Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Volume & Issues
Volume 41, Issue 8 - Aug 2016
Volume 41, Issue 7 - Jul 2016
Volume 41, Issue 6 - Jun 2016
Volume 41, Issue 5 - May 2016
Volume 41, Issue 4 - Apr 2016
Volume 41, Issue 3 - Mar 2016
Volume 41, Issue 2 - Feb 2016
Volume 41, Issue 1 - Jan 2016
Selecting the target year
Faster Than Nyquist Transmission with Multiple Channel Codes
Kang, Donghoon ; Kim, Haeun ; Yun, Joungil ; Lim, Hyoungsoo ; Oh, Wangrok ;
The Journal of Korean Institute of Communications and Information Sciences, volume 41, issue 2, 2016, Pages 157~162
DOI : 10.7840/kics.2016.41.2.157
The performance of turbo-like codes highly depends on their frame size and thus, the bit error rate performance of turbo-like codes can be improved by increasing the frame size. Unfortunately, increasing the frame size of channel codes induces some drawbacks such as the increase of not only encoding and decoding complexity but also transmission and decoding latencies. On the other hand, a faster than Nyquist (FTN) transmission causes intentional inter-symbol interference (ISI) and thus, induces some correlation among the transmission symbols. In this paper, we propose an FTN transmission with multiple channel codes. By exploiting the correlation among the modulated symbols, multiple code frames can be regarded as a code frame with a lager frame size. Due to the inherent parallel encoding scheme of proposed scheme, parallel decoding can be easily implemented.
Parallel Descrambling of Transponder Telegram for High-Speed Train
Kwon, Soon-Hee ; Park, Sungsoo ; Shin, Dong-Joon ; Lee, Jae-Ho ; Ko, Kyeongjun ;
The Journal of Korean Institute of Communications and Information Sciences, volume 41, issue 2, 2016, Pages 163~171
DOI : 10.7840/kics.2016.41.2.163
In order to detect the exact position of high-speed train, it is necessary to obtain location information from the transponder tag installed along the track. In this paper, we proposed parallel descrambling scheme for high-speed railway transponder system, which aims for reducing the processing time required to decode telegram. Since a telegram is stored in a tag after information bits are scrambled by an encoder, decoding procedure includes descrambling of received telegram to recover the original information bits. By analyzing the structure of the descrambling shift register circuit, we proposed a parallel descrambling scheme for fast decoding of telegram. By comparing the required number of clocks, it is shown that the proposed scheme significantly outperforms the original one.
Efficient Message Relaying Scheme for Heterogeneous Platoons
Jeong, Dong Geun ;
The Journal of Korean Institute of Communications and Information Sciences, volume 41, issue 2, 2016, Pages 172~174
DOI : 10.7840/kics.2016.41.2.172
In heterogeneous platoons, consisting of various size of vehicles, the signal from/to a small-size vehicle may be blocked by adjacent large-size ones. In this case, some vehicles in between the source and the destination should relay the messages. We design an efficient message relaying scheme for these platoons and evaluate its performance, taking the linear topology of platoons into account.
Optimal Power Splitting for Wireless Energy and Information Transfer in Amplify-and-Forward Two-Way Relaying
Do, Thinh Phu ; Kim, Yun Hee ;
The Journal of Korean Institute of Communications and Information Sciences, volume 41, issue 2, 2016, Pages 175~177
DOI : 10.7840/kics.2016.41.2.175
This letter considers wireless energy and information transfer for an amplify-and-forward two-way relay network. When the relay harvests the energy and transfers the information signal through power splitting, the optimal power splitting minimizing the outage probability is derived explicitly and its gain is confirmed by simulations.
Content Delivery Network Based on MST Algorithm
Lee, Hyung-ok ; Kang, Mi-young ; Nam, Ji-seung ;
The Journal of Korean Institute of Communications and Information Sciences, volume 41, issue 2, 2016, Pages 178~188
DOI : 10.7840/kics.2016.41.2.178
The traffic in the wired and wireless networks has increased exponentially because of increase of smart phone and improvement of PC performance. Multimedia services and file transmission such as Facebook, Youtube occupy a large part of the traffic. CDN is a technique that duplicates the contents on a remote web server of content provider to local CDN servers near clients and chooses the optimal CDN server for providing the content to the client in the event of a content request. In this paper, the content request message between CDN servers and the client used the SCRP algorithm utilizing the MST algorithm and the traffic throughput was optimized. The average response time for the content request is reduced by employing HC_LRU cache algorithm that improves the cache hit ratio. The proposed SCRP and HC_LRU algorithm may build a scalable content delivery network system that efficiently utilizes network resources, achieves traffic localization and prevents bottlenecks.
