Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Volume & Issues
Volume 40, Issue 12 - Dec 2015
Volume 40, Issue 11 - Nov 2015
Volume 40, Issue 10 - Oct 2015
Volume 40, Issue 9 - Sep 2015
Volume 40, Issue 8 - Aug 2015
Volume 40, Issue 7 - Jul 2015
Volume 40, Issue 6 - Jun 2015
Volume 40, Issue 5 - May 2015
Volume 40, Issue 4 - Apr 2015
Volume 40, Issue 3 - Mar 2015
Volume 40, Issue 2 - Feb 2015
Volume 40, Issue 1 - Jan 2015
Selecting the target year
Design of a Low Power 10bit Flash SAR A/D Converter
Lee, Gi-Yoon ; Kim, Jeong-Heum ; Yoon, Kwang-Sub ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 4, 2015, Pages 613~618
DOI : 10.7840/kics.2015.40.4.613
This paper proposed a low power CMOS Flash-SAR A/D converter which consists of a Flash A/D converter for 2 most significant bits and a SAR A/D converter with capacitor D/A converter for 8 least significant bits. Employment of a Flash A/D converter allows the proposed circuit to enhance the conversion speed. The SAR A/D converter with capacitor D/A converter provides a low power dissipation. The proposed A/D converter consumes
with a power supply of 1V under a
CMOS process and achieves 9.16 effective number of bits for sampling frequency up to 2MHz. Therefore it results in 120fJ/step of Figure of Merit (FoM).
Speech Basis Matrix Using Noise Data and NMF-Based Speech Enhancement Scheme
Kwon, Kisoo ; Kim, Hyung Young ; Kim, Nam Soo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 4, 2015, Pages 619~627
DOI : 10.7840/kics.2015.40.4.619
This paper presents a speech enhancement method using non-negative matrix factorization (NMF). In the training phase, each basis matrix of source signal is obtained from a proper database, and these basis matrices are utilized for the source separation. In this case, the performance of speech enhancement relies heavily on the basis matrix. The proposed method for which speech basis matrix is made a high reconstruction error for noise signal shows a better performance than the standard NMF which basis matrix is trained independently. For comparison, we propose another method, and evaluate one of previous method. In the experiment result, the performance is evaluated by perceptual evaluation speech quality and signal to distortion ratio, and the proposed method outperformed the other methods.
Channel State Information Feedback Scheme Based on Non-Convex Compressed Sensing for Massive MIMO Systems
Kim, Jung-Hyun ; Kim, Inseon ; Park, Jin Soo ; Song, Hong-Yeop ; Han, Sung Woo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 4, 2015, Pages 628~636
DOI : 10.7840/kics.2015.40.4.628
In this paper, we propose a non-convex compressed sensing(NCCS)-based channel state information(CSI) feedback scheme for massive multiple-input multiple-output(MIMO) systems. Combining the random vector quantization(RVQ), the proposed scheme permits a transmitter to obtain CSI with acceptable accuracy under substantially reduced feedback load. Furthermore, it recovers CSI from fewer measurements than that of existing convex compressed sensing(CCS)-based schemes even if the measurements are inaccurate and incomplete. Simulation results show that the proposed scheme achieves higher throughput than both existing CCS-based feedback scheme and random vector quantization(RVQ) feedback scheme with the same feedback load.
New Spatial Modulation Scheme based on Quaternary Quasi-Orthogonal Sequence for 8 Transmit Antennas
Shang, Yulong ; Kim, Hojun ; Kim, Cheolsung ; Jung, Taejin ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 4, 2015, Pages 637~645
DOI : 10.7840/kics.2015.40.4.637
Recently, a spatial modulation (SM) scheme achieving high throughput based on quaternary quasi-orthogonal sequences (Q-QOSs), referred to as Q-QOS-SM, is presented for $N_t
Dynamic Feedback Selection Scheme for User Scheduling in Multi-user MIMO Systems
Kim, I-Cheon ; Kang, Chung G. ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 4, 2015, Pages 646~652
DOI : 10.7840/kics.2015.40.4.646
In this paper, the system-level performance is evaluated for the feedback scheme on the pre-coding matrix index (PMI) and channel quality indication (CQI), which are required for user selection in the multi-user MIMO system. Our analysis demonstrates that the number of users, the number of selected users, and codebook size are the key factors that govern the performance of the best companion grouping (BCG)-based user scheduling. Accordingly, we have confirmed that the probability of forming the co-scheduled user group is determined by these factors, which implies that the number of PMI`s and codebook size can be dynamically determined so as to maximize the average system throughput as the number of users varies in the cell.
