Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information and Communication Engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 12, Issue 12 - Dec 2008
Volume 12, Issue 11 - Nov 2008
Volume 12, Issue 10 - Oct 2008
Volume 12, Issue 9 - Sep 2008
Volume 12, Issue 8 - Aug 2008
Volume 12, Issue 7 - Jul 2008
Volume 12, Issue 6 - Jun 2008
Volume 12, Issue 5 - Apr 2008
Volume 12, Issue 4 - Apr 2008
Volume 12, Issue 3 - Mar 2008
Volume 12, Issue 2 - Feb 2008
Volume 12, Issue 1 - Jan 2008
Selecting the target year
Noise Reduction Algorithm of Digital Hologram Using Histogram Changing Method
Choi, Hyun-Jun ; Seo, Young-Ho ; Kim, Dong-Wook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 603~610
In this paper, we propose an efficient noise reduction algorithm for digital hologram during acquisition and transmission. The proposed algorithm segment a digital hologram with object region and background region after DCT. Then, we adopt a histogram transition method for object region and zero-value change method for background region. The experimental results show that our algorithm has beuer performance than a natural image denoising algorithm.
Design and Implementation of 2.5D Mapping System for Cloth Pattern
Kim, Ju-Ri ; Joung, Suck-Tae ; Jung, Sung-Tae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 611~619
2.5D Mapping system that embody in this paper can make new design by doing draping to live various texture and model picture image of fashion clothes by pattern, and can confirm clothes work to simulation without producing direction sample or product directly. Also, the system can support function that can forecast fabric design and state of end article exactly, and the system can bring competitive power elevation of fashion industry and cost-cutting effect by doing draping using database of fabric and model picture image. 2.5D Mapping system composed and embodied by mesh warp algorithm module, light and shade extraction and application module, mapping path extraction module, mesh creation and transformation module, and 2.5D mapping module for more natural draping. Future work plans to study 3D fashion design system that graft together 3D clothes technology and 3D human body embodiment technology to do based on embodiment technology of 2.5D mapping system and overcomes expression limit of 2.5D mapping technology.
Feature Map for Collision Detection in Motion-Based Game using Web Camera
Lee, Young-Jae ; Lee, Dae-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 620~626
We propose a feature map method to detect a collision for a motion-based game. The feature map can be made an optimally reduced motion data using subtraction image and virtual ball images according to image size and condition. And we calculate the overlapped ratio between moving image data and objects. This ratio is an invariant for detection even though image size is changed. And we compare this ration with collision detection constant, the feature map can detect fast collisions as well as the collided direction. To evaluate the method, we implemented a motion-base game that consists of a web cam, a player, an enemy, and some virtual balls, and we obtained some valid results for our method for the collision detection. The results demonstrated that the proposed approach is robust, and they can be used as a basic collide detection algorithm for a motion-based game where the size and the position of characters are continuously changing.
A Media Access Control for Spatial Reuse in Wireless Ad hoc Networks
Qingxian, Pu ; Hwang, Won-Joo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 627~635
Using directional antenna in wireless network can offer many advantages including significant decrease of interference, increase of spatial reuse and possibility of improving network capacity. However, existing 802.11 MAC is designed for use of omni-directional antenna then those advantages can not be shown in that MAC protocol when it uses directional antenna. In this paper, we present a MAC protocol specifically designed for directional antenna to achieve spatial reuse and improve capacity of MAC protocol. Simulation result shows the advantages of our proposal in comparison with existing MAC in terms of end-to-end delay and network throughput.
Design and Implementation of Embedded Ethernet Module
Kim, Yung-Jin ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 636~642
Upon the changes of human life style due to the distribution of ultra-high speed internet services and the development of high-tech information equipment, the idea of necessity fer home networking has been widely accepted. Thus, "embedded ethernet module" was designed in this paper for the stabilization of home networking by using 8051 MCU, Hardwired TCP/IP (W3150A). By executing remote software on established simple web-server on the target machine, controlling electric equipment became available elsewhere. With this module, establishing a low-cost home automations system would become possible in a ubiquitous society.
