Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Kyung-Hi Chang / Song Chong / Jong-Taek Oh / Jae-Jin Lee / Myung-Sik Yoo
Volume & Issues
Volume 35, Issue 12C - Dec 2010
Volume 35, Issue 12B - Dec 2010
Volume 35, Issue 12A - Dec 2010
Volume 35, Issue 11C - Nov 2010
Volume 35, Issue 11B - Nov 2010
Volume 35, Issue 11A - Nov 2010
Volume 35, Issue 10C - Oct 2010
Volume 35, Issue 10B - Oct 2010
Volume 35, Issue 10A - Oct 2010
Volume 35, Issue 9C - Sep 2010
Volume 35, Issue 9B - Sep 2010
Volume 35, Issue 9A - Sep 2010
Volume 35, Issue 8C - Aug 2010
Volume 35, Issue 8B - Aug 2010
Volume 35, Issue 8A - Aug 2010
Volume 35, Issue 7C - Jul 2010
Volume 35, Issue 7B - Jul 2010
Volume 35, Issue 7A - Jul 2010
Volume 35, Issue 6C - Jun 2010
Volume 35, Issue 6B - Jun 2010
Volume 35, Issue 6A - Jun 2010
Volume 35, Issue 5C - May 2010
Volume 35, Issue 5B - May 2010
Volume 35, Issue 5A - May 2010
Volume 35, Issue 4C - Apr 2010
Volume 35, Issue 4B - Apr 2010
Volume 35, Issue 4A - Apr 2010
Volume 35, Issue 3C - Mar 2010
Volume 35, Issue 3B - Mar 2010
Volume 35, Issue 3A - Mar 2010
Volume 35, Issue 2C - Feb 2010
Volume 35, Issue 2B - Feb 2010
Volume 35, Issue 2A - Feb 2010
Volume 35, Issue 1C - Jan 2010
Volume 35, Issue 1B - Jan 2010
Volume 35, Issue 1A - Jan 2010
Selecting the target year
Multidimensional Ring-Delta Network: A High-Performance Fault-Tolerant Switching Networks
Park, Jae-Hyun ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 1B, 2010, Pages 1~7
In this paper, a high-performance fault-tolerant switching network using a deflection self-routing was proposed. From an abstract algebraic analysis of the topological properties of the Delta network, which is a baseline switching network, we derive the Multidimensional Ring-Delta network: a multipath switching network using a deflection self-routing algorithm. All of the links including already existing links of the Delta network are used to provide the alternate paths detouring faulty/congested links. We ran a simulation analysis under the traffic loads having the non-uniform address distributions that are usual in Internet. The throughput of
switching network proposed is better than that of the 2D ring-Banyan network by 13.3 %, when the input traffic load is 1.0 and the hot ratio is 0.9. The reliability of
switching network proposed is better than that of the 2D ring-Banyan network by 46.6%.
Design of Defence Mechanism against DDoS Attacks in NCP-based Broadband Convergence Networks
Han, Kyeong-Eun ; Yang, Won-Hyuk ; Yoo, Kyung-Min ; Yoo, Jae-Young ; Kim, Young-Sun ; Kim, Young-Chon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 1B, 2010, Pages 8~19
In this paper, we propose the NCP (Network Control Platform)-based defense mechanism against DDoS (Distributed Denial of Service) attacks in order to guarantee the transmission of normal traffic and prevent the flood of abnormal traffic. We also define defense modules, the threshold and packet drop-rate used for the response against DDoS attacks. NCP analyzes whether DDoS attacks are occurred or not based on the flow and queue information collected from SR (Source Router) and VR (Victim Router). Attack packets are dopped according to drop rate decided from NCP. The performance is simulated using OPNET and evaluated in terms of the queue size of both SR and VR, the transmitted volumes of legitimate and attack packets at SR.
Downlink Scheduling Algorithm Based on Traffic Arrival Rate for Mobile Telecommunication System
Kim, Jung-Jong ; Hwang, Jun-Ho ; Yoo, Myung-Sik ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 1B, 2010, Pages 20~26
The downlink scheduling algorithm has a great impact on the performance of mobile telecommunication system. In proportional fairness (PF) scheduling algorithm, the resource is allocated proportionally to the quality of wireless channel. Thus, PF has difficulty in servicing the users having more downlink traffic. One can allocate the resource proportionally to the accumulated queue length. However, this leads to system throughput degradation since the users having low channel quality get more and more resource allocated due to accumulation property of queue. In this paper, we propose a new downlink scheduling algorithm, which extends PF algorithm by incorporating downlink traffic arrival rate. The proposed algorithm can effectively cope with users having more downlink traffic, and maintain high system throughput by eliminating accumulation effect in the algorithm. With computer simulations, it is verified that the proposed algorithm performs better than existing algorithms.
