Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Kyung-Hi Chang / Song Chong / Jong-Taek Oh / Jae-Jin Lee / Myung-Sik Yoo
Volume & Issues
Volume 32, Issue 12C - Dec 2007
Volume 32, Issue 12B - Dec 2007
Volume 32, Issue 12A - Dec 2007
Volume 32, Issue 11C - Nov 2007
Volume 32, Issue 11B - Nov 2007
Volume 32, Issue 11A - Nov 2007
Volume 32, Issue 10C - Oct 2007
Volume 32, Issue 10B - Oct 2007
Volume 32, Issue 10A - Oct 2007
Volume 32, Issue 9C - Sep 2007
Volume 32, Issue 9B - Sep 2007
Volume 32, Issue 9A - Sep 2007
Volume 32, Issue 8C - Aug 2007
Volume 32, Issue 8B - Aug 2007
Volume 32, Issue 8A - Aug 2007
Volume 32, Issue 7C - Jul 2007
Volume 32, Issue 7B - Jul 2007
Volume 32, Issue 7A - Jul 2007
Volume 32, Issue 6C - Jun 2007
Volume 32, Issue 6B - Jun 2007
Volume 32, Issue 6A - Jun 2007
Volume 32, Issue 5C - May 2007
Volume 32, Issue 5B - May 2007
Volume 32, Issue 5A - May 2007
Volume 32, Issue 4C - Apr 2007
Volume 32, Issue 4B - Apr 2007
Volume 32, Issue 4A - Apr 2007
Volume 32, Issue 3C - Mar 2007
Volume 32, Issue 3B - Mar 2007
Volume 32, Issue 3A - Mar 2007
Volume 32, Issue 2C - Feb 2007
Volume 32, Issue 2B - Feb 2007
Volume 32, Issue 2A - Feb 2007
Volume 32, Issue 1C - Jan 2007
Volume 32, Issue 1B - Jan 2007
Volume 32, Issue 1A - Jan 2007
Selecting the target year
An Effective Location-based Packet Scheduling Scheme for Adaptive Tactical Wireless Mesh Network
Kim, Young-An ; Hong, Choong-Seon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 32, issue 12B, 2007, Pages 719~727
The Wireless Mesh Network technology is able to provide an infrastructure for isolated islands, in which it is difficult to install cables or wide area such as battlefield of armed forces. Therefore, Wireless Mesh Network is frequently used to satisfy needs for internet connection and active studies and research on them are in progress However, as a result of increase in number of hops under hop-by-hop communication environment has caused a significant decrease in throughput and an increase in delay. Considering the heavy traffic of real-time data, such as voice or moving pictures to adaptive WMN, in a military environment, it is restricted for remote units to have their Mesh Node to get real-time services. Such phenomenon might cause an issue in fairness. In order to resolve this issue, the Location-based Packet Scheduling Scheme, which can provide an fair QoS to each mesh node that is connected to each echelon's AP and operates based on WRR method that gives a priority to emergency message and control packet. The performance of this scheme is validated.
A GOSST Heuristic Mechanism for the Design of a Physical Multiple Security Grade Network
Kim, In-Bum ; Kim, Chae-Kak ;
The Journal of Korean Institute of Communications and Information Sciences, volume 32, issue 12B, 2007, Pages 728~734
In this paper, we propose a GOSST(Grade Of Services Steiner minimum Tree) heuristic mechanism for the design of a physical multiple security grade network with minimum construction cost. On the network, each node can communicate with other nodes by its desiring security grade. Added to the existing network security methods, the preventing method from illegal physical access is necessary for more safe communication. To construct such network with minimum cost, the GOSST problem is applied. As the GOSST problem is a NP-Hard problem, a heuristic with reasonable complexity is necessary for a practical solution. In this research, to design the physical multiple security grade network with the minimum construction cost, the reformed our previous Distance Direct GOSST heuristic mechanism is proposed. The mechanism brings average 29.5% reduction in network construction cost in comparison with the experimental control G-MST.