Open Based Network Security System Architecture
Kim, Chang-Su ; Jung, Hoe-Kyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 643~650
If existing system need to expand security part, the security was established after paying much cost, processing of complicated installation and being patient with inconvenience at user's view because of closed structure. In this thesis, those defects could be overcome by using open security tools and constructing security server, which is firewall of 'bastion' form including proxy server, certification server and so on. Also each security object host comes to decide acceptance or denial where each packet comes from, then determines security level each hosts. Precisely it is possible choosing the packets from bastion host or following at the other policies. Although an intruder enter into inside directly, it is constructed safely because encryption algorithm is applied at communication with security object host. This thesis suggests more flexible, independent and open security system, which improves existing security through systematic linkage between system security and network security.
Efficient and Dynamic Authenticated Dictionary Design Using RSA One-way Accumulator
Kim, Soon-Seok ; Lee, Yong-Hee ; Lee, Kang-Woo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 651~660
The widespread use of public networks, such as the Internet, for the exchange of sensitive data that need a severe security, like legally valid documents and business transactions. At the same time public-key certificates used for sensitive data interchange form the viewpoint of data integrity and authentication. But there are some weakness of data transfer capacity and security in public key infrastructure(PKI) environment. This paper use the RSA one-way accumulator to realize an efficient and dynamic authenticated dictionary, where untrusted directories provide cryptographically verifiable answers to membership queries on a set maintained by a trusted source.
OTP Authentication Protocol using PingPong-128
Lee, Jang-Chun ; Lee, Hoon-Jae ; Lim, Hyo-Taek ; Lee, Sang-Gon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 661~669
Nowadays, authentication is essential to identify the legal users in a network communication. Usually, there are few wars to achieve authentication over a publicly accessible network system in order to protect certain private data from the unauthorized users, ranging from simple ID/Password to Biometrics System. One of the most active areas in OTP(One Time Password) research today aims at exploiting OTP to provide authentication in the finance and security industry. OTP is usually discarded once it has been used. this prevents huge loophole of traditional authentication system which employs the same ID and Password every time. However this OTP system also has its weaknesses in surviving some attacks. this paper proposes an advanced OTP protocol using PingPong-128 without loop hole of pre-existing OTP.
A Study on Spam Protection Technolgy for Secure VoIP Service in Broadband convergence Network Environment
Sung, Kyung ; Kim, Seok-Hun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 670~676
There is a difficult plane letting a security threat to occur in Internet networks as VoIP service uses technology-based the Internet is inherent, and you protect without adjustment of the existing security solution or changes with real-time service characteristics. It is a voice to single networks The occurrence security threat that it is possible is inherent in IP networks that effort and cost to protect a data network only are complicated relatively as provide service integrated data. This paper about various response way fields to be able to prevent analysis regarding definition regarding VoIP spam and VoIP spam technology and VoIP spam.
Implementation of the Grid-Based Research System Supporting Remote Experiment Replay using Distributed Streaming Server
Jang, Sun ; Lee, Jang-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 677~684
We propose an grid-based research system that replays the experiment by storing and reusing the previous experiment result data in performing remote experiment from a distance. The proposed system was designed for the real-time hybrid test facility which is being built in Korea Construction Engineering Development(KOCED) Project. To provide users with various data, the experiment result data are maintained by the distributed streaming servers based on the publish/subscribe paradigm. Based on the data characteristics of our project, we compared analyzed the performance of the one-streaming-server case and the distributed-multiple-streaming-server case.
Comparison of the neural networks with spline interpolation in modelling superheated water
Lee, Tae-Hwan ; Park, Jin-Hyun ; Kim, Bong-Hwan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 685~690
In numerically evaluating the thermal performance of the heat exchanger, numerical values of thermodynamic properties such as temperature, pressure, specific volume, enthalpy and entropy are required. But the steam table or diagram itself cannot be directly used without modelling. In this study the applicability of neural networks in modelling superheated water vapor was examined. The multi-layer neural networks consist of an input layer with 2 nodes, two hidden layers with 15 and 25 nodes respectively and an output layer with 3 nodes. Quadratic spline interpolation was also applied for comparison. Neural networks model revealed smaller percentage error compared with spline interpolation. From this result, it is confirmed that the neural networks could be a powerful method in modelling the superheated water vapor.