Reinforcement Learning Approach for Resource Allocation in Cloud Computing
Choi, Yeongho ; Lim, Yujin ; Park, Jaesung ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 4, 2015, Pages 653~658
DOI : 10.7840/kics.2015.40.4.653
Cloud service is one of major challenges in IT industries. In cloud environment, service providers predict dynamic user demands and provision resources to guarantee the QoS to cloud users. The conventional prediction models guarantee the QoS to cloud user, but don`t guarantee profit of service providers. In this paper, we propose a new resource allocation mechanism using Q-learning algorithm to provide the QoS to cloud user and guarantee profit of service providers. To evaluate the performance of our mechanism, we compare the total expense and the VM provisioning delay with the conventional techniques with real data.
A Joint Sub-Packet Level Network Coding and Channel Coding
Kim, Seong-Yeon ; Shin, Jitae ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 4, 2015, Pages 659~665
DOI : 10.7840/kics.2015.40.4.659
Recent studies on network coding scheme for increasing transmission efficiency of the network has been actively conducted. In this paper, we apply RLNC in sub-packet unit and propose a joint scheme of sub-packet level network coding and LDPC code. The proposed method can have similar ability of network coding and obtain further error correction capability. The simulation results show that the proposed one enhances error correction capability compared to the case using only LDPC when extra packets are received.
Automatic Generation of Snort Content Rule for Network Traffic Analysis
Shim, Kyu-Seok ; Yoon, Sung-Ho ; Lee, Su-Kang ; Kim, Sung-Min ; Jung, Woo-Suk ; Kim, Myung-Sup ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 4, 2015, Pages 666~677
DOI : 10.7840/kics.2015.40.4.666
The importance of application traffic analysis for efficient network management has been emphasized continuously. Snort is a popular traffic analysis system which detects traffic matched to pre-defined signatures and perform various actions based on the rules. However, it is very difficult to get highly accurate signatures to meet various analysis purpose because it is very tedious and time-consuming work to search the entire traffic data manually or semi-automatically. In this paper, we propose a novel method to generate signatures in a fully automatic manner in the form of sort rule from raw packet data captured from network link or end-host. We use a sequence pattern algorithm to generate common substring satisfying the minimum support from traffic flow data. Also, we extract the location and header information of the signature which are the components of snort content rule. When we analyzed the proposed method to several application traffic data, the generated rule could detect more than 97 percentage of the traffic data.
A Study on Interconnection Regime: Core Issues and Alternatives
Kim, Il-Jung ; Shin, Minsoo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 4, 2015, Pages 678~691
DOI : 10.7840/kics.2015.40.4.678
Internet and mobile traffic continues to surge exponentially in recent years due to popularization of smart devices, the appearance of various internet services carrying large amount of traffic from richer content and applications. This phenomenon leaded to various network problems such as the congestion delay, the non-balanced traffic ratio between ISPs, the continuous network investment cost and the Internet access problems. In light of changed data-driven communication ecosystem, There are growing concerns by both academia and industry that settlement-free peering and full transit regime have the limitations such as not only difficulties in maintaining mutual benefits but also difficulties in securing investment incentives for upgrading network performance and quality. Thus, it becomes more necessary for introducing the evolved internet interconnection regime which can fulfill the All-IP network environment. This study derives core issues regarding internet interconnection regime in Korea and suggest new evolved alternatives based on three point of view(traffic optimization, cost optimization, network investment optimization) through the empirical analysis.
NDN Contents Verification Scheme for Efficient XaaS Implementation
Kim, DaeYoub ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 4, 2015, Pages 692~699
DOI : 10.7840/kics.2015.40.4.692
Evarything as a Service (XaaS) is a software, platform, infra distribution method which provide users with necessary modules, not entire modules, as a service. To efficiently and securely operate services such as XaaS, it is needed to solve various Internet problems like network congestion, weak security and so on. Future Internet technologies are provided to solve such problems. Specially, named data networking architecture (NDN) proposes that network nodes cache transmitted data, and then they send the cached data if receiving request messages for the cached data. So NDN can efficiently diffuse excessive request messages transmitted toward original contents providers. However, when receiving contents through NDN, receivers can not confirm the practical providers because the practical providers can be different from original contents providers. Hence, it is requested for receivers to verify the received contents and such a verification process can cause service delay of XaaS. In this paper, we improve a content verification scheme of NDN to enhance the performance of services such as XaaS.