A Video Streaming Adaptive Packet Pre-marker in DiffServ Networks
Jung, Young-H. ; Kang, Young-Wook ; Choe, Yoon-Sik ;
The Journal of Korean Institute of Communications and Information Sciences, volume 32, issue 12B, 2007, Pages 735~742
We propose an effective packet marking algorithm for video streaming in DiffServ network. Because legacy packet markers such as srTCM(single rate three color marker) cannot distinguish the importance of packet, these markers can cause quality degradation of streaming during the network congestion period. Recently proposed TMS (Two Marker System)  shows effectiveness in such scenario that video streaming service is struggling with other types of service traffic. However, if many video streaming services co-exist in DiffServ network and result in competition among themselves, then both legacy packet markers and even TMS cannot prevent drastic streaming quality degradation. To cope with this, we suggest A-TCPM (Adaptive time sliding window Three Color Marker) algorithm. In this algorithm, an A-TCPM module decides the color of a racket based upon the probability which is lead by current channel status and frame importance ratio. Simulation results show that proposed A-TCPM algorithm can enhance streaming service quality especially when overbooked video streaming sessions struggle with themselves.
Methods for Change of Tag States and Assignment of Master Leaders to Protect RFID Privacy
Kim, Eun-Jin ; Roh, Byeong-Hee ;
The Journal of Korean Institute of Communications and Information Sciences, volume 32, issue 12B, 2007, Pages 743~749
The problem of privacy is considered one of the main concerns to deploy RFID applications. In this paper, we propose methods to change a tag state and assign a master leader for the protection of privacy. By changing a tag state, we can limit the range for the information retrieval of the tag to all leaders or a specific leader (mater leader). Whenever the owner of a tag changes, with the master leader assignment method for the tag, we can make only the master leader get the information for the tag. With the proposed methods, it is expected that the privacy problems can be solved by preventing the private information of tags that persons have from being exposed by illegal leaders.
A Session Key Exchange Scheme for Authentication and SDP Encryption to Protect P2P SPIT in SIP
Jang, Yu-Jung ; Choi, Jae-Sic ; Choi, Jae-Duck ; Won, Yoo-Jae ; Cho, Young-Duk ; Jung, Sou-Hwan ;
The Journal of Korean Institute of Communications and Information Sciences, volume 32, issue 12B, 2007, Pages 750~757
This paper analyzes spam threats and proposes key exchange scheme for user authentication and SDP encryption to protect potential spam threats in SIP-based VoIP services. The existing HTTP digest authentication scheme exchanges many message because challenge is sent for every establishment of the session and doesn't provide a confidentiality of SDP. To protect SPIT, our scheme exchanges initial nonce and a session master key for authentication and SDP encryption during registration. In our scheme, the challenge and response procedure is not necessary and the communication overhead is much less than applying S/MIME or TLS.
Design and Implementation of Internet Broadcasting System based on P2P Architecture
Woo, Moon-Sup ; Kim, Nam-Yun ; Hwang, Ki-Tae ;
The Journal of Korean Institute of Communications and Information Sciences, volume 32, issue 12B, 2007, Pages 758~766
IStreaming services with a client-server architecture have scalability problem because a server cannot accomodate clients more than its processing capability. This paper introduces a case study for implementing H.264 streaming system based on P2P architecture in order to provide scalable and stable broadcast streaming services over the internet. The prototype system called OmniCast264 consists of the H.264 encoding server, the streaming server, the proxy server, and peer nodes. The proxy server dynamically manages placement of the peer nodes on the P2P network. Omnicast264 has the concepts of distributed streaming loads, real-time playback, error-robustness and modularity. Thus, it can provide large-scale broadcast streaming services. Finally, we have built P2P streaming systems with 12 PCs connected serially or in parallel. The experiment shows that OmniCast264 can provide real-time playback.
Intelligent Service Reasoning Model Using Data Mining In Smart Home Environments
Kang, Myung-Seok ; Kim, Hag-Bae ;
The Journal of Korean Institute of Communications and Information Sciences, volume 32, issue 12B, 2007, Pages 767~778
In this paper, we propose a Intelligent Service Reasoning (ISR) model using data mining in smart home environments. Our model creates a service tree used for service reasoning on the basis of C4.5 algorithm, one of decision tree algorithms, and reasons service that will be offered to users through quantitative weight estimation algorithm that uses quantitative characteristic rule and quantitative discriminant rule. The effectiveness in the performance of the developed model is validated through a smart home-network simulation.
