Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Volume & Issues
Volume 35, Issue 12C - Dec 2010
Volume 35, Issue 12B - Dec 2010
Volume 35, Issue 12A - Dec 2010
Volume 35, Issue 11C - Nov 2010
Volume 35, Issue 11B - Nov 2010
Volume 35, Issue 11A - Nov 2010
Volume 35, Issue 10C - Oct 2010
Volume 35, Issue 10B - Oct 2010
Volume 35, Issue 10A - Oct 2010
Volume 35, Issue 9C - Sep 2010
Volume 35, Issue 9B - Sep 2010
Volume 35, Issue 9A - Sep 2010
Volume 35, Issue 8C - Aug 2010
Volume 35, Issue 8B - Aug 2010
Volume 35, Issue 8A - Aug 2010
Volume 35, Issue 7C - Jul 2010
Volume 35, Issue 7B - Jul 2010
Volume 35, Issue 7A - Jul 2010
Volume 35, Issue 6C - Jun 2010
Volume 35, Issue 6B - Jun 2010
Volume 35, Issue 6A - Jun 2010
Volume 35, Issue 5C - May 2010
Volume 35, Issue 5B - May 2010
Volume 35, Issue 5A - May 2010
Volume 35, Issue 4C - Apr 2010
Volume 35, Issue 4B - Apr 2010
Volume 35, Issue 4A - Apr 2010
Volume 35, Issue 3C - Mar 2010
Volume 35, Issue 3B - Mar 2010
Volume 35, Issue 3A - Mar 2010
Volume 35, Issue 2C - Feb 2010
Volume 35, Issue 2B - Feb 2010
Volume 35, Issue 2A - Feb 2010
Volume 35, Issue 1C - Jan 2010
Volume 35, Issue 1B - Jan 2010
Volume 35, Issue 1A - Jan 2010
Selecting the target year
A Design and Implementation of Digital Vessel Context Diagnosis System Based on Context Aware
Song, Byoung-Ho ; Choi, Myeong-Soo ; Kwon, Jang-Woo ; Lee, Sung-Ro ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 6B, 2010, Pages 859~866
Digital vessels can occur large a disaster at sea because vessels in fire and collision in case of certain unforeseen circumstances. In this paper, We propose digital vessel context monitoring system through risk analysis. We propose environment information analysis system using wireless sensor that have to acquire marine environment and context of marine digital vessel. For conducting simulation, we chose 300 data sets to train the neural network. As a result, we obtained about 96% accuracy for fire risk context and we obtained 88.7% accuracy for body of vessel risk context. To improve the accuracy of the system, we implement a FEC (Forward Error Correction) block. We implemented digital vessel context monitoring system that transmitted to diagnosis result in CDMA.
A Reliable Transmission and Buffer Management Techniques of Event-driven Data in Wireless Sensor Networks
Kim, Dae-Young ; Cho, Jin-Sung ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 6B, 2010, Pages 867~874
Since high packet losses occur in multi-hop transmission of wireless sensor networks, reliable data transmission is required. Especially, in case of event-driven data, a loss recovery mechanism should be provided for lost packets. Because retransmission for lost packets is requested to a node that caches the packets, the caching node should maintains all of data for transmission in its buffer. However, nodes of wireless sensor networks have limited resources. Thus, both a loss recovery mechanism and a buffer management technique are provided for reliable data transmission in wireless sensor networks. In this paper, we propose a buffer management technique at a caching position determined by a loss recovery mechanism. The caching position of data is determined according to desirable reliability for the data. In addition, we validate the performance of the proposed method through computer simulations.
SN-Protected Network Entry Process for IEEE 802.16 Mesh Network
Lixiang, Lin ; Yoo, Sang-Jo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 6B, 2010, Pages 875~887
The workgroup of IEEE 802 proposed the IEEE 802.16 standard, also known as WiMAX, to provide broadband wireless access (BWA). The standard specifies two operational modes, one is popular PMP mode, and the other is optional mesh mode. In the mesh mode, the network entry process-NetEntry is the pivotal procedure for mesh network topology formulation and thus, influences the accessibility of whole mesh network. Unfortunately, the NetEntry process suffers from the hidden neighbor problem, in which new neighborship emerges after a new node comes in and results in possible collisions. In this paper, we propose a new SN-protected NetEntry process to address the problem. Simulation results show that the new proposed NetEntry process is more stable compared with the standard-based NetEntry process.
Fingerprinting Bayesian Algorithm for Indoor Location Determination
Lee, Jang-Jae ; Kwon, Jang-Woo ; Jung, Min-A ; Lee, Seong-Ro ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 6B, 2010, Pages 888~894
For the indoor positioning, wireless fingerprinting is most favorable because fingerprinting is most accurate among the technique for wireless network based indoor positioning which does not require any special equipments dedicated for positioning. The deployment of a fingerprinting method consists of off-line phase and on-line phase and more efficient and accurate methods have been studied. This paper proposes a bayesian algorithm for wireless fingerprinting and indoor location determination using fuzzy clustering with bayesian learning as a statistical learning theory.
