Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Kyung-Hi Chang / Song Chong / Jong-Taek Oh / Jae-Jin Lee / Myung-Sik Yoo
Volume & Issues
Volume 39C, Issue 12 - Dec 2014
Volume 39B, Issue 12 - Dec 2014
Volume 39A, Issue 12 - Dec 2014
Volume 39C, Issue 11 - Nov 2014
Volume 39B, Issue 11 - Nov 2014
Volume 39A, Issue 11 - Nov 2014
Volume 39C, Issue 10 - Oct 2014
Volume 39B, Issue 10 - Oct 2014
Volume 39A, Issue 10 - Oct 2014
Volume 39C, Issue 9 - Sep 2014
Volume 39B, Issue 9 - Sep 2014
Volume 39A, Issue 9 - Sep 2014
Volume 39C, Issue 8 - Aug 2014
Volume 39B, Issue 8 - Aug 2014
Volume 39A, Issue 8 - Aug 2014
Volume 39C, Issue 7 - Jul 2014
Volume 39B, Issue 7 - Jul 2014
Volume 39A, Issue 7 - Jul 2014
Volume 39C, Issue 6 - Jun 2014
Volume 39B, Issue 6 - Jun 2014
Volume 39A, Issue 6 - Jun 2014
Volume 39C, Issue 5 - May 2014
Volume 39B, Issue 5 - May 2014
Volume 39A, Issue 5 - May 2014
Volume 39C, Issue 4 - Apr 2014
Volume 39B, Issue 4 - Apr 2014
Volume 39A, Issue 4 - Apr 2014
Volume 39C, Issue 3 - Mar 2014
Volume 39B, Issue 3 - Mar 2014
Volume 39A, Issue 3 - Mar 2014
Volume 39C, Issue 2 - Feb 2014
Volume 39B, Issue 2 - Feb 2014
Volume 39A, Issue 2 - Feb 2014
Volume 39C, Issue 1 - Jan 2014
Volume 39B, Issue 1 - Jan 2014
Volume 39A, Issue 1 - Jan 2014
Selecting the target year
I3A Framework of Defense Network Centric Based C2 Facilities
Kim, Young-Dong ; Lee, Tae-Gong ; Park, Bum-Shik ;
The Journal of Korean Institute of Communications and Information Sciences, volume 39C, issue 8, 2014, Pages 615~625
DOI : 10.7840/kics.2014.39C.8.615
Ministry of National Defense, MND, established a "Master Plan of Military Facility" in 2010 based on the defense reform to prepare for future war. It was a plan for consolidating small military facilities into battalion units, reflecting on and preparing for the needs of various changes in defense environment as well as balanced growth of ROK Army, Navy, and Air Force. However, to move forward with "Military Facility Master Plan," current design criteria for military facilities need to be revised to be enacted due to numerous calculation errors in facility footprints because of the absence of a sound facility criteria. Because the future war environment will be changed from Platform basis to Network Centric Warfare basis, Command & Control capability of C4I systems is getting more important. Therefore, Successful mission accomplishment can be secured by convergence of facility and military Information Technology(IT). So, MND should quickly prepare for the operational guidance, design criteria and policy that are suitable for Network Centric Warfare accomplishment, and implement infrastructure of IT and installation of C2 facility in conjunction with consolidation movement of military facilities. In this paper, we propose the defense I3A framework in order to solve this problem.
REST-Based Open API Ontology Modeling and Automatic Mash-Up Method Using In/Output Properties
Jung, Wan ; Kim, Hwa Sung ;
The Journal of Korean Institute of Communications and Information Sciences, volume 39C, issue 8, 2014, Pages 626~636
DOI : 10.7840/kics.2014.39C.8.626
Existing mash-up services could not be offered in accordance with the purposes and preferences of all users because they are created by the service developers. Therefore some precedent studies, which enable for individual users to create their own mash-up services automatically, have been conducted. In order to create automatic mash-up services, it is important to find elements to distinguish the possibility of mash-up. The precedent studies determine the possibility of mash-up through comparison of the similarity between input/output parameter names in the REST-based Open API. Only using the similarity to distinguish the possibility of mash-up, however, some unintended mash-up results can be occurred because the property of input/output parameters are not considered. In this paper, we propose the method considering the properties of input/output parameters to decrease the unintended mash-up results and extend ontology proposed in precedent studies by applying this property. And we propose the algorithm to distinguish the possibility of mash-up using the expanded ontology and describe the result of automatic mash-up services.