DT-GPSR: Delay Tolerant-Greedy Perimeter Stateless Routing Protocol
Nam, Jae-Choong ; Cho, You-Ze ;
The Journal of Korean Institute of Communications and Information Sciences, volume 41, issue 2, 2016, Pages 189~197
DOI : 10.7840/kics.2016.41.2.189
Mobile ad-hoc networks (MANETs) experience frequent link disconnections due to non-uniform node distribution and mobility. Thus, end-to-end path establishment-based routing protocols cause frequent transmission failures in MANETs, resulting in heavy control messages for path reestablishment. While location-based MANET routing protocols, such as Greedy Perimeter Stateless Routing (GPSR), use location information to forward messages in a hop-by-hop routing fashion without an end-to-end path establishment procedure, such protocols encounter communication void problems when message forwarding to the next hop fails due to the absence of a relay node. Therefore, to solve this problem, this paper proposes a Delay Tolerant-GPSR (DT-GPSR) protocol, which combines Delay Tolerant Networking (DTN) technology with the GPSR protocol. The performance of DT-GPSR is compared with the performances of the original GPSR and PRoPHET routing protocols through simulation using NS-2. The simulation results confirm that DT-GPSR outperforms GPSR and PRoPHET in terms of the message delivery ratio and message delivery delay.
Invisible Watermarking Based Optical Wireless Communications
Hossain, Mohammad Arif ; Le, Nam-Tuan ; Islam, Amirul ; Hong, Chang Hyun ; Jang, Yeong Min ;
The Journal of Korean Institute of Communications and Information Sciences, volume 41, issue 2, 2016, Pages 198~205
DOI : 10.7840/kics.2016.41.2.198
In the contemporary world, the breakthrough of the ultra-modern technologies has been blessed with the camera. This device has become omnipresent either integrated on with other devices such as smartphones, notebooks, laptops, handheld devices and so on. In addition, digital signage, display and monitors have also become very widespread around us everywhere. These types of scenarios have made imaginable to imagine about the consuming of the unused resources. The dual use of displayed contents can make it possible to use it as an advertisement as well as a transmitter for camera based communication. In this study, a digital watermarking algorithm based communication method has been analyzed. We have introduced Binary Pattern (BP) based a new message extracting algorithm to extract message in an efficient way from the watermarked image compared to other algorithms. Besides, the previous works using camera and display have been illustrated using comparative analysis. This paper has demonstrated an advantageous overview using the experimental results which reveals that the proposed methodology significantly reduces the complexity while augmenting the advantages of the proposed scheme. Moreover, the simulation results have shown the advantages of the proposed scheme over the other schemes.
Joint Routing, Scheduling, and Power Control for Wireless Sensor Networks with RF Energy Transfer Considering Fairness
Moon, Seokjae ; Roh, Hee-Tae ; Lee, Jang-Won ;
The Journal of Korean Institute of Communications and Information Sciences, volume 41, issue 2, 2016, Pages 206~214
DOI : 10.7840/kics.2016.41.2.206
Recently, radio frequency energy transfer (RFET) attracts more and more interests for powering sensor nodes in the wireless sensor network (WSN). In the conventional WSN, reducing energy consumption of sensor nodes is of primary importance. On the contrary, in the WSN with RFET, reducing energy consumption is not an important issue. However, in the WSN with RFET, the energy harvesting rate of each sensor node depends on its location, which causes the unbalanced available energy among sensor nodes. Hence, to improve the performance of the WSN with RFET, it is important to develop network protocols considering this property. In this paper, we study this issue with jointly considering routing, scheduling, and power control in the WSN with RFET. In addition, we study this issue with considering two different objectives: `Max-min` with which we tries to maximize the performance of a sensor node having the minimum performance and `Max-min fairness` with which we tries to achieve max-min fairness among sensor nodes. We show that our solutions can improve network performance significantly and we also discuss the differences between `Max-min` and `Max-min fairness`.
