-Dimensional codes, respectively The analysis results show that the performance improved 3.5 times of simultaneous users of before and after inserting OHL in the case of no beat noise. In the case of beat noise the performance improved 1.5 times of simultaneous users of before and after inserting OHL. The performance marked use of symmetric prime-hop code.
Gaze Detection System by IR-LED based Camera
The Journal of Korean Institute of Communications and Information Sciences, volume 29, issue 4C, 2004, Pages 494~504
The researches about gaze detection have been much developed with many applications. Most previous researches only rely on image processing algorithm, so they take much processing time and have many constraints. In our work, we implement it with a computer vision system setting a IR-LED based single camera. To detect the gaze position, we locate facial features, which is effectively performed with IR-LED based camera and SVM(Support Vector Machine). When a user gazes at a position of monitor, we can compute the 3D positions of those features based on 3D rotation and translation estimation and affine transform. Finally, the gaze position by the facial movements is computed from the normal vector of the plane determined by those computed 3D positions of features. In addition, we use a trained neural network to detect the gaze position by eye's movement. As experimental results, we can obtain the facial and eye gaze position on a monitor and the gaze position accuracy between the computed positions and the real ones is about 4.2 cm of RMS error.
An Adaptive De-blocking Algorithm in Low Bit-rate Video Coding
The Journal of Korean Institute of Communications and Information Sciences, volume 29, issue 4C, 2004, Pages 505~513
Most video codecs including the international standards use the block-based hybrid structure for efficient compression. But for low bit-rate applications such as video transmission through wireless channels, the blocking artifacts degrade image qualify seriously. In this paper, we propose an adaptive de-blocking algorithm using characteristics of the block boundaries. Blocking artifacts contain the high frequency components near the block boundaries, therefore the lowpass filtering can remove them. However, simple lowpass filtering results into blurring by removing important information such as edges. To overcome this problem, we determine the modes depending upon the characteristics of pixels adjacent to block boundary then proper filter is applied to each area. Simulation results show that proposed method improves de-blocking performance compared to that of MPEG-4.
Implementation of Intelligent Moving Target Tracking and Surveillance System Using Pan/Tilt-embedded Stereo Camera System
The Journal of Korean Institute of Communications and Information Sciences, volume 29, issue 4C, 2004, Pages 514~523
In this paper, a new intelligent moving target tracking and surveillance system basing on the pan/tilt-embedded stereo camera system is suggested and implemented. In the proposed system, once the face area of a target is detected from the input stereo image by using a YCbCr color model and then, using this data as well as the geometric information of the tracking system, the distance and 3D information of the target are effectively extracted in real-time. Basing on these extracted data the pan/tilted-embedded stereo camera system is adaptively controlled and as a result, the proposed system can track the target adaptively under the various circumstance of the target. From some experiments using 80 frames of the test input stereo image, it is analyzed that standard deviation of the position displacement of the target in the horizontal and vertical directions after tracking is kept to be very low value of 1.82, 1.11, and error ratio between the measured and computed 3D coordinate values of the target is also kept to be very low value of 0.5% on average. From these good experimental results a possibility of implementing a new real-time intelligent stereo target tracking and surveillance system using the proposed scheme is finally suggested.
Optical Implementation of Incoherent Holographic 3D Display System using Modified Triangular and Mach-Zehender Interferometer
The Journal of Korean Institute of Communications and Information Sciences, volume 29, issue 4C, 2004, Pages 524~532
In this paper, an incoherent holographic 3D imaging and display system based on the modified triangular and Mach-Zehnder interferometers is optically implemented and some experiments are carried out. Incoherent hologram of a 3D object is generated by using the hologram input system of modified triangular interferometer. Then this complex hologram is reconstructed by using the hologram output system of modified Mach-Zehnder interferometer in which two LCD spatial light modulators and a waveplate are inserted. From the experiment with two point sources having a depth difference of 100 mm each other, it is revealed that each point source can be independently reconstructed at its own focal position from the complex hologram, while both of the bias and conjugate image are simultaneously eliminated at the same time. And in the experiment with the real 3D object of two dices having a depth difference of 30 mm each other, it is also conformed that the bias and conjugate image can be effectively eliminated from the hologram pattern and each 3D dice can be also successfully reconstructed at its own focal position from the complex hologram. These experiment results finally suggest a possibility of implementing a new incoherent holographic 3D imaging and display system using the modified triangular and Mach-Zehender interferometers.