A Design of 10bit current output Type Digital-to-Analog converter with self-Calibration Techique for high Resolution
Song, Jung-Gue ; Shin, Gun-Soon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 691~698
This paper describes a 3.3V 10 bit CMOS digital-to-analog converter with a divided architecture of a 7 MSB and a 3 LSB, which uses an optimal Thermal-to-Binary Decoding method with monotonicity, glitch energy. The output stage utilizes here implements a return-to-zero circuit to obtain the dynamic performance. Most of D/A converters in decoding circuit is complicated, occupies a large chip area. For these problems, this paper describes a D/A converter using an optimal Thermal-to-Binary Decoding method. the designed D/A converter using the CMOS n-well
process0. The experimental data shows that the rise/fall time, settling time, and INL/DNL are 1.90ns/2.0ns, 12.79ns, and a less than
, respectively. The power dissipation of the D/A converter with a single power supply of 3.3V is about 250mW.
Design of A Deblocking Filter Based on Macroblock Overlap Scheme for H.264/AVC
Kim, Won-Sam ; Sonh, Seung-Il ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 699~706
H.264/AVC is a new international standard for the compression of video images, in which a deblocking filter has been adopted to remoye blocking artifacts. This paper proposes an efficient architecture of deblocking filter in H.264/AVC. By making good use of data dependence between neighboring
blocks, the memory sire is reduced and the throughput of the deblocking filter processing is increased. The designed deblocking filter further enhances the parallelism by simultaneously executing horizontal and vertical filtering within a macroblock in pipeline method and adopting overlap between macroblocks. The implementation result shows that the proposed architecture enhances the performance of deblocking filter processing from 1.75 to 4.23 times than that of the conventional deblocking filter. Hence the Proposed architecture of deblocking filter is able to perform real-time deblocking in high-resolution(
) video applications.
A Ranking Method for Improving Performance of Entropy Coding in Gray-Level Images
You, Kang-Soo ; Sim, Chun-Bo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 707~715
This paper proposes an algorithm for efficient compression gray-level images by entropy encoder. The issue of the proposed method is to replace original data of gray-level images with particular ranked data. For this, first, before encoding a stream of gray-level values in an image, the proposed method counts co-occurrence frequencies for neighboring pixel values. Then, it replaces each pay value with particularly ranked numbers based on the investigated co-occurrence frequencies. Finally, the ranked numbers are transmitted to an entropy encoder. The proposed method improves the performance of existing entropy coding by transforming original gray-level values into rank based images using statistical co-occurrence frequencies of gray-level images. The simulation results, using gray-level images with 8-bits, show that the proposed method can reduce bit rate by up to 37.85% compared to existing conventional entropy coders.
Extraction of Water Depth in Coastal Area Using EO-1 Hyperion Imagery
Seo, Dong-Ju ; Kim, Jin-Soo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 716~723
With rapid development of science and technology and recent widening of mankind's range of activities, development of coastal waters and the environment have emerged as global issues. In relation to this, to allow more extensive analyses, the use of satellite images has been on the increase. This study aims at utilizing hyperspectral satellite images in determining the depth of coastal waters more efficiently. For this purpose, a partial image of the research subject was first extracted from an EO-1 Hyperion satellite image, and atmospheric and geometric corrections were made. Minimum noise fraction (MNF) transformation was then performed to compress the bands, and the band most suitable for analyzing the characteristics of the water body was selected. Within the chosen band, the diffuse attenuation coefficient Kd was determined. By deciding the end-member of pixels with pure spectral properties and conducting mapping based on the linear spectral unmixing method, the depth of water at the coastal area in question was ultimately determined. The research findings showed the calculated depth of water differed by an average of 1.2 m from that given on the digital sea map; the errors grew larger when the water to be measured was deeper. If accuracy in atmospheric correction, end-member determination, and Kd calculation is enhanced in the future, it will likely be possible to determine water depths more economically and efficiently.
