Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information and Communication Engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 10, Issue 12 - Dec 2006
Volume 10, Issue 11 - Nov 2006
Volume 10, Issue 10 - Oct 2006
Volume 10, Issue 9 - Sep 2006
Volume 10, Issue 8 - Aug 2006
Volume 10, Issue 7 - Jul 2006
Volume 10, Issue 6 - Jun 2006
Volume 10, Issue 5 - May 2006
Volume 10, Issue 4 - Apr 2006
Volume 10, Issue 3 - Mar 2006
Volume 10, Issue 2 - Feb 2006
Volume 10, Issue 1 - Jan 2006
Selecting the target year
A Study on the technical application of VoIP Service in e-Trade
Jeong Boon-Do ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1339~1346
This thesis outlines a preparation plan for e-Trade business service regarding tendency development in super-highway information network including internet, cable, and wireless communication. It also explains two perspectives in e-Trade market: changes of circumstances and consumerism, and revitalization devices of Von(Voice over Internet Protocol) service technology for creating new market in rapidly changing IP(Internet Protocol) environment. Plus it illustrates what core competence and progress business organizations must have in current situation, forecasts turns of future e-Trade market, and analyzes technological applications of VoIP service in an extended viewpoint of corporate strategy.
Dipole-type Antenna for Measuring Human Radiometric Signals
Shin Ho-Sub ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1347~1351
Microwave radiometry, as a non-invasive technique which doesn't pierce inside human and can measure the temperature, is to diagnose early the disease or abnormality by measuring the temperature inside human. In this paper, as an antenna for measuring human radiometric signals, we simulated and measured a dipole-type antenna with circular loops. As a measured result has a ultra wideband characteristic of
, it is considered to be suitable to detect the position and size of human tissue having various diseases.
Wide Band Bow-Tie Slot Antenna with Dual Reflector
Lee Jae-Sung ; Lee Sang-Woo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1352~1358
In this paper, we have fabricated and tested a broad band bow-tie slot antenna with dual reflector. If we put 1/2 length thin and long slot on a wide metal plate, the slot antenna radiates efficient and strong radio wave as same as 1/2 dipole antenna does. we made with bow-tie form slot which has wider broad band than normal rectangular slot. At first, we made and test a single reflector slot antenna. To enlarge the broad band, we inserted another reflection plate between the slot antenna and reflection plate. After the test, we could have known that the low band(VSWR<2.0) has about
, high band(VSWR<2.0) has about 61% (1626MHz\sim3064MHz).
Designing a Digital Reconstruction of Koguryo Mural using Virtual Reality Technology for Interactive Cultural Heritage Learning
Cho Yong-Joo ; Moon Hyung-Tae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1359~1365
Digital Koguryo is a virtual reality reconstruction of the Koguryo mural tumulus, Anak No. 3, designed for an interactive educational gaming and learning environment. Digital Koguryo aims at not only developing a digital reconstruction of cultural heritage but also helping young students learn the living style and the custom of Koguryo Kingdom while playing the game environment. This paper describes the digital restoration process of Koguryo mural paintings and 3D structure, as well as the construction of educational virtual environment designed to get more user's interests. It then discusses a few design issues learned from the development and the public demonstration. Finally, it will present the future research directions to improve the users' immersion.
Design and Implementation of Real time Monitoring System based on Web camera for safe agricultural product management
Kim Tak-Chen ; Ryu Kwang-Hee ; Jung Hoe-Kyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1366~1372
After the import liberalization of agricultural products, The Imported agricultural products rapidly increased market share of domestic agricultural products. But Imported agricultural products include various agricultural chemicals and food additives. In order to improve competitiveness in domestic markets of farmhouses and to secure food safety, the farmers needs to introduce Systematic support and various system. In this paper, established system that use Monitoring technology, to inform production information and management information about agricultural products to consumer by real time. Therefore unused analog camera such as CCTV(Closed-Circuit Television) for real time Monitoring. This system Used web camera that offer picture quality that is good than CCTV at place that consists network without distinction in the place. An advantage of real time Monitoring system designed multi-vision interface showing multi images on single screen and, for the purpose of the improvement in efficiency, the functions of saving images and of scheduling the time to save the images.