Tanner Graph Based Low Complexity Cycle Search Algorithm for Design of Block LDPC Codes
Myung, Se Chang ; Jeon, Ki Jun ; Ko, Byung Hoon ; Lee, Seong Ro ; Kim, Kwang Soon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 39C, issue 8, 2014, Pages 637~642
DOI : 10.7840/kics.2014.39C.8.637
In this paper, we propose a efficient shift index searching algorithm for design of the block LDPC codes. It is combined with the message-passing based cycle search algorithm and ACE algorithm. We can determine the shift indices by ordering of priority factors which are effect on the LDPC code performance. Using this algorithm, we can construct the LDPC codes with low complexity compare to trellis-based search algorithm and save the memory for storing the parity check matrix.
Analysis of Localization Scheme for Ship Application Using Received Signal Strength
Lee, Jung-Kyu ; Lee, Seong Ro ; Kim, Seong-Cheol ;
The Journal of Korean Institute of Communications and Information Sciences, volume 39C, issue 8, 2014, Pages 643~650
DOI : 10.7840/kics.2014.39C.8.643
Recently, the wireless communication applications are studied in various environment by the development of short range communication system like wireless sensor networks. This paper presents the analysis of localization schemes for ship application using received signal strength. The localization schemes using received signal strength from wireless networks are classified under two methods, which are Range based method and Range free method. Range based methods estimate the location with least square estimation based on estimated distance using path-loss model. Range free methods estimated the location with the information of anchor nodes linked to target. Simulation results show the appropriate localization scheme for each cabin environments based on the empirical path-loss model in warship's internal space.
Rate-Aware Two-Way Relaying for Low-Cost Ship-to-Ship Communications
Wang, Jinsoo ; Kim, Sun Yong ; Jeong, Min-A ; Lee, Seong Ro ; Kim, Yun Hee ;
The Journal of Korean Institute of Communications and Information Sciences, volume 39C, issue 8, 2014, Pages 651~659
DOI : 10.7840/kics.2014.39C.8.651
In this paper, we consider a two way relay network for ship-to-ship communications in a fleet, where two communicating ships exchange the information with the help of a multi-antenna relay ship. For the network, we propose a rate-aware three-phase analog network coding to improve the reliability of the information exchange with asymmetric rates. The proposed scheme allows low-complex implementation of the relay without channel estimation by generating an improved analog network coded signal with the orthogonally received signals from two ships by using only the received signal power at each antenna. In addition, the proposed scheme reduces outages in the data exchange at asymmetric rates by adopting a rate-aware relay power allocation, which is confirmed by evaluating the outage performance via simulation.
Proposal of USN Configuratation and Routing Scheme Inside a Ship
Lee, Seong Ro ; Jeong, Min-A ; Kim, Yeongeun ; Min, Sang-Won ;
The Journal of Korean Institute of Communications and Information Sciences, volume 39C, issue 8, 2014, Pages 660~666
DOI : 10.7840/kics.2014.39C.8.660
In this paper, we consider a classification criteria of sensor nodes based on equipment function, and propose a routing search algorithm between node when an IP-USN is applied inside a ship. whereas a tree-type routing algorithm is applied to the limited mobile enviroment, such as engine room or machine room, a mesh-type routing alogrithm is to free mobile enviroment, such as passager corridor liviing quarters or restanrats areas. For mesh-type routing, it is necessary to maintain a seamless route path between a sink node and sensor nodes for which we consider a novel message exchange periodically. We proposed a new message, RDES message, which is issued periodically to update the topology of sensor node and check a connectivity between nodes.
LTE Femtocell Network Configuration and an Off-Load Scheme According to Traffic Type within Smart Shipyard Area
Kim, Su-Hyun ; Jung, Min-A ; Lee, Seong Ro ; Min, Sang-Won ;
The Journal of Korean Institute of Communications and Information Sciences, volume 39C, issue 8, 2014, Pages 667~673
DOI : 10.7840/kics.2014.39C.8.667
In a smart shipyard area, it is possible to integrate a variety of ship modules from separate sites into a final ship construction by using mobile applications. In this paper, we proposed the LTE femtocell network configuration which is applicable to sub shipyard, the traffic exchange method with shipyard headquarter and offload method to separate the general traffic. We defined the mode change in a femtocell gateway for supporting offload for general traffic between the main server in shipyard headquarter and sub shipyard, the offload data managements and message definition. We check the transmitted/received message flow in the wireless link, and consider the performance of the proposed method using state the transition diagram. It is expected that our results can improve the productivity within a smart shipyard by mobile communications and LTE femtocell network.