Economic Analysis of Typhoon Surge Floodplain that Using GIS and MD-FDA from Masan Bay, South Korea
Choi, Hyun ; Ahn, Chang-Hwan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 724~729
In the case of 'MAEMI', the Typhoon which formed in September, 2003, the largest-scale damage of tidal wave was caused by the co-occurrence of Typhoon surge and full tide. Until now Korea has been focusing on the calculating the amount of damage and its restoration to cope with these sea and harbor disasters. It is essential to establish some systematic counterplans to diminish such damages of large-scale tidal invasion on coastal lowlands considering the recent weather conditions of growing scale of typhoons. Therefore, the purpose of this research is to make the counterplans for prevention against disasters fulfilled effectively based on the data conducted by comparing and analyzing the accuracy between observation values and the results of estimating the greatest overflow area according to abnormal tidal levels centered on Masan area where there was the severest damage from tidal wave at that time. It's necessary utilize data like high-resolution satellite image and LiDAR(etc.) for correct analysis data considering geographical characteristics of dangerous area from the storm surge. And we must make a solution to minimize the damage by making data of dangerous section of flood into GIS Database using those data (as stated above) and drawing correcter damage function.
The Development of DDC system for High Precision Laser distance instrument
Bae, Young-Chul ; Park, Jong-Bae ; Cho, Eui-Joo ; Kang, Ki-Woong ; Kang, Keon-Il ; Kim, Hyeon-Woo ; Kim, Eun-Ju ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 730~736
We proposed and implemented new DDC system which overcomes the difficulties including lack of flexibility of modifications of frequency which is the problem of previous frequence oscillator and synchronization. New DDC system can create frequence in two decimal points. Moreover, due to its usage in adjusting to frequence clock which is required by many consumers, laser distance instrument can reduce its error; thus, implementation of system is capable of high precision distance measurement can be performed.
A study on the fault detection efficiency of software
Kim, Sun-Il ; Che, Gyu-Shik ; Jo, In-June ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 737~743
I compare my parameter estimation methodoloay with existing method, considering both of testing effort and fault detecting rate simultaneously in software reliability modeling. Generally speaking, fault detection/removal mechanism depends on how apply previous fault detection/removal and testing effort of S/W. The fault removal efficiency makes large influence to the reliability growth, testing and removal cost in developing stage S/W. This is very useful measure during all the developing stages and much helpful for the developer to estimate debugging efficiency, and furthermore, to anticipate additional working amount.
Implementation of Ubiquitous Application based on Context-Awareness
Seo, Jung-Hee ; Park, Hung-Bog ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 744~751
Ubiquitous computing is a new paradigm of telecommunication technology and is embedded with advanced computing technology to process a large amount of data in a normal environment. Generally, ail equipment is embedded with sensors and operating devices to interaction with communication functions. That is why ubiquitous computing must be able to access any devices anywhere at anytime in order to perform appropriate functions. Unfortunately, however, it is difficult to make an optimized design for applications which can effectively interaction with various functions in distributed environment like ubiquitous computing. Therefore, this paper is aimed at deploying interface with server nodules and virtual prototyping by utilizing LabVIEW and embedded application software with additional network function. In addition, given information about sensors collected from context-awareness and location-awareness, it will suggest the ideal ubiquitous application based on context-awareness and apply the advanced application to device control and monitoring through context awareness of lab.
Implementation of Software for the Brake Test in the Vehicle using the LabView
Kang, Jun-Hwan ; Kim, Sun-Hyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 752~757
In this paper, studied Measuring Equipment for Brake Test provided to test a braking distance and stability on various conditions while at stop/drive. It ensures an objectivity, repeatability and reproducibility for a brake test, which may be applied to various types of braking distance and stability tests anywhere in the world. With Measuring S/W for Brake Test mounted on the vehicle while at stop/drive, braking distance and stability were examined under conditions specified of NCAP and vehicle manufactures A and B's own test, which was available under all conditions and even harder ones to confirm this measuring S/W for brake test be applicable for any changed conditions for the future.