Moving Object Extraction Based on Block Motion Vectors
Kim Dong-Wook ; Kim Ho-Joon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1373~1379
Moving object extraction is one of key research topics for various video services. In this study, a new moving object extraction algorithm is introduced to extract objects using block motion vectors in video data. To do this, 1) a maximum a posteriori probability and Gibbs random field are used to obtain real block motion vectors,2) a 2-D histogram technique is used to determine a global motion, 3) additionally, a block segmentation is fellowed. In the computer simulation results, the proposed technique shows a good performance.
A Modified PTW Wakeup Scheme for Performance Enhancement in Wireless Sensor Network
Kim Seong-Cheol ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1380~1385
A Pipelined Tone Wakeup(PTW) scheme(1) was proposed to support energy saving and end-to-end delay for sensor networks by providing an asynchronous wakeup pipeline to overlap the wakeup procedures with the packet transmission. But the scheme uses two radios and assumes error-free environments. In this paper, we propose a modified PTW scheme for wireless sensor networks. The proposed scheme is based on the PTW. The difference is that next hop information will be included in the ack packet from receiver node to sender node, So all the other neighbor nodes can stay in sleep mode long enough to save energy. Also ore get enhanced delay performance.
Informatics Network Representation Using Probabilistic Graphical Models of Network Genetics
Ra Sang-Dong ; Park Dong-Suk ; Youn Young-Ji ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1386~1392
This study is a numerical representative modelling analysis for applying the process that unravels networks between cells in genetics to WWW of informatics. Using the probabilistic graphical model, the insight from the data describing biological networks is used for making a probabilistic function. Rather than a complex network of cells, we reconstruct a simple lower-stage model and show a genetic representation level from the genetic based network logic. We made probabilistic graphical models from genetic data and extends them to genetic representation data in the method of network modelling in informatics.
A study on the optimization of network resource allocation scheme based on access probabilities
Kim Do-Kyu ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1393~1400
This paper optimizes the access probabilities (APs) in a network resource allocation scheme based on access probabilities in order that the waiting time and the blocking probability are minimized under the given constraints, and obtains its performance. In order to optimize APs, an infinite number of balance equations is reduced to a finite number of balance equations by applying Neuts matrix geometric method. And the nonlinear programming problem is converted into a linear programming problem. As a numerical example, the performance measures of waiting time and blocking probability for optimal access probabilities and the maximum utilization under the given constraints are obtained. And it is shown that the scheme with optimal APs gives more performance build-up than the strategy without optimization.
Variable Geocasting based on Ad Hoc Networks
Lee Cheol-Seung ; Lee Joon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1401~1406
Mobile Ad-hoc networks have recently attracted a lot of attention in the research community as well as in industry. Although the previous research mainly focused on various of Ad-hoc in routing, we consider, in this paper, how to efficiently support applications such as variable Goocasting basd on Ad-hoc networks. The goal of a geocasting uotocol is deliver data packets to a group of nodes that are located within a specified geocasting region. Previous research that support geocast nice in mobilie computing based on Ad-hoc have the non-optimization problem of data delivery path, overhead by frequent reconstruction of the geocast tree, and service disruption problem. In this paper, we propose the mobility pattern based geocast technique using variable service range according to the nobility of destination node and resource reservation to solve this problem. The experimental results show that our proposed mechanism has improved performance of Connection & Network Overhead than previous research.
Blind Watermarking by Using Circular Input Method and Binary Image
Kim Tae-Ho ; Kim Young-Hee ; Jin Kyo-Hong ; Ko Bong-Jin ; Park Mu-Hun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1407~1413
The field of medical images has been digitalized as the development of computer and the digitalization of the medical instruments. As a result it causes a lot of problems such as an illegal copy related to medical images and property right of the medical images. Therefore, digital watermarking is used for discrimination whether the data are modified or not. It is also used to protect both the property right of medical images and the private life of many patients. The proposed theories, the Non-blind and the Blind method, have two problems. One is needed an original image and the other is using a gaussian watermarking. This paper proposes the new Blind Watermarking using binary images in order to easily recognize the results of watermark. This algorism is described that an watermark of a binary image is wavelet-transformed, and then a transformed watermark is inserted in medium-band of frequency domains of original image by the Circular Input method. This method don't have any loss when image didn't have any attack. As a result Watermark can be perfectly extracted by using this algorithm. And Maximam PSNR value is improved 3.35dB. This algorithm will be improved by using gray level image and color image.
