Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information and Communication Engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 12, Issue 12 - Dec 2008
Volume 12, Issue 11 - Nov 2008
Volume 12, Issue 10 - Oct 2008
Volume 12, Issue 9 - Sep 2008
Volume 12, Issue 8 - Aug 2008
Volume 12, Issue 7 - Jul 2008
Volume 12, Issue 6 - Jun 2008
Volume 12, Issue 5 - Apr 2008
Volume 12, Issue 4 - Apr 2008
Volume 12, Issue 3 - Mar 2008
Volume 12, Issue 2 - Feb 2008
Volume 12, Issue 1 - Jan 2008
Selecting the target year
Miniaturization of UHF Planar Antenna Employing Slot-loading
Chun, Joong-Chang ; Lee, Dong-Hyun ; Kim, Tae-Soo ; Kim, Hyun-Deok ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 979~983
Planar antennas are very efficient for the use of the out-door data transmission applications due to their low-profile characteristics. But the size of the antenna in UHF band blocks the practical usage. In this paper, a miniaturized planar antenna is investigated for the application of AMR system in UHF band. The designed antenna is fabricated in the form of the microstrip patch on the FR-4 substrate. The miniaturization is achieved by slot-loading on the patch. First, effects of simple slots on the size reduction are analyzed, followed by the design using more complex slots resulting in the reduction ratio of 37.9% in 425.6 MHz and bandwidth of 3.8 MHz. The effort of epoxy coating for the protection is also investigated.
The Design of U-Slot Stack Structure Antenna for 800MHz Band Coastal Sea Base Station Applications
Kim, Kab-Ki ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 984~989
In this paper, we will design a 800MHz broadband antenna after a problem of the narrow bandwidth is improved. This multiple band antenna unifies the CDMA(Code Division Multiple Access), GSM(Global System for Mobile Telecommunication) and TRS(Trunked Radio System) band in the UHF band, and then it is possible at the shore base station or repeater as the commercial use. It used the duplex resonance effect it had the L-shared feeding structure which adds the U-slot. And it improved profit using stack structure. It was measured that the frequency bandwidth of the designed antenna which is planed
with 248MHz(33%). And the antenna gain is 9.4dBi, 3dB beam width
in radiation pattern.
Experimental Results of SSB Modem in Shallow Sea
Ju, Hyng-Jun ; Han, Jung-Woo ; Kim, Ki-Man ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 990~998
In this paper we achieve experimental data evaluation using SSB(Single-side band) modulation in the ocean. Present research in underwater communication is applying digital modulation, OFDM and MIMO system. However, Commercial modems using analog modulation techniques in oceans. So, we achieved experimental for modem appliance development of correct high quality in South Korea sea characteristics. This experimets achievd useing SSB analog modulation in Jin-hae shore of shallow water condition. Used data are tonal and LFM signal for getting underwater channel characterisitcs and female Korean speech for speech communications.
A New RFID Multi-Tag recognition Algorithm using Collision-Bit
Ji, Yoo-Kang ; Cho, Mi-Nam ; Hong, Sung-Soo ; Park, Soo-Bong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 999~1005
RFID(Radio Frequency IDintification) leader is collision of data, when recognizing the multiple tag the inside area. This collision became the cause which delays the tag recognition time of the leader. The protocol which prevents the delay of tag recognition time of the leader the place where representative it uses QT(Query Tree) algorithms, it uses a collision bit position from this paper and are improved QT-MTC(Query Tree with Multi-Tag Cognition) algorithms which it proposes. This algorithm stored the bit position which bit possibility and the collision where the collision happens occurs in the stack and goes round a tree the number of time which, it reduced could be identified two tags simultaneously in order, it was planned. A result of performance analysis, It compared in QT protocols and the this algorithm against the tag bit which is continued a high efficiency improvement effect was visible.
Study on New Security Device of Telephony Using the Pseudo Random Number Generator
Kim, Soon-Seok ; Lee, Yong-Hee ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1006~1009
We suggest the digital voice encryption module using the pseudo random number generator and design the security device of a telephone using the module. The proposed method provides encryption method of the telephone against the third party. This encryption method uses pseudo random number generator which computes the encryption key using the shared secret key and the current time value.