Analysis of a Queueing Model with Combined Control of Arrival and Token Rates
Choi, Doo-Il ; Kim, Tae-Sung ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 6B, 2010, Pages 895~900
As the diverse telecommunication services have been developed, network designers need to prevent congestion which may be caused by properties of timecorrelation and burstiness, and unpredictable statistical fluctuation of traffic streams. This paper considers the leaky bucket scheme with combined control of arrival and token rates, in which the arrival rate and the token generation interval are controlled according to the queue length. By using the embedded Markov chain and the supplementary variable methods, we obtain the queue length distribution as well as the loss probability and the mean waiting time.
A design and implementation of a priority and context-aware event ID for U-City integrated urban management platform in U-City
Song, Kyu-Seog ; Ryou, Jae-Cheol ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 6B, 2010, Pages 901~907
This paper proposes a standard method for linking data between the U-City Integrated Urban Management Platform and u-service systems through systemization of event identification and standardization of event priority. By applying the proposed method, the incoming events to the Management Platform are listed and processed according to their priority of urgency. The application of the systemized event ID and standardized event priority enables prompt counter-measures against urban emergencies and disasters, which improves the efficiency of business processes by reducing the time and cost to complete required actions.
Effects of User Propensity on Total Charges of Mobile Communication: The Role of Mobile Services
Ahn, Joong-Ho ; Baek, Hyun-Mi ; Lim, Hyeo-Seok ; Cheon, Eun-Young ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 6B, 2010, Pages 908~920
In recent years, mobile phone market is saturated in number of user term. Associated service providers struggle to provide various mobile services such as Internet, e-commerce, game, music etc. to increase ARPU (average revenue per user) instead. In this study we explore the factors which affect price tabs of mobile communication. As a conceptual foundation, this study introduces user factors-users' propensity to use mobile phones-as independent variables and mobile service functions as mediating variables. The research model was phones-as independent variables and mobile service functions as mediating variables. The research model was tested with data from Web-based survey of 1,500 mobile users and analyzed by structural equation modeling (SEM). Our results suggest that user factors impact the usage of mobile service functions and mobile service functions for information and convenience are positively related to price tabs of mobile communication. Implications for mobile service providers and policy makers are discussed.
A Study on Simulation and Performance Evaluation of Group Communication over Mobile Wimax
Oh, Moon-Kyoon ; Kim, Jae-Myong ; Yoo, Dae-Seung ; Kim, Dae-Young ; Thinh, Vu Manh ; Ro, Soong-Hwan ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 6B, 2010, Pages 921~929
Group communication that involves the setup of a list of users has been a topic of interest in mobile industry. Push to Talk over Cellular (PoC), a group communication service for cellular phone network, is a type of half duplex communications that allows a single person to reach an active talk group without making several calls, but a single button press. Based on this service, we build a new protocol called Push to Talk over Mobile Wimax that uses group communication service in 802.16e network. Also, weper formed simulation to verify and evaluate performance of the designed service in Mobile Wimax network. From the results of performance evaluation, network administrators can evaluate the stability of network and make a better of network's shortcoming and have decision to build the robust network.
A Study on Controlling IPTV Interface Based on Tracking of Face and Eye Positions
Lee, Won-Oh ; Lee, Eui-Chul ; Park, Kang-Ryoung ; Lee, Hee-Kyung ; Park, Min-Sik ; Lee, Han-Kyu ; Hong, Jin-Woo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 6B, 2010, Pages 930~939
Recently, many researches for making more comfortable input device based on gaze detection have been vigorously performed in human computer interaction. However, these previous researches are difficult to be used in IPTV environment because these methods need additional wearing devices or do not work at a distance. To overcome these problems, we propose a new way of controlling IPTV interface by using a detected face and eye positions in single static camera. And although face or eyes are not detected successfully by using Adaboost algorithm, we can control IPTV interface by using motion vectors calculated by pyramidal KLT (Kanade-Lucas-Tomasi) feature tracker. These are two novelties of our research compared to previous works. This research has following advantages. Different from previous research, the proposed method can be used at a distance about 2m. Since the proposed method does not require a user to wear additional equipments, there is no limitation of face movement and it has high convenience. Experimental results showed that the proposed method could be operated at real-time speed of 15 frames per second. Wd confirmed that the previous input device could be sufficiently replaced by the proposed method.
A Design and Implementation of Parking Guidance and Information System in u-City
Song, Kyu-Seog ; Ryou, Jae-Cheol ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 6B, 2010, Pages 940~947
A Parking Guidance and Information Service System is to provide real-time parking-information and the shortest parking-path for increasing the user's convenience, relieving traffic congestion, reducing illegal parking, and maximizing the efficiency of parking management. This paper discusses the result of the needs analysis, design, and implementation of the Parking Guidance and Information Service System. Furthermore, it analyzes and compares the parking time and vehicle turnover rate before and after the system installation.