Design of a Consistency Algorithm for VOD Streaming Data
Jang Seung-Ju ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1414~1421
This paper proposes a consistency algorithm that is able to serve streaming data efficiently in VOD system. The media data is stripping into several pieces of data by the Round Robin method in order to media data service. The barrier mechanism is changed into the minimum data factor(SH. GOP) in this paper. The shared memory is allocated at one host with one fragment size. Data is combined with RTP packet transmission data format using barrier mechanism. I experiment and program the suggested algorithm on the VOD system.
A Power Estimation Model for Arithmetic and Logic Instructions of Embedded Microprocessors
Shin Dong-Ha ; Kang Kyung-Hee ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1422~1427
In order to estimate the power consumed by an embedded microprocessor during an execution of software, we measure and utilize the current consumed by the processor during the execution of each instruction. In this paper, we measure and analyse the current consumed by the microprocessor adc16s310 during the execution of arithmetic and logic instructions, and propose a power estimation model which estimates the current for all instruction executions precisely by using a small numbers of current measurements. The proposed model can estimate the current with an average 0.34% error by using only 5.84% of total current measurements for arithmetic and logic instructions of the processor.
Improving Scalability using Parallelism in RFID Privacy Protection
Shin Myeong-Sook ; Lee Joon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1428~1434
In this paper, we propose the scheme solving privacy infringement in RFID systems with improving the scalability of back-end server. With RFID/USN becoming important subject, many approaches have been proposed and applied. However, limits of RFID, low computation power and storage, make the protection of privacy difficult. The Hash Chain scheme has been known as one guaranteeing forward security, confidentiality and indistinguishability. In spite of that, it is a problem that requires much of computation to identify tags in Back-End server. In this paper, we introduce an efficient key search method, the Hellman Method, to reduce computing complexity in Back-End server. Hellman Method algorism progresses pre-computation and (re)search. In this paper, after applying Hellman Method to Hash chain theory, We compared Preservation and key reference to analyze and apply to parallel With guaranteeing requistes of security for existing privacy protecting Comparing key reference reduced computation time of server to reduce computation complex from O(m) to
than the existing form.
A Safety Verification of the Modified BLP Model using PVS
Koo Ha-Sung ; Park Tae-Kue ; Song Ho-Keun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1435~1442
The ideal method of safety evaluation is to verify results of execution against all possible operations within operating system, but it is impossible. However, the formal method can theoretically prove the safety on actual logic of operating system. Therefore we explain the contents of the art of the safety verification of security kernel, and make a comparative study of various standardized formal verification tools. And then we assigned PVS(Prototype Verification system) of SRI(Stanford Research Institute) to verify the safety of a modified BLP(Bell & LaPadula) model, the core access control model of multi-lavel based security kernel. Finally, we describe formal specification of the revised BLP model using the PVS, and evaluate the safety of the model by inspecting the specification of the PVS.
A Study on the Design of Secure Messenger Using ECC of ElGamal Method in PKI Environment
Park Su-Young ; Choi Kwang-Mi ; Jung Choi-Yeoung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1443~1448
As computers and networks become popular, distributing information on the Internet is common in our daily life. In the past, e-mail has been the primary choice of exchanging information but messengers are gaining popularity abroad and domestically because of their nature of getting immediate responses. Information leakage by invasion that is enemy of evil in communication of communications division Server and Agent between each agents that become burden of communication for effective administration of data for most of existing messenger is becoming an issue. In this paper, we design a secure messenger system that could be obtained maximum security. It use ECC based on ElGamal methodology using PKI for secure communication. For the message encryption and decryption between the same group non, each group is kept distinct by drawing an elliptic curve and an arbitrary point is chosen on the curve.
