Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Volume & Issues
Volume 40, Issue 12 - Dec 2015
Volume 40, Issue 11 - Nov 2015
Volume 40, Issue 10 - Oct 2015
Volume 40, Issue 9 - Sep 2015
Volume 40, Issue 8 - Aug 2015
Volume 40, Issue 7 - Jul 2015
Volume 40, Issue 6 - Jun 2015
Volume 40, Issue 5 - May 2015
Volume 40, Issue 4 - Apr 2015
Volume 40, Issue 3 - Mar 2015
Volume 40, Issue 2 - Feb 2015
Volume 40, Issue 1 - Jan 2015
Selecting the target year
Code-Book Based Beamforming Techniques for Improving SIR
Ahn, Jongmin ; Lee, Dongkyu ; Park, Chul ; Kim, Hanna ; Chung, Jaehak ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1469~1476
DOI : 10.7840/kics.2015.40.8.1469
We propose a beam selection algorithm that improves inter sector SIR using a code-book of a circular array antenna in multi-sector wireless mesh network environments. The proposed method improves SIR using a combination of fed back code-book and guarantees QoS of all nodes. Computer simulation exhibits the proposed scheme demonstrates 4.42dB higher SIR than that of the conventional code-book method, QoS with proportional fair is improved by 1.70dB and fact that all nodes are satisfied Qos is also shown.
Transmission Methods Using RS Codes to Improve Spatial Relationship of Images in Reversible Data Hiding Systems
Kim, Taesoo ; Jang, Min-Ho ; Kim, Sunghwan ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1477~1484
DOI : 10.7840/kics.2015.40.8.1477
In this paper, a novel reversible data hiding by using Reed-Solomon (RS) code is proposed for efficient transmission in encryption image. To increase the recovery of data from encrypted image, RS codes are used to encode messages, and then the codewords can be embedded into encrypted image according to encryption key. After receiving encrypted image which embeds the codewords, the receiver firstly decryptes the encrypted image using the encryption key and get metric about codewords containing messages. According to recovery capability of RS codes, better estimation of message is done in data hiding system. Simulation results about two images and two RS codes show that the performances of the proposed schemes are better than ones of the reference scheme.
Pilot Assignment Algorithm for Uplink Massive MIMO Systems
Jang, Seokju ; Kong, Han-Bae ; Lee, Inkyu ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1485~1491
DOI : 10.7840/kics.2015.40.8.1485
This paper introduces a new pilot assignment algorithm for uplink Massive multiple-input multiple-output (MIMO) systems. Since the conventional pilot assignment algorithm has the performance degradation compared to the optimal algorithm which performs the exhaustive search, we propose a new pilot assignment algorithm using Pre-determined Interference and Pre-determined Desired-term techniques. The proposed algorithm has the low complexity and guarantees negligible performance loss compared to the optimal algorithm. Simulation result verifies that the proposed algorithm achieves a large performance gain over the conventional algorithm.
Erasure Insertion and Clipping for LDPC Coded Frequency-Hopping Non-Coherent BFSK System over Partial-Band Jamming Channel
Park, Jinsoo ; Kim, Inseon ; Song, Hong-Yeop ; Yang, Pilwoong ; No, Jong-Seon ; Han, Sung Woo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1492~1499
DOI : 10.7840/kics.2015.40.8.1492
In this paper, we propose a clipping method for LDPC coded FH BFSK system over partial-band jamming channel. We apply the erasure insertion technique, which had been studied much earlier, now to LDPC codes and discuss its performance degradation region. By using clipping technique, the performance degradation can be removed. Finally, we discuss the erasure insertion and clipping techniques for various jamming conditions.
Efficient Broadcast Scheme Based on Ergodic Index Coding
Choi, Sang Won ; Kim, Juyeop ; Kim, Yong-Kyu ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1500~1506
DOI : 10.7840/kics.2015.40.8.1500
In this paper, en efficient broadcast scheme with acknowledged mode is proposed. Specifically, based on stochastic pattern of ACK/NACK across all users and index coding, adaptive coding scheme with XOR operation is used at the transmitter. At each receiver, packets are decoded using layered decoding method with already successfully decoded packets. From numerical results, proposed index coded broadcast scheme is shown to be more efficient than naive broadcast scheme in the sense of average total number of transmitted packets.