Android App Birthmarking Technique Resilient to Code Obfuscation
Kim, Dongjin ; Cho, Seong-Je ; Chung, Youngki ; Woo, Jinwoon ; Ko, Jeonguk ; Yang, Soo-Mi ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 4, 2015, Pages 700~708
DOI : 10.7840/kics.2015.40.4.700
A software birthmark is the set of characteristics of a program which can be used to identify the program. Many researchers have studied on detecting theft of java programs using some birthmarks. In case of Android apps, code obfuscation techniques are used to protect the apps against reverse-engineering and tampering. However, attackers can also use the obfuscation techniques in order to conceal a stolen program. A birthmark (feature) of an app can be alterable by code obfuscations. Therefore, it is necessary to detect Android app theft based on the birthmark which is resilient to code obfuscation. In this paper, we propose an effective Android app birthmark and app theft detection through the proposed birthmark. By analyzing some obfuscation tools, we have first selected parameter and the return types of methods as an adequate birthmark. Then, we have measured similarity of target apps using the birthmarks extracted from the apps, where some target apps are not obfuscated and the others obfuscated. The measurement results show that our proposed birthmark is effective for detecting Android app theft even though the apps are obfuscated.
Java Automatic Identifier Renaming Technique and Protection Method
Kim, Ji-Yun ; Hong, Soo-Hwa ; Go, Nam-Hyeon ; Lee, Woo-Seung ; Park, Yong-Su ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 4, 2015, Pages 709~719
DOI : 10.7840/kics.2015.40.4.709
This paper introduces a proper renaming service using variable action and security services against the analysis techniques in Java code. The renaming service that is introduced is separated into API pattern and loop condition. We present our scheme algorithm with known Java obfuscation techniques and tools in order to help readers understanding, and implement prototype to prove practicality in this paper. Test result using prototype shows 73% successful variable renaming rate. Using our scheme, cooperators can intuitionally understand all of code. Also, It helps malware analysts to predict malware action by variable name. But application source code that is developed by Java is exposed to hackers easily using our scheme. So we introduce Java application code protection methods, too.
Integrated Wireless Network Control System using a Cloud-based AP Controller
Min, Kyung-Su ; Yoon, Kwon-Jin ; Park, Min-Ho ; Jung, Sou-Hwan ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 4, 2015, Pages 720~722
DOI : 10.7840/kics.2015.40.4.720
In this paper, we propose a new type of integrated wireless control system using a cloud-based AP Controller. With this system, network administrator can control wireless network in head office and branch hierarchically. In head office, they have an AP Controller Manager, it can control all Access Points, Access point Controllers in their networks. In addition, if we need to install new Access point Controller because of the increasing number of Access Point, the process of making virtual Access point Controller can be automated. This paper presents an architecture of the integrated wireless control system, as well as describes its components and protocols.
Location Tracking Compensation Algorithm for Route Searching of Docent Robot in Exhibition Hall
Jung, Moo Kyung ; Lee, Dong Myung ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 4, 2015, Pages 723~730
DOI : 10.7840/kics.2015.40.4.723
In this paper, a location tracking compensation algorithm based on the Least-Squares Method (
) was proposed to improve the autonomous tracking efficiency for the docent robot in exhibition hall, and the performance of the
is analyzed by several practical experiments. The proposed
compensates the collected location coordinates for the robot using the Least-Squares Method (LSM) in order to reduce the cumulated errors that occur in the Encoder/Giro sensor (E/G) and to enhance the measured tracking accuracy rates in the autonomous tracking of the robot in exhibition hall. By experiments, it was confirmed that the average error reduction rates of the
are higher as 4.85% than that of the
in Scenario 1 (S1) and Scenario 2 (S2), respectively on the location tracking. In addition, it was also confirmed that the standard deviation in the measured errors of the
are much more low and constant compared to that of the E/G sensor and the
in S1 and S2 respectively. Finally, we see that the suggested
can execute more the stabilized location tracking than the E/G sensors and the
on the straight lines of S1 and S2 for the docent robot.
PVC Detection Based on the Distortion of QRS Complex on ECG Signal
Lee, SeungMin ; Kim, Jin-Sub ; Park, Kil-Houm ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 4, 2015, Pages 731~739
DOI : 10.7840/kics.2015.40.4.731
In arrhythmia ECG signal, abnormal beat that has various abnormal shape depending on the generation site and conduction disorders is included and it is very important to diagnose heart disease such as arrhythmia. In this paper, we propose a PVC abnormal beat detection algorithm associated with ventricular disease. The PVC abnormal beat is characterized by distortion of the QRS complex occurs among the components of the ECG signal. Therefore it is possible to detect PVC abnormal beat according to the degree of distortion of the QRS complex. First, quantify the distortion of the QRS complex by using the potential of the R-peak, kurtosis and period. By using the mean and standard deviation, PVC abnormal beat is detected depending on the degree of distortion from the normal beat. The proposed algorithm can detect the average over 98% of the AAMI-V class type abnormal beat associated with ventricular disease in MIT-BIH arrhythmia database.
