Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information and Communication Engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 13, Issue 12 - Dec 2009
Volume 13, Issue 11 - Nov 2009
Volume 13, Issue 10 - Oct 2009
Volume 13, Issue 9 - Sep 2009
Volume 13, Issue 8 - Aug 2009
Volume 13, Issue 7 - Jul 2009
Volume 13, Issue 6 - Jun 2009
Volume 13, Issue 5 - May 2009
Volume 13, Issue 4 - Apr 2009
Volume 13, Issue 3 - Mar 2009
Volume 13, Issue 2 - Feb 2009
Volume 13, Issue 1 - Jan 2009
Selecting the target year
A Study on the Software Reliability of Operational Stage S/W
Che, Gyu-Shik ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 445~450
One method to improve quality before releasing of S/W after development is to enhance the reliability, whose direct methodology is to detect and revise fault through testing. Once the S/W is released because it meets the target reliability, the operational reliability problem arises. It is obvious the operational reliability different from that of testing stage depending on the condition whether it is universal(package) S/W or dedicated S/W. I propose the methodology to calculate operational software reliability of universal and dedicated S/W in this paper.
Vertex Normal Computation using Conformal Mapping and Mean Value Coordinates
Kim, Hyoung-Seok B. ; Kim, Ho-Sook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 451~457
Most of objects in computer graphics may be represented by a form of mesh. The exact computation of vertex normal vectors is essential for user to apply a variety of geometric operations to the mesh and get more realistic rendering results. Most of the previous algorithms used a weight which resembles a local geometric property of a vertex of a mesh such as the interior angle, the area, and so on. In this paper, we propose an efficient algorithm for computing the normal vector of a vertex in meshes. Our method uses the conformal mapping which resembles synthetically the local geometric properties, and the mean value coordinates which may smoothly represent a relationship with the adjacent vertices. It may be confirmed by experiment that the normal vector of our algorithm is more exact than that of the previous methods.
A Proposal for a True VOD Service Combining Patching with a Data Segmented NVOD
Ji, Yong-Jin ; Kim, Nam-Hoon ; Park, Ho-Hyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 458~468
The patching technique has been used for removing initial waiting time of NVOD. The technique was applicable only to time segmented NVOD services. However, data segmented NVOD methods have been known to have less initial waiting time or use less server's bandwidths than the time segmented NVODs. Therefore, we expect that if patching is applied to a data segmented NVOD, a more efficient NVOD service will be possible. But there has not been such approach. In this paper, we propose a new VOD scheduling algorithm that combines the patching technique with a data segmented NVOD, thus it uses less server's bandwidths and removes initial waiting time, hence makes a true VOD service possible. The proposed technique also absorbs the storage overhead necessary for client buffering incurred by patching into the data segmentation policy of the NVOD scheduling, hence does not need any extra overhead of the client's resource. Therefore, it is also applicable to the case that the client has resource limits.
Dynamic Frame Size Allocation Scheme based on Estimated Number of Tags
Lim, In-Taek ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 469~474
An RFID system consists of radio frequency tags attached to objects that need to be identified and one or more electromagnetic readers. Unlike the traditional bar code system, the great benefit of RFID technology is that it allows information to be read without requiring contact between the tag and the reader. For this contact-less feature, RFID technology in the near future will become an attractive alternative to bar code in many application fields. In almost all the 13.56MHz RFID systems, FSA algorithm is used for identifying multiple tags in the reader's identification range. In FSA algorithm, the tag identification time and system efficiency depend mainly on the number of tags and frame size. In this paper, we propose a tag number estimation scheme and a dynamic frame size allocation scheme based on the estimated number of tags.
An Analysis of System Error Rate
Seong, Soon-Yong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 475~481
The frequency and probability of deadlock are influential factors in the design of algorithms for deadlock. However, little work has been done in this area because it's not easy to analyze how factors such as the characteristics of process or resource, resource request and release patterns, or the number of process affect the occurrence of deadlock. This study was designed to reduce remarkably the number of state by adapting the model 'state (a,b)t' to represent the resource allocation state, as well as to include the effect of resource error rate and recovery rate in the system analysis. Various formulas about deadlock occurrence were resulted in this study such as the average time interval of deadlock, the probability that a process requesting a resource waits or deadlocks, and the probability that a request deadlocks in a cycle of length 2.