NEMO Support Scheme within PMIPv6 for Supporting Network Mobility in Harbor Area
Min, Sang-Won ; Han, Kyeong-Il ; Jeong, Min-A ; Lee, Seong Ro ;
The Journal of Korean Institute of Communications and Information Sciences, volume 39C, issue 8, 2014, Pages 674~680
DOI : 10.7840/kics.2014.39C.8.674
In this paper, as one of the fusion of IT and ocean technology, we propose a scheme to support NEMO in a harbor area network to provide network mobility for passengers, distribution as well as give a connection to an MN from an outside network. In a harbor area under PMIPv6 with NEMO support, a problem could be occurred due to overlapping HA/LMA tunnels and duplicate BCE fields. To Solve these problems, we consider the existing mobility option and add an optional field in the PBU message, which can notify the LMA and HA for either an initial connection or handover request. This procedure can reduce some overlapped steps of binding procedure. Hence, our proposed scheme could reduce an amount of delay and save the processing resource in the harbor area under PMIPv6 with NEMO support.
Multi-Device-to-Multi-Device Communication for Efficient Contents Distribution on Board the Ship
You, Dongho ; Kwon, Eunjeong ; Kim, Dong Ho ; Lee, Seong Ro ;
The Journal of Korean Institute of Communications and Information Sciences, volume 39C, issue 8, 2014, Pages 681~687
DOI : 10.7840/kics.2014.39C.8.681
Internet traffic is rapidly increasing due to the spread of personal smart devices. It causes serious burden on base stations and access points which are installed in buildings, buses, trains, and ships. We consider a communication scenario aboard a cruise ship and propose efficient contents distribution schemes to alleviate the burden of access points with multi-device-to-multi-device(MD2MD) communication. The proposed transmission method is based on the hybrid STBC-SM scheme. We compare the error performance of MD2MD communication system on the cruise ship using space-time block coding (STBC) scheme, spatial multiplexing (SM) scheme. The proposed MD2MD communication system is expected to adopt in the ship-area-network (SAN) with efficient contents distribution and reliable communication.
Collision Avoidance Method for Coexistence between Relay-Based Multi-Hop UWB System
Kim, Jin-Woo ; Park, Jong-Hwan ; Lee, Seong Ro ;
The Journal of Korean Institute of Communications and Information Sciences, volume 39C, issue 8, 2014, Pages 688~695
DOI : 10.7840/kics.2014.39C.8.688
In a small wireless environment, such as your home or office, a various network using WiMedia PHY can be mixed. Because these networks operate independently for each application, data conflict can occur between adjacent networks. To avoid data conflict, the resource in a different time zone can be utilized. However, if devices in a network increase, available resources in the network decrease, and then the lack of resources necessary to provide service can occur. To solve this problem, we propose collision avoidacne scheme for coexistence of various UWB systems. In this paper, we evaluate the performance of the proposed scheme through simulation.
Relay Communication Scheme for Conflict Avoidance in Wireless USB System
Kim, Jin-Woo ; Kim, Kyung-Ho ; Lee, Seong Ro ;
The Journal of Korean Institute of Communications and Information Sciences, volume 39C, issue 8, 2014, Pages 696~707
DOI : 10.7840/kics.2014.39C.8.696
In this paper, firstly, performance degradation due to the Private Distributed Reservation Protocol (DRP) conflict problem caused by devices' mobility is analyzed. And a novel relay transmission protocol combined with Private DRP conflict resolution is proposed to overcome the performance degradation at Private DRP conflicts. In order to give the loser device due to Private DRP conflicts another chance to maintain resources, the proposed relay transmission protocol executed at each device helps the loser device reserve another indirect link maintaining the required resources via a relay node.
Efficient Anomaly Detection Through Confidence Interval Estimation Based on Time Series Analysis
Kim, Yeong-Ju ; Heo, You-Kyung ; Park, Jin-Gwan ; Jeong, Min-A ;
The Journal of Korean Institute of Communications and Information Sciences, volume 39C, issue 8, 2014, Pages 708~715
DOI : 10.7840/kics.2014.39C.8.708
In this paper, we suggest a method of realtime confidence interval estimation to detect abnormal states of sensor data. For realtime confidence interval estimation, the mean square errors of the exponential smoothing method and moving average method, two of the time series analysis method, where compared, and the moving average method with less errors was applied. When the sensor data passes the bounds of the confidence interval estimation, the administrator is notified through alarming. As the suggested method is for realtime anomaly detection in a ship, an Android terminal was adopted for better communication between the wireless sensor network and users. For safe navigation, an administrator can make decisions promptly and accurately upon emergency situation in a ship by referring to the anomaly detection information through realtime confidence interval estimation.