Radiation-Induced Soft Error Detection Method for High Speed SRAM Instruction Cache
Kwon, Soon-Gyu ; Choi, Hyun-Suk ; Park, Jong-Kang ; Kim, Jong-Tae ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 6B, 2010, Pages 948~953
In this paper, we propose multi-bit soft error detection method which can use an instruction cache of superscalar CPU architecture. Proposed method is applied to high-speed static RAM for instruction cache. Using 1D parity and interleaving, it has less memory overhead and detects more multi-bit errors comparing with other methods. It only detects occurrence of soft errors in static RAM. Error correction is treated like a cache miss situation. When soft errors are occurred, it is detected by 1D parity. Instruction cache just fetch the words from lower-level memory to correct errors. This method can detect multi-bit errors in maximum 4
Fast Stream Cipher AA32 for Software Implementation
Kim, Gil-Ho ; Park, Chang-Soo ; Kim, Jong-Nam ; Cho, Gyeong-Yeon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 6B, 2010, Pages 954~961
Stream cipher was worse than block cipher in terms of security, but faster in execution speed as an advantage. However, since so far there have been many algorithm researches about the execution speed of block cipher, these days, there is almost no difference between them in the execution speed of AES. Therefore an secure and fast stream cipher development is urgently needed. In this paper, we propose a 32bit output fast stream cipher, AA32, which is composed of ASR(Arithmetic Shifter Register) and simple logical operation. Proposed algorithm is a cipher algorithm which has been designed to be implemented by software easily. AA32 supports 128bit key and executes operations by word and byte unit. As Linear Feedback Sequencer, ASR 151bit is applied to AA32 and the reduction function is a very simple structure stream cipher, which consists of two major parts, using simple logical operations, instead of S-Box for a non-linear operation. The proposed stream cipher AA32 shows the result that it is faster than SSC2 and Salsa20 and satisfied with the security required for these days. Proposed cipher algorithm is a fast stream cipher algorithm which can be used in the field which requires wireless internet environment such as mobile phone system and real-time processing such as DRM(Digital Right Management) and limited computational environments such as WSN(Wireless Sensor Network).
Patient Authentication System for Medical Information Security using RFID
Yoon, Eun-Jun ; Yoo, Kee-Young ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 6B, 2010, Pages 962~969
Recently, RFID technology can successfully be used to reduce medical errors. This technology can aid in the accurate matching of patients with their medications and treatments. The enthusiasm for using RFID technology in medical settings has been tempered by privacy concerns. In this paper, we propose a secure and efficient RFID authentication system to not only authenticate patients' authenticity but also protect patients' personal medical informations. The proposed system consists of RFID-based patient authentication protocol and database security protocol. As a result, since the proposed RFID authentication system provides strong security and efficiency, it can be used practically for patient authentication and personal medical information protection on the high technology medical environments such as u-Hospital and u-Healthcare.
A Study on Advanced RF4CE Key Agreement for Device Convergence Security
Shon, Tae-Shik ; Koo, Bon-Hyun ; Han, Kyu-Suk ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 6B, 2010, Pages 970~976
Platform convergence originated from the convergence of broadcast and telecommunication is making rapid progress including IT and not-IT fields in order to provide a variety of converged services, S/W eco-system construction, and so on. With the advent of convergence environment, IEEE 802.15.4-based RF4CE technology is rising because of creating momentum for the market using converged connectivity between home and office devices as well as all around located devices. In this paper, we present enhanced RF4CE key seed distribution approach in order to provide efficient connection and control between devices. The proposed approach consists of device mutual authentication, initial vector assignment, and two-phase key seed distribution. Moreover, we make a development real RF4CE test board and its key agreement simulator to verify the proposed approach.
Military Group Key Management for Mobile and Secure Multicast Communications
Jung, Youn-Chan ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 6B, 2010, Pages 977~983
In mobile and secure military networks, full-meshed IPSec tunnels, which do correspond to not physical links but logical links between each IPSec device and its peer, are required to provide multicast communications. All IPSec devices need support in changing IPSec tunnels by a way of using a multicast group key which is updated dynamically. Tactical terminals, which often constitute a group, need also secure multicast communications in the same group members. Then, the multicast group key is required to be updated dynamically in order to support group members' mobility. This paper presents challenging issues of designing a secure and dynamic group key management of which concept is based on the Diffie-Hellman (DH) key exchange algorithm and key trees. The advantage of our dynamic tree based key management is that it enables the dynamic group members to periodically receive status information from every peer members and effectively update a group key based on dynamically changing environments.
New Efficient Design of Reed-Solomon Encoder, Which has Arbitrary Parity Positions, without Galois Field Multiplier
An, Hyeong-Keon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 6B, 2010, Pages 984~990
In Current Digital
Devices(Communication, Computer, Consumer electronic devices), Reed-Solomon encoder is essentially used. For example we should use RS encoder in DSP LSI of CDMA Mobile and Base station modem, in controller LSI of DVD Recorder and that of computer memory(HDD or SSD memory). In this paper, we propose new economical multiplierless (also without divider) RS encoder design method. The encoder has Arbitrary parity positions.