Detecting Jamming Attacks in MANET
Shrestha, Rakesh ; Lee, Sang-Duk ; Choi, Dong-You ; Han, Seung-Jo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 482~488
Mobile Ad-hoc Networks provide communication without a centralized infrastructure, which makes them suitable for communication in disaster areas or when quick deployment is needed. On the other hand, they are susceptible to malicious exploitation and have to face different challenges at different layers due to its open Ad-hoc network structure which lacks previous security measures. Denial of service (DoS) attack is one that interferes with the radio transmission channel causing a jamming attack. In this kind of attack, an attacker emits a signal that interrupts the energy of the packets causing many errors in the packet currently being transmitted. In harsh environments where there is constant traffic, a jamming attack causes serious problems; therefore measures to prevent these types of attacks are required. The objective of this paper is to carry out the simulation of the jamming attack on the nodes and determine the DoS attacks in OPNET so as to obtain better results. We have used effective anomaly detection system to detect the malicious behaviour of the jammer node and analyzed the results that deny channel access by jamming in the mobile Ad-hoc networks.
Coefficient Adaptive Multiple Insertion Method With Blind Watermarking
Shin, Chang-Doon ; Kim, Bong-Gi ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 489~497
Most of existent blind watermarking methods in frequency domain use coefficient relationship to detect the watermark without original image. But the change in coefficient values occurred when the original image was attacked by lossy JPEG compression or noise addition. So robustness of watermark detection was weaken. In order to solve these problems, this paper presents a robust watermarking method, which enables multiple watermark insertion. Also, in order to reduce errors in the detected value of watermarks according to small changes in the coefficient relationship when detecting watermarks, it set the change guard value for variation of the coefficients. The experimental results show that the proposed method has good image quality and is robust to various attacks such as the JPEG lossy compression, noise addition, etc.
Efficient Sharing System of Medical Information for Interoperability between PACS System
Cho, Ik-Sung ; Kwon, Hyeong-Soong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 498~504
In the PACS system, the radiology image(X-ray) and its report are saved as separated parts. The exchange of the radiology image between clinics that installed this system are easily achieved by the DICOM standardization. But it is difficult to exchange the radiology report between clinics because a solution of PACS system is different according to manufacturers. The radiology report should be unified the vocabulary and the type of code for effective sharing and exchanging, and also the radiology image and its report should be integrated for the accurate analysis. In this paper, we propose the sharing system of medical information based on HL7-CDA, it defines the templates and converts the structured documents. For this purpose, we design the XML schema of the radiology report and turn the DICOM files into defined schema. The HL7-CDA documents based on XML is easily displayed on web browser and can help the diagnosis by inserting the radiology image.
A study of MIMO Fuzzy system with a Learning Ability
Park, Jin-Hyun ; Bae, Kang-Yul ; Choi, Young-Kiu ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 505~513
Z. Cao had proposed NFRM(new fuzzy reasoning method) which infers in detail using relation matrix. In spite of the small inference rules, it shows good performance than mamdani's fuzzy inference method. But the most of fuzzy systems are difficult to make fuzzy inference rules in the case of MIMO system. The past days, We had proposed the MIMO fuzzy inference which had extended a Z. Cao's fuzzy inference to handle MIMO system. But many times and effort needed to determine the relation matrix elements of MIMO fuzzy inference by heuristic and trial and error method in order to improve inference performances. In this paper, we propose a MIMO fuzzy inference method with the learning ability witch is used a gradient descent method in order to improve the performances. Through the computer simulation studies for the inverse kinematics problem of 2-axis robot, we show that proposed inference method using a gradient descent method has good performances.