Design of the Specific IP Access Deny for the Database
Jang, Seung-Ju ; Kim, Sung-Jin ;
The Journal of Korean Institute of Communications and Information Sciences, volume 39C, issue 8, 2014, Pages 716~721
DOI : 10.7840/kics.2014.39C.8.716
This paper proposes how to prevent of vulnerability from IP address attack of Oracle DB by C program environments. An attacker may try to login DB by connectng remote IP address. Recently an attacker use foreign IP address and try to connect to DB using known DB account. Therefore, DB data is frequently disclosed. I propose a new idea that develops specific IP address blocking module in C program in the Oracle DB. By this module, we can use the Oracle DB safely.
Empirical Study on Performance and Power Consumption in Multi-Core and Multi-Threaded Smartphones
Lee, Woonghee ; Kim, Hwangnam ;
The Journal of Korean Institute of Communications and Information Sciences, volume 39C, issue 8, 2014, Pages 722~730
DOI : 10.7840/kics.2014.39C.8.722
Due to the advance of hardware, various devices have mobility features, and many applications need the data transmission. In addition, it is essential for latest smartphones to utilize multi-cores and multi-threads because of the enhancement of Application Processor. Therefore, this paper analyzes the performance/power consumption according to transmission rate, the number of cores, and that of threads in the system that is supposed to conduct data transmission and processing simultaneously. Through the analysis, this paper provides a direction for the proper number of threads in terms of performance improvement and efficient power consumption.
Detection of Crowd Escape Behavior in Surveillance Video
Park, Junwook ; Kwak, Sooyeong ;
The Journal of Korean Institute of Communications and Information Sciences, volume 39C, issue 8, 2014, Pages 731~737
DOI : 10.7840/kics.2014.39C.8.731
This paper presents abnormal behavior detection in crowd within surveillance video. We have defined below two cases as a abnormal behavior; first as a sporadically spread phenomenon and second as a sudden running in same direction. In order to detect these two abnormal behaviors, we first extract the motion vector and propose a new descriptor which is combined MHOF(Multi-scale Histogram of Optical Flow) and DCHOF(Directional Change Histogram of Optical Flow). Also, binary classifier SVM(Support Vector Machine) is used for detection. The accuracy of the proposed algorithm is evaluated by both UMN and PETS 2009 dataset and comparisons with the state-of-the-art method validate the advantages of our algorithm.
Linear SVM-Based Android Malware Detection and Feature Selection for Performance Improvement
Kim, Ki-Hyun ; Choi, Mi-Jung ;
The Journal of Korean Institute of Communications and Information Sciences, volume 39C, issue 8, 2014, Pages 738~745
DOI : 10.7840/kics.2014.39C.8.738
Recently, mobile users continuously increase, and mobile applications also increase As mobile applications increase, the mobile users used to store sensitive and private information such as Bank information, location information, ID, password on their mobile devices. Therefore, recent malicious application targeted to mobile device instead of PC environment is increasing. In particular, since the Android is an open platform and includes security vulnerabilities, attackers prefer this environment. This paper analyzes the performance of malware detection system applying linear SVM machine learning classifier to detect Android malware application. This paper also performs feature selection in order to improve detection performance.
Structure of Dual Polarized System for Wireless Communication
Kim, Jaekil ; Gwak, Gye Seok ; Ahn, Jae Min ;
The Journal of Korean Institute of Communications and Information Sciences, volume 39C, issue 8, 2014, Pages 746~755
DOI : 10.7840/kics.2014.39C.8.746
In this paper, we propose the structure of a dual polarized system for a wireless communication. The proposed dual polarized antenna is formed by one vertical antenna and two horizontal antennas that are orthogonal to each other. Vertical and horizontal polarized antennas transmit different signals, but two orthogonal horizontal polarized antennas transmit the same data signals. So, the signals of the proposed dual polarized system construct two dual-polarization planes. And, only one dual-polarization plane with a large signal power is selected at the side of a receiver. The simulation results show that the proposed dual polarized system could obtain a higher capacity compared to an ordinary
MIMO (Multi-input Multi-output) system.