VoIP Quality Metric and Quality-based Accounting Scheme
Jung, Youn-Chan ; Ann, Ibanez Al ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 1B, 2010, Pages 27~34
As VoIP systems move to wireless environments with much higher average packet loss rates than wired networks, it becomes less possible for the network to assure a reasonable QoS. So, real-time quality monitoring for mobile VoIP applications is an important issue to be explored. In this paper, we explore perceptual quality dependency on two parameters: the burst loss rate and average burst length. Also, we propose a simple 'moving average' approach with
aiming to measure those parameters on real-time basis. In order to find how accurately the two parameters measured estimate the real perceptual quality, we compare actual measured PESQ scores with estimated value by matching the measured quality metric to the trained MOS table. Finally, we propose the quality-based accounting system, which can set obvious continuities between quality and billing.
A Study on 3D View Design of Images and Voices Integration for Effective Information Transfer
Shin, C.H. ; Lee, J.S. ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 1B, 2010, Pages 35~41
In this paper, we propose a 3D view design scheme which arranges 2D information in a 3D virtual space with a flexible interface and voice information. The scheme allows the user interface of the 2D image in 3D virtual space anytime from any view point. Voice information can be easily attached. It is this simple and efficient image and voice information arrangement in 3D virtual space that improves information transfer.
Hash-based Mutual Authentication Protocol for RFID Environment
Jeon, Dong-Ho ; Kim, Hae-Moon ; Kwon, Hye-Jin ; Kim, Soon-Ja ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 1B, 2010, Pages 42~52
Recently, Ahn et al proposed an improved authentication protocol using the hash function in RFID environment. Their proposed protocol provide the following three merits; it reduces the computational costs of RFID tag. itrfduces the communication overhead between the reader and the tag. it protects the user privacy. However, this paper points out that does not authenticate the legality of the RFID reader and database. this paper proposes an improved mutual authentication protocol that can provide the mutual authenticaion.
A Study of the Message Protocols Technologies in M2M Platforms
Lee, Chang-Yeol ; Hong, Han-Kuk ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 1B, 2010, Pages 53~61
M2M Platform is the future ubiquitous network technologies which provide the integrated service with the networks and devices. It requires the standardized message protocols among the sensor applications. In this study, we developed the message protocols that support the data abstraction and interoperability among application systems with characteristics of sensor systems. The message protocols consist of the data representation formats and data exchange functions.
Bonding Method and Packaging of High Temperature RFID Tag
Choi, Eun-Jung ; Yoo, Dea-Won ; Byun, Jong-Hun ; Ju, Dae-Keun ; Sung, Bong-Gun ; Cho, Byung-Lok ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 1B, 2010, Pages 62~67
Our research group has investigated that RFID tag packaging development and RFID tag flip chip bonding method influences on the industry-environmental customized RFID tag development that has applications to various industry environmental conditions. RFID tag flip chip bonding is consisting with wire bonding, ultrasonic bonding, heat plate bonding, and laser bonding and those methods are also depending on the different RFID tag development. Our research data shows that, among the various industrial environments such as an extremely high temperature, cryogenic, high-humidity, flexible, high-durable, development of RFID tag in an extremely high temperature is inappropriate for laser bonding method, converting of heat energy as absorbing light energy or heat plate bonding method of straight heat transferring manner, on the other hand, is suitable for wire bonding method which directly connect bump to pattern using wire.
Adaptive Link Quality Estimation and Routing Scheme in Large-scale Wireless Sensor Networks
Lee, Jung-Wook ; Chung, Kwang-Sue ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 1B, 2010, Pages 68~77
Wireless sensor networks are installed in various environments and collect sensing data through wireless links. The quality of a wireless link may be unstable due to environment causes and hardware performance in wireless sensor networks. Since the change of the link quality may cause data loss, sensor nodes need to adaptively estimate the change of the link quality. Also, the routing protocol should deal with this situation. In this paper, the adaptive link quality estimation and routing scheme in the large-scale wireless sensor networks are proposed. When the quality of a link is unstable, sensor nodes agilely estimate the quality of links, and the new route is selected. When quality of a link is stable, the link quality is occasionally estimated so that the energy consumption is reduced. Moreover, sensor nodes exchange less beacons in order to reduce an overhead in dense networks. In the case of sparse network, the sensor nodes exchange more beacons for finding a better route. We prove that the proposed scheme can improve the energy efficiency and reliability.