An Architecture of UPnP Bridge for Non-lP Devices with Heterogeneous Interfaces
Kang, Jeong-Seok ; Choi, Yong-Soon ; Park, Hong-Seong ;
The Journal of Korean Institute of Communications and Information Sciences, volume 32, issue 12B, 2007, Pages 779~789
This paper presents an architecture of UPnP Bridge for interconnecting Non-lP devices with heterogeneous network interfaces to UPnP devices on UPnP networks. The proposed UPnP Bridge provides a Virtual UPnP device that performs generic UPnP Device's functionalities on behalf of Non-lP device. This paper defines 3 types of descriptions, Device Description, Message Field Description, and Extended UPnP Service Description in order to reduce the amount of effort required to connect a non-lP device with a new interface or message format to UPnP network. By these three types of descriptions and Message conversion module, developers for Non-lP devices can easily connect the devices to UPnP network without additional programming. So UPnP control point controls Non-lP devices as generic UPnP device. Some experiments validate the proposed architecture, which are performed on a test bed consisting of UPnP network the proposed bridge, and non-lP devices with CAN and RS232 interfaces.
WLAN CR Coexistence Beacon Protocol for Cognitive Radio-Based WLAN Network
Kim, Hyun-Ju ; Yoo, Sang-Jo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 32, issue 12B, 2007, Pages 790~799
In this paper, we propose WLAN CR coexistence beacon protocol for thenext WLAN network. This method can provide WLAN with high-speed data rate in new WLAN architecture and network platform based on cognitive radio technology. WLAN CR devices that enter the CR network can know UHF channels by listening CR beacon including the coexistence parameter set and start using CR channel fast. During handover of WLAN device in UHF spectrums, WLAN device that lost their channel can change available channel by obtaining the current CR channel information from the CR beacon. In advance relaying coexistence parameter set to entire CR system, WLAN CR system can prepare own candidate channel set that is different with other CR system. In CR beacon and relay delay, we show the results that WLAN CR coexistence beacon protocol supports spectrum handover efficiently and decreases the probability of collision in candidate channel set.
TCP Performance Analysis over Mobile ad-hoc Networks
Nam, Ho-Seok ; Cho, Sol ; Lee, Tae-Hoon ; Kim, Jun-Nyun ;
The Journal of Korean Institute of Communications and Information Sciences, volume 32, issue 12B, 2007, Pages 800~808
With the development of wireless data communication technology, all IP-based network will become compositions of wired and wireless networks. TCP is a connection-oriented, reliable transport protocol and has been used as de facto standard in most wired networks. Because TCP's congestion control algorithm could not distinguish congestion from BER, link failure and frequent route changes, TCP shows a poor performance over mobile ad-hoc networks. In this paper, the theoretical feature of TCP was studied and the performance of TCP over mobile ad-hoc networks was analyzed with ns2.
Demonstration of RSOA based Bidirectional WDM-POM by using Suppressed Optical Carrier Modulation
Kim, Dong-Hyeon ; Lee, Dae-Won ; Won, Young-Wuk ; Park, Soo-Jin ; Han, Sang-Kook ;
The Journal of Korean Institute of Communications and Information Sciences, volume 32, issue 12B, 2007, Pages 809~814
In this paper, we proposed new method of a bidirectional WDM-PON transmission using suppressed optical carreir(SOC) and reflective semi-conductor optical amplifier(RSOA) based on WDM-PON. while LiNbO3 mach zehnder modulator(LN-MZM) generates 5GHz modulated SOC for uplink at central office(CO), RSOA at CO modulates the downstream data. At optical network units(ONUs), Another RSOA modulates the SOC light source for uplink at ONU and uplink data are up-converted to the 5 GHz already modulated SOC using LN-MZM.
A Performance Evaluation of Governmental Funding Projects for IT Small and Medium-Sized Enterprises and Venture Business Using DEA/AR-I
Park, Sung-Min ; Kim, Heon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 32, issue 12B, 2007, Pages 815~825
It is necessary to establish a systematic framework where the performance of governmental funding projects can be evaluated just-in-time as well as objectively regarding IT small and medium-sized enterprises and venture business. In this study, a framework is proposed for the performance evaluation using Data Envelopment Analysis (DEA) and a case study is illustrated with an empirical dataset. Especially, in order to enhance the reliability of optimal solutions, a DEA/AR-I revised model is developed by adding Acceptance Region (AR) Type I constraints into the DEA basic model. Based on the procedure and the models, it is considered that an 'efficiency score' can be calculated as a guideline for conducting successive performance evaluation processes fast. As for major governmental funding projects with respect to 'IT SMERP 2010 Plan', performance evaluations are discussed concerning between projects as well as between corporate entities within each project.