Robust Software-Defined Scheme for Image Sensor Network
Islam, Amirul ; Hossain, Mohammad Arif ; Le, Nam-Tuan ; Hong, Chang Hyun ; Jang, Yeong Min ;
The Journal of Korean Institute of Communications and Information Sciences, volume 41, issue 2, 2016, Pages 215~221
DOI : 10.7840/kics.2016.41.2.215
Data failure in wireless communications considerably affects the reconstruction quality of transmitted data. Traditionally, fascinating trials have been conducted to overcome the data failure intensifying reliable reconstruction of a media. But, none of these efforts neither effective, computationally inexpensive nor simply configurable to reduce the problems of transmitting media or images. In practice, it is necessary to maintain the quality of transmitted image without sacrificing any data, content, or information. So, to deal with dynamic events such as sensor node participation and departure, during transmission, an efficient scheme is important. For this reason, a new robust scheme has been presented in this paper to minimize the limitation of traditional wireless networking. This scheme uses Software-Defined Image Sensor Network (SD-ISN) to ensure scalability and dependability of the sensor network of handling data losses. Finally, a comparison of our proposed SD-ISN with conventional wireless networking has been presented in simulation to test the robustness and effectiveness of our proposed SD-ISN approach.
Aggressive Spatial Reuse Scheme for the 802.11 Wireless LAN
Kim, Jinkyeong ; Ahn, Jae-Min ;
The Journal of Korean Institute of Communications and Information Sciences, volume 41, issue 2, 2016, Pages 222~228
DOI : 10.7840/kics.2016.41.2.222
We provide an aggressive spatial reuse scheme exploiting the space sensed busy when neighboring 802.11 stations radiate radio wave in omni-directions. For this purpose, we develop four strategies, i.e., disruptive RTS, busy random backoff, zero padding, and unavailable pair management. The simulation results show that the proposed scheme can improve the aggregate network throughput from 14% to 50% while the station adopting the proposed scheme coexists with the legacy stations.
Empirical Study on Unit Bias under the Flat Rate Pricing in the Korean Mobile Telecommunication Market
Lee, Sang-Woo ; Jeong, Seon-Hwa ; Lee, Hyeongjik ;
The Journal of Korean Institute of Communications and Information Sciences, volume 41, issue 2, 2016, Pages 229~237
DOI : 10.7840/kics.2016.41.2.229
The purpose of this paper is to empirically identify whether unit bias exists or not under the flat rate pricing in the Korean mobile telecommunication market and to give the desirable form of pricing plans for minimizing this irrational behaviors. Our results show that with the flat rate pricing consumers tends to make more voice or data traffic over their optimal consumption level, meaning the existence of unit bias in the Korean mobile market. These results imply that under the current pricing plans subscribers may pay higher monthly fee than their optimal cost which maximizes their utility, for using the telecommunications service. Thus, policy makers need to consider adopting mobile operators` segmentation of the flat rate pricing plans for the reduction of subscribers` telecommunications costs and the improvement of consumer welfare.
BGP Session Takeover Method Based on Docker
Kim, Sang-il ; Kim, Hwa-sung ;
The Journal of Korean Institute of Communications and Information Sciences, volume 41, issue 2, 2016, Pages 238~240
DOI : 10.7840/kics.2016.41.2.238
Recently, the improvement in the data communication networks in terms of availability and reliability is emerging as a critical issue. In this context, the high availability and reliability of routers that control data flow and routing path between networks on the data communication network are being recognized as critical problems. Many methods for providing high availability to minimize the loss cost caused by the failure of a router are being studied. This paper proposed a BGP session takeover method using the Docker to support the high availability of the BGP session and to improve the takeover performance.
Similarity Comparison Among Open API Parameters Using Open API Description Document
Kim, Sang-il ; Kim, Hwa-sung ;
The Journal of Korean Institute of Communications and Information Sciences, volume 41, issue 2, 2016, Pages 241~243
DOI : 10.7840/kics.2016.41.2.241
The recent spread of smart devices has led to creating a variety of services based on the smart device, and the needs for the user-centric services that fit the individual users according to their situations and characteristics are increasing. However, current services can not fulfil the individual requirement of individual user, because these services are intended for unspecified individual. This paper, as a key technology of automatic user-centric service mash-up considering the situation of individual user, investigated the similarity comparison method between the Open API parameters by calculating the amount of mutual information of the parameters extracted from the Open API documents.
Stepwise Detection of the QRS Complex in the ECG Signal
Kim, Jeong-Hong ; Lee, SeungMin ; Park, Kil-Houm ;
The Journal of Korean Institute of Communications and Information Sciences, volume 41, issue 2, 2016, Pages 244~253
DOI : 10.7840/kics.2016.41.2.244
The QRS complex of ECG signal represents the depolarization and repolarization activities in the cells of ventricle. Accurate informations of
are needed for automatic analysis of ECG waves. In this study, using the amount of change in the QRS complex voltage values and the distance from the
, we determined the junction point from Q-wave to R-wave and the junction point from R-wave to S-wave. In the next step, using the integral calculation based on the connection point, we detected
. We use the PhysioNet QT database to evaluate the performances of the algorithm, and calculate the mean and standard deviation of the differences between onsets or offsets manually marked by cardiologists and those detected by the proposed algorithm. The experiment results show that standard deviations are under the tolerances accepted by expert physicians, and outperform the results obtained by the other algorithms.