Sliding Mode Controller Design Using Virtual State and State Decoupling for IPM Motor
Kim, Min-Chan ; Park, Seung-Kyu ; Yoon, Seong-Sik ; Kwak, Gun-Pyong ; Park, Young-Hwan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 514~521
The current control for Interior-mounted Permanent Magnet Motor(IPM Motor) is more complicate than Surface-mounted Permanent magnet Motor(SPM Motor) because of its torque characteristic depending on the reluctance. For high performance torque control, it requirs state decoupling between d-axis current and q-axis current dynamics. However the variation of the inductances, which couples the state dynamics of the currents, makes the state decoupling difficult. So some decoupling methods have developed to cope this variation and each current can be regulated independently. This paper proposes a novel approach for fully decoupling the states cross-coupling using sliding mode control with virtual state for IPM Motor. As a result, in spite of the parameter uncertainty and disturbance, the proposed sliding surface can have the dynamics of nominal system controlled by PI controller.
An Efficient Timing Closure Methodology in ASIC ECO Step
Seo, Young-Ho ; Choi, Hyun-Jun ; Yoo, Ji-Sang ; Kim, Dong-Wook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 522~530
In this paper, we propose an efficient methodology to fix timing violation in ECO step for ASIC process. Timing violation can occur from various reasons and the major cause is inconsistent correlation between EDA tools. The most frequent violation is setup time and hold time violation. First, we analyzed the reason of violation creation, and then proposed the adjusting method for overcome them. Each violation can be fixed by increasing data required time or decreasing data arrival time. We proposed the detailed technique on a case basis. It is difficult to execute these methods by routine of algorithm or principle. Therefore ASIC engineer needs to apply these technique to violation as conditions of the implemented design.
Fingerprint Sensor Based on a Skin Resistivity with
Jung, Seung-Min ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 531~536
In this paper, we propose
pixel array fingerprint sensor with an advanced circuits for detecting. The pixel level simple detection circuit converts from a small and variable sensing current to binary voltage out effectively. We minimizes an electrostatic discharge(ESD) influence by applying an effective isolation structure around the unit pixel. The sensor circuit blocks were designed and simulated in standard CMOS
process. Full custom layout is performed in the unit sensor pixel and auto placement and routing is performed in the full chip.
The Design and Implementation of Telemedicine System for Emergency Patients in a Ship
Lee, Dong-Hoon ; Kwon, Jang-Woo ; Kim, Gyu-Dong ; Hong, Jun-Eui ; Lee, Sang-Min ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 537~545
Though there were many research and development about telemedicine on land recently, not yet applied to that on the shore. In this paper, when emergency clinic situation were generated in a ship on shore, the telemedicine system was designed and implemented for transfer and clinic service to doctors on the land by measuring basic body signals of patients. Presently, wireless communication and inmarsat telephone are usually used by simple questions and clinic consults to remote doctors when emergency situation were happened in the ship. In this paper, the telemedicine system on the shore were developed for improving this problems by measuring patient's fundamental conditions such as the blood pressure, pulse, the respiratory condition, electrocardiogram, body temperature, patient image and sending these information to remote doctors on land for more accurate prescription. The developed system can supply the high level clinic service to emergency patients on the shore and cope with the emergency situation in ship.
The Web Viewer System Development of Real-Time Patient Monitering using HL7(Healthy Level Seven) Protocol
Kim, Gwang-Jun ; Lim, Se-Jung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 546~555
HL7 is well-known standard protocol for text data generated in hospital information systems. Vital sign information web viewer systems is also the standard protocol for medical image and transfer. In this paper, we have to design to obtain useful vital sign information, which is generated at data receiver modulor of HIS, that is offered by the central monitor. Vital sign informations of central monitor is composed of the row data of several bedsite patient monitors. We are willing to maintain vital sign information of real time and continuity that is generated from the bedsite patient monitor. It is able to apply to remote medical examination and treatment. we proposed integration method between vital sign database systems and hospital information systems. Through the proper exchange and management of patient vital sign information, real time vital sign information management will offer better workflow to all hospital employee.
Performance Improvement of the HMIPv6 Macro Handover using the Address Insurance with Selective Buffering
Ahn, Chi-Hyun ; Woo, Jong-Jung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 556~563
HMIP, an extending version of MIP, makes the signaling traffic low, thereby reducing the packet losses and delay. However, it still has the same problem in MIPv6 in the case of macro mobility, though it can reduce the out-signaling in the case of a micro mobility, a regional mobility with the MAP protocol. To overcome this problem, this paper proposes a handover which exploits an address insurance with selective buffering for the HMIP macro handover. This scheme can decrease the lost packets and the delay time and provide better performance for high QoS traffic and real-time multimedia transmission. The simulation result shows that the proposed scheme makes the transmission delay time and the lost packets smaller than the existing schemes.