Study of the 900 MHz Near Field RFID System for the Jewelry Management
Lee, Jin-Seong ; Lee, Kyoung-Hwan ; Chung, Chung-You ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 1B, 2010, Pages 78~84
A fixed 900 MHz near field RFID system is developed to provide information; market efficiency, jewelry information and the circulation history information in real time, to the customers. The developed RFID system for the jewelry management consists of a reader, antenna and a CPU in a integrated type. The system size is
, the operated frequency band of the reader antenna is 905 ~ 926 MHz. The maximum gain of the embedded reader antenna is 5.1 dBii(@ 910 MHz). Honeycomb tag manufactured by RSI Co. is suitable for the jewelry management than another other commercial near field tags. The tagging method and the tagging location of Honeycomb tag are suggested. In the suggested system, the maximum reading range is about 16 cm, and the zone with 100 % recognition rate is 10 cm from the radom of the reader antenna.
Fast and Reliable Tag Estimation Algorithm in RFID Systems with Collision-Oblivious Reader
Jeong, Han-You ; Yoon, Won-Ju ; Chung, Sang-Hwa ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 1B, 2010, Pages 85~94
Many RFID systems use dynamic slotted ALOHA to identify the label information of the RFID tags. One of the key problems in the RFID system is how to estimate the number of RFID tags up to the desired level of accuracy. In this paper, we present the framework of tag estimation algorithm for the collision-oblivious (CO) reader which can only decide whether the tag response is successful or not. Thus, the CO reader must rely on the success estimator to predict the RFID tag population. We propose two estimation algorithms to predict the number of RFID tags, named the memoryless success estimator (MSE) and the intersection-based success estimator (ISE). The MSE considers only the estimate obtained at the current inventory round, while the ISE finds an appropriate intersection interval of the existing estimates collected at every inventory round. Through the simulation results, we demonstrate that the ISE is a fast, accurate, and controllable estimator whose performance is close to that of the collision/idle estimators.
The Optimization of IEEE 802.15.4 PHY/MAC with Hardwired Low-MAC
Hwang, Tae-Ho ; Kim, Dong-Sun ; Won, Gwang-Ho ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 1B, 2010, Pages 95~105
IEEE 802.15.4 is the one of the protocols for radio communication in a personal area network. Since it aims to provide low cost and low power communication for ubiquitous communication, it requires high level of optimization in implementation. Recently, there have been many studies on the performance evaluation of IEEE 802.15.4 MAC protocol. According to the results of the studies, it is tendency that the transceiver is implemented to SoC type. On the implementation, the specific functions of MAC like CSMA-CA and MAC frame handling is designed to hardwired functions. In this paper, we implemented the protocol with hardwired low MAC (HL-MAC) and its state machine for the optimization from the physical layer and MAC layer. it has the characteristics of the small code size and the enhanced power consumption.
A Self-Deployment Scheme Using Improved Potential Field in Mobile Sensor Networks
Lee, Heon-Jong ; Kim, Yong-Hwan ; Han, Youn-Hee ; Jeong, Young-Sik ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 1B, 2010, Pages 106~116
Sensor deployment makes an effect on not only covering of the interesting area but also reliable data acquisition and efficient resource management of sensor, so that sensors must be deployed at their better place. In traditional static wireless sensor networks, however, it is impossible to deploy the sensors manually when they are distributed in unexploited, hostile, or disaster areas. Therefore, if each sensor has locomotion capability, it can re-deploy itself using the location information of neighbor sensors. In our previous study, we showed that moving sensors to the centroids of their Voronoi polygon is efficient for extending the coverage area. In this paper, we present an improved potential-field-based sensor self-deployment scheme by combining the centroid of Voronoi polygon with the traditional potential-field scheme. Simulation results show that our scheme can achieve higher coverage in shorter time and less movement than the traditional potential-field scheme.
Sampling Based Demodulation of RFID-PJM Mode
Youn, Jae-Hyuk ; Yang, Hoon-Gee ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 1B, 2010, Pages 117~124
This paper presents a sampling based demodulation method of PJM signal and a hardware structure to implement the proposed demodulator. The proposed method, using matched filters in the discrete time domain, can make decisions on 4 different sampled signals caused by MFM encoding. We mathematically derive the BER of the proposed demodulation method and prove its validity through simulation results.
A Lighting Control System of Underground Parking Lot Based on Ubiquitous Sensor Networks
Son, Byung-Rak ; Kim, Jung-Gyu ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 1B, 2010, Pages 125~135
Recently, the problem of global warming has issued seriously, so Green IT(Information Technology) using RFID/USN is concerned in order to solve environmental problems. In this paper, we implemented that public area like an underground parking lot could reduce unnecessary energy consumption used by lighting control system based on Ubiquitous Sensor Networks. The lighting control system for underground parking lot is comprised of intersection nodes for watching cars enter and leave, and light node for controlling light. It applies the routing protocol based on hierarchical cluster, hierarchical addressing method, and probability filtering method for the specific place like an underground parking lot. The result after experiments shows that the lighting control system could decrease electrical energy consumption to around 61.7%.