Spectral and Energy Efficient Spatially Modulated Non-Orthogonal Multiple Access (NOMA) For 5G
Irfan, Mohammad ; Kim, Jin Woo ; Shin, Soo Young ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1507~1514
DOI : 10.7840/kics.2015.40.8.1507
Non-orthogonal multiple access (NOMA) is a promising candidate for 5G networks. NOMA achieves superior spectral efficiency than conventional orthogonal multiple access (OMA), as in NOMA multiple users uses the same time and frequency resources. Multiple-input-multiple-output (MIMO) is one another promising technique that can enhance system performance. In this paper we present a spectral and energy efficient multiple antenna based NOMA scheme, known as spatially modulated NOMA. In the proposed scheme the cell edge users are multiplexed in spatial domain, which means the information to cell edge users is conveyed using the transmit antenna indices. In NOMA the performance of cell edge users are deeply effected as it treats signals of others as noise. The proposed scheme achieves superior spectral efficiency than the conventional NOMA. The number of decoding steps involved in decoding NOMA signal reduces by one as cell edge user is multiplexed in spatial domain. The proposed scheme is more energy efficient as compare to conventional NOMA. All of the three gains high spectral, energy efficiency and one step reduction in decoding comes at cost of multiple transmit antennas at base station.
Effects of the Reference Sample Size on the Performance of the Two-Sample Rank Detector
Bae, Jinsoo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1515~1517
DOI : 10.7840/kics.2015.40.8.1515
The effects of the reference sample size on the detection probability of the two-sample rank detector is investigated in this paper. The larger reference sample size shows the better performance of the detector. The effect is also shown to be saturated as the reference sample size becomes larger.
Distributed User Association Based on Message Passing for Energy Efficiency in a Small-Cell Network
Jeong, Hyun Woo ; Kim, Yun Hee ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1518~1520
DOI : 10.7840/kics.2015.40.8.1518
This letter considers a problem of associating users to small-cell base stations (sBSs) and selecting a set of operating sBSs in a small-cell network to minimize the power consumption. We derive a message passing algorithm to obtain a solution distributively. Simulation results show that the proposed algorithm is superior to the conventional schemes.
Sector-Based Device Discovery Scheme for D2D Communication in LTE-Advanced Networks
Kim, Hyang-mi ; Lee, Han-na ; Kim, Sangkyung ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1521~1531
DOI : 10.7840/kics.2015.40.8.1521
According to the service attributes, D2D communications establish 1-1, or 1-n channels and require the differentiated device discovery technology. This paper proposes a sector-based device discovery mechanism for 1-n D2D communication scenario in LTE-Advanced networks that a disaster happened. Our proposal is a mechanism that can extend the coverage in a disaster situation which a number of devices(survivors) need to be discovered in a short time. In the single cell environment, a larger discovery coverage can be obtained, and in the multi-cell, it is possible to mitigate the interference with adjacent links due to sector-based coverage control. Through a set of simulations, we have confirmed that our proposal has better performance in the number of devices discovered and the interference than the legacy broadcast device discover mechanism.
Grouping Resource Allocation Scheme for D2D Communications
Kim, Hyang-mi ; Lee, Han-na ; Kim, Sangkyung ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1532~1541
DOI : 10.7840/kics.2015.40.8.1532
D2D(Device-to-Device) communication is a promising technology to improve the system capacity and spectral efficiency. By sharing the same radio resources with cellular user equipments, D2D communications can significantly enhance the overall spectral efficiency. However, it may cause interference between D2D link and cellular link. So, careful resource allocation and interference coordination between them are very important and need to be properly handled. This paper proposes a radio resource allocation scheme that decreases interference through the use of area grouping and D2D pair grouping. Simulations results are provided to verify the performance improvement of the proposed scheme in terms of the number of assigned resource blocks and computational complexity.
Regulating Delayed ACK Timeout to Construct High Speed Transmission
Lee, Joon Yeop ; Lee, Woonghee ; Kim, Hwangnam ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1542~1550
DOI : 10.7840/kics.2015.40.8.1542
Delayed ACK is an algorithm implemented to decrease the number of ACK transmissions by delaying an ACK transmission and by waiting for additional ACK instead of transmitting the ACK immediately. By using Delayed ACK in TCP, the congestion of network and the overhead of handling ACKs can be reduced. Waiting time of Delayed ACK is defined as the Delayed ACK timeout, and it is fixed in Window OS basically. However, the fixed value of Delayed ACK timeout is not suitable for dynamic network circumstance, and it may cause unnecessary delay. This paper proposes a regulating Delayed ACK timeout algorithm to reduce the aforementioned unnecessary delay caused by the lengthy default value of the Delayed ACK timeout. We confirm that TCP transmission performance in dynamic network circumstance can be improved using the proposed algorithm.