Design and Implementation of Visible Light Communication Circuit with a Built-in Distance Compensation Function
Park, Jeong-Uk ; Lee, Yong Up ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 4, 2015, Pages 740~749
DOI : 10.7840/kics.2015.40.4.740
In the visible light (VL) communication based on the conventional LED lights, depending on the increase of the communication range, the signal received at the photodiode of the VL receiver has usually the random distorted and decreased amplitude due to the path loss and fading effects of the VL channel. In order to overcome this problem, we propose, design, and implement the visible light communication circuit based on the comparator threshold voltage, where has a built-in distance compensation function. In addition, the performance of the proposed technique is evaluated and analyzed depending on the distance and communication speed through comparing the proposed VLC system based on the threshold voltage with the conventional one.
Reverse Simulation Software Architecture for Required Performance Analysis of Defense System
Hong, Jeong Hee ; Seo, Kyung-Min ; Kim, Tag Gon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 4, 2015, Pages 750~759
DOI : 10.7840/kics.2015.40.4.750
This paper focuses on reverse simulation methods to find and analyze the required performance of a defense system under a given combat effectiveness. Our approach is motivated that forward simulation, that traditionally employs the effectiveness analysis of performance alternatives, is not suitable for resolving the above issue because it causes a high computational cost due to repeating simulations of all possible alternatives. To this end, the paper proposes a reverse simulation software architecture, which consists of several functional sub-modules that facilitate two types of reverse simulations according to possibility of inverse model design. The proposed architecture also enable to apply various search algorithms to find required operational capability efficiently. With this architecture, we performed two case studies about underwater and anti-air warfare scenarios. The case studies show that the proposed reverse simulation incurs a smaller computational cost, while finding the same level of performance alternatives compared with traditional forward simulation. Finally we expect that this study provides a guide those who desire to make decisions about new defense systems development.
Improvement of Computational Complexity of Device-to-Device (D2D) Resource Allocation Algorithm in LTE-Advanced Networks
Lee, Han Na ; Kim, Hyang-Mi ; Kim, SangKyung ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 4, 2015, Pages 762~768
DOI : 10.7840/kics.2015.40.4.762
D2D communication as an underlaying LTE-Advanced network has proven to be efficient in improving the network performance and decreasing the traffic load of eNodeB(enhanced NodeB). However large amount of interference can be caused by sharing the resources between the cellular users and D2D pairs. So, a resource allocation for D2D communication to coordinate the interference is necessary. Related works for resource allocation that D2D can reuse the resources of more than one cellular user with best CQI(Channel Quality Indicator) have been proposed. D2D communications may still cause interference to the primary cellular network when radio resource are shared between them. To avoid this problem, we propose a radio resource allocation algorithm with low computational complexity for D2D communication in OFDM-based wireless cellular networks. Unlike the previous works, the proposed algorithm utilizes unused ones of the whole resource. The unused resource allocate to on D2D pair can be shared only with other D2D pairs. In other words, if the distance between the D2D pairs is sufficient, we allowed more than two D2D pairs to share the same resources. The simulation results have proven that the proposed algorithm has up to 11 times lower computational complexity than the compared one according to the number of D2D.
A Design of IT-Convergence Plant Factory System Using the Renewable Energy
Lim, Gye-Jae ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 4, 2015, Pages 769~779
DOI : 10.7840/kics.2015.40.4.769
In this paper, the ideal standard design and construction of plant factory systems with the Green IT technologies is proposed. For feasibility and problem analysis, a container-type plant factory which was integrated with hardware and software of elemental technologies was operated as a test bed. This operation testing and research will be the foundation of the future construction and operation of large plant factories.
ICT-Based Smart Farm Factory Systems through the Case of Hydroponic Ginseng Plant Factory
Hwang, Sung-Il ; Joo, Jong-Moon ; Joo, Seong-Yong ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 4, 2015, Pages 780~790
DOI : 10.7840/kics.2015.40.4.780
Studies for a plants factory is progressing for cultivating various plants by the needs of the times and industry around world. However most studies is carried out only in lab sized plants factory. It does not consider an economic feasibility. The study for a large scale plants factory is very required to get an economic gain. In this paper we has been studying a smart farm factory based on ICT using the hydroponics ginseng. The smart farm factory is to extend a concept of the general plants factory to full automated factory. The factory can collect the information about growing of plants and automate operating and management of factory like the existing plants factory. Also it is the total plants factory management system, which analyzes the collected information for optimized growth and development of plants and applies the result to the system back.