Comparison of Outage Probability Between Best-relay 2-hop Relaying and 3-hop Relaying
Youn, You-Sun ; Kim, Dong-Woo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 1B, 2010, Pages 136~143
In this paper, we investigate decode-and-forward (DF) relaying systems with a direct link between the source and the destination node. The objective of this paper is to determine the better relaying strategy between 3-hop DF relaying and dual-hop DF relaying with the best relay selection. Assuming Rayleigh fading channels, we present closed-form outage probability of the 3-hop relaying and the dual-hop relaying, respectively, and compare the performances by numerical investigation. Numerical results show that if the channel is poor, the outage performance of the 3-hop relaying is better than the dual-hop relaying.
Hop Based Gossiping Protocol (HoGoP) for Broadcasting Message Services in Wireless Sensor Networks
So, Won-Ho ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 1B, 2010, Pages 144~153
Flooding based routing protocols are usually used to disseminate information in wireless sensor networks. Those approaches, however, require message retransmissions to all nodes and induce huge collision rate and high energy consumption. In this paper, HoGoP (Hop based Gossiping Protocol) in which all nodes consider the number of hops from sink node to them, and decide own gossiping probabilities, is introduced. A node can decide its gossiping probability according to the required average reception percentage and the number of parent nodes which is counted with the difference between its hop and neighbors' ones. Therefore the decision of gossiping probability for network topology is adaptive and this approach achieves higher message reception percentage with low message retransmission than the flooding scheme. Through simulation, we compare the proposed protocol with some previous ones and evaluate its performance in terms of average reception percentage, average forwarding percentage, and forwarding efficiency. In addition, average reception percentage is analyzed according to the application requirement.
A Congestion Control Scheme Using Duty-Cycle Adjustment in Wireless Sensor Networks
Lee, Dong-Ho ; Chung, Kwang-Sue ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 1B, 2010, Pages 154~161
In wireless sensor networks, due to the many-to-one convergence of upstream traffic, congestion more probably appears. The existing congestion control protocols avoid congestion by controlling incoming traffic, but the duty-cycle operation of MAC(Medium Access Control) layer has not considered. In this paper, we propose DCA(Duty-cycle Based Congestion Avoidance), an energy efficient congestion control scheme using duty-cycle adjustment for wireless sensor networks. The DCA scheme uses both a resource control approach by increasing the packet reception rate of the receiving node and a traffic control approach by decreasing the packet transmission rate of the sending node for the congestion avoidance. Our results show that the DCA operates energy efficiently and achieves reliability by its congestion control scheme in duty-cycled wireless sensor networks.
Implementation and Empirical Evaluation of Indoor Localization in IEEE 802.15.4 Network
Kim, Tae-Woon ; Choi, Woo-Yeol ; Lim, Hyuk ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 1B, 2010, Pages 162~175
Currently, geographical information is interpreted and adopted in a wide range of context, and used for meeting diverse demands, such as, battlefield, traffic management, or public safety. With such an explosive increase of location-based applications, a considerable amount of research on the localization technique has been carried out. Among them, RSS (Received Signal Strength)-based approach is used especially for the indoor localization due to intrinsic limitations of the indoor environment. In this paper, we perform theoretical and empirical studies on enhancing the accuracy of the RSS-based localization on the IEEE 802.15.4 network. To this end, we set up an indoor testbed and implement a localization system on it. In addition to the theoretical analysis of the localization algorithm that we used, an empirical analysis on the effect of the factors which affect the accuracy of a localization system is carried out. Finally, we suggest some critical guidelines that should be considered for building a highly accurate localization system.
An Adaptive I/Q Diversity Combining Method for UHF RFID Reader Systems
Yoon, Chang-Seok ; Nam, Sung-Sik ; Cho, Sung-Ho ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 1B, 2010, Pages 176~182
In this paper, we propose an adaptive I/Q diversity combining scheme which reduces unnecessary computations while maintaining the required performance level. The system with the proposed scheme adaptively applies a proper combining scheme among the conventional selective scheme and combining scheme based on the comparison result between the estimated instantaneous SNR and the pre-determined threshold. As a result, the system with our proposed scheme can reduce the computational load while maintaining the required performance level. Some selected simulation results show that the system with the proposed scheme can decrease the unnecessary computations compared with the system with the conventional schemes while maintaining the required performance level.