Link Layer Traffic Control Algorithm to Improve the Performance of WLANs
Choi, Sun-Woong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 758~765
Wide-spread deployment of infrastructure WLANs has made Wi-Fi an integral part of today's Internet access technology. WLANs suffer from degraded system throughput and each node's throughput fluctuates significantly in the saturation regime. In this paper, we propose a link layer traffic control mechanism which controls the offered load of DCF system. It is shown that the link layer traffic controller can improve DCF system throughput and reduce nodes' throughput fluctuation with properly controlled offered load. We propose a dynamic traffic control algorithm which can find an optimal offered load and show its performance improvement with ns-2 simulation.
A Study on the Implementation of SAW ID Reader Platform
Yu, Ho-Jun ; Kim, Young-Kil ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 766~771
As the practical range of SAW Device extended into various fields including physical sensor, chemical sensor and ID Tag, the platform for various SAW Devices is required more than ever. While SAW ID or Sensors advanced remarkably, the development of platform which applies to SAW Sensor left much to be desired. Therefore this paper represents the SAW platform in order to use SAW ID such as ID Tag or Sensors more conveniently. The SAW platform consists of a RF module which can recognize SAW ID and a main module which has a hish performance processor in order to process the response signal of SAW ID. The main module which has a high performance processor is designed by GUI environmental type to ensure that users are able to use the platform more easily. In this paper, the SAW platform, which is based on ARM9 core processor, used Windows Embedded CE 6.0 OS which brings friendly interface to users. Also the developers can make less effort to design various applications with sensors.
Extensions of X-means with Efficient Learning the Number of Clusters
Heo, Gyeong-Yong ; Woo, Young-Woon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 772~780
K-means is one of the simplest unsupervised learning algorithms that solve the clustering problem. However K-means suffers the basic shortcoming: the number of clusters k has to be known in advance. In this paper, we propose extensions of X-means, which can estimate the number of clusters using Bayesian information criterion(BIC). We introduce two different versions of algorithm: modified X-means(MX-means) and generalized X-means(GX-means), which employ one full covariance matrix for one cluster and so can estimate the number of clusters efficiently without severe over-fitting which X-means suffers due to its spherical cluster assumption. The algorithms start with one cluster and try to split a cluster iteratively to maximize the BIC score. The former uses K-means algorithm to find a set of optimal clusters with current k, which makes it simple and fast. However it generates wrongly estimated centers when the clusters are overlapped. The latter uses EM algorithm to estimate the parameters and generates more stable clusters even when the clusters are overlapped. Experiments with synthetic data show that the purposed methods can provide a robust estimate of the number of clusters and cluster parameters compared to other existing top-down algorithms.
Modified Kalman Filter Method for the Position Estimation of an Autonomous Mobile Robot
Eom, Ki-Hwan ; Kang, Seong-Ho ; Kim, Joo-Woong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 781~790
In order to improve on the divergence by noise convariance in the Kalman filter position estimation, we propose a method of position estimating through compensating the autonomous mobile robot's noise. Proposed method is the modified Kalman filter using neural network. It is prevented the divergence by the estimation of measurement noise covariance and system noise covariance. In order to verify the effectiveness of the proposed method, we performed simulations and experiments for position estimation. The results show that convergence and position error is reduced than the Kalman filter method.
Design and Implementation of High-Resolution Image Transmission Interface for Mobile Device
Lee, Sang-Wook ; Ahn, Yong-Beom ; Kim, Eung-Soo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 4, 2008, Pages 791~799
An image recognition for surrounding conditions is very important in image transmission. In recently rears, as the information infrastructure is more general, the user-centered demands in which they want to identify by object's states image using wire or wireless environment have increased. However, existing mobile solution could be hard to expect high quality mage, because limitation of software processing according as network based on mobile terminal which has low band width supports software codec. To solve this weak point, this paper describes on hardware codec design based on MPEG-4 which is international video compression standard. Implemented system contains the embedded CPU for optimized design and it works high quality service as transmission speed and resolution in mobile circumstance.