Android Malware Detection Using Auto-Regressive Moving-Average Model
Kim, Hwan-Hee ; Choi, Mi-Jung ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1551~1559
DOI : 10.7840/kics.2015.40.8.1551
Recently, the performance of smart devices is almost similar to that of the existing PCs, thus the users of smart devices can perform similar works such as messengers, SNSs(Social Network Services), smart banking, etc. originally performed in PC environment using smart devices. Although the development of smart devices has led to positive impacts, it has caused negative changes such as an increase in security threat aimed at mobile environment. Specifically, the threats of mobile devices, such as leaking private information, generating unfair billing and performing DDoS(Distributed Denial of Service) attacks has continuously increased. Over 80% of the mobile devices use android platform, thus, the number of damage caused by mobile malware in android platform is also increasing. In this paper, we propose android based malware detection mechanism using time-series analysis, which is one of statistical-based detection methods.We use auto-regressive moving-average model which is extracting accurate predictive values based on existing data among time-series model. We also use fast and exact malware detection method by extracting possible malware data through Z-Score. We validate the proposed methods through the experiment results.
Resource Management for Maximizing Simultaneous Transfer of Information and Power
Lee, Kisong ; Kim, Minhoe ; Cho, Dong-Ho ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1560~1566
DOI : 10.7840/kics.2015.40.8.1560
To enable the efficient use of energy, the environment where unscheduled receivers can harvest energy from the transmitted signal is considered in next-generation wireless communication systems. In this paper, we propose a scheme for allocating subchannel and power to maximize the system throughput and harvested energy simultaneously using optimization techniques. Through simulations, we verify that the proposed scheme can increase the system throughput and harvested energy harmoniously. In particular, the proposed scheme improves the harvested energy remarkably with a negligible degradation of system throughput, compared with conventional scheme, as a result, energy can be used efficiently in the system.
Reliable Real-Time Data Dissemination Protocol in Wireless Sensor Networks
Yang, Taehun ; Yim, Yongbin ; Jung, Kwansoo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1567~1576
DOI : 10.7840/kics.2015.40.8.1567
This paper proposes a reliable real-time data dissemination protocol for mitigating transmission failure of real-time data in WSNs. The re-transmission is well-known for recovery of transmission failure, but this may violate the real-time requirement by transmission delay. To solve this problem, the proposed protocol exploits broadcasting nature and temporal opportunity allocation. In a radio-range of sending node, there may be neighbors satisfying the real-time requirement. The neighbors of specific node could receive data simultaneously by broadcasting, and decide their priority using temporal opportunity allocation method. The method uses time slot and tolerable time. The time slot specifies the priority and transmission deadline for each neighbors, and the tolerable time is the real-time requirement at the sending node. By giving the priority to the node with shorter tolerable time in each slot, we may get more opportunities to forward toward the destination. In other words, even if a node have the longer tolerable time, it still has a chance to forward with the real-time requirement. Simulation results show that the proposed protocol is superior to the existing protocols.
Influence of Personal Information Security Vulnerabilities and Perceived Usefulness on Bank Customers` Willingness to Stay
Seo, Dong-Jin ; Kim, Tae-Sung ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1577~1587
DOI : 10.7840/kics.2015.40.8.1577
Privacy of financial customers is becoming important due to frequent leakage of personal information. Financial customers, who experience the leakage of personal information, feel threatened by their privacy and this changes customer`s awareness about financial institutions or behavioral intentions. By examining the influence relation of personal information security vulnerability of the bank information system with usefulness, trust and attractiveness perceived by bank customers, this study aims to analyze the effect of each variable on bank customers` willingness to stay.