Out-of-band Collaborative Spectrum Sensing of CR System in Rayleigh Fading Channel
Kang, Bub-Joo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 564~571
In this paper, we propose out-of -band collaborative spectrum sensing scheme in the cognitive radio (CR) base station operated by the multiple frequency channels. Also this paper presents the signal detection results for ATSC digital TV signal as an incumbent signal and derives signal detection probability and false alarm probability for the out-of-band collaborative spectrum sensing scheme in frequency selective Rayleigh fading channel. Numerical results demonstrate that the sensing performance is improved by the out-of-band collaborative spectrum sensing in the case that the incumbent signal powers measured by the CR terminals of the multiple frequency channels are almost similar.
Implementation of Efficient Mobile Monitoring System of the GreenHouse Environment Data
Seo, Jung-Hee ; Park, Hung-Bog ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 572~579
A monitoring system needs many parameters to increase devices for monitoring data and to support various services. In particular, monitoring the status of a device in a wireless mobile environment has a difficulty in displaying multi data in a limited screen size, and transfer of the status data of a device into a network is largely related with network traffic. The research aims at designing a control board that collects data in order to effectively manage a greenhouse environment system. Also, the research tries to appropriately operate devices, environment data monitoring, and the control of each device by realizing a multiplexed interface based on a web. Thus, in the case in which a distributed client was a computer, monitoring and control were obtained with a web browser through the Lab VIEW web server of a server or local control module in order to effectively monitor and control according to the status of a user. In the case in which a client was a PDA, application of a wireless mobile considering the scale and data processing capacity of a displayer was connected. As a result of the research, we could confirm a satisfactory outcome from the viewpoint of a human-centered design by supplying adaptability and mobility according to the environment of a user.
Design and Implementation of Low-power RTLS Tag using Adaptive Blink
Jung, Yeon-Su ; Kim, Sae-Na ; Baek, Yun-Ju ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 580~585
Real Time Locating Systems (RTLS) are used to track and identify the location of objects in real time using simple, inexpensive tags attached to or embedded in objects and readers that receive the wireless signals from these tags to determine their locations. A tag is powered an internal source such as a battery. The blink frequency of a tag affects the energy efficiency and the locating accuracy of RTLS. The mobility of a tag also affects the locating accuracy. In this paper, we introduce a RTLS tag design which improves the locating accuracy and the power efficiency. We propose an adaptive transmission-rate control algorithm using a motion sensor. By analyzing the signal pattern of the motion sensor, we can build a model to estimate the speed of the motion. Using this model, our algorithm can achieve better locating accuracy and lower power consumption than those of the conventional method. In our experiments, the number of transmission reduced as 40%, keeping similar locating accuracy.
A Design of TopicMap System based on XMDR for Efficient Data Retrieve in Distributed Environment
Hwang, Chi-Gon ; Jung, Kye-Dong ; Kang, Seok-Joong ; Choi, Young-Keun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 586~593
As most of the data configuration at distributed environment has a tree structure following the hierarchical classification, relative data retrieve is limited. Among these data, the data stored in a database has a problem in integration and efficient retrieve. Accordingly, we suggest the system that uses XMDR for distributed database integration and links XMDR to TopicMap for efficient retrieve of knowledge expressed hierarchically. We proposes a plan for efficient integration retrieve through using the XMDR which is composed of Meta Semantic Ontology, Instance Semantic Ontology and meta location, solves data heterogeneity and metadata heterogeneity problem and integrates them, and replaces the occurrence of the TopicMap with the Meta Location of the XMDR, which expresses the resource location of TopicMap by linking Meta Semantic Ontology and Instance Semantic Ontology of XMDR to the TopicMap.