Tag Identification Process Model with Scalability for Protecting Privacy of RFID on the Grid Environment
Shin, Myeong-Sook ; Kim, Choong-Woon ; Lee, Joon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1010~1015
The choice of RFID system is recently progressing(being) rapidly at various field. For the sake of RFID system popularization, However, We should solve privacy invasion to gain the pirated information of RFID tag. There is the safest M Ohkubos's skill among preexistent studying to solve these problems. But, this skill has a problem that demands a immense calculation capability caused an increase in tag number when we discriminate tags. So, This paper proposes the way of transplant to Grid environment for keeping Privacy Protection up and reducing the Tag Identification Time. And, We propose the Tag Identification Process Model to apply Even Division Algorithm to separate SP with same site in each node. If the proposed model works in Grid environment at once, it would reduce the time to identify tags to 1/k.
Analysis of Authentication Architecture in Integrated WLAN/3G Networks
Shrestha, Anish Prasad ; Lee, Sang-Duk ; Cho, Byung-Lok ; Han, Seung-Jo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1016~1021
A number of wireless technologies have been implemented, but each technology has its limitation in terms of coverage and bandwidth. WLAN and 3G cellular network has emerged to be a complementary platform for wireless data communications. However, the mobility of roaming terminals in heterogeneous networks poses several risks. To maintain secure communications in universal roaming, the effective authentication must be implemented. The focus of this paper is on analysis of authentication architecture involved in integrated WLAN/3G networks.
Secure Framework for SIP-based VoIP Network
Han, Kyong-Heon ; Choi, Dong-You ; Bae, Yong-Guen ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1022~1025
Session Initiation Protocol (SIP) has become the call control protocol of choice for Voice over IP (VoIP) networks because of its open and extensible nature. However, the integrity of call signaling between sites is of utmost importance, and SIP is vulnerable to attackers when left unprotected. Currently a herby-hop security model is prevalent, wherein intermediaries forward a request towards the destination user agent sewer (UAS) without a user agent client (UAC) knowing whether or not the intermediary behaved in a trusted manner. This paper presents an integrated security model for SIP-based VoIP network by combining hop-by-hop security and end-to-end security.
A design of Giga-bit security module using Fully pipe-lined CTR-AES
Vinh, T.Q. ; Park, Ju-Hyun ; Kim, Young-Chul ; Kim, Kwang-Ok ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1026~1031
Nowdays, homes and small businesses rely more and more PON(Passive Optical Networks) for financial transactions, private communications and even telemedicine. Thus, encryption for these data transactions is very essential due to the multicast nature of the PON In this parer, we presented our implementation of a counter mode AES based on Virtex4 FPGA. Our design exploits three advanced features; 1) Composite field arithmetic SubByte, 2) efficient MixColumn transformation 3) and on-the-fly key-scheduling for fully pipelined architecture. By pipeling the composite field implementation of the S-box, the area cost is reduced to average 17 percent. By designing the on-the-fly key-scheduling, we implemented an efficient key-expander module which is specialized for a pipelined architecture.
A Direction-Decision RFID System with a Authentication
Park, Chul-Min ; Jo, Heung-Kuk ; Lee, Hoon-Jae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1032~1038
RFID is applied in various industry area. The purpose of RFID system is authentication of objects. After Tag's certification, RFID system start to process to be wanted. A RFID electric motor recognizes Tag's action and tails. The application of this system is very wide. For example, a cart in shopping Mall follows customer with a proper Tag. Customer may be very convenient if the cart follows customer autonomously as recognizing the direction of Tag. In this parer, we studied about RFID system that follow objects with a Tag. Finally, we experimented and analysed the proposed system, with Tag, Reader, host computer and electric motion motors.
A Design of Framework based on SyncML for Smart Synchronization of u-GIS
Lee, Hyoun-Sup ; Kim, Jin-Deog ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1039~1044
Owing to rapid advancements of the mobile computing technologies and the performance of mobile device recently, the data synchronization techniques between severs and mobile clients are getting more and more important. OMA also proposes and recommends standard synchronization methods to use SyncML. However, the feasible data in the method are limited to normal document data, scheduler data, etc. This paper a standard framework based on SyncML. We call it SCGFG. The SCGFG is able to synchronize not only the above data but also GIS data which is very useful in mobile applications. It applies GML, international GIS standard, to the synchronization. By means of using XML, it is also able to resolve the serious problem that is the increase of data volume occurred by SyncML and GML. efficiently. It is highly expected to be useful in the smart synchronization of GIS data among several servers and mobile clients.