Analysis on Energy Consumption Required for Building DTLS Session Between Lightweight Devices in Internet of Things
Kwon, Hyeokjin ; Kang, Namhi ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1588~1596
DOI : 10.7840/kics.2015.40.8.1588
In the Internet of Things (IoT), resource-constrained devices such as sensors are capable of communicating and exchanging data over the Internet. The IETF standard group has specified an application protocol CoAP, which uses UDP as a transport protocol, allows such a lightweight device to transmit data. Also, the IETF recommended the DTLS binding for securing CoAP. However, additional features should be added to the DTLS protocol to resolve several problems such as packet loss, reordering, fragmentation and replay attack. Consequently, performance of DTLS is worse than TLS. It is highly required for lightweight devices powered by small battery to design and implement a security protocol in an energy efficient manner. This paper thus discusses about DTLS performance in the perspective of energy consumption. To analyze the performance, we implemented IEEE 802.15.4 based test network consisting of constrained sensor devices in the Cooja simulator. We measured energy consumptions required for each of DTLS client and server in the test network. This paper compares the energy consumption and amount of transmitted data of each flight of DTLS handshake, and the processing and receiving time. We present the analyzed results with regard to code size, cipher primitive and fragmentation as well.
Multi Server Password Authenticated Key Exchange Using Attribute-Based Encryption
Park, Minkyung ; Cho, Eunsang ; Kwon, Ted Taekyoung ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1597~1605
DOI : 10.7840/kics.2015.40.8.1597
Password authenticated key exchange (PAKE) is a protocol that a client stores its password to a server, authenticates itself using its password and shares a session key with the server. In multi-server PAKE, a client splits its password and stores them to several servers separately. Unless all the servers are compromised, client`s password will not be disclosed in the multi-server setting. In attribute-based encryption (ABE), a sender encrypts a message M using a set of attributes and then a receiver decrypts it using the same set of attributes. In this paper, we introduce multi-server PAKE protocol that utilizes a set of attributes of ABE as a client`s password. In the protocol, the client and servers do not need to create additional public/private key pairs because the password is used as a set of public keys. Also, the client and the servers exchange only one round-trip message per server. The protocol is secure against dictionary attacks. We prove our system is secure in a proposed threat model. Finally we show feasibility through evaluating the execution time of the protocol.
Low Power NDIR CO
Sensor Using LED Light Source with a Smart Device Interface
Kim, Jong-heon ; Lee, Chan-joo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1606~1612
DOI : 10.7840/kics.2015.40.8.1606
In this paper, a portable high efficiency nondispersive infrared(NDIR)
sensor module with a smart device interface is developed. For low power consumption design, an IR LED was used instead of tungsten lamp for light source and an optical waveguide optimized to the sensor module is designed. With the smart device interface, power of the sensor module is applied from the battery of smart phone. The measured data of the sensor module such as
concentration, temperature, and humidity are displayed on the smart phone using android application. From measured results, the developed sensor module shows
tolerance error from 0 to 3,000ppm
concentration range among
Implementation of Adaptive MCS in The IEEE 802.11ac/ad Wireless LAN
Lee, Ha-cheol ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1613~1621
DOI : 10.7840/kics.2015.40.8.1613
This paper analyzes the rate adaptation scheme and suggests applicable strategy of the MCS(Modulation and Coding Scheme) for improving DCF throughput in the IEEE 802.11ad and 802.11ad wireless LAN. IEEE 802.11ac and 802.11ad wireless LAN provide MCS technique that dynamically adjusts modulation level and code rate to the time-varying channel conditions in order to obtain considerably high data rates. But these standards did not provide rate adaptation algorithm, so this paper surveyes rate adaptation algorithm and suggests MCS scheme applied to IEEE 802.11ac and 802.11ad wireless LAN. Specially A MAC(Medium Access Control) layer throughput is evaluated over error-prone channel in the IEEE 802.11ac-based wireless LAN. In this evaluation, DCF (Distributed Coordination Function) protocol and A-MPDU (MAC Protocol Data Unit Aggregation) scheme are used. Using theoretical analysis method, the MAC saturation throughput is evaluated with the PER (Packet Error Rate) on the condition that the number of station, transmission probability, the number of parallel beams and the number of frames in each A-MPDU are variables.
Performance Analysis of the Uni-Directional Radiation Equiangular Antenna over EBG Surface
Yoon, Sung Hyun ; Kim, Jae Kwan ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1622~1630
DOI : 10.7840/kics.2015.40.8.1622
In this study, we used EBG(electromagnetic band gap) reflector to change bi-directional radiation of circular polarization into uni-directional radiation of equiangular spiral antenna. When the height of spiral arm from EBG reflector is 0.07 wavelength of the lowest operating frequency, the axial ratio of the circular polarization was deteriorated. In this paper, we analyzed the magnitude and the time phase difference of
that generates right hand circle polarization that is co-polarization at +z direction and proposed the improving condition for axial ratio at all related frequency range. As a result, we obtained that the axial ratio was below 3[dB] at range of 3 ~ 10[dB], the gain was improved about 3[dB] with comparison to bi-directional radiation at free space, and
was below -10[dB] at all related frequency range.