Interference Mitigation by High-Resolution Frequency Estimation Method for Automotive Radar Systems
Lee, Han-Byul ; Choi, Jung-Hwan ; Lee, Jong-Ho ; Kim, Yong-Hwa ; Kim, YoungJoon ; Kim, Seong-Cheol ;
The Journal of Korean Institute of Communications and Information Sciences, volume 41, issue 2, 2016, Pages 254~262
DOI : 10.7840/kics.2016.41.2.254
With the increased demand for automotive radar systems, mutual interference between vehicles has become a crucial issue that must be resolved to ensure better automotive safety. Mutual interference between frequency modulated continuous waveform (FMCW) radar system appears in the form of increased noise levels in the frequency domain and results in a failure to separate the target object from interferers. The traditional fast fourier transform (FFT) algorithm, which is used to estimate the beat frequency, is vulnerable in interference-limited automotive radar environments. In order to overcome this drawback, we propose a high-resolution frequency estimation technique for use in interference environments. To verify the performance of the proposed algorithms, a 77GHz FMCW radar system is considered. The proposed method employs a high-resolution algorithm, specially the multiple signal classification and estimation of signal parameters via rotational invariance techniques, which are able to estimate beat frequency accurately.
Performance Analysis of an Adaptive Sector System for Terrestrial Station in Ad-hoc Communication System Between Vessels
Lee, Hyung-beom ; Kim, Seung-geun ; Kim, Jun-ho ; Kim, Min-sang ; Ko, Hak-lim ; Im, Tae-ho ;
The Journal of Korean Institute of Communications and Information Sciences, volume 41, issue 2, 2016, Pages 263~268
DOI : 10.7840/kics.2016.41.2.263
A rapid increase of data amount, used in ship-to-ship transmission of safety and logistics information, ships in the inland sea have trouble transmitting real-time information transmission due to an increase in traffic load caused by data transmitted by land station and offshore ships. In this study, therefore, communication is carried out by adaptively controlling the detailed beam width based on the distribution of offshore ships in land station durable in marine environment. Then after the adaptive sector system enabling real-time communication support between ships concentrated in an inland sea and land station is applied, the performance verification is conducted based on the respective Call Blocking Rates of an omnidirectional antenna, fisted sector system, and adaptive sector system. The performance verification result shows that adaptive sector system has better performance than the fixed sector system as the density of ship, q value, increases, and that the smaller the beam width is, the better performance of adaptive sector system will be.
Broadcast Data Delivery in IoT Networks with Packet Loss and Energy Constraint
Jeon, Seung Yong ; Ahn, Ji Hyoung ; Lee, Tae-Jin ;
The Journal of Korean Institute of Communications and Information Sciences, volume 41, issue 2, 2016, Pages 269~276
DOI : 10.7840/kics.2016.41.2.269
Internet of Things (IoT) is based on wireless networks being able to connect things and people on a large scale. In the IoT environment, reliable broadcast plays an important role to distribute data to a large number of devices. Energy harvesting from a surrounding environment is a key technique to achieve a sustainable IoT network. In IoT networks, a problem of transmission errors and energy shortage should be mitigated for reliable broadcast. In this paper, we propose an energy-efficient and reliable broadcast method to consider packet errors and energy consumption in the environment where a large number of nodes are connected. The proposed scheme can improve data restoration probability by up to 15% and reduce energy consumption by up to 17%.
Malicious Traffic Detection Using K-means
Shin, Dong Hyuk ; An, Kwang Kue ; Choi, Sung Chune ; Choi, Hyoung-Kee ;
The Journal of Korean Institute of Communications and Information Sciences, volume 41, issue 2, 2016, Pages 277~284
DOI : 10.7840/kics.2016.41.2.277
Various network attacks such as DDoS(Distributed Denial of service) and orm are one of the biggest problems in the modern society. These attacks reduce the quality of internet service and caused the cyber crime. To solve the above problem, signature based IDS(Intrusion Detection System) has been developed by network vendors. It has a high detection rate by using database of previous attack signatures or known malicious traffic pattern. However, signature based IDS have the fatal weakness that the new types of attacks can not be detected. The reason is signature depend on previous attack signatures. In this paper, we propose a k-means clustering based malicious traffic detection method to complement the problem of signature IDS. In order to demonstrate efficiency of the proposed method, we apply the bayesian theorem.