Multispectral Image Data Compression Using Classified Prediction and KLT in Wavelet Transform Domain
The Journal of Korean Institute of Communications and Information Sciences, volume 29, issue 4C, 2004, Pages 533~540
This paper proposes a new multispectral image data compression algorithm that can efficiently reduce spatial and spectral redundancies by applying classified prediction, a Karhunen-Loeve transform (KLT), and the three-dimensional set partitioning in hierarchical trees (3-D SPIHT) algorithm in the wavelet transform (WT) domain. The classification is performed in the WT domain to exploit the interband classified dependency, while the resulting class information is used for the interband prediction. The residual image data on the prediction errors between the original image data and the predicted image data is decorrelated by a KLT. Finally, the 3-D SPIHT algorithm is used to encode the transformed coefficients listed in a descending order spatially and spectrally as a result of the WT and KLT. Simulation results showed that the reconstructed images after using the proposed algorithm exhibited a better quality and higher compression ratio than those using conventional algorithms.
JPEG-2000 Based Error Resilient Entropy Coding Using Rate-Distortion Optimization
The Journal of Korean Institute of Communications and Information Sciences, volume 29, issue 4C, 2004, Pages 541~549
In this paper, a new improved EREC based error resilient coding in JPEG-2000 standard is proposed, considering the error sensitive wireless environment with limited channel capacity. In order to apply EREC, we use the variable bit-rate by using R-D optimization. Simulation results demonstrate that the proposed EREC based error resilient coding is more resilient than the error resilient schemes used in JPEG-2000.
An analysis and design on the security node for guaranteeing availability against network based DoS
The Journal of Korean Institute of Communications and Information Sciences, volume 29, issue 4C, 2004, Pages 550~558
In order to design network node for guaranteeing availability against network based DoS attack, some restrictions such as the relationship analysis on upper and lower layer bandwidth, buffer capacity, attack resources, a number of attack session and loss probability are analyzed. And then, to make good use of network resource, the relationship between required resources for satisfying loss probability and cost is discussed. The results of this study are expected to be applied to the effective security node design against network DoS.
Active Security Management on Active Networks
The Journal of Korean Institute of Communications and Information Sciences, volume 29, issue 4C, 2004, Pages 559~569
It has become more difficult to correspond an cyber attack quickly as a pattern of attack becomes various and complex. And, current security mechanisms just have passive defense functionalities. In this paper, we propose new network security architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture make possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service) using active packet technology including a mobile sensor on active network. Active Security Management System based on proposed security architecture consists of active security node and active security server in a security zone, and is designed to have more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of Active Security Management System. The experimentation results are analyzed.
The Performance Evaluation of XML-based Digital Signature System on Mobile Environment
The Journal of Korean Institute of Communications and Information Sciences, volume 29, issue 4C, 2004, Pages 570~580
Due to development of internet and mobile communication, M-commerce applications that utilize the digital signature are widely used these days. The mobile environment is weaker than the wired internet environment. Thus, it is highly required to systematically analyze the effect of processing the digital document and the digital signature algorithm, and low bandwidth of the mobile network on the system performance. In this paper, we have constructed the mobile contract system which has the XML based digital contract and the RSA signature algorithm as the test system. And we have derived the performance parameters and then measured in detail the runtime performance of the mobile digital signature system with the Compaq iPAQ 3850 PDA and CDMA 2000 1x mobile network.
A Study on Dynamic Key Management in Mixed-Mode Wireless LAN
The Journal of Korean Institute of Communications and Information Sciences, volume 29, issue 4C, 2004, Pages 581~593
The interest in wireless LAN security is on the increase owing to a role of high-speed wireless Internet infrastructure of wireless LAN. Wi-Fi has released WPA standard in order to overcome drawbacks of WEP algorithm that is security element of current IEEE 802.11-based wireless LAN system. Pairwise key management and group key management in a mixed-mode which supports both terminals running WPA and terminals running original WEP security are very complicate. In this paper, we analyze flaws in WPA authenticator key management state machine for key distribution and propose the countermeasures to overcome the analyzed problems. Additionally, WPA authenticator key management state machine to which the solutions are applied is described. The reconstructed WPA authenticator key management state machine helps the AP perform efficiently group key exchange and group key update in the mixed-mode.