Effect of Interference in CSMA/CA Based MAC Protocol for Underwater Network
Song, Min-je ; Cho, Ho-shin ; Jang, Youn-seon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1631~1636
DOI : 10.7840/kics.2015.40.8.1631
With the advance of wireless communication technology in terrestrial area, underwater communication is also evolving very fast from a simple point-to-point transmission to an elaborate networked communications. Underwater acoustic channel has quite different features comparing with the terrestrial radio channel in terms of propagation delay, Doppler shift, multipath, and path loss. Thus, existing technologies developed for terrestrial communication might not work properly in underwater channel. Especially medium access control (MAC) protocols which highly depend on propagation phenomenon should be newly designed for underwater network. CSMA/CA has drawn lots of attention as a candidate of underwater MAC protocol, since it is able to resolve a packet collision and the hidden node problem. However, a received signal could be degraded by the interferences from the nodes locating outside the receiver`s propagation radius. In this paper, we study the effects of interference on the CSMA/CA based underwater network. We derived the SNR with the interference using the sonar equation and analyzed the degradation of the RTS/CTS effects. These results are compared with the terrestrial results to understand the differences. Finally we summarized the design considerations in CSMA/CA based underwater network.
Design and Implementation of Optimal LED Emotional-Lighting Control System
Yun, Su-Jeong ; Lin, Chi-Ho ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1637~1642
DOI : 10.7840/kics.2015.40.8.1637
Next-generation applications using technology IT fused to biological signals from the emotional state to extract a lot of research has been, and the sensitivity of the human sensory functions influences the physiological condition known to be the fact that. In this paper, Propose an Emotional-lighting control algorithm using bio-signals. LED lighting for Emotion light is environmentally friendly and has a high efficiency and long life. In particular, LED lights are different colors represent the possible single light sphere advantages. And, Human sensitivity for determining a more accurate biological signals using EEG was collected using EEG equipment sensitivity was determined to analyze the EEG.
Indoor Wi-Fi Localization with LOS/NLOS Determination Scheme Using Dual-Band AP
Kim, Kangho ; Lee, Suk Kyu ; Jung, Jongtack ; Yoo, Seungho ; Kim, Hwangnam ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1643~1654
DOI : 10.7840/kics.2015.40.8.1643
With standardization of IEEE 802.11n, APs with the 2.4GHz and 5GHz dual-band capability have widely been deployed over a metropolitan area by individuals and internet service providers. Moreover, due to the increasing attentions on indoor-localization technique using Wi-Fi, the need for LOS and NLOS determination scheme is increasing to enhance accuracy of the localization. In this paper, we propose a novel LOS/NLOS determination technique by using different radio attenuation characteristics in different frequency bands and different mediums. Based on this technique, we designed a LOS/NLOS-aware indoor localization scheme. The proposed LOS/NLOS determination algorithm can be used when the distance between an user device and an AP is unknown, and the proposed localization scheme provides very accurate room-level position information. We validated the proposed scheme by implementing it on Android smart phones.
User Positioning Method Based on Image Similarity Comparison Using Single Camera
Song, Jinseon ; Hur, SooJung ; Park, Yongwan ; Choi, Jeonghee ;
The Journal of Korean Institute of Communications and Information Sciences, volume 40, issue 8, 2015, Pages 1655~1666
DOI : 10.7840/kics.2015.40.8.1655
In this paper, user-position estimation method is proposed by using a single camera for both indoor and outdoor environments. Conventionally, the GPS of RF-based estimation methods have been widely studied in the literature for outdoor and indoor environments, respectively. Each method is useful only for indoor or outdoor environment. In this context, this study adopts a vision-based approach which can be commonly applicable to both environments. Since the distance or position cannot be extracted from a single still image, the reference images pro-stored in image database are used to identify the current position from the single still image captured by a single camera. The reference image is tagged with its captured position. To find the reference image which is the most similar to the current image, the SURF algorithm is used for feature extraction. The outliers in extracted features are discarded by using RANSAC algorithm. The performance of the proposed method is evaluated for two buildings and their outsides for both indoor and outdoor environments, respectively.