A Framework for Electronic Navigational Chart Systems Based on the Web
Lee Seong-Dae ; Park Hyu-Chan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1449~1458
Electronic Navigational Charts (ENCs) are digital charts which contain a great variety of data on coast and sea regions. Although they contain much information that ordinary people are interested in, there is no easy way to access because they are coded in the specialized data forma, and can be visualized by using specialized system. Therefore, supporting systems need to be developed for ordinary people to easily access ENCs. This paper proposes a framework for the ENC systems based on the Web. It relies on quite general standards such as Ceography Markup Language (GML) and Scalable Vector Graphics (SVG). In the framework, ENCs coded in S-57 format are first translated into GML to be stored in a database. Once the database is built, users can request to the database what they want. According to the user request, relevant data are retrieved, and then translated into SVG to be displayed on the Web browser. By using the framework, ordinary people may easily access coast and sea information contained in the ENCs. Furthermore, the framework may provide interoperability by virtue of XML-based standards such as GML and SVG, and efficiency by virtue of database. To validate the feasibility of proposed framework, a prototype system is developed and tested.
Comparison and Evaluation of Vector and Raster Methods for Mobile Map Services
Choi Jin-Oh ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1459~1464
There are two approaches to construct mobile GIS, Vector and Raster methods, according to the map data transformation format from server to mobile client. Each method requires a different implementation architecture of server and client modules for mobile map services. And each have advantages and disadvantages at the different aspects. This thesis implements these two approaches, thus, compares the each merits, by experiments. They include the transmission performance, map quality, and so on.
Design of Low Power CMOS LNA for using Current Reuse Technique
Cho In-Shin ; Yeom Kee-Soo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1465~1470
This paper presents a design of low power CMOS LNA(Low Noise Amplifier) for 2.4 GHz ZigBee applications that is a promising international standard for short area wireless communications. The proposed circuit has been designed using TSMC
CMOS process technology and two stage cascade topology by current reuse technique. Two stage cascade amplifiers use the same bias current in the current reused stage which leads to the reduction of the power dissipation. LNA design procedures and the simulation results using ADS(Advanced Design System) are presented in this paper. Simulation results show that the LNA has a extremely low power dissipation of 1.38mW with a supply voltage of 1.0V. This is the lowest value among LNAs ever reported. The LNA also has a maximum gain of 13.38dB, input return loss of -20.37dB, output return loss of -22.48dB and minimum noise figure of 1.13dB.
Visualization of propagating process in the seizure discharge by use of cross-correlation analysis
Kim Jin-Woo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1471~1477
Electrocorticogram (ECoG) was recorded in one young adult suffering from medically refractory partial seizures a few weeks before resection. ECoG of intractable focal epilepsy was analyzed usins AR model, wavelet analysis and cross-correlation analysis. The cross-correlation of the epileptic discharges was calculated between the electrodes in every unit of time, to get the phase shift. A contour map of the phase shift and the sequential two-dimensional phase shift maps were utilized to localize the epileptic foci and to study their propagation process. More than two epileptogenic foci were localized and two kinds of propagating process were shown. These investigations suggest that epileptic phenomena can be caused by at least two kinds of mechanisms in one patient.
Implementation of the Container ISO Code Recognition System for Real-Time Processing
Choi Tae-Wan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1478~1489
This paper describes system to extract ISO codes in container image. A container ISO code recognition system for real-time processing is made of 5 core parts which are container ISO code detection and image acquisition, ISO code region extraction, individual character extraction, character recognition and database. Among them, the accuracy of ISO code extraction can affect significantly the accuracy of system recognition rate, and also the more exact extraction of ISO code is required in various weather and environment conditions. The proposed system produces binary of the ISO code's template lesions using an adaptive thresholding, extracts candidate regions containing distribution of ISO code, and recognizes ISO codes as detecting a final region through the verifications by using character distribution characteristics of ISO code among the extracted candidates. Experimental results reveal that ISO codes can be efficiently extracted by the proposed method.
A Study on the Implementation of Embedded DHCP Server Based on ARM
Kim Hyeong-Gyun ; Lee Sang-Beom ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1490~1494
Most network equipment is an embedded system designed to execute specific function. An embedded system is an electronic control system mixing hardware and software to execute only fixed function for the purpose of system, not confuter, performing diverse function for a wide use. Early embedded system executed only simple function, combining specific function with optimization, a micro size, and low power, but it has developed to meet complex and diverse system. The purpose of this study is to realize DHCP server based on embedded system. To achieve this, embedded Linux was ported in ez Bord-M01 mounted with Intel Strong ARM SA1110 processor, and ethernet-based network was constructed for network function. In this way, this study suggests embedded DHCP server where Window and Linux client hosts are dynamically configurated as network information by dynamically assigning network information in embedded board.