Image Processing Technique for Laser Beam Recognition in Shooting Simulation System
Oh, Se-Chang ; Han, Dong-Il ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 594~601
Shooting simulation systems not only reduce a great amount of expense and time for military exercises but also prevent accidents. In particular, the shooting simulation systems using laser beam have an advantage which is very similar to the shooting exercise that uses real bullets. However, real time technique for laser beam recognition in a target image is necessary. The method proposed in this paper takes a difference image from two adjacent image frames. Then a thresholding is applied on this difference image to discriminate laser beam from background. To decide the threshold value the intensity distribution of background points is modeled assuming normal distribution. Then a noise reduction and a region segmentation are applied on the binary image to find the position of a laser beam. The time complexity of this process depends on the size of an image multiplied by the size of a mask used in the noise reduction process. The experimental result showed that the accuracy of the system was 93.3%. Even in the inaccurate cases the beam was always found in the resultant region.
The Design and Implementation of the Explorer Robot Adaptive Pipe Magnitude Width and Curve
Lee, Kwang-Seok ; Lee, Byeong-Ro ; Choo, Yeon-Gyu ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 602~607
Most of explorer robot in past has the fixed magnitude and communicate with wire communication method. In case of various range of pipe's width and various angle in pipe inter structure, the exploring work is very difficult. Thus, in this paper, we design as dealing with spring tension with pushing out pipe exterior, and applied RF communication. We can accept good performance both structure change and improvement of ability, monitor and collect the defaults data in pipe inter structure. Newly designed and developed pipe explorer robot is very advantageous to carrying and driving as being small and law weight.
An Energy Efficient Cluster-head Selection Algorithm Using Head Experience Information in Wireless Sensor Networks
Kim, Hyung-Jue ; Kim, Seong-Cheol ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 608~614
In wireless sensor networks, there are hundreds to thousands of small battery powered devices which are called sensors. As sensors have a limited energy resources, there is a need to use it effectively. A clustering based routing protocol forms clusters by distributed algorithm. Member nodes send their data to their cluster heads then cluster heads integrate data and send to sink node. In this paper we propose an energy efficient cluster-head selection algorithm. We have used some factors(a previous cluster head experience, a existence of data to transmit and an information that neighbors have data or not) to select optimum cluster-head and eventually improve network lifetime. Our simulation results show its effectiveness in balancing energy consumption and prolonging the network lifetime compared with LEACH and HEED algorithms.
Design and Implementation of Multimedia Sensor Networks with Image Sensor
Lee, Joa-Hyoung ; Jo, Young-Tae ; Jung, In-Bum ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 615~622
Advances in wireless communication and hardware technology have made it possible to manufacture high-performance tiny sensor nodes. More recently, the availability of inexpensive CMOS cameras that are able to capture multimedia data from the environment has fostered the development of Wireless Multimedia Sensor Networks (WMSNs). WMSN with the CMOS imaging sensor which is cheaper and consumes lower power than the CCD will not only enhance existing sensor network but also enable several new application such as multimedia surveillance sensor network, multimedia environment monitoring. This paper presents the design of a multimedia sensor network with the image sensor mote developed by us using the CMOS. Given new multimeida sensor network, the new image collecting protocol was tested and analyzed.
A Design of Wireless Sensor Node Using Embedded System
Cha, Jin-Man ; Lee, Young-Ra ; Park, Yeon-Sik ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 3, 2009, Pages 623~628
The emergence of compact and low-power wireless communication sensors and actuators in the technology supporting the ongoing miniaturization of processing and storage allows for entirely the new kinds of embedded systems. These systems are distributed and deployed in environments where they may have been designed into a particular control method, and are often very dynamic. Collection of devices can communicate to achieve a higher level of coordinated behavior. Wireless sensor nodes deposited in various places provide light, temperature, and activity measurements. Wireless sensor nodes attached to circuits or appliances sense the current or control the usage. Together they form a dynamic and multi-hop routing network connecting each node to more powerful networks and processing resources. Wireless sensor networks are a specific-application and therefore they have to involve both software and hardware. They also use protocols that relate to both applications and the wireless network. Wireless sensor networks are consumer devices supporting multimedia applications such as personal digital assistants, network computers, and mobile communication devices. Wireless sensor networks are becoming an important part of industrial and military applications. The characteristics of modem embedded systems are the capable of communicating adapting the different operating environments. In this paper, We designed and implemented sensor network system which shows through host PC sensing temperature and humidity data transmitted for wireless sensor nodes composed wireless temperature and humidity sensor and designs sensor nodes using embedded system with the intention of studying USN.