Analysis of Position Error Variance on GNSS Augmentation System due to Non-Common Measurement Error
Jun, Hyang-Sig ; Ahn, Jong-Sun ; Yeom, Chan-Hong ; Lee, Young-Jae ; Choi, Young-Kiu ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1045~1050
A GNSS augmentation system provides precision information using corrected GNSS pseudorange measurements. Common bias errors are corrected by PRC (Pseudorange Correction) between reference stations and a rover. However non-common errors (ionospheric and tropospheric noise error) are not corrected. Using position error variance this paper analyzes non-common error (noise errors) of ionosphere and troposphere wet vapor.
The Electroluminescence Display using Electron Beam evaporation
Hur, Chang-Wu ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1051~1055
If ZnS receive electric energy, it can generate light. Thin film ELD has merits of excellent sight effect, solid state and easy fabrication but has problems of low emission density, high power loss and high operating voltage. Thin film deposited by electron beam evaporator has good uniformity of 6%. We fabricate excellent thin film ELD for solution of this problems. The thin film ELD made in this study has brightness of 650fL at yellow light and 350fL at green light.
A Design of Parameterized Viterbi Decoder for Multi-standard Applications
Park, Sang-Deok ; Jeon, Heung-Woo ; Shin, Kyung-Wook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1056~1063
This paper describes an efficient design of a multi-standard Viterbi decoder that supports multiple constraint lengths and code rates. The Viterbi decoder is parameterized for the code rates 1/2, 1/3 and constraint lengths 7,9, thus it has four operation nodes. In order to achieve low hardware complexity and low power, an efficient architecture based on hardware sharing techniques is devised. Also, the optimization of ACCS (Accumulate-Subtract) circuit for the one-point trace-back algorithm reduces its area by about 35% compared to the full parallel ACCS circuit. The parameterized Viterbi decoder core has 79,818 gates and 25,600 bits memory, and the estimated throughput is about 105 Mbps at 70 MHz clock frequency. Also, the simulation results for BER (Bit Error Rate) performance show that the Viterbi decoder has BER of
of 3.6 dB when it operates with code rate 1/3 and constraints 7.
Video Surveillance System Design and Realization with Interframe Probability Distribution Analyzation
Ryu, Kwang-Ryol ; Kim, Ja-Hwan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1064~1069
A system design and realization for video surveillance with interframe probability distribution analyzation is presented in this paper. The system design is based on a high performance DSP professor, video surveillance is implemented by analyzing interframe probability distribution using trivariate normal distribution(weight, mean, variance) for scanning objects in a restricted area and the video analysis algorithm is decided for forming a different image from the probability distribution of several frame compressed by the standardized JPEG. The system processing time of D1
image per frame is 85ms and enables to process the system at 12 frames per second. An object surveillance about the restricted area by rules is extracted to 100% unless object is moved faster.
A Study on The Fat Measurement at Subcutaneous Adipose by Optical and Electrical Method
Oh, Se-Yong ; Lee, Young-Woo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1070~1074
Body fat correlation formula induced by using optical method was used white light LED source and electrical method used BIA(Bio-electrical Impedance Analysis) method measured at same time. In the case of BIA method confirmed phase difference of 6 degree and voltage drop of 2.7V at 5V and 50kHz's input signal. In the case of optical method confirmed that optical intensity increased by order of the biceps, the fleshy inside of the thigh and the triceps. We obtained percent body fat of 20% with the body fat correlation formula induced by photo-electricity method.
The Cryption Tool Transfer System for Digital Broadcasting Service
Cao, Ke-Rang ; Hwang, Kyung-Min ; Jung, Hoe-Kyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1075~1081
The growth of digital content market inducted to develope consuming device of various content. And through this, digital content consuming is more Promoted. But digital content cryption tool need to handle to protect and consume digital content safely. Also, interoperability of cryption tool management is impossible, because of not standardized transfer protocol between device. In this paper, we defined transfer protocol of cryption tool for protecting and consuming digital content. And in this base, we designed and implemented transfer server/client system.