Development of Universal Remote Control System using TFT Color LCD
Kim Yong-Pyo ; Yoon Dong-Han ; Choi Un-Ha ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1495~1501
In this paper, It is purposed to Develope Development of Home Automation Remote Control System using W Color touch LCD(liquid crystal display). This control remotely with remote control innovative and ergonomic design, right combination of LCD and hard buttons and its industry leading technology puts your customers at the cutting-edge of home entertainment. Remote Control for casual users is programmed automatically programmed with multiple free step macros and IR commands. Radio Frequency (RF) operation provides 50-100 inch range though walls and doors. Editor includes a vast library of IR codes for hundreds of brands and models of A/V components. This database is constantly growing with the inclusion of new devices every month. Keep your software up to date by using the Live Update feature. Rather than un-installing and re-installing the software, you download updates to the software from the internet.
Performance Analysis of HDR-WPAN System with MIMO Techniques
Han Deog-Su ; Kang Chul-Gyu ; Oh Chang-Heon ; Cho Sung-Joon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1502~1509
In this paper, we proposed reliability and capacity enhancement methods for IEEE 802.15.3 HDR-WPAN (High Data Rate-Wireless Personal Area Network) system which is currently getting an interest in home network technology adopting a MIMO technique. We also analyzed performance or the proposed system through a computer simulation. The HDR-WPAN system using V-BLAST algorithm, transmitting the different signal vector to each other's sub-channel, can get the transmission speed of more than 110Mbps using two Tx/Px antenna without bandwidth expansion in TCM-64QAM mode. Also the proposed system has reliability of 104 at
under the Rayleigh fading channel in case of two Tx/Rx antenna with MMSE algorithm. The HDR-WPAN system adopting V-BLAST method has its drawback which is very complicated to determine the decision-ordering at the receiver. But, the proposed system enhances the transmission capacity and reliability without extra bandwidth expansion by sending data streams to multiple antennas.
Dynamic Address Interworking Scheme between Wireless Sensor Network and Internet Based on IPv4/IPv6
Kim Jeong-Hee ; Kwon Hoon ; Kwak Ho-Young ; Do Yang-Hoi ; Kim Dae-Young ; Kim Do-Hyeun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1510~1518
As a promising technology that enables ubiquitous computing and leads IT(information Technology) industries of next generation, the exciting new field of sensor networks is attracting so much attention and considered to be the one of the hottest research topics these days. From now on, all the each node, forming a network, and even the sensor network itself will interact with the generic network and evolve dynamically according to the change of environment with the perpetual creation and extinction. In this paper, we purpose the dynamic address interworking scheme for interactive networking between sensor network and Internet(IPv6). Proposed scheme is enable to interworking dynamically between sensor network address scheme based on Zigbee and Internet address scheme based on IP. Additionally, we implement the proposed address interworking scheme using Berkeley TinyOS, mica motes, and IP protocol. And, we verify the proposed scheme by the interconnection experimental between wireless sensor networks and Internet based on IPv4/IPv6.
Design and Implementation of the Distributed Object Middleware for Ubiquitous-Home Healthcare System
Park Su-Hyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 8, 2006, Pages 1519~1525
This paper proposes the U-healtcare middleware that is based on mininumCORBA. Ubiquitous healthcare system is generated by combining the technologies of computer system and medical system. This makes available that the person can receive medical treatment anywhere, anytime at on-line. The Healthcare devices are connected to network system as wire or wireless internet. So, the computer system can gather the vital information from the person at the real time and transfers the information to the server system that processes the medical information. When a medical doctor makes a diagnosis they can get more information about the patient by using the information within the server. Users would like to receive more services in the ubiquitous healthcare system than the traditional medical system. And in U-healthcare system, every healthcare devices and the users have to be connected to network system and the information from them has to be integrated. U-Home Healthcare middleware I proposed in this paper will do everything that I mentioned above.