Derivation of Closed Form Channel Capacity Using Confluent Hypergeometric Function for Wireless MIMO
Kabir, S.M.Humayun ; Pham, Van-Su ; Mai, Linh ; Yoon, Gi-Wan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1082~1086
Multiple-input multiple-output (MIMO) is an efficient technology to increase data rate in wireless networks due to bandwidth and power limitations. Data transmission rate between transmitter and receiver is determined by channel capacity. MIMO has an advantage of reliable communication over wireless channel because of utilizing the channel capacity properly. In this letter, we drive a new formula, closed form capacity formula, using confluent hypergeometric function.
Design of Formalized message exchanging method using XMDR
Hwang, Chi-Gon ; Jung, Kye-Dong ; Choi, Young-Keun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1087~1094
Recently, XML has been widely used as a standard for a data exchange, and there has emerged the tendency that the size of XML document becomes larger. The data transfer can cause problems due to the increase in traffic, especially when a massive data such as Data Warehouse is being collected and analyzed. Therefore, an XMDR wrapper can solve this problem since it analyzes the tree structures of XML Schema, regenerates XML Schema using the analyzed tree structures, and sends it to each station with an XMDR Query. XML documents which are returned as an outcome encode XML tags according to XML Schema, and send standardized messages. As the formalized XML documents decrease network traffic and comprise XML class information, they are efficient for extraction, conversion, and alignment of data. In addition, they are efficient for the conversion process through XSLT, too, as they have standardized forms. In this paper we profuse a method in which XML Schema and XMDR_Query sent to each station are generated through XMDR(extended Meta-Data Registry) and the generation of products and XML conversion occur in each station wrapper.
Feature Extraction Using Trace Transform for Insect Footprint Recognition
Shin, Bok-Suk ; Cho, Kyoung-Won ; Cha, Eui-Young ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1095~1100
In a process of insect foot recognition, footprint segments as basic areas for recognition need to be extracted from scanned insect footprints and appropriate features should be found from the footprint segments in order to discriminate kinds of insects, because the characteristics of the features are important to classify insects. In this paper, we propose methods for automatic footprint segmentation and feature extraction. We use a Trace transform method in order to find out appropriate features from the extracted segments by the above methods. The Trace transform method builds a new type of data structure from the segmented images by functions using parallel trace lines and the new type of data structure has characteristics invariant to translation, rotation and reflection of images. This data structure is converted to Triple features by Diametric and Circus functions, and the Triple features are used for discriminating patterns of insect footprints. In this paper, we show that the Triple features found by the proposed methods are enough distinguishable and appropriate for classifying kinds of insects.
Recognition of Finger Language Using FCM Algorithm
Kim, Kwang-Baek ; Woo, Young-Woon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1101~1106
People who have hearing difficulties suffer from satisfactory mutual interaction with normal people because there are little chances of communicating each other. It is caused by rare communication of people who have hearing difficulties with normal people because majority of normal people can not understand sing language that is represented by gestures and is used by people who have hearing difficulties as a principal way of communication. In this paper, we propose a recognition method of finger language using FCM algorithm in order to be possible of communication of people who have hearing difficulties with normal people. In the proposed method, skin regions are extracted from images acquired by a camera using YCbCr and HSI color spaces and then locations of two hands are traced by applying 4-directional edge tracking algorithm on the extracted skin lesions. Final hand regions are extracted from the traced hand regions by noise removal using morphological information. The extracted final hand regions are classified and recognized by FCM algorithm. In the experiment using images of finger language acquired by a camera, we verified that the proposed method have the effect of extracting two hand regions and recognizing finger language.
Clustering Algorithm to Equalize the Energy Consumption of Neighboring Node on Sink in Wireless Sensor Networks
Jung, Jin-Wook ; Jin, Kyo-Hong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1107~1112
Clustering techniques, which are algorithm to increase the network lifetime in wireless sensor networks, is developed to minimize the energy consumption of nodes. Existing clustering techniques by to increase the network lifetime with equalizing each node's the energy consumption by rotating the role of CH(Cluster Head), but these algorithms did not present the solution that minimizes the energy consumption of neighboring nodes with sink. In this paper, we propose the clustering algorithm that prolongs the network lifetime by not including a part of nodes in POS(Personal Operating Space) of the sink in a cluster and communicating with sink directly to reduce the energy consumption of CH closed to sink.
A hierarchical routing protocol of suggest to Sensor network reconfiguration
Kwon, Hoon ; Kim, Jeong-Hee ; Kwak, Ho-Young ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1113~1119
In IP-USN for replacing the sensor network based on Zigbee by IP-based it, routing and the address assignment technique for sensor node are important focuses. But, there is a weak point in existing hierarchical routings. It is that all paths must be searched because the end node isn't considered. And the end node based muting is not sufficient in the mobile sensor network environment because it supports the only simple-path-search. Hereupon, this thesis suggests ComHRP(Complement HRP) that have the only merits of existing methods. The address assignment technique and search method are also proposed. ComHRP simplifies the organization of sensor networks and reduces network complexity. Also, It can efficiently deal with restructuring networks for the unpredictable ubiquitous sensor network feature.
Ultra-Wide Band Sensor Tuning for Localization and its Application to Context-Aware Services
Jung, Da-Un ; Choo, Young-Yeol ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1120~1127
This paper presents implementation of localization system using UWB (Ultra-Wide Band) sensors and its experimental results along with development of context-aware services. In order for precise measurement of position, we experimented various conditions of pitch angles, yaw angles, number of sensors, height of tags along with measuring errors at each installation. As an application examples of the location tracking system, we developed an intelligent health training management system based on context-aware technology. The system provides appropriate training schedule to a trainee by recognizing position of the trainee and current status of gymnastic equipments and note the usage of the equipment through a personal digital assistant (PDA). Error compensation on position data and moving direction of the trainee was necessary for context-aware service. Hence, we proposed an error compensation algorithm using velocity of the trainee. Experimental results showed that proposed algorithm had made error data reduce by 30% comparing with the data without applying the algorithm.
Implementation of a Context-awareness based UoC Architecture for MANET
Doo, Kyoung-Min ; Lee, Kang-Whan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1128~1133
Context-aware computing has been attracting the attention as an approach to alleviating the inconvenience in human-computer interactions. This paper proposes a context-aware system architecture to be implemented on an UoC (Ubiquitous system on Chip). A new proposed technology of CRS (Context Recognition Switch) and DOS (Dynamic and Optimal Standard) based on Context-awareness system architecture with pre-processor, HPSP(High Performance Signal Processor) in this paper. And proposed a new algorithm using in network topology processor shows for Ubiquitous Computing System. implementing in UoC (Ubiquitous System on Chip) base on the IEEE 802.15.4 WPAN (Wireless Personal Area Network) standard. Also, This context-aware based UoC architecture has been developed to apply to mobile intelligent robots which would support human in a context-aware manner.
Biological data transmission performance of virtual cattle feedlot sensor network
Kang, Hyun-Joong ; Ju, Hui-Dong ; Lee, Meong-Hun ; Yoe, Hyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1134~1141
As sensor network technologies developed, the sphere field of application is escalated unfortunately, the applicable size is smaller than the actual quantity of cattle in feedlot. In this paper, we simulated and evaluated biological data transmission performance of virtual cattle feedlot. Deducted conclusions show us a more efficient cattle control scenario is required and effective routing protocol design and modification are needed.
An Application Scheme and Comparison for the Education Homepage By the Web Accessability Guidelines
Jung, Deok-Gil ; Lee, Jong-Hun ; Lho, Young-Uhg ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 6, 2008, Pages 1142~1147
In recent years, the efforts for standards of Web contents accessibility and the improvements of Web accessibility are expanded in the government, enterprises, and public institutions. In this paper, we examine the Korean Web contents accessibility guidelines, and propose the evaluation scheme for the education homepage by the Web accessibility guidelines using KADO-WAH program which is the evaluation tool for Web accessibility. Also, we propose the improvement scheme for education homepage by modifying the error and warning clauses directed in which are appeared in the evaluation report. And, we evaluate the various education homepages using KADO-WAH, and analyze the comparisons for the Web accessibility